[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3317549.3324928acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

SurFi: detecting surveillance camera looping attacks with wi-fi channel state information

Published: 15 May 2019 Publication History

Abstract

The proliferation of surveillance cameras has greatly improved the physical security of many security-critical properties including buildings, stores, and homes. However, recent surveillance camera looping attacks demonstrate new security threats --- adversaries can replay a seemingly benign video feed of a place of interest while trespassing or stealing valuables without getting caught. Unfortunately, such attacks are extremely difficult to detect in real-time due to cost and implementation constraints. In this paper, we propose SurFi to detect these attacks in real-time by utilizing commonly available Wi-Fi signals. In particular, we leverage that channel state information (CSI) from Wi-Fi signals also perceives human activities in the place of interest in addition to surveillance cameras. SurFi processes and correlates the live video feeds and the Wi-Fi CSI signals to detect any mismatches that would identify the presence of the surveillance camera looping attacks. SurFi does not require the deployment of additional infrastructure because Wi-Fi transceivers are easily found in the urban indoor environment. We design and implement the SurFi system and evaluate its effectiveness in detecting surveillance camera looping attacks. Our evaluation demonstrates that SurFi effectively identifies attacks with up to an attack detection accuracy of 98.8% and 0.1% false positive rate.

References

[1]
H. Abdelnasser, M. Youssef, and K. A. Harras. 2015. WiGest: A ubiquitous WiFi-based gesture recognition system. In Proc. of INFOCOM.
[2]
Fadel Adib and Dina Katabi. 2013. See through walls with WiFi!. In Proc. of SIGCOMM.
[3]
Van Albert and Banks. 2015. Looping Surveillance Cameras through Live Editing. https://www.youtube.com/watch?v=RoOqznZUClI
[4]
Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, and Matthias Hollick. 2015. Using Channel State Information for Tamper Detection in the Internet of Things. In Proc. of ACSAC.
[5]
Zhe Cao, Gines Hidalgo, Tomas Simon, Shih-En Wei, and Yaser Sheikh. 2018. OpenPose: realtime multi-person 2D pose estimation using Part Affinity Fields. In arXiv preprint arXiv:1812.08008.
[6]
D Halperin, W. Hu, A. Sheth, and D. Wetherall. 2011. Tool release: Gathering 802.11n traces with channel state information. In ACM SIGCOMMM CCR.
[7]
Craig Heffners. 2013. Exploiting Network Surveillance Cameras Like a Hollywood Hacker. https://www.youtube.com/watch?v=B8DjTcANBx0
[8]
Wenjun Jiang, Chenglin Miao, Fenglong Ma, Shuochao Yao, Yaqing Wang, Ye Yuan, Hongfei Xue, Chen Song, Xin Ma, Dimitrios Koutsonikolas, et al. 2018. Towards Environment Independent Device Free Human Activity Recognition. In Proc. of MobiCom. 289--304.
[9]
Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, and Jong Taek Lee. 2019. SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version). https://arxiv.org/abs/1904.01350
[10]
Tapia W. Munguia. 2008. Using machine learning for real-time activity recognition and estimation of energy expenditure. In Ph.D. dissertation.
[11]
Le T. Nguyen, Yu Seung Kim, Patrick Tague, and Joy Zhang. 2014. IdentityLink: User-device Linking Through Visual and RF-signal Cues. In Proc. of UbiComp.
[12]
Shijia Pan, Carlos Ruiz, Jun Han, Adeola Bannis, Patrick Tague, Hae Young Noh, and Pei Zhang. 2018. UniverSense: IoT Device Pairing Through Heterogeneous Sensing Signals. In Proc. of HotMobile.
[13]
Qifan Pu, Sidhant Gupta, Shyamnath Gollakota, and Shwetak Patel. 2013. Whole-home Gesture Recognition Using Wireless Signals. In Proc. of MobiCom.
[14]
Carlos Ruiz, Shijia Pan, Adeola Bannis, Xinlei Chen, Carlee Joe-Wong, Hae Young Noh, and Pei Zhang. 2018. IDrone: Robust Drone Identification Through Motion Actuation Feedback. Proc. of IMWUT.
[15]
Matthias Schulz, Jakob Link, Francesco Gringoli, and Matthias Hollick. 2018. Shadow Wi-Fi: Teaching Smartphones to Transmit Raw Signals and to Extract Channel State Information to Implement Practical Covert Channels over Wi-Fi. In Proc. of MobiSys. ACM.
[16]
Wei Wang, Alex X. Liu, and Muhammad Shahzad. 2016. Gait Recognition Using Wifi Signals. In Proc. of UbiComp.
[17]
Wei Wang, Alex X Liu, Muhammad Shahzad, Kang Ling, and Sanglu Lu. 2015. Understanding and modeling of WiFi signal based human activity recognition. In Proc. of MobiCom.
[18]
Yunze Zeng, Parth H. Pathak, and Prasant Mohapatra. 2016. WiWho: WiFi-based Person Identification in Smart Spaces. In Proc. of IPSN.
[19]
J. Zhang, B. Wei, W. Hu, and S. S. Kanhere. 2016. WiFi-ID: Human Identification Using WiFi Signal. In Proc. of DCOSS.

Cited By

View all
  • (2024)Precise Wireless Camera Localization Leveraging Traffic-Aided Spatial AnalysisIEEE Transactions on Mobile Computing10.1109/TMC.2023.333327223:6(7256-7269)Online publication date: Jun-2024
  • (2024)A Survey on Human Profile Information Inference via Wireless SignalsIEEE Communications Surveys & Tutorials10.1109/COMST.2024.337339726:4(2577-2610)Online publication date: Dec-2025
  • (2023)Phantom-CSI Attacks against Wireless Liveness DetectionProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607245(440-454)Online publication date: 16-Oct-2023
  • Show More Cited By

Index Terms

  1. SurFi: detecting surveillance camera looping attacks with wi-fi channel state information

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
    May 2019
    359 pages
    ISBN:9781450367264
    DOI:10.1145/3317549
    © 2019 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 May 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CSI
    2. surveillance video
    3. wi-fi

    Qualifiers

    • Research-article

    Conference

    WiSec '19
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 98 of 338 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Precise Wireless Camera Localization Leveraging Traffic-Aided Spatial AnalysisIEEE Transactions on Mobile Computing10.1109/TMC.2023.333327223:6(7256-7269)Online publication date: Jun-2024
    • (2024)A Survey on Human Profile Information Inference via Wireless SignalsIEEE Communications Surveys & Tutorials10.1109/COMST.2024.337339726:4(2577-2610)Online publication date: Dec-2025
    • (2023)Phantom-CSI Attacks against Wireless Liveness DetectionProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607245(440-454)Online publication date: 16-Oct-2023
    • (2023)Self-supervised Multi-Modal Video Forgery Attack Detection2023 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC55385.2023.10118664(1-6)Online publication date: Mar-2023
    • (2023)Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette CorrespondenceIEEE INFOCOM 2023 - IEEE Conference on Computer Communications10.1109/INFOCOM53939.2023.10228947(1-10)Online publication date: 17-May-2023
    • (2022)Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State InformationIEEE Transactions on Wireless Communications10.1109/TWC.2021.312918821:6(4340-4349)Online publication date: Jun-2022
    • (2021)MotionCompassProceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services10.1145/3458864.3467683(215-227)Online publication date: 24-Jun-2021
    • (2021)Towards Cross-Modal Forgery Detection and Localization on Live Surveillance VideosIEEE INFOCOM 2021 - IEEE Conference on Computer Communications10.1109/INFOCOM42981.2021.9488798(1-10)Online publication date: 10-May-2021
    • (2021)Light Weight Passive Human Motion Detection with WiFi2021 6th International Conference on Intelligent Computing and Signal Processing (ICSP)10.1109/ICSP51882.2021.9408952(1310-1315)Online publication date: 9-Apr-2021
    • (2020)A Holistic Review of Cybersecurity and Reliability Perspectives in Smart AirportsIEEE Access10.1109/ACCESS.2020.3036728(1-1)Online publication date: 2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media