Acoustic Eavesdropping through Wireless Vibrometry University of Wisconsin – Madison, Chinese Academy of Sciences School of Electronic Information and.

Slides:



Advertisements
Similar presentations
GSC: Standardization Advancing Global Communications Evolution of TD-SCDMA China Communications Standards Association (CCSA) Chicago, May 29th to 2nd June,
Advertisements

UAbove Law fahrul hakim2003 Wireless LAN implications Project managers and design engineer should be aware, the following potential problems from the implementation.
AMATEUR RADIO TRAINING
Analysis of Gait Patterns by Using a Sound Sensor and Wireless Communication Miku Teruya Department of Information Communication, Okinawa National College.
Data Communication lecture10
Whole-Home Gesture Recognition Using Wireless Signals —— MobiCom’13 Author: Qifan Pu et al. University of Washington Presenter: Yanyuan Qin & Zhitong Fei.
Date: Friday, April 11, 2008 Time: 11:00 a.m. Place: ECSS TI Auditorium Engineering and Computer Science Complex, UTD Campus Professor Moeness Amin.
Chapter 11: Electromagnetic Waves
WIRELESS COMMUNICATIONS Assist.Prof.Dr. Nuray At.
1 Dhwani : Peer–Peer Secure Acoustic NFC Rajalakshmi Nandakumar Krishna Chintalapudi Venkata Padmanabhan Ramarathnam Venkatesan Microsoft Research India.
J. N. DenenbergActive Noise Cancellation1 NOISE CANCELLATION INTRODUCTION TECHNOLOGY APPLICATIONS DEMONSTRATION.
Unbounded media have network signals that are not bound by any type of fiber or cable; hence, they are also called wireless technologies Wireless LAN.
Lecture 41 The AM Radio. Lecture 42 The AM Radio Understanding the AM radio requires knowledge of several EE subdisciplines: –Communications/signal processing.
Integrated Circuits Design for Applications in Communications Dr. Charles Surya Department of Electronic and Information Engineering DE636  6220
Harbin Institute of Technology (Weihai) 1 Chapter 2 Channel Measurement and simulation  2.1 Introduction  Experimental and simulation techniques  The.
EEE440 Modern Communication Systems Wireless and Mobile Communications.
WIRELESS COMMUNICATIONS Assist.Prof.Dr. Nuray At.
PRESENTATION BY ATIF DAR ULTRASONIC SENSORS.. CONTENTS PAGE Page 1 – Homepage Page 3 – Description of Ultrasonic Sensor. Page 4 – How the Ultrasonic Sensor.
King Saud University College of Applied studies and Community Service 1301CT By: Nour Alhariqi 1nalhareqi st semester
Frequency Modulation in Wireless Microphone System EECE 252 Project Spring 2012 Presented by: Haolin Wang, Muhamad Fuad Harun, Baihaqis Bahran.
Transmission Media / Channels. Introduction Provides the connection between the transmitter and receiver. 1.Pair of wires – carry electric signal. 2.Optical.
Acoustic Echo Cancellation Using Digital Signal Processing. Presented by :- A.Manigandan( ) B.Naveen Raj ( ) Parikshit Dujari ( )
3/13/2009IB Physics HL 21 Ultrasound Medical Imaging Physics – IB Objectives I.2.7Describe the principles of the generation and the detection of ultrasound.
COMMUNICATION THEORY.
Radio Communication SL – Option F.1. Radio communication includes any form of communication that uses radio (EM) waves to transfer information –TV, mobile.
1 nd semester King Saud University College of Applied studies and Community Service 1301CT.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
Technical Seminar Presented by :- Debabandana Apta (EC ) National Institute of Science and Technology [1] “ECHO CANCELLATION” Presented.

Doc.: IEEE /0364r1 SubmissionEldad Perahia, Intel CorporationSlide 1 Date: Authors: Antenna Array Gain from Measured Data for n/ac.
TELECOMMUNICATIONS Dr. Hugh Blanton ENTC 4307/ENTC 5307.
EELE 5490, Fall, 2009 Wireless Communications Ali S. Afana Department of Electrical Engineering Class 5 Dec. 4 th, 2009.
Complementary Code Keying with PIC based microcontrollers for The Wireless Radio Communications.
On Distinguishing the Multiple Radio Paths in RSS-based Ranging Dian Zhang, Yunhuai Liu, Xiaonan Guo, Min Gao and Lionel M. Ni College of Software, Shenzhen.
Doc.: IEEE d_Intra-Device_Propagation_Measuremets Submission March 2015 Slide 1 Project: IEEE P Working Group for Wireless Personal.
Experimental Results ■ Observations:  Overall detection accuracy increases as the length of observation window increases.  An observation window of 100.
EE 6331, Spring, 2009 Advanced Telecommunication Zhu Han Department of Electrical and Computer Engineering Class 7 Feb. 10 th, 2009.
Senior Project – Electrical Engineering – 2005 Wireless Baby Monitor Nelson Rosario, Farida Siddiqi Advisors: Professor Ekram Hassib Professor Emad A.
EECE 252 PROJECT SPRING 2014 Presented by: Peizhen Sun Nor Asma Mohd Sidik.
Adaphed from Rappaport’s Chapter 5
Advancing Wireless Link Signatures for Location Distinction Mobicom 2008 Junxing Zhang, Mohammad H. Firooz Neal Patwari, Sneha K. Kasera University of.
Vehicle Identification Detect vehicles in large open fields and to track the movement of vehicles remotely Presented by Hoda El-Dawy Mohamed.
Coexistence in heterogeneous networks Discuss the interference issue
Part 3  Transmission Media & EM Propagations.  Provides the connection between the transmitter and receiver. 1.Pair of wires – carry electric signal.
Turning a Mobile Device into a Mouse in the Air
Doc.: IEEE thz Submission March 2009 Young-Chai Ko,Korea UniversitySlide 1 Project: IEEE P Working Group for Wireless Personal.
TELECOMMUNICATION. Communication over a long distance.
EENG473 Mobile Communications Module 3 : Week # (10) Mobile Radio Propagation: Large-Scale Path Loss.
RADIO RECIEVERS.
1 Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan and Anish Arora Department of Computer Science and Engineering PhyCloak: Obfuscating Sensing from.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
WIRELESS CHARGING Presented by: K.MAHESH (08T81A1236)
EEE 441 Wireless And Mobile Communications
Antenna Developments for WiFi Phase Applications Diversity MIMO.
Senior Science Information Systems
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
WIRELESS POWER TRANSFER
WIRELESS POWER TRANSFER
Wireless power transfer by High frequency resonating coils
WIRELESS POWER TRANSFER
Dhwani : Peer–Peer Secure Acoustic NFC
UNIT I – Wireless channels
WiFinger: Talk to Your Smart Devices with Finger-grained Gesture
Communication Systems.
Blind Known Interference Cancellation
Radio AIM: To understand the parts of a simple A.M. radio and appreciate the purpose of modulation. PRIOR KNOWLEDGE: Frequency and Amplitude
Acoustic Eavesdropping through Wireless Vibrometry
Keystroke Recognition using Wi-Fi Signals
doc.: IEEE yy/xxxxr0 Date:
Wireless LAN.
Presentation transcript:

Acoustic Eavesdropping through Wireless Vibrometry University of Wisconsin – Madison, Chinese Academy of Sciences School of Electronic Information and Electrical Engineering Presenter: XiaofengHou Student ID:

The Evolution of Acoustic Eavesdropping Directional Microphone Fail in the sound-proof environment. Widely used in espionage and newsgathering Laser-based Microphone Highly directional and sensitive. Require unobstructed line-of-sight between the subject and laser. Microwave-based Microphone Penetrate sound-proof material and unblocked by obstacles The basic idea of this paper lies in a translation between acoustic vibration and radio signal fluctuation.

Initial Questions ? Q1 : How to capture acoustic information by radio signal fluctuation ? Q2 : How to recover the primitive sound from signal fluctuation ? Q3 : How to boost the eavesdropping quality ? Q4 : How to defend against the eavesdropping ? Q5 : ……

Contents Background and Motivation Threat Model Implementation Methodologies Reflective Audio Eavesdropping Emission Audio Eavesdropping Set & Experiment Counter Measures Conclusion

Contents Background and Motivation Threat Model Implementation Methodologies Reflective Audio Eavesdropping Emission Audio Eavesdropping Set & Experiment Counter Measures Conclusion

Acoustic Eavesdropping through Wireless Loudspeaker and Wi-Fi are widely used in the conference and home environment Image wireless can pick up the sound and leak private information

Contents Background and Motivation Threat Model Implementation Methodologies Reflective Audio Eavesdropping Emission Audio Eavesdropping Set & Experiment Counter Measures Conclusion

Threat Model Translate acoustic vibration into radio signal fluctuation Step 1 : Audio emission causes small vibration of the loudspeaker body, which is invisible to human eyes. Step 2 : But such minute motion can resonance with radio waves reflected by the loudspeaker, or originating from a wireless transmitter co-located with the loudspeaker. Step 3 : The contaminated radio waves can be captured by a tampered receiver and processed to recover the original audio played by the loudspeaker.

Threat Models EmissiveReflective Attacker Tx Rx Victim Wall Attacker Victim Wall Rx AP Compared to the right, the left can control radio signal into a specific frequency band, with a practical transmit power level. What’s the natural difference between reflective and emissive vibrometry ?

Contents Background and Motivation Threat Model Implementation Methodologies Reflective Audio Eavesdropping Emission Audio Eavesdropping Set & Experiment Counter Measures Conclusion

Taylor expansion Acoustic-Radio Transformation Problem & Challenge Q2 : How to recover the primitive sound from signal fluctuation ? Radio pathloss Acoustic-Radio Transformation (ART) RSS-based ART Phase-based ART DC component Audio signal component High-order harmonics DC component Audio signal component Micro Doppler

Observations & Solutions Enhance the eavesdropping quality Problem & challenge Challenge 1 : Noises, i.e. reflections from irrelevant background objects can overwhelm the signals modulated by the loudspeaker. Q3 : How to boost the eavesdropping quality ? Challenge 2 : The reflected signals is orders of magnitude lower than sub- millimeter and become weaker as attacker-victim distance d0 increases beyond a few meters. Solution 1 : A simple frequency filter. Observation 1 : The leakage and background signals are typically quasi- stationary compared to the audio vibration. Solution 2 : Multi-antenna beamforming. Observation 2 : The radio sampling rate is far beyond the audio frequency.

Bandpass filter TxRx Loudspeaker reflection Received signal Background Reflection Path Loudspeaker Reflection Path Wireless signal is broadcasting in natural I Q SlSl S ScSc Background reflection Background reflections Multipath affects eavesdropping quality

Blind multi-antenna beamforming I Q SlSl S ScSc I Q SlSl S ScSc I Q SlSl S ScSc Antenna 1Antenna 2Beamform Basic Idea Solution: blind beamforming algorithm Problem: no channel training Weight Searching RxTx Radio 1 Radio 2 TxRx Radio 1 Radio 2 RxTx Radio 1 Radio 2 Role-switch Rx weight search 2 Blind multi- antenna Beamforming Rx weight search 1 Improved eavesdropping quality

Observations & Solutions Enhanced Emissive ART Problem & challenge Q : How to distinguish the victim’s reflection from various noises ? Challenge : Compared to the reflective ART, which transfer radio signal with specified frequency, the missive one can’t control the wireless signal, i.e. WiFi. Attacker Rx AP STFLTFHeaderPayload Short Training Field (STF) Packet detection Emissive ART

Contents Background and Motivation Threat Model Implementation Methodologies Reflective Audio Eavesdropping Emission Audio Eavesdropping Set & Experiment Counter Measures Conclusion

Experiment Setup Conference Room Sound-proof Room Diversity gain Distance to antenna: 1 ~ 5m

Contents Background and Motivation Threat Model Implementation Methodologies Reflective Audio Eavesdropping Emission Audio Eavesdropping Set & Experiment Counter Measures Conclusion

Counter Measure #2 : Interfering Mechanical Vibrations Human movement Rotating fan … Uplink WiFi packets time Original power of packets Power time Randomized power of packets Power #3 : Transmission Power Randomization #1 : Safety Distance Mainly dependent on the audio’s PSNR

Contents Background and Motivation Threat Model Implementation Methodologies Reflective Audio Eavesdropping Emission Audio Eavesdropping Set & Experiment Counter Measures Conclusion

Answers to the initial questions Q1 : How to capture acoustic information by radio signal fluctuation ? S1 : Translate acoustic vibration into radio signal fluctuation. Q2 : How to recover the primitive sound from signal fluctuation ? S2 : Acoustic-Radio Transformation (ART). Q3 : How to boost the eavesdropping quality ? S3 : A simple frequency filter, multi-antenna beamforming. Q4 : How to defend against the eavesdropping ? S4 : Interfering mechanical vibrations, transmission power randomization. Q5 : …… Future work : Investigation into the effect of WIFI packet rate to eavesdropping quality, more detailed counter measures, ……