Understanding and Modeling of WiFi Signal-Based Indoor Privacy Protection

被引:11
|
作者
Zhang, Wei [1 ,2 ]
Zhou, Siwang [1 ]
Peng, Dan [1 ]
Yang, Liang [1 ]
Li, Fangmin [2 ,3 ]
Yin, Hui [2 ,3 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] Changsha Univ, Sch Comp Engn & Appl Math, Changsha 410022, Peoples R China
[3] Changsha Univ, Hunan Prov Key Lab Ind Internet Technol & Secur, Changsha 410022, Peoples R China
基金
中国国家自然科学基金;
关键词
Semantics; Privacy; Wireless fidelity; Support vector machines; Security; Internet of Things; Indoor environments; Activity recognition; channel state information (CSI); deep network; privacy protection;
D O I
10.1109/JIOT.2020.3015994
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing WiFi recognition schemes are capable of discovering patterns of indoor semantics, such as human activity, identity, indoor environment, and so on. We note that channel state information (CSI) presents an opportunity for hackers to learn indoor privacy, however, currently there is a lack of security research on CSI. In this article, we are the first to discuss and define the security problem of CSI signals, which is further extended to the problems of nontargeted protection and targeted protection. To solve them, we present two types of adversarial autoencoder networks (AAENs). Through replacing the original signals with the generated adversarial ones, the protected semantic features are modified, and the significant features of the other semantics required to be recognized are reserved. Intensive evaluations demonstrate that with the proposed AAENs, the recognition accuracy of the protected semantic can be significantly decreased, while still maintaining the other semantics to be identified correctly.
引用
收藏
页码:2000 / 2010
页数:11
相关论文
共 50 条
  • [21] Key Based Artificial Fingerprint Generation for Privacy Protection
    Li, Sheng
    Zhang, Xinpeng
    Qian, Zhenxing
    Feng, Guorui
    Ren, Yanli
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 828 - 840
  • [22] An Enhanced Location Scattering Based Privacy Protection Scheme
    Nisha, Nisha
    Natgunanathan, Iynkaran
    Xiang, Yong
    IEEE ACCESS, 2022, 10 : 21250 - 21263
  • [23] Trajectory Privacy Protection Method Based on Differential Privacy
    Yuan S.-L.
    Pi D.-C.
    Xu M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (07): : 1266 - 1273
  • [24] Privacy-Phys: Facial Video-Based Physiological Modification for Privacy Protection
    Sun, Zhaodong
    Li, Xiaobai
    IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1507 - 1511
  • [25] A Differential Privacy Protection Protocol Based on Location Entropy
    Guo, Ping
    Ye, Baopeng
    Chen, Yuling
    Li, Tao
    Yang, Yixian
    Qian, Xiaobin
    Yu, Xiaomei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (03): : 452 - 463
  • [26] Two Level Based Privacy Protection Approach for Internet of Things Users in Cloud Computing
    Alarabi, Shatha
    Alaradi, Sara
    Almuzeri, Shahad
    Innab, Nisreen
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [27] Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent
    Guo, Dan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 143 - 152
  • [28] Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability
    Zhou, Yong
    Lei, Hong
    Bao, Zijian
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 7498 - 7510
  • [29] WiFi-Based Adaptive Indoor Passive Intrusion Detection
    Tian, Zengshan
    Li, Yong
    Zhou, Mu
    Li, Ze
    2018 IEEE 23RD INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2018,
  • [30] Understanding WiFi Signal Frequency Features for Position-Independent Gesture Sensing
    Niu, Kai
    Zhang, Fusang
    Wang, Xuanzhi
    Lv, Qin
    Luo, Haitong
    Zhang, Daqing
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (11) : 4156 - 4171