skip to main content
10.1145/3372224.3419189acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article
Public Access

SDR receiver using commodity wifi via physical-layer signal reconstruction

Authors Info & Claims
Published:18 September 2020Publication History

ABSTRACT

With the explosive increase in wireless devices, physical-layer signal analysis has become critically beneficial across distinctive domains including interference minimization in network planning, security and privacy (e.g., drone and spycam detection), and mobile health with remote sensing. While SDR is known to be highly effective in realizing such services, they are rarely deployed or used by the end-users due to the costly hardware ~1K USD (e.g., USRP). Low-cost SDRs (e.g., RTL-SDR) are available, but their bandwidth is limited to 2-3 MHz and operation range falls well below 2.4 GHz - the unlicensed band holding majority of the wireless devices. This paper presents SDR-Lite, the first zero-cost, software-only software defined radio (SDR) receiver that empowers commodity WiFi to retrieve the In-phase and Quadrature of an ambient signal. With the full compatibility to pervasively-deployed WiFi infrastructure (without any change to the hardware and firmware), SDR-Lite aims to spread the blessing of SDR receiver functionalities to billions of WiFi users and households to enhance our everyday lives. The key idea of SDR-Lite is to trick WiFi to begin packet reception (i.e., the decoding process) when the packet is absent, so that it accepts ambient signals in the air and outputs corresponding bits. The bits are then reconstructed to the original physical-layer waveform, on which diverse SDR applications are performed. Our comprehensive evaluation shows that the reconstructed signal closely reassembles the original ambient signal (>85% correlation). We extensively demonstrate SDR-Lite effectiveness across seven distinctive SDR receiver applications under three representative categories: (i) RF fingerprinting, (ii) spectrum monitoring, and (iii) (ZigBee) decoding. For instance, in security applications of drone and rogue WiFi AP detection, SDR-Lite achieves 99% and 97% accuracy, which is comparable to USRP.

References

  1. 3DR. Solo drone. https://www.3dr.com/company/about-3dr/solo/.Google ScholarGoogle Scholar
  2. ALFA Network Inc. AWUS036NHA. http://www.rokland.com/support/specs/.Google ScholarGoogle Scholar
  3. Atheros. Ar 9271 datasheet. https://https://www.ath-drivers.eu/qualcomm-atheros-datasheets-for-AR9271.html.Google ScholarGoogle Scholar
  4. Atheros. Ar 9380 datasheet. https://www.ath-drivers.eu/download-driver-nr-309-for-atheros-AR9380-and-Windows10.html.Google ScholarGoogle Scholar
  5. M. M. Baig, H. GholamHosseini, and M. J. Connolly. Mobile healthcare applications: system design review, critical issues and challenges. Australasian physical & engineering sciences in medicine, 38(1):23--38, 2015.Google ScholarGoogle Scholar
  6. O. Barak and A. Touboul. Mobile broadband wireless network with interference mitigation mechanism to minimize interference within a cluster during multiple concurrent transmissions, Aug. 11 2009. US Patent 7,574,179.Google ScholarGoogle Scholar
  7. V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 116--127, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Chebrolu and A. Dhekne. Esense: communication through energy sensing. In Proceedings of the 15th annual international conference on Mobile computing and networking, pages 85--96. ACM, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. Chen, Z. Li, and T. He. Twinbee: Reliable physical-layer cross-technology communication with symbol-level coding. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pages 153--161. IEEE, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  10. Y. Chen, S. Lu, H.-S. Kim, D. Blaauw, R. G. Dreslinski, and T. Mudge. A low power software-defined-radio baseband processor for the internet of things. In 2016 IEEE international symposium on high performance computer architecture (HPCA), pages 40--51. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  11. L. Cheng and J. Wang. Walls have no ears: A non-intrusive wifi-based user identification system for mobile devices. IEEE/ACM Transactions on Networking, 27(1):245--257, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J.-S. Choi, W.-H. Lee, J.-H. Lee, J.-H. Lee, and S.-C. Kim. Deep learning based nlos identification with commodity wlan devices. IEEE Transactions on Vehicular Technology, 67(4):3295--3303, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  13. CNN. Is it OK to shoot down a drone over your backyard? https://edition.cnn.com/2015/09/09/opinions/schneier-shoot-down-drones.Google ScholarGoogle Scholar
  14. D-Link. Dw-192 datasheet. https://support.dlink.com/ProductInfo.aspx?m=DWA-192.Google ScholarGoogle Scholar
  15. G. Diraco, A. Leone, and P. Siciliano. In-home hierarchical posture classification with a time-of-flight 3d sensor. Gait & posture, 39(1):182--187, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  16. DJI. Mavic Pro Drone. https://www.dji.com/mavic/info#specs.Google ScholarGoogle Scholar
  17. EDiMAX. Edimax ac-1200 datasheet. https://www.edimax.com/edimax/mw/cufiles/files/download/datasheet/EW-7822ULC_Datasheet_English.pdf.Google ScholarGoogle Scholar
  18. J. Elias, S. Paris, and M. Krunz. Cross-technology interference mitigation in body area networks: An optimization approach. IEEE Transactions on Vehicular Technology, 64(9):4144--4157, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  19. P. Gawlowicz, A. Zubow, and A. Wolisz. Enabling cross-technology communication between lte unlicensed and wifi. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pages 144--152. IEEE, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Gollakota, F. Adib, D. Katabi, and S. Seshan. Clearing the rf smog: making 802.11 n robust to cross-technology interference. In Proceedings of the ACM SIGCOMM 2011 conference, pages 170--181, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. W. Gong and J. Liu. Roarray: Towards more robust indoor localization using sparse recovery with commodity wifi. IEEE Transactions on Mobile Computing, 18(6):1380--1392, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. G. W. Grube and T. W. Markison. Detection of unauthorized use of software applications in communication units, Jan. 3 1995. US Patent 5,379,343.Google ScholarGoogle Scholar
  23. X. Guo, Y. He, X. Zheng, L. Yu, and O. Gnawali. Zigfi: Harnessing channel state information for cross-technology communication. IEEE/ACM Transactions on Networking, 28(1):301--311, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. X. Guo, Y. He, X. Zheng, Z. Yu, and Y. Liu. Lego-fi: Transmitter-transparent ctc with cross-demapping. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pages 2125--2133. IEEE, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  25. X. Guo, X. Zheng, and Y. He. Wizig: Cross-technology energy communication over a noisy channel. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pages 1--9. IEEE, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  26. J. Hall. Detection of rogue devices in wireless networks. PhD thesis, Carleton University, 2006.Google ScholarGoogle Scholar
  27. D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Tool release: Gathering 802.11n traces with channel state information. ACM SIGCOMM CCR, 41(1):53, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Hessar, A. Najafi, V. Iyer, and S. Gollakota. Tinysdr: Low-power SDR platform for over-the-air programmable iot testbeds. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), pages 1031--1046, 2020.Google ScholarGoogle Scholar
  29. A. Hithnawi, S. Li, H. Shafagh, J. Gross, and S. Duquennoy. Crosszig: Combating cross-technology interference in low-power wireless networks. In 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pages 1--12. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  30. Y. Hou, M. Li, X. Yuan, Y. T. Hou, and W. Lou. Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pages 880--888. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  31. Intel. Aero drone. https://www.intel.com/content/www/us/en/support/products/97174/drones/development-drones/intel-aero-products.html.Google ScholarGoogle Scholar
  32. V. Iyer, V. Talla, B. Kellogg, S. Gollakota, and J. Smith. Inter-technology backscatter: Towards internet connectivity for implanted devices. In Proceedings of the 2016 ACM SIGCOMM Conference, pages 356--369, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. W. Jiang, Z. Yin, S. M. Kim, and T. He. Transparent cross-technology communication over data traffic. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pages 1--9. IEEE, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  34. W. Jiang, Z. Yin, R. Liu, Z. Li, S. M. Kim, and T. He. Bluebee: a 10,000 x faster cross-technology communication via phy emulation. In Proceedings of ACM SenSys, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. C. R. Karanam, B. Korany, and Y. Mostofi. Magnitude-based angle-of-arrival estimation, localization, and target tracking. In 2018 17th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pages 254--265, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. K. Kim, C. M. Spooner, I. Akbar, and J. H. Reed. Specific emitter identification for cognitive radio with application to ieee 802.11. In IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, pages 1--5. IEEE, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  37. S. M. Kim and T. He. Freebee: Cross-technology communication via free side-channel. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pages 317--330. ACM, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. S. Kiranyaz, O. Avci, O. Abdeljaber, T. Ince, M. Gabbouj, and D. J. Inman. 1D convolutional neural networks and applications: A survey. arXiv preprint arXiv:1905.03554, 2019.Google ScholarGoogle Scholar
  39. Z. Li and T. He. Webee: Physical-layer cross-technology communication via emulation. In Proceedings of ACM MobiCom, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Z. Li and T. He. Longbee: Enabling long-range cross-technology communication. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pages 162--170. IEEE, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. E. Magistretti, K. K. Chintalapudi, B. Radunovic, and R. Ramjee. Wifi-nano: reclaiming wifi efficiency through 800 ns slots. In Proceedings of the 17th annual international conference on Mobile computing and networking, pages 37--48, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Myriad-RF. LimeSDR. https://wiki.myriadrf.org/LimeSDR-Mini.Google ScholarGoogle Scholar
  43. R. Narayanan and S. Kumar. Revisiting software defined radios in the iot era. In Proceedings of the 17th ACM Workshop on Hot Topics in Networks, pages 43--49, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. NESDR. Nesdr mini 2 +. https://www.nooelec.com/store/sdr/sdr-receivers/nesdrmini-2.html.Google ScholarGoogle Scholar
  45. NESDR. Nesdr nano 2. https://www.nooelec.com/store/nesdr-nano2.html.Google ScholarGoogle Scholar
  46. NESDR. Nesdr nano 3. https://www.nooelec.com/store/nesdr-nano-three.html.Google ScholarGoogle Scholar
  47. F. News. Hidden cameras: Are you being watched? https://www.foxnews.com/tech/hidden-cameras-are-you-being-watched.Google ScholarGoogle Scholar
  48. P. Nguyen, M. Ravindranatha, A. Nguyen, R. Han, and T. Vu. Investigating cost-effective rf-based detection of drones. In Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, pages 17--22, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. P. Nguyen, H. Truong, M. Ravindranathan, A. Nguyen, R. Han, and T. Vu. Matthan: Drone presence detection by identifying physical signatures in the drone's rf communication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, pages 211--224, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. M. Peacock and M. N. Johnstone. Towards detection and control of civilian unmanned aerial vehicles. In The Proceedings of 14 th Australian Information Warfare Conference, page 9. Citeseer, 2013.Google ScholarGoogle Scholar
  51. D. Pfammatter, D. Giustiniano, and V. Lenders. A software-defined sensor architecture for large-scale wideband spectrum monitoring. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks, pages 71--82, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. K. B. Rasmussen and S. Capkun. Implications of radio fingerprinting on the security of sensor networks. In 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007, pages 331--340. IEEE, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  53. E. Research. USRP N210. https://www.ettus.com/product/details/UN210-KIT, n.d.Google ScholarGoogle Scholar
  54. A. Sabharwal. WARP 802.11 Physical Layer. http://warpproject.org/trac/wiki/802.11/PHY, 2016.Google ScholarGoogle Scholar
  55. M. Schulz, J. Link, F. Gringoli, and M. Hollick. Shadow wi-fi: Teaching smartphones to transmit raw signals and to extract channel state information to implement practical covert channels over wi-fi. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, page 256--268, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. E. Soltanaghaei, A. Kalyanaraman, and K. Whitehouse. Multipath triangulation: Decimeter-level wifi localization and orientation with a single unaided receiver. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, page 376--388, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. M. Sruthi, M. Abirami, A. Manikkoth, R. Gandhiraj, and K. Soman. Low cost digital transceiver design for software defined radio using rtl-sdr. In 2013 international mutli-conference on automation, computing, communication, control and compressed sensing (iMac4s), pages 852--855. IEEE, 2013.Google ScholarGoogle Scholar
  58. Texas Instruments. SimpleLink multi-standard CC2650 SensorTag. http://www.ti.com/tool/TIDC-CC2650STK-SENSORTAG.Google ScholarGoogle Scholar
  59. T. N. Y. Times. Two Major Saudi Oil Installations Hit by Drone Strike, and U.S. Balems Iran. https://www.nytimes.com/2019/09/14/world/middleeast/saudi-arabia-refineries-drone-attack.html.Google ScholarGoogle Scholar
  60. T. N. Y. Times. White House Drone Crash Described as a U.S. Worker's Drunken Lark. https://www.nytimes.com/2015/01/28/us/white-house-drone.html.Google ScholarGoogle Scholar
  61. T. D. Vo-Huu, T. D. Vo-Huu, and G. Noubir. Fingerprinting wi-fi devices using software defined radios. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pages 3--14, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. S. Wang, S. M. Kim, and T. He. Symbol-level cross-technology communication via payload encoding. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pages 500--510. IEEE, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  63. Y. Wang, J. Liu, Y. Chen, M. Gruteser, J. Yang, and H. Liu. E-eyes: Device-free location-oriented activity identification using fine-grained wifi signatures. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, page 617--628, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Wireless LAN Working Group. Ieee standard part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007), pages 1--2793, March 2012.Google ScholarGoogle Scholar
  65. H. Wu, T. Wang, Z. Yuan, C. Peng, Z. Li, Z. Tan, B. Ding, X. Li, Y. Li, J. Liu, et al. The tick programmable low-latency sdr system. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, pages 101--113, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Y. Xie, Z. Li, and M. Li. Precise power delay profiling with commodity wifi. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom '15, page 53--64, New York, NY, USA, 2015. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Y. Xie, J. Xiong, M. Li, and K. Jamieson. Md-track: Leveraging multi-dimensionality for passive indoor wi-fi tracking. In The 25th Annual International Conference on Mobile Computing and Networking, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Y. Xie, J. Xiong, M. Li, and K. Jamieson. md-track: Leveraging multi-dimensionality for passive indoor wi-fi tracking. In The 25th Annual International Conference on Mobile Computing and Networking, pages 1--16, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. P. Yang, Y. Yan, X.-Y. Li, Y. Zhang, Y. Tao, and L. You. Taming cross-technology interference for wi-fi and zigbee coexistence networks. IEEE Transactions on Mobile Computing, 15(4):1009--1021, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Z. Yin, W. Jiang, S. M. Kim, and T. He. C-morse: Cross-technology communication with transparent morse coding. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pages 1--9. IEEE, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  71. Z. Yin, Z. Li, S. M. Kim, and T. He. Explicit channel coordination via cross-technology communication. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, pages 178--190, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Y. Yubo, Y. Panlong, L. Xiangyang, T. Yue, Z. Lan, and Y. Lizhao. Zimo: building cross-technology mimo to harmonize zigbee smog with wifi flash without intervention. In Proceedings of the 19th annual international conference on Mobile computing & networking, pages 465--476. ACM, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Y. Zeng, P. H. Pathak, and P. Mohapatra. Wiwho: Wifi-based person identification in smart spaces. In 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pages 1--12, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Y. Zhang and Q. Li. Howies: A holistic approach to zigbee assisted wifi energy savings in mobile devices. In INFOCOM, 2013 Proceedings IEEE, pages 1366--1374. IEEE, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  75. X. Zheng, Y. He, and X. Guo. Stripcomm: Interference-resilient cross-technology communication in coexisting environments. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pages 171--179. IEEE, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  76. H. Zou, Y. Zhou, J. Yang, W. Gu, L. Xie, and C. J. Spanos. Wifi-based human identification via convex tensor shapelet learning. In Thirty-Second AAAI Conference on Artificial Intelligence, 2018.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. SDR receiver using commodity wifi via physical-layer signal reconstruction

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiCom '20: Proceedings of the 26th Annual International Conference on Mobile Computing and Networking
      April 2020
      621 pages
      ISBN:9781450370851
      DOI:10.1145/3372224

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 September 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate440of2,972submissions,15%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader