IS-WARS: Intelligent and Stealthy Adversarial Attack to Wi-Fi-Based Human Activity Recognition Systems

被引:12
作者
Huang, Pei [1 ]
Zhang, Xiaonan [2 ]
Yu, Sihan [1 ]
Guo, Linke [1 ]
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29634 USA
[2] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
基金
美国国家科学基金会;
关键词
Wireless fidelity; Wireless communication; Activity recognition; Zigbee; Interference; Wireless sensor networks; Noise reduction; Wireless adversarial example; cross-technology interference; channel state information; human activity recognition; MODEL;
D O I
10.1109/TDSC.2021.3110480
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The non-intrusive human activity recognition has been envisioned as a key enabler for many emerging applications requiring interactions between humans and computing systems. To accurately recognize different human behaviors, ubiquitous wireless signals are widely adopted, e.g., Wi-Fi signals, whose Channel State Information (CSI) can precisely reflect human movements. Unfortunately, nearly all Wi-Fi-based recognition systems assume a clean wireless environment, i.e., no interference will compromise the developed algorithms, which, apparently, is not feasible in practice. Even worse, for systems using Wi-Fi 2.4GHz signals, the widely existing interference from coexisting protocols, such as ZigBee, Bluetooth, and LTE-Unlicensed, can easily compromise the recognition process, posing a hard limit on further enhancing the accuracy. Therefore, this work uncovers a new signal adversarial attack against Wi-Fi-based human activity recognition systems, by intentionally injecting interference using coexisting protocol signals. The contaminated Wi-Fi signal will distort CSI estimation and finally output a false recognition result. Different from traditional jamming attacks, this new adversarial attack is intelligent and stealthy in terms of avoiding being detected from traffic analysis. Along with both theoretical analysis and extensive real-world experiments, we have shown this newly-identified attack can easily compromise many existing Wi-Fi-based human recognition systems while still bypassing existing schemes for malicious signal detection.
引用
收藏
页码:3899 / 3912
页数:14
相关论文
共 44 条
[1]  
[Anonymous], 2012, Smoothing Methods in Statistics, DOI DOI 10.1007/978-1-4612-4026-6
[2]  
Balasubramanian K, 2018, ADV NEUR IN, V31
[3]  
Berndt DJ, 1994, P 3 INT C KNOWL DISC, P359
[4]   Towards Accurate Corruption Estimation in ZigBee Under Cross-Technology Interference [J].
Chen, Gonglong ;
Dong, Wei ;
Zhao, Zhiwei ;
Gu, Tao .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, :425-435
[5]   Denoising of Hyperspectral Imagery Using Principal Component Analysis and Wavelet Shrinkage [J].
Chen, Guangyi ;
Qian, Shen-En .
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2011, 49 (03) :973-980
[6]  
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[7]   THE WAVELET TRANSFORM, TIME-FREQUENCY LOCALIZATION AND SIGNAL ANALYSIS [J].
DAUBECHIES, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (05) :961-1005
[8]   Cross-Technology Interference Mitigation in Body Area Networks: An Optimization Approach [J].
Elias, Jocelyne ;
Paris, Stefano ;
Krunz, Marwan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (09) :4144-4157
[9]   PAWS: Passive Human Activity Recognition Based on WiFi Ambient Signals [J].
Gu, Yu ;
Ren, Fuji ;
Li, Jie .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05) :796-805
[10]  
Guo XZ, 2018, IEEE INFOCOM SER, P360, DOI 10.1109/INFOCOM.2018.8486364