2,038 research outputs found

    Violating privacy through walls by passive monitoring of radio windows

    Get PDF
    pre-printWe investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a person crosses the link lines between the legitimate transmitters and the attack receivers, by using physical layer measurements. We also develop a method to estimate the direction of movement of a person from the sequence of link lines crossed during a short time interval. Additionally, we describe how an attacker may estimate any artificial changes in transmit power (used as a countermeasure), compensate for these power changes using measurements from sufficient number of links, and still detect line crossings. We implement our methodology on WiFi and ZigBee nodes and experimentally evaluate the MRW attack by passively monitoring human movements through external walls in two real-world settings. We find that achieve close to 100% accuracy in detecting line crossings and determining direction of motion, even through reinforced concrete walls

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Security assemblages: enclaving, private security, and new materialism in suburban Johannesburg

    Get PDF
    A research report submitted in partial satisfaction of the requirements of the degree Master of Arts in Anthropology March 2016This research report explores how private security is materially assembled in suburban Johannesburg. Based on ethnographic fieldwork within a private security company operating across the northern suburbs of Greater Johannesburg, it examines how the materiality of security is intimately intertwined with shaping the socio-spatial terrain of the city. Using a new materialist “assemblage” theory proposed by Jane Bennett, it contends although the materials of private security are designed to protect and exclude, they often work rather differently on the ground, resulting in strange new ways of seeing, moving, and relating in the city

    The Evolution of Wi-Fi Technology in Human Motion Recognition: Concepts, Techniques and Future Works

    Get PDF
    . Human motion recognition is an important topic in computer vision as well as security. It is used in scientific research, surveillance cameras industry and robotics technology as well. The human interaction with the objects creates a complex stance. Multiple artefacts such as clutter, occlusions, and backdrop diversity contribute to the complexity of this technology. Wi-Fi signals with the usage of their features could help solve some of these issues, with the help of other wearable sensors, such as: RGB-D camera, IR sensor (thermal camera), inertial sensor etc. This paper reviews various approaches for Wi-Fi human motion recognition systems, their analytical methodologies, challenges and proposed techniques along with the aspects to this paper: (a) applications; (b) single and multi-modality sensing; (c) Wi-Fi-based techniques; d) challenges and future works. More research related to Wi-Fi human related activity recognition can be encouraged and improved

    Space Station Habitability Recommendations Based on a Systematic Comparative Analysis of Analogous Conditions

    Get PDF
    Conditions analogous to the proposed NASA Space Station are systematically analyzed in order to extrapolate design guidelines and recommendations concerning habitability and crew productivity. Analogous environments studied included Skylab, Sealab, Tektite, submarines, Antarctic stations and oil drilling platforms, among others. These analogues were compared and rated for size and composition of group, social organization, preparedness for mission, duration of tour, types of tasks, physical and psychological isolation, personal motivation, perceived risk, and quality of habitat and life support conditions. One-hundred design recommendations concerning, sleep, clothing, exercise, medical support, personal hygiene, food preparation, group interaction, habitat aesthetics, outside communications, recreational opportunities, privacy and personal space, waste disposal, onboard training, simulation and task preparation, and behavioral and physiological requirements associated with a microgravity environment, are provided

    Doctor of Philosophy

    Get PDF
    dissertationWe are seeing an extensive proliferation of wireless devices including various types and forms of sensor nodes that are increasingly becoming ingrained in our daily lives. There has been a significant growth in wireless devices capabilities as well. This proliferation and rapid growth of wireless devices and their capabilities has led to the development of many distributed sensing and computing applications. In this dissertation, we propose and evaluate novel, efficient approaches for localization and computation offloading that harness distributed sensing and computing in wireless networks. In a significant part of this dissertation, we exploit distributed sensing to create efficient localization applications. First, using the sensing power of a set of Radio frequency (RF) sensors, we propose energy efficient approaches for target tracking application. Second, leveraging the sensing power of a distributed set of existing wireless devices, e.g., smartphones, internet-of-things devices, laptops, and modems, etc., we propose a novel approach to locate spectrum offenders. Third, we build efficient sampling approaches to select mobile sensing devices required for spectrum offenders localization. We also enhance our sampling approaches to take into account selfish behaviors of mobile devices. Finally, we investigate an attack on location privacy where the location of people moving inside a private area can be inferred using the radio characteristics of wireless links that are leaked by legitimate transmitters deployed inside the private area, and develop the first solution to mitigate this attack. While we focus on harnessing distributed sensing for localization in a big part of this dissertation, in the remaining part of this dissertation, we harness the computing power of nearby wireless devices for a computation offloading application. Specially, we propose a multidimensional auction for allocating the tasks of a job among nearby mobile devices based on their computational capabilities and also the cost of computation at these devices with the goal of reducing the overall job completion time and being beneficial to all the parties involved
    corecore