-
Two Measure is Two Know: Calibration-free Full Duplex Monitoring for Software Radio Platforms
Authors:
Jie Wang,
Jonathan Gornet,
Alex Orange,
Leigh Stoller,
Gary Wong,
Jacobus Van Der Merwe,
Sneha Kumar Kasera,
Neal Patwari
Abstract:
Future virtualized radio access network (vRAN) infrastructure providers (and today's experimental wireless testbed providers) may be simultaneously uncertain what signals are being transmitted by their base stations and legally responsible for their violations. These providers must monitor the spectrum of transmissions and external signals without access to the radio itself. In this paper, we prop…
▽ More
Future virtualized radio access network (vRAN) infrastructure providers (and today's experimental wireless testbed providers) may be simultaneously uncertain what signals are being transmitted by their base stations and legally responsible for their violations. These providers must monitor the spectrum of transmissions and external signals without access to the radio itself. In this paper, we propose FDMonitor, a full-duplex monitoring system attached between a transmitter and its antenna to achieve this goal. Measuring the signal at this point on the RF path is necessary but insufficient since the antenna is a bidirectional device. FDMonitor thus uses a bidirectional coupler, a two-channel receiver, and a new source separation algorithm to simultaneously estimate the transmitted signal and the signal incident on the antenna. Rather than requiring an offline calibration, we also adaptively estimate the linear model for the system on the fly. FDMonitor has been running on a real-world open wireless testbed, monitoring 19 SDR platforms controlled (with bare metal access) by outside experimenters over a seven month period, sending alerts whenever a violation is observed. Our experimental results show that FDMonitor accurately separates signals across a range of signal parameters. Over more than 7 months of observation, it achieves a positive predictive value of 97%, with a total of 20 false alerts.
△ Less
Submitted 15 December, 2022;
originally announced December 2022.
-
Quantifying Interference-Assisted Signal Strength Surveillance of Sound Vibrations
Authors:
Alemayehu Solomon Abrar,
Neal Patwari,
Sneha Kumar Kasera
Abstract:
A malicious attacker could, by taking control of internet-of-things devices, use them to capture received signal strength (RSS) measurements and perform surveillance on a person's vital signs, activities, and sound in their environment. This article considers an attacker who looks for subtle changes in the RSS in order to eavesdrop sound vibrations. The challenge to the adversary is that sound vib…
▽ More
A malicious attacker could, by taking control of internet-of-things devices, use them to capture received signal strength (RSS) measurements and perform surveillance on a person's vital signs, activities, and sound in their environment. This article considers an attacker who looks for subtle changes in the RSS in order to eavesdrop sound vibrations. The challenge to the adversary is that sound vibrations cause very low amplitude changes in RSS, and RSS is typically quantized with a significantly larger step size. This article contributes a lower bound on an attacker's monitoring performance as a function of the RSS step size and sampling frequency so that a designer can understand their relationship. Our bound considers the little-known and counter-intuitive fact that an adversary can improve their sinusoidal parameter estimates by making some devices transmit to add interference power into the RSS measurements. We demonstrate this capability experimentally. As we show, for typical transceivers, the RSS surveillance attacker can monitor sound vibrations with remarkable accuracy. New mitigation strategies will be required to prevent RSS surveillance attacks.
△ Less
Submitted 21 February, 2020;
originally announced February 2020.
-
Quantifying an Interference-Assisted Signal Strength Breathing Surveillance Attack
Authors:
Alemayehu Solomon Abrar,
Neal Patwari,
Aniqua Baset,
Sneha Kumar Kasera
Abstract:
A malicious attacker could, by taking control of internet-of-things devices, use them to capture received signal strength (RSS) measurements and perform surveillance on a person's vital signs, activities, audio in their environment, and other RF sensing capabilities. This paper considers an attacker who looks for periodic changes in the RSS in order to surveil a person's breathing rate. The challe…
▽ More
A malicious attacker could, by taking control of internet-of-things devices, use them to capture received signal strength (RSS) measurements and perform surveillance on a person's vital signs, activities, audio in their environment, and other RF sensing capabilities. This paper considers an attacker who looks for periodic changes in the RSS in order to surveil a person's breathing rate. The challenge to the attacker is that a person's breathing causes a low amplitude change in RSS, and RSS is typically quantized with a significantly larger step size. This paper contributes a lower bound on an attacker's breathing monitoring performance as a function of the RSS step size and sampling frequency so that a designer can understand their relationship. Our bound considers the little-known and counter-intuitive fact that an adversary can improve their sinusoidal parameter estimates by making some devices transmit to add interference power into the RSS measurements. We demonstrate this capability experimentally. As we show, for typical transceivers, the RSS surveillance attack can monitor RSS with remarkable accuracy. New mitigation strategies will be required to prevent RSS surveillance attacks.
△ Less
Submitted 10 May, 2019;
originally announced May 2019.