skip to main content
research-article

Next2You: Robust Copresence Detection Based on Channel State Information

Published:15 February 2022Publication History
Skip Abstract Section

Abstract

Context-based copresence detection schemes are a necessary prerequisite to building secure and usable authentication systems in the Internet of Things (IoT). Such schemes allow one device to verify proximity of another device without user assistance utilizing their physical context (e.g., audio). The state-of-the-art copresence detection schemes suffer from two major limitations: (1) They cannot accurately detect copresence in low-entropy context (e.g., empty room with few events occurring) and insufficiently separated environments (e.g., adjacent rooms), (2) They require devices to have common sensors (e.g., microphones) to capture context, making them impractical on devices with heterogeneous sensors. We address these limitations, proposing Next2You, a novel copresence detection scheme utilizing channel state information (CSI). In particular, we leverage magnitude and phase values from a range of subcarriers specifying a Wi-Fi channel to capture a robust wireless context created when devices communicate. We implement Next2You on off-the-shelf smartphones relying only on ubiquitous Wi-Fi chipsets and evaluate it based on over 95 hours of CSI measurements that we collect in five real-world scenarios. Next2You achieves error rates below 4%, maintaining accurate copresence detection both in low-entropy context and insufficiently separated environments. We also demonstrate the capability of Next2You to work reliably in real-time and its robustness to various attacks.

REFERENCES

  1. [1] Abouzar Pooyan, Michelson David G., and Hamdi Maziyar. 2016. RSSI-based distributed self-localization for wireless sensor networks used in precision agriculture. IEEE Transactions on Wireless Communications 15, 10 (2016), 66386650. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Abyaneh Amirhossein Yazdani, Foumani Ali Hosein Gharari, and Pourahmadi Vahid. 2018. Deep neural networks meet CSI-based authentication. arXiv:1812.04715. Retrieved from https://arxiv.org/abs/1812.04715.Google ScholarGoogle Scholar
  3. [3] Agata Yugo, Hong Jihoon, and Ohtsuki Tomoaki. 2015. Room-level proximity detection using beacon frame from multiple access points. In Proceedings of the 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. IEEE, 941945.Google ScholarGoogle Scholar
  4. [4] Agata Yugo, Hong Jihoon, and Ohtsuki Tomoaki. 2016. Room-level proximity detection based on RSS of dual-band Wi-Fi signals. In Proceedings of the IEEE International Conference on Communications. IEEE, 16.Google ScholarGoogle Scholar
  5. [5] Aviva. 2020. Tech Nation: Number of Internet-Connected Devices Grows to 10 per Home. Retrieved 29 September, 2021 from https://www.aviva.com/newsroom/news-releases/2020/01/tech-nation-number-of-internet-connected-devices-grows-to-10-per-home/.Google ScholarGoogle Scholar
  6. [6] Baehrens David, Schroeter Timon, Harmeling Stefan, Kawanabe Motoaki, Hansen Katja, and Müller Klaus-Robert. 2010. How to explain individual classification decisions. The Journal of Machine Learning Research 11, 61 (2010), 18031831. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Brownlee Jason. 2020. How to Control the Stability of Training Neural Networks with the Batch Size. Retrieved from https://machinelearningmastery.com/how-to-control-the-speed-and-stability-of-training-neural-networks-with-gradient-descent-batch-size/.Google ScholarGoogle Scholar
  8. [8] Classen Jiska and Hollick Matthias. 2019. Inside job: Diagnosing bluetooth lower layers using off-the-shelf devices. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks. 186191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Conti Mauro and Lal Chhagan. 2019. Context-based co-presence detection techniques: A survey. Computers & Security 88 (2019), 101652.Google ScholarGoogle Scholar
  10. [10] Fang Song, Liu Yao, Shen Wenbo, and Zhu Haojin. 2014. Where are you from? Confusing location distinction using virtual multipath camouflage. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking. 225236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Fang Song, Liu Yao, Shen Wenbo, Zhu Haojin, and Wang Tao. 2016. Virtual multipath attack and defense for location distinction in wireless networks. IEEE Transactions on Mobile Computing 16, 2 (2016), 566580. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Feng Chen, Au Wain Sy Anthea, Valaee Shahrokh, and Tan Zhenhui. 2011. Received-signal-strength-based indoor positioning using compressive sensing. IEEE Transactions on Mobile Computing 11, 12 (2011), 19831993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Fomichev Mikhail, Abanto-Leon Luis F., Stiegler Max, Molina Alejandro, Link Jakob, and Hollick Matthias. 2021. Index of Supplementary Files from “Next2You: Robust Copresence Detection Based on Channel State Information”. ACM Transactions on Internet of Things 1, 1 (2021), 1–30. DOI:https://doi.org/10.5281/zenodo.5105815Google ScholarGoogle Scholar
  14. [14] Fomichev Mikhail, Álvarez Flor, Steinmetzer Daniel, Gardner-Stephen Paul, and Hollick Matthias. 2018. Survey and systematization of secure device pairing. IEEE Communications Surveys & Tutorials 20, 1 (2018), 517550.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Fomichev Mikhail, Maass Max, Almon Lars, Molina Alejandro, and Hollick Matthias. 2019. Perils of zero-interaction security in the Internet of Things. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 1 (2019), 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Frankle Jonathan and Carbin Michael. 2018. The lottery ticket hypothesis: Finding sparse, trainable neural networks. In 7th International Conference on Learning Representations (ICLR’19).Google ScholarGoogle Scholar
  17. [17] AG Futurae Technologies. 2019. Futurae Authentication Suite. Retrieved 29 September, 2021 from https://www.futurae.com/product/strongauth/.Google ScholarGoogle Scholar
  18. [18] Gawłowicz Piotr, Zubow Anatolij, Bayhan Suzan, and Wolisz Adam. 2020. Punched cards over the air: Cross-technology communication between LTE-U/LAA and WiFi. In Proceedings of the 21st IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. IEEE.Google ScholarGoogle Scholar
  19. [19] Gong Liangyi, Yang Wu, Zhou Zimu, Man Dapeng, Cai Haibin, Zhou Xiancun, and Yang Zheng. 2016. An adaptive wireless passive human detection via fine-grained physical layer information. Ad Hoc Networks 100, 38 (2016), 3850. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Goodfellow Ian, Bengio Yoshua, and Courville Aaron. 2016. Deep Learning. MIT press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Gringoli Francesco, Schulz Matthias, Link Jakob, and Hollick Matthias. 2019. Free your CSI: A channel state information extraction platform for modern Wi-Fi chipsets. In Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization. 2128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Halevi Tzipora, Ma Di, Saxena Nitesh, and Xiang Tuo. 2012. Secure proximity detection for NFC devices based on ambient sensor data. In Proceedings of the European Symposium on Research in Computer Security. Springer, 379396.Google ScholarGoogle Scholar
  23. [23] Halperin Daniel, Hu Wenjun, Sheth Anmol, and Wetherall David. 2011. Tool release: Gathering 802.11n traces with channel state information. ACM SIGCOMM CCR 41, 1 (2011), 53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Han Jun, Chung Albert Jin, Sinha Manal Kumar, Harishankar Madhumitha, Pan Shijia, Noh Hae Young, Zhang Pei, and Tague Patrick. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 836852.Google ScholarGoogle Scholar
  25. [25] Hauser Steven C., Headley William C., and Michaels Alan J.. 2017. Signal detection effects on deep neural networks utilizing raw IQ for modulation classification. In Proceedings of the IEEE Military Communications Conference. IEEE, 121127.Google ScholarGoogle Scholar
  26. [26] Hornik Kurt, Stinchcombe Maxwell, and White Halbert. 1989. Multilayer feedforward networks are universal approximators. Neural Networks 2, 5 (1989), 359366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Huang Donny, Nandakumar Rajalakshmi, and Gollakota Shyamnath. 2014. Feasibility and limits of Wi-Fi imaging. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems. 266279. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Karapanos Nikolaos, Marforio Claudio, Soriente Claudio, and Capkun Srdjan. 2015. Sound-proof: Usable two-factor authentication based on ambient sound. In Proceedings of the 24th \(\lbrace\)USENIX\(\rbrace\) Security Symposium (\(\lbrace\)USENIX\(\rbrace\) Security 15). 483498. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] team Keras. 2020. Keras: The Python Deep Learning Library. Retrieved 29 September, 2021 from https://keras.io/.Google ScholarGoogle Scholar
  30. [30] Kingma Diederik P. and Ba Jimmy. 2014. Adam: A method for stochastic optimization. In 3rd International Conference on Learning Representations (ICLR’15).Google ScholarGoogle Scholar
  31. [31] Lapuschkin Sebastian, Wäldchen Stephan, Binder Alexander, Montavon Grégoire, Samek Wojciech, and Müller Klaus-Robert. 2019. Unmasking Clever Hans predictors and assessing what machines really learn. Nature Communications 10, 1 (2019), 18.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] LeCun Yann, Boser Bernhard, Denker John S., Henderson Donnie, Howard Richard E., Hubbard Wayne, and Jackel Lawrence D.. 1989. Backpropagation applied to handwritten zip code recognition. Neural Computation 1, 4 (1989), 541551. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Liu Jialin, Wang Lei, Guo Linlin, Fang Jian, Lu Bingxian, and Zhou Wei. 2017. A research on CSI-based human motion detection in complex scenarios. In Proceedings of the IEEE 19th International Conference on e-Health Networking, Applications and Services. IEEE, 16.Google ScholarGoogle Scholar
  34. [34] Lu Zhou, Pu Hongming, Wang Feicheng, Hu Zhiqiang, and Wang Liwei. 2017. The expressive power of neural networks: A view from the width. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 62326240. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Ma Yongsen, Zhou Gang, and Wang Shuangquan. 2019. WiFi sensing with channel state information: A survey. ACM Computing Surveys 52, 3 (2019), 136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Mantz Dennis, Classen Jiska, Schulz Matthias, and Hollick Matthias. 2019. Internalblue-bluetooth binary patching and experimentation framework. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. 7990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Mare Shrirang, Markham Andrés Molina, Cornelius Cory, Peterson Ronald, and Kotz David. 2014. Zebra: Zero-effort bilateral recurring authentication. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 705720. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Marforio Claudio, Karapanos Nikolaos, Soriente Claudio, Kostiainen Kari, and Capkun Srdjan. 2014. Smartphones as practical and secure location verification tokens for payments. In Proceedings of the 21st Network and Distributed System Security Symposium. Vol. 14, 2326.Google ScholarGoogle Scholar
  39. [39] Matuszewski Jan and Sikorska-Łukasiewicz Katarzyna. 2017. Neural network application for emitter identification. In Proceedings of the 18th International Radar Symposium. IEEE, 18.Google ScholarGoogle Scholar
  40. [40] Niitsoo Arne, Thorsten Edelhäuβer, and Mutschler Christopher. 2018. Convolutional neural networks for position estimation in TDoA-based locating systems. In Proceedings of the International Conference on Indoor Positioning and Indoor Navigation. IEEE, 18.Google ScholarGoogle Scholar
  41. [41] O’Shea Timothy James, Roy Tamoghna, and Clancy T. Charles. 2018. Over-the-air deep learning based radio signal classification. IEEE Journal of Selected Topics in Signal Processing 12, 1 (2018), 168179.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Pérez-Cruz Fernando, Olmos Pablo M., Zhang Michael Minyi, and Huang Howard. 2019. Probabilistic time of arrival localization. IEEE Signal Processing Letters 26, 11 (2019), 16831687.Google ScholarGoogle Scholar
  43. [43] Putz Florentin, Álvarez Flor, and Classen Jiska. 2020. Acoustic integrity codes: Secure device pairing using short-range acoustic communication. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 3141.Google ScholarGoogle Scholar
  44. [44] Qian Kun, Wu Chenshu, Yang Zheng, Liu Yunhao, and Zhou Zimu. 2014. PADS: Passive detection of moving targets with dynamic speed using PHY layer information. In Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems. IEEE, 18.Google ScholarGoogle Scholar
  45. [45] Ross Andrew Slavin, Hughes Michael C., and Doshi-Velez Finale. 2017. Right for the right reasons: Training differentiable models by constraining their explanations. In Proceedings of the 26th International Joint Conference on Artificial Intelligence. 26622670. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Schultz B.. 2013. 802.11 ad–WLAN at 60 GHz–A Technology Introduction. Rohde & Schwarz.Google ScholarGoogle Scholar
  47. [47] Schulz Matthias, Link Jakob, Gringoli Francesco, and Hollick Matthias. 2018. Shadow Wi-Fi: Teaching smartphones to transmit raw signals and to extract channel state information to implement practical covert channels over Wi-Fi. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 256268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Schulz Matthias, Wegemer Daniel, and Hollick Matthias. 2017. Nexmon: The C-based Firmware Patching Framework. Retrieved 29 September, 2021 from https://nexmon.org.Google ScholarGoogle Scholar
  49. [49] Sen Souvik, Radunovic Božidar, Choudhury Romit Roy, and Minka Tom. 2012. You are facing the Mona Lisa: Spot localization using PHY layer information. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services. 183196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Shepherd Carlton, Gurulian Iakovos, Frank Eibe, Markantonakis Konstantinos, Akram Raja Naeem, Panaousis Emmanouil, and Mayes Keith. 2017. The applicability of ambient sensors as proximity evidence for NFC transactions. In Proceedings of the IEEE Security and Privacy Workshops. IEEE, 179188.Google ScholarGoogle Scholar
  51. [51] Shi Cong, Liu Jian, Liu Hongbo, and Chen Yingying. 2017. Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52] Shi Yi, Davaslioglu Kemal, Sagduyu Yalin E., Headley William C., Fowler Michael, and Green Gilbert. 2019. Deep learning for RF signal classification in unknown and dynamic spectrum environments. In Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks. IEEE, 110.Google ScholarGoogle Scholar
  53. [53] Shrestha Babins, Mohamed Manar, and Saxena Nitesh. 2019. ZEMFA: Zero-effort multi-factor authentication based on multi-modal gait biometrics. In Proceedings of the 17th International Conference on Privacy, Security and Trust. IEEE, 110.Google ScholarGoogle Scholar
  54. [54] Shrestha Babins, Saxena Nitesh, Truong Hien Thi Thu, and Asokan N.. 2014. Drone to the rescue: Relay-resilient authentication using ambient multi-sensing. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 349364.Google ScholarGoogle Scholar
  55. [55] Shrestha Babins, Saxena Nitesh, Truong Hien Thi Thu, and Asokan N.. 2018. Sensor-based proximity detection in the face of active adversaries. IEEE Transactions on Mobile Computing 18, 2 (2018), 444457. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Shrestha Babins, Shirvanian Maliheh, Shrestha Prakash, and Saxena Nitesh. 2016. The sounds of the phones: Dangers of zero-effort second factor login based on ambient audio. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 908919. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. [57] Shuman Dave. 2019. Looking Under the Hood of the Connected Car. Retrieved 29 September, 2021 from https://www.techradar.com/news/looking-under-the-hood-of-the-connected-car.Google ScholarGoogle Scholar
  58. [58] Sonoda Sho and Murata Noboru. 2017. Neural network with unbounded activation functions is universal approximator. Applied and Computational Harmonic Analysis 43, 2 (2017), 233268.Google ScholarGoogle ScholarCross RefCross Ref
  59. [59] Srivastava Nitish, Hinton Geoffrey, Krizhevsky Alex, Sutskever Ilya, and Salakhutdinov Ruslan. 2014. Dropout: A simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research 15, 1 (2014), 19291958. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. [60] Stute Milan, Kreitschmann David, and Hollick Matthias. 2018. One billion Apples’ secret sauce: Recipe for the Apple Wireless Direct Link Ad hoc protocol. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 529543. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. [61] Stute Milan, Narain Sashank, Mariotto Alex, Heinrich Alexander, Kreitschmann David, Noubir Guevara, and Hollick Matthias. 2019. A billion open interfaces for eve and mallory: MitM, DoS, and tracking attacks on iOS and macOS through Apple Wireless Direct Link. In Proceedings of the 28th USENIX Conference on Security Symposium. 3754. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. [62] Tan Chuanqi, Sun Fuchun, Kong Tao, Zhang Wenchang, Yang Chao, and Liu Chunfang. 2018. A survey on deep transfer learning. In Proceedings of the International Conference on Artificial Neural Networks. Springer, 270279.Google ScholarGoogle ScholarCross RefCross Ref
  63. [63] team TensorFlow. 2020. Deploy Machine Learning Models on Mobile and IoT Devices. Retrieved 29 September, 2021 from https://www.tensorflow.org/lite.Google ScholarGoogle Scholar
  64. [64] Group The Weaver Computer Engineering Research. 2020. The Top 50 Fastest Computers in the Weaver Research Group. Retrieved 29 September, 2021 from http://web.eece.maine.edu/ vweaver/group/machines.html.Google ScholarGoogle Scholar
  65. [65] Truong Hien Thi Thu, Gao Xiang, Shrestha Babins, Saxena Nitesh, Asokan N., and Nurmi Petteri. 2014. Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications. IEEE, 163171.Google ScholarGoogle Scholar
  66. [66] Truong Hien Thi Thu, Toivonen Juhani, Nguyen Thien Duc, Soriente Claudio, Tarkoma Sasu, and Asokan N.. 2019. DoubleEcho: Mitigating context-manipulation attacks in copresence verification. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications. IEEE.Google ScholarGoogle Scholar
  67. [67] Twain Taylor. 2019. 6 Most Commonly Used IoT Communication Protocols. Retrieved 29 September, 2021 from http://techgenix.com/iot-communication-protocols/.Google ScholarGoogle Scholar
  68. [68] Vaswani Ashish, Shazeer Noam, Parmar Niki, Uszkoreit Jakob, Jones Llion, Gomez Aidan N., Kaiser Łukasz, and Polosukhin Illia. 2017. Attention is all you need. In Proceedings of the 31st International Conference on Neural Information Processing Systems. 59986008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. [69] Wang Xuyu, Gao Lingjun, and Mao Shiwen. 2016. CSI phase fingerprinting for indoor localization with a deep learning approach. IEEE Internet of Things Journal 3, 6 (2016), 11131123.Google ScholarGoogle ScholarCross RefCross Ref
  70. [70] Wang Xuyu, Gao Lingjun, and Mao Shiwen. 2017. BiLoc: Bi-modal deep learning for indoor localization with commodity 5GHz WiFi. IEEE Access 5 (2017), 42094220.Google ScholarGoogle ScholarCross RefCross Ref
  71. [71] Won Myounggyu, Zhang Shaohu, and Son Sang H.. 2017. WiTraffic: Low-cost and non-intrusive traffic monitoring system using WiFi. In Proceedings of the 26th International Conference on Computer Communication and Networks. IEEE, 19.Google ScholarGoogle Scholar
  72. [72] Wu Kaishun, Xiao Jiang, Yi Youwen, Chen Dihu, Luo Xiaonan, and Ni Lionel M.. 2012. CSI-based indoor localization. IEEE Transactions on Parallel and Distributed Systems 24, 7 (2012), 13001309. Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. [73] Wu Yuezhong, Lin Qi, Jia Hong, Hassan Mahbub, and Hu Wen. 2020. Auto-Key: Using autoencoder to speed up gait-based key generation in body area networks. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 1 (2020), 123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. [74] Xi Wei, Qian Chen, Han Jinsong, Zhao Kun, Zhong Sheng, Li Xiang-Yang, and Zhao Jizhong. 2016. Instant and robust authentication and key agreement among mobile devices. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 616627. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. [75] Xiao Jiang, Zhou Zimu, Yi Youwen, and Ni Lionel M.. 2016. A survey on wireless indoor localization from the device perspective. ACM Computing Surveys 49, 2 (2016), 131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Xie Yaxiong, Li Zhenjiang, and Li Mo. 2015. Precise power delay profiling with commodity WiFi. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, 5364. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. [77] Xiong Jie and Jamieson Kyle. 2013. Arraytrack: A fine-grained indoor location system. In Proceedings of the 10th \(\lbrace\)USENIX\(\rbrace\) Symposium on Networked Systems Design and Implementation. 7184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. [78] Xiong Jie and Jamieson Kyle. 2013. Securearray: Improving WiFi security with fine-grained physical-layer information. In Proceedings of the 19th Annual International Conference on Mobile Computing & Networking. 441452. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. [79] Xu Bing, Wang Naiyan, Chen Tianqi, and Li Mu. 2015. Empirical evaluation of rectified activations in convolutional network. arXiv:1505.00853. Retrieved from https://arxiv.org/abs/1505.00853.Google ScholarGoogle Scholar
  80. [80] Xue Jiang, Biswas Sudip, Cirik Ali Cagatay, Du Huiqin, Yang Yang, Ratnarajah Tharmalingam, and Sellathurai Mathini. 2018. Transceiver design of optimum wirelessly powered full-duplex MIMO IoT devices. IEEE Transactions on Communications 66, 5 (2018), 19551969.Google ScholarGoogle ScholarCross RefCross Ref
  81. [81] Yang Zheng, Zhou Zimu, and Liu Yunhao. 2013. From RSSI to CSI: Indoor localization via channel response. ACM Computing Surveys 46, 2 (2013), 132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. [82] Zheng Alice and Casari Amanda. 2018. Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists. O’Reilly Media, Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. [83] Zhu Yanzi, Xiao Zhujun, Chen Yuxin, Li Zhijing, Liu Max, Zhao Ben Y., and Zheng Haitao. 2020. Et tu Alexa? When commodity WiFi devices turn into adversarial motion sensors. In Proceedings of the 27th Annual Network and Distributed System Security Symposium. The Internet Society.Google ScholarGoogle Scholar

Index Terms

  1. Next2You: Robust Copresence Detection Based on Channel State Information

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet of Things
        ACM Transactions on Internet of Things  Volume 3, Issue 2
        May 2022
        214 pages
        EISSN:2577-6207
        DOI:10.1145/3505220
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 February 2022
        • Accepted: 1 October 2021
        • Revised: 1 September 2021
        • Received: 1 February 2021
        Published in tiot Volume 3, Issue 2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format