This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Hiding Signal Strength Interference from Outside Adversaries

Mingxuan Han University of Utah
School of Computing
Email: [email protected]
   Jeff M. Phillips University of Utah
School of Computing
Email: [email protected]
   Sneha Kumar Kasera University of Utah
School of Computing
Email: [email protected]
Abstract

The presence of people can be detected by passively observing the signal strength of Wifi and related forms of communication. This paper tackles the question of how and when can this be prevented by adjustments to the transmitted signal strength, and other similar measures. The main contribution of this paper is a formal framework to analyze this problem, and the identification of several scenarios and corresponding protocols which can prevent or limit the inference from passive signal strength snooping.

I Introduction

Wifi is the dominant last leg of connecting devices to the internet, and is ubiquitous in households and businesses. However, recent work [22, 17, 13] has shown that these wifi signals can leak the location of occupants in those homes and businesses, even if the occupants are passive and do not have devices sending signals. The presence of a person can reduce the Wifi signal strength, and an adversary outside of a home or business can detect this reduction, inferring the presence and even location of the person.

This paper examines if and when it is possible to prevent the leaking of the presence of a person using only passive reduced signal strength of Wifi and other wireless transmissions. Different from, for instance, [8, 7], we assume the messages can be encrypted, and for high security settings equipment can even continually fill the channel with messages in a regular (or random) pattern to avoid detection of the presence of signals. The only information leaked is the magnitude of the signals.

This is a challenging domain with many possible strategies an adversary could use [12, 6, 23, 18]. As such, this paper starts with a very simple model where a formal analysis can be developed. Then it builds on these basic ideas to create a more comprehensive array of possible modeling assumptions. The first model is in 1 dimension where the sender has full information, then when the model does not know if a person interferes or not. We ultimately consider 2-dimensional (spatial) models, and if the sender knows the state of potentially interfering people or adversaries. We empirically demonstrate the effectiveness of our models in the simple controlled scenarios. While these models do not reach the specification of the transmission protocol and hardware devices, they develop a characterization of which factors are essential to models, and which are less pertinent.

Hence, the main contribution of this paper is the formalization of how to protect against signal strength inference attacks, which outcomes are possible, and a series of modeling assumptions and corresponding protocols and analysis to protect against inference. Our methods are based on information theoretic and statistical information arguments, and given modeling assumptions are impervious to any adversarial attack, or show a certain amount of transmissions must be made before the presensence of the person can be identified with sufficient (e.g., 95%95\%) confidence.

I-A Related Works

Previous related work mostly provides methods to detect the presence of people using RSS or similar signals. This includes work based on the moving average [22], and similar to our noisy model, claims there is detection if the moving average is greater than some threshold. Abid et.al. [3] shows that witrack, a system that tracks the 3D motion of a user from the radio signals reflected off a body, can localize the center of a human body to within a about 10 to 13 cm. This group also shows [4] that they can track a human by treating the motion of a human body as an antenna array and tracking the resulting RF beam and show how one can use MIMO (Multiple Input Multiple Output) interference nulling to eliminate reflections off static objects and focus the receiver on a moving target.

Another line of work related to statistical inference in signal strength [19] estimates the parameters of a single-frequency complex tone from a finite number of noisy discrete-time observations. Moschitta et.al. [15] provide a Cramer-Rao Lower Bound (CRLB) for the parametric estimation of quantized sinewaves. Similarly, Abrar et.al. [2] contributes a CRLB on an attacker’s monitoring performance as a function of the RSS step size and sampling frequency. Similar models use change point detection statistics [20], information theory and signal processing problem [10, 14], or machine learning [5, 1].

In contrast our work provides a rigorous framework for characterizing when a person might or statistically cannot be detected by any method, or bounds the rate of potential detection up to some statistical confidence. A different tact to characterizing when detection is or is not possible uses game-theoretic approaches [16, 9, 21], as opposed to our statistical/information theory approach.

II Structural Properties

We begin with some basic properties about distributions which will guide our characterization of various scenarios and the corresponding protocols. The “signal” is a bit bb, if a person interferes with a signal (b=1b=1) or not (b=0b=0). We identify three cases: when the scenarios are completely indistinguishable, when it must be one of the scenarios and not the other, and when it is not immediately clear, but the adversary gains information favoring one or the other. In this last scenario, we quantify how much information the adversary gains, and then if nn readings are made in an iid fashion, when the adversary can reach a certain amount of confidence about one scenario or the other. This reduces to the expectation under a distribution μ\mu, denoted 𝖤μ{\bf{\mathsf{E}}}_{\mu}, of the Kullback-Liebler (KL) divergence between certain distributions, denoted KL()\mathrm{KL}(\cdot\mid\mid\cdot).

Lemma II.1.

Consider a set XX of observations from one of the two distributions f1()f_{1}(\cdot) amd f2()f_{2}(\cdot), which are characterized by different parameters say μ1\mu_{1}, μ2\mu_{2}. If we are interested in either Xf1(xμ1)X\sim f_{1}(x\mid\mu_{1}) or Xf2(xμ2)X\sim f_{2}(x\mid\mu_{2}), the problem can be divided into three cases:

  • Case 1 (perfect hiding): If μ1=μ2\mu_{1}=\mu_{2} then naturally Xf(Xμ1)=df(Xμ2)X\sim f(X\mid\mu_{1})\buildrel d\over{=}f(X\mid\mu_{2}) and we cannot distinguish that XX are drawn from f(Xμ1)f(X\mid\mu_{1}) or f(Xμ2)f(X\mid\mu_{2}).

  • Case 2 (noisy hiding): If μ1μ2\mu_{1}\neq\mu_{2} and the logarithm of the likelihood ratio satisfies

    M=ln(L(Xμ1)L(Xμ2))ln(1pp),\displaystyle M=\ln(\frac{L(X\mid\mu_{1})}{L(X\mid\mu_{2})})\leq\ln(\frac{1-p}{p}),

    we can distinguish with more than 1p1-p confidence that XX is from f1(Xμ1)f_{1}(X\mid\mu_{1}) rather than f2(Xμ2)f_{2}(X\mid\mu_{2}). If Xμ1X\sim\mu_{1}, then this holds in expectation if it contains nn iid samples, and 𝖤μ1(M)=nKL(f1(μ1)f2(μ2)){\bf{\mathsf{E}}}_{\mu_{1}}(M)=n\cdot\mathrm{KL}(f_{1}(\mu_{1})\mid\mid f_{2}(\mu_{2})), only if n>ln1ppKL(f1(Xμ1)f2(Xμ2))n>\frac{\ln\frac{1-p}{p}}{\mathrm{KL}(f_{1}(X\mid\mu_{1})\mid\mid f_{2}(X\mid\mu_{2}))}.

  • Case 3 (immediate detection): If for any observation xXx\in X, L(xμ2)=0\text{L}(x\mid\mu_{2})=0 or L(xμ1)=0\text{L}(x\mid\mu_{1})=0, we can immediately distinguish from which distribution XX is drawn.

Proof.

Case 1 and 3 are immediate. For the Case 2 the logarithm of the likelihood ratio is defined as M=ln(L(Xμ1)L(Xμ2)).M=\ln(\frac{L(X\mid\mu_{1})}{L(X\mid\mu_{2})}). If the Xμ1X\sim\mu_{1} then

𝖤μ1(M)=𝖤μ1(i=1nln(L(xiμ1)L(xiμ2))).\displaystyle{\bf{\mathsf{E}}}_{\mu_{1}}(M)={\bf{\mathsf{E}}}_{\mu_{1}}\left(\sum_{i=1}^{n}\ln(\frac{L(x_{i}\mid\mu_{1})}{L(x_{i}\mid\mu_{2})})\right).

Since xix_{i} are i.i.d. and by the definition of KL-divergence,

𝖤μ1(M)\displaystyle{\bf{\mathsf{E}}}_{\mu_{1}}(M) =n𝖤μ1(ln(L(xiμ1)L(xiμ2)),\displaystyle=n\cdot{\bf{\mathsf{E}}}_{\mu_{1}}(\ln(\frac{L(x_{i}\mid\mu_{1})}{L(x_{i}\mid\mu_{2})}),
=nKL(f1(xμ1)f2(xμ2)).\displaystyle=n\cdot\mathrm{KL}(f_{1}(x\mid\mu_{1})\mid\mid f_{2}(x\mid\mu_{2})).

We can understand the likelihood ratio by normalizing the numerator, denominator pair so ln1pp\ln\frac{1-p}{p}; then if p=0.05p=0.05 then we can think the confidence that XX comes from f1(xμ1)f_{1}(x\mid\mu_{1}) is 0.950.95 and the confidence that XX comes from f2(xμ2)f_{2}(x\mid\mu_{2}) is 0.050.05. Hence, if Mln((1p)/p)M\leq\ln((1-p)/p) then with at most 1p1-p confidence that XX are drawn from f1(xμ1)f_{1}(x\mid\mu_{1}). Hence by contrapositive, in expectation only if n>ln1ppKL(f1(xμ1)f2(xμ2))n>\frac{\ln\frac{1-p}{p}}{\mathrm{KL}(f_{1}(x\mid\mu_{1})\mid\mid f_{2}(x\mid\mu_{2}))} can we say with more than 1p1-p confidence that Xf1(xμ1)X\sim f_{1}(x\mid\mu_{1}). ∎

II-A Special cases on the Case 2: Noisy Hiding

Now we analyze two specifications of Case 2 in Lemma II.1: when f1f_{1} and f2f_{2} are Laplace or Normal. Recall 𝖫𝖺𝗉(μ,σ)\mathsf{Lap}(\mu,\sigma) at value xx has the form exp(|xμ|/σ)\exp(-|x-\mu|/\sigma), and 𝖭𝗈𝗋𝗆𝖺𝗅(μ,σ)\mathsf{Normal}(\mu,\sigma) at value xx has the form exp((xμ)2/2σ2)\exp(-(x-\mu)^{2}/2\sigma^{2}), each with a different normalizing constant, which will not play a role in our analysis, so is omitted for simplicity.

Corollary II.1.1.

Consider when a set XX of observations is from either 𝖫𝖺𝗉(μ1,σ)\mathsf{Lap}(\mu_{1},\sigma) or 𝖫𝖺𝗉(μ2,σ)\mathsf{Lap}(\mu_{2},\sigma), where μ2μ1=δ>0\mu_{2}-\mu_{1}=\delta>0. If XX is from 𝖫𝖺𝗉(μ1,σ)\mathsf{Lap}(\mu_{1},\sigma), then at least n>ln(1pp)σδn>\ln(\frac{1-p}{p})\frac{\sigma}{\delta} iid observations are needed for than (1p)100%(1-p)\cdot 100\% confidence.

Proof.

According to Case 2 in Lemma II.1, we have

M\displaystyle M =ln(L(Xμ1)L(Xμ2))=i=1nlnexp(|xiμ1|σ)exp(|xiμ2|σ).\displaystyle=\ln(\frac{L(X\mid\mu_{1})}{L(X\mid\mu_{2})})=\sum_{i=1}^{n}\ln\frac{\exp(-\frac{|x_{i}-\mu_{1}|}{\sigma})}{\exp(-\frac{|x_{i}-\mu_{2}|}{\sigma})}.
=i=1nln(exp(|xiμ1|/σ))+ln(exp(|xiμ2|/σ))\displaystyle=\sum_{i=1}^{n}\ln\left(\exp(-|x_{i}-\mu_{1}|/\sigma)\right)+\ln\left(\exp(|x_{i}-\mu_{2}|/\sigma)\right)
=1σi=1n(|xiμ2||xiμ1|)nσ|μ1μ2|=nδσ.\displaystyle=\frac{1}{\sigma}\sum_{i=1}^{n}(|x_{i}-\mu_{2}|-|x_{i}-\mu_{1}|)\leq\frac{n}{\sigma}|\mu_{1}-\mu_{2}|=n\frac{\delta}{\sigma}.

Thus, if nMσ/δn\leq M\sigma/\delta then the likelihood ratio is at most MM. If the likelihood ratio Mln((1p)/p)M\leq\ln((1-p)/p) then with at most probability 1p1-p that XX is from 𝖫𝖺𝗉(μ1,σ)\mathsf{Lap}(\mu_{1},\sigma). Hence, by contrapositive, only if n>ln(1pp)σ/δn>\ln(\frac{1-p}{p})\sigma/\delta can we say with more than 1p1-p confidence that XX is from 𝖫𝖺𝗉(μ1,σ)\mathsf{Lap}(\mu_{1},\sigma). ∎

For the Laplace distribution, we do not need to take expectation with respect to true distribution. We can rather get an upper bound approximation for the logarithm of the likelihood ratio MM by the triangle inequality shown in the proof, which cannot be achieved by other distributions, such as Gaussian.

Corollary II.1.2.

Consider if a set XX of observations is from either 𝖭𝗈𝗋𝗆𝖺𝗅(μ1,σ1)\mathsf{Normal}(\mu_{1},\sigma_{1}) or 𝖭𝗈𝗋𝗆𝖺𝗅(μ2,σ2)\mathsf{Normal}(\mu_{2},\sigma_{2}). If XX is truly from 𝖭𝗈𝗋𝗆𝖺𝗅(μ1,σ1)\mathsf{Normal}(\mu_{1},\sigma_{1}), let η1=σ2σ1\eta_{1}=\frac{\sigma_{2}}{\sigma_{1}} and η2=μ2μ1σ2,\eta_{2}=\frac{\mu_{2}-\mu_{1}}{\sigma_{2}}, then in expectation at least n>ln(1pp)η2212+ln(η1)+12η12n>\frac{\ln(\frac{1-p}{p})}{\frac{\eta_{2}^{2}-1}{2}+\ln(\eta_{1})+\frac{1}{2\eta_{1}^{2}}} iid observations are needed for than (1p)100%(1-p)\cdot 100\% confidence.

Proof.

According to Case 2 in II.1 we know that we need n>ln1ppKL(f(xμ1)f(xμ2))n>\frac{\ln\frac{1-p}{p}}{\mathrm{KL}(f(x\mid\mu_{1})\mid\mid f(x\mid\mu_{2}))} iid observations, and

KL(𝖭𝗈𝗋𝗆𝖺𝗅(μ1,σ1)\displaystyle\mathrm{KL}(\mathsf{Normal}(\mu_{1},\sigma_{1}) 𝖭𝗈𝗋𝗆𝖺𝗅(μ2,σ2))\displaystyle\mid\mid\mathsf{Normal}(\mu_{2},\sigma_{2}))
=\displaystyle= (μ1μ2)2+σ12σ222σ22+ln(σ2σ1),\displaystyle\frac{(\mu_{1}-\mu_{2})^{2}+\sigma_{1}^{2}-\sigma_{2}^{2}}{2\sigma_{2}^{2}}+\ln(\frac{\sigma_{2}}{\sigma_{1}}),
=\displaystyle= η2212+ln(η1)+12η12.\displaystyle\frac{\eta_{2}^{2}-1}{2}+\ln(\eta_{1})+\frac{1}{2\eta_{1}^{2}}.

Hence at least n>ln(1pp)η2212+ln(η1)+12η12n>\frac{\ln(\frac{1-p}{p})}{\frac{\eta_{2}^{2}-1}{2}+\ln(\eta_{1})+\frac{1}{2\eta_{1}^{2}}} iid observations are needed to conclude with more than (1p)100%(1-p)\cdot 100\% confidence. ∎

A special case for Corollary II.1.2 is when σ1=σ2=σ\sigma_{1}=\sigma_{2}=\sigma and we denote η=1η2=σμ2μ1.\eta=\frac{1}{\eta_{2}}=\frac{\sigma}{\mu_{2}-\mu_{1}}. Thus, by some simple algebra we know that if XX is from 𝖭𝗈𝗋𝗆𝖺𝗅(μ1,σ)\mathsf{Normal}(\mu_{1},\sigma), then in expectation at least n>2ln(1pp)η2n>2\ln(\frac{1-p}{p})\eta^{2} iid observations are needed for more than (1p)100%(1-p)\cdot 100\% confidence.

III The Basic Shift Models

We first consider a case with a single sender xx\in\mathbb{R} and a single adversary aa\in\mathbb{R} in the one-dimensional domain along the line of sight between them. The sender will be communicating (e.g., via wifi) and may encrypt signal content, but can not hide the signal strength, and the adversary can measure this amplitude.

The unimpeded signal presents a larger amplitude the closer it is to the sender, and so the amplitude measured by an adversary aa is a function of the initial magnitude α\alpha used by the sender, and the distance between them |xa||x-a|. We restrict that the sender can produce signals in range [0,M][0,M], with maximum signal strength MM. While our protocols can be adapted to any known (or learned) decay function, for simplicity in this model we will assume a linear decay of the observed signal

sx,α(a,b=0)=max{0,αcxa}.s_{x,\alpha}(a,b=0)=\max\{0,\alpha-c\|x-a\|\}.

Here cc is the fixed linear decay rate, and b=0b=0 (no person) indicates no interference by a person. We next explore a few models and associated protocols so if b=1b=1 (exists person), which can prevent an adversary from knowing the bit. Here we assume the sender knows this bit bb.

III-A Constant Offset Interference

In our first model, we assume that the presence of a person (b=1b=1) creates a constant δ\delta decrease in the observed signal. We can write the observed signal strength as

sx,α(a,p=1)=max{0,αcxaδ}.s_{x,\alpha}(a,p=1)=\max\{0,\alpha-c\|x-a\|-\delta\}.
Refer to caption
Figure 1: Example of signal strength for constant offset model, and shift protocol.

Our goal is to modulate the signal strength patter so that adversary cannot infer the person bit bb. The Shift Protocol is

  • If there is no person interfering with the signal (b=0b=0), the sender emits a signal with strength MδM-\delta.

  • If there is a person interfering with the signal (b=1b=1), the sender emits a signal with strength MM.

Theorem III.1.

Under the Shift Protocol the adversary receives the same signal strength if a person interfering with the signal (b=1b=1) or not (b=0b=0), so it achieves perfect hiding.

Proof.

If b=0b=0, signal strength is MδM-\delta; the signal received

s=sx,Mδ(a,b=0)=max{0,(Mδ)cxa}.s=s_{x,M-\delta}(a,b=0)=\max\{0,(M-\delta)-c\|x-a\|\}.

If b=1b=1 the sent signal strength is MM; the signal received is

s=sx,M(a,b=1)=max{0,Mcxiaδ}.s^{\prime}=s_{x,M}(a,b=1)=\max\{0,M-c\|x_{i}-a\|-\delta\}.

And thus the observed signals s=ss^{\prime}=s are identical. ∎

III-B The Random Shift Protocol

We generalize this model and protocol so the person’s interference effect is not fixed, but is a random function ff. We consider for ff any known discrete or one-sided truncated version (like truncated normal) or only with non-negative domain (like beta) continuous distributions from location-scale family111Location scale family distribution includes almost all common seen distributions like any distribution in the exponential family or some distribution not in the exponential family, say Cauchy distribution. with a known mean denoted as μ\mu and variance σ\sigma,

δforp(δ=y)=fμ,σ(y),\displaystyle\delta\sim f\;\;\;\;\text{or}\;\;\;p(\delta=y)=f_{\mu,\sigma}(y),

where pp denote the pdf or pmf of distribution ff. In this model we only consider ff with non-negative domain. The Random Shift Protocol is

  • If there is a person interfering (b=1b=1), the sender emits a signal with strength MM.

  • If there is no person interfering (b=0b=0), the sender emits a signal with strength MyM-y, where yy is random as yfy\sim f.

Refer to caption
Figure 2: The effect of generalized random shift, and the Generalized Random Shift Protocol.
Theorem III.2.

Under the Random Shift Protocol, S(a)=𝑑S(a)S(a)\overset{d}{=}S^{\prime}(a), so this achieves perfect hiding.

Proof.

Notice that, each st(a)S(a)s_{t}(a)\in S(a) follows st(a)=Mδs_{t}(a)=M-\delta where, δf\delta\sim f. Hence for the two cases (p=0p=0 and p=1p=1, respectively), for each time tt, satisfy

st(a)\displaystyle s_{t}(a) =Mδ with δf\displaystyle=M-\delta\text{ with }\delta\sim f
st(a)\displaystyle s^{\prime}_{t}(a) =My with yf.\displaystyle=M-y\text{ with }y\sim f.

So we have S(a)=𝑑S(a)S(a)\overset{d}{=}S^{\prime}(a), no matter distribution ff. ∎

IV Random Noise Models for Unknown Interference

The Basic Shift Models allowed for Case 1 (perfect hiding) in Lemma II.1. This notably require that the sender knows if a person is interfering. In this section we focus on when the sender does not know the bb bit, indicating interference. In this setting, we are not able to achieve perfect hiding, and instead settle for noisy hiding (Case 2 in Lemma II.1).

For simplicity, we analyze the constant offset interference model with reduction of δ\delta, with a linear decay with constant cc. Although, this can again be generalized to other decay and interference models.

The approach will be to inject noise into signal strength chosen by the sender. We will investigate a few types of noise, and how much is required to achieve various guarantees.

IV-A Laplace Noise Model

In this setting, the sender uses signal strength chosen under a Laplacian noise model 𝖫𝖺𝗉(μ,σ)\mathsf{Lap}(\mu,\sigma). If a person is interfering with the signal (b=1b=1), the observed signal is reduced by δ\delta, and is equivalent to using Laplacian noise with 𝖫𝖺𝗉(μ1,σ)\mathsf{Lap}(\mu^{\prime}_{1},\sigma) with μ1=μδ\mu^{\prime}_{1}=\mu-\delta. Then an adversary would observe data from a distribution with a reduced mean, that is from 𝖫𝖺𝗉(μ1,σ)\mathsf{Lap}(\mu_{1},\sigma) or 𝖫𝖺𝗉(μ0,σ)\mathsf{Lap}(\mu_{0},\sigma) with μ1=μ1cxa\mu_{1}=\mu^{\prime}_{1}-c\|x-a\| and μ0=μcxa\mu_{0}=\mu-c\|x-a\|. Ultimately, the key parameter is δ=μ0μ1=μμ1\delta=\mu_{0}-\mu_{1}=\mu-\mu^{\prime}_{1}. A unit-less parameter η=σ/δ\eta=\sigma/\delta captures the needed characteristic of this problem; refer to this as the η\eta-Laplace setting.

Theorem IV.1.

In the η\eta-Laplace setting, if b=1b=1, then the adversary needs at least n=ln(1pp)ηn=\ln(\frac{1-p}{p})\eta readings for (1p)100%(1-p)\cdot 100\% confidence in the value of bb.

Proof.

If b=1b=1, the signal strength readings received by the adversary follow 𝖫𝖺𝗉(μ1,σ)\mathsf{Lap}(\mu_{1},\sigma), or 𝖫𝖺𝗉(μ0,σ)\mathsf{Lap}(\mu_{0},\sigma) if b=0b=0. Hence by applying Corollary II.1.1, if b=1b=1, the adversary needs at least n>ln(1pp)ηn>\ln(\frac{1-p}{p})\eta readings to conclude with more than (1p)100(1-p)\cdot 100 percent confidence the value bb. ∎

This approach where we can derive a bound without any probabilistic notions other than confidence is a special result of the Laplace distribution having an upper bound of their log-likelihoods being exactly (μ1μ2)/σ(\mu_{1}-\mu_{2})/\sigma, similar to the Laplace mechanism in differential privacy [11]. For other sorts of distributions (e.g., Normal), this is not the case, and we will need to state the bounds in expectation.

IV-B Normal Noise Model

Now we consider when the sender injects normal 𝖭𝗈𝗋𝗆𝖺𝗅(μ,σ)\mathsf{Normal}(\mu,\sigma) noise into the signal strength. Again the interference of a person (b=1b=1) is modeled as decreasing the observed signal by δ\delta. As a result an adversary would observe one of two distributions 𝖭𝗈𝗋𝗆𝖺𝗅(μ0,σ)\mathsf{Normal}(\mu_{0},\sigma) for b=0b=0 or 𝖭𝗈𝗋𝗆𝖺𝗅(μ1,σ)\mathsf{Normal}(\mu_{1},\sigma) for b=1b=1, where μ0μ1=δ\mu_{0}-\mu_{1}=\delta. Again we analyze a unit-less parameter η=σ/δ\eta=\sigma/\delta in this so-called η\eta-Normal setting.

Theorem IV.2.

In the η\eta-Normal setting, if b=1b=1, then in expectation the adversary needs at least n=2ln(1pp)η2n=2\ln(\frac{1-p}{p})\eta^{2} readings for (1p)100%(1-p)\cdot 100\% in the value of bb.

Proof.

If b=1b=1, the adversary observes data from 𝖭𝗈𝗋𝗆𝖺𝗅(μ1,σ)\mathsf{Normal}(\mu_{1},\sigma), otherwise (b=0b=0) they observe data from 𝖭𝗈𝗋𝗆𝖺𝗅(μ0,σ)\mathsf{Normal}(\mu_{0},\sigma). Via Corollary II.1.2, the η\eta-Normal setting is exactly the special case when σ1=σ2=σ\sigma_{1}=\sigma_{2}=\sigma. Thus if there is an interfering person, in expectation the adversary needs at least n>2ln(1pp)η2n>2\ln(\frac{1-p}{p})\eta^{2} readings for (1p)100%(1-p)\cdot 100\% confidence the existence of the person. ∎

IV-C Normal Noise and Normal Interference Model

Now we analyze when the sender injects normal noise and the effect of the person also follows a normal distribution. This specific case demonstrates the general principal of how these protocols and analysis can handle noise that materialize at several spots in the broadcast, interference, and sensing process – surely noise is introduced elsewhere as well.

Specifically, the sender chooses signal strength from 𝖭𝗈𝗋𝗆𝖺𝗅(μ,σ)\mathsf{Normal}(\mu,\sigma), and a person’s interference results in a decrease in signal strength by 𝖭𝗈𝗋𝗆𝖺𝗅(μI,σI)\mathsf{Normal}(\mu_{I},\sigma_{I}). Define σ1=σ2+σI2\sigma_{1}=\sqrt{\sigma^{2}+\sigma_{I}^{2}} and two unitless parameters η=σ1/μI\eta=\sigma_{1}/\mu_{I} and η=σ1/σ\eta^{\prime}=\sigma_{1}/\sigma. We refer to this as the (η,η)(\eta,\eta^{\prime})-Normal setting.

Theorem IV.3.

In the (η,η)(\eta,\eta^{\prime})-Normal setting, if b=1b=1, then in expectation the adversary needs at least n>ln(1pp)(1/η)212+log(η)+12(η)2n>\frac{\ln(\frac{1-p}{p})}{\frac{(1/\eta)^{2}-1}{2}+\log(\eta^{\prime})+\frac{1}{2(\eta^{\prime})^{2}}} readings to conclude with (1p)100%(1-p)\cdot 100\% the value of bb.

Proof.

If b=1b=1, then the observed signal is of the form 𝖭𝗈𝗋𝗆𝖺𝗅(μ1,σ1)\mathsf{Normal}(\mu_{1},\sigma_{1}) where μ1=μμIcxa\mu_{1}=\mu-\mu_{I}-c\|x-a\|, because a convolution of two normals results in another normal with parameters μμI\mu-\mu_{I} and standard deviation σ1\sigma_{1}. Otherwise (the case b=0b=0), the observed signal by the adversary would be from 𝖭𝗈𝗋𝗆𝖺𝗅(μ0,σ)\mathsf{Normal}(\mu_{0},\sigma) with μ0=μcxa\mu_{0}=\mu-c\|x-a\|.

By applying Corollary II.1.2, with these normals, we determine that in expectation the adversary needs at least n>ln(1pp)(1/η)212+log(η)+12(η)2n>\frac{\ln(\frac{1-p}{p})}{\frac{(1/\eta)^{2}-1}{2}+\log(\eta^{\prime})+\frac{1}{2(\eta^{\prime})^{2}}} readings to conclude with more than (1p)100%(1-p)\cdot 100\% confidence the existence of the person. ∎

IV-D Truncated Distributions

This above analysis formalizes how the smaller the KL divergence between two observed signals’ distributions, the harder for an adversary to detect the difference. Intuitively, when the variance of the signal sent out by the communicator is much larger than the variance of the interference, it is hard for the adversary to detect a person. This seems to indicate, we can set μ=M\mu=M (the maximum signal strength) and set the variance (σ2\sigma^{2}) very large, and avoid losing communication power and make it difficult to detect the presence of a person, since σδ\sigma\gg\delta. However, the signal strength may be limited to [0,M][0,M], and as a result, truncated distributions must be used. We can set the mean 0<μ<M0<\mu<M, or more likely 2σ<μ<M2σ2\sigma<\mu<M-2\sigma. Under this restriction, the analysis in Lemma II.1 can be adjusted using appropriately truncated distributions in place of a full Gaussian as in Corollary II.1.2.

V Models in 22 Dimensions

The situation in 2 dimensions with 1 person and 1 adversary can be reduced to the 1-dimensional setting. If the location of the person and adversary is known (bb is known), this maps to the Basic Shift models in Section III. If the location of the person or adversary is not known (bb is not known), this maps to the Random Noise models in Section III-B.

When there are 2 adversaries and 1 person, the setting is more challenging as one may be interfered with and the other not. Assuming the adversaries collude, this allows them to immediately detect the interference, if the sent signal strength is always the same in all directions. This immediate detection holds even for the Random Noise model as long as the effect of the noise is the same for both adversaries.

To circumvent this obstacle to hiding, we consider using broadcast equipment that can control directional signal strengths (as is commonplace in cell phone towers, and emerging in wifi routers). We consider two models for directional signal strength where hiding results can exist in this setting: very narrow band, and gradual decay.

Very narrow band. In the very narrow band model, the angle in which signal is emitted from the sender is defined by an direction θ\theta, and only is detectable within a very narrow set of angles (θτ,θ+τ)(\theta-\tau,\theta+\tau), for some parameter τ\tau. If the angle between the two adversaries from the perspective of the sender is greater than 2τ2\tau, then hiding protocols exist. At each time point, the sender chooses a random direction to send its signal. Then this can be observed by at most one adversary, and it again reduces to the 1 adversary case.

Gradual decay. A different model does not enforce a very narrow band, but instead assumes that for a fixed direction θ\theta, the signal strength decays symmetrically in both directions as the angle of the observer becomes further from θ\theta. Then again if the angle between the adversaries is large enough, a protocol can be designed to hide the interference of a person. In particular, this requires the sender to know if an adversary is interfered with, and that the difference in signal strength received by the two adversaries (because of the angular decay) to be larger than the effect of the interference of the person.

The protocol then is as follows. If there is no interference, direct the signal so its highest signal direction θ\theta is directly between the two adversaries; use less than the maximum possible strength. If a person interferes with one adversary, then direct the signal closer towards that interfered with adversary and increase the signal strength. If these two parameters (direction and signal strength) are chosen correctly, they can ensure both adversaries receive the same signal as without interference.

Note that in both cases, the most challenging case, which neither can overcome, is when the two adversaries are in a very similar direction from the sender, but are separated enough so a person can interfere with one but not the other. From one perspective, this provides a perhaps surprisingly useful setup for a pair of colluding adversaries. From another perspective, this model may be problematic since a person’s interference with an adversary may not be so binary, and may be diffuse within a range. If this contributes to a random distribution, some version of the noisy hiding analysis may be applicable.

Handling more than 2 adversaries is challenging in the gradual decay model because trying to solve for a setting that retains the same signal strength for 3 adversaries when there are only 2 degrees of freedom (signal strength and angular direction) is, in general, not possible.

VI Experiments on Noisy Hiding

We perform simulations on the noisy hiding model under Laplace distribution and normal distribution for different values of the ratio between standard deviation σ\sigma and the strength of the interference effect δ\delta. For each value of the ratio (σδ=3,6,9\frac{\sigma}{\delta}=3,6,9) we draw 10001000 random numbers coming from the specified distribution (𝖫𝖺𝗉(μ,σ)\mathsf{Lap}(\mu,\sigma) or 𝖭𝗈𝗋𝗆𝖺𝗅(μ,σ)\mathsf{Normal}(\mu,\sigma)). Then we calculate the likelihoods of the random sample drawn from the true distribution 𝖫𝖺𝗉(μ,σ)\mathsf{Lap}(\mu,\sigma) and another hypothetical distribution 𝖫𝖺𝗉(μδ,σ)\mathsf{Lap}(\mu-\delta,\sigma), and then the logarithm of the likelihood ratio between these two likelihoods. Our theoretical results indicates that the confidence to determine if the samples come from the true distribution rather than hypothetical distribution would be increased as the sample size increases. We perform 1010 trials for each value of the ratio, and compute the resulting confidence (via confidence = 1/(exp(LLR)1)1/(\exp(\textsf{LLR})-1)); and report its average and standard deviation. For each ratio σδ\frac{\sigma}{\delta}, we vary the number of readings from 100100 to 10001000, and plot the mean and error bars (showing one standard deviation) in Figure 3. For instance when σ/δ=6\sigma/\delta=6, then it usually requires between 500500 and 800800 readings to reach 95%95\% confidence. Although the Laplace distribution has a better theoretical bound (because of convenient mathematical properties), the normal empirically requires fewer trials to reach high confidence.

Refer to caption
Refer to caption
Figure 3: Statistical confidence achieved as a function of the number of readings for the Laplace and Normal noise models. We vary the unit-less parameter η=σ/δ\eta=\sigma/\delta as 33, 66, or 99.

VII Discussion & General Strategies

We propose new models and protocols to prevent an adversary snooping on the strength of a signal and detecting the presence of a person. Depending on if the interference is known, the presence can either be perfectly hidden, or hidden for a number of rounds with a statistical confidence bound. If the potentially interfering person collaborates with sender, and knows the protocol, it could potentially determine if it interferes with high confidence before a non-collaborating adversary, and shift to a perfect hiding strategy.

The models proposed in the paper are quite general. We omitted some potential specifications – they become tedious quickly – but results will not deviate too much from the general theorems/properties we produce in Section II. For instance, in observing real signal strength decay, they do not decay at a linear rate, the effect of a person blocking does decrease it but the effect is not binary (block or not block), and the fixed structures (like walls) in the environment play a role. When these can be modeled (or learned), very similar statements can be made as simple corollaries of our main results. When they cannot be modeled effectively or precisely, the fix is essentially to add more noise that the sender is not aware of, and the extensions appear much like Theorem IV.3.

For instance, some spatial (2-dimensional) settings with several colluding adversaries may seem hopeless, resulting in immediate detection. But this assumes perfect information and noiseless sensing among adversaries. Noise in the process may lead to something like the noisy hiding scenario in practice.

These methods reduce communication rates, since a lower than maximum signal strength is used. In the noisy hiding, we bound the probability an adversary can determine the bit bb indicating if a person is interfering with the signal or not. Hence we must set up the mean of the distribution of the signal strength, say μ\mu, which is lower than the maximal signal strength, say MM, and the power utilization is roughly μ/M\mu/M. As discussed, how large μ\mu can be set depending on σ\sigma (i.e. variance of the noise), since we desire that Mμ>2σM-\mu>2\sigma or >3σ>3\sigma so that the truncation of a normal (or Laplace) distribution insignificantly changes the KL divergence. In turn, this value of σ\sigma should be roughly proportional to δ\delta (i.e. person effect). Since again, it is common that the interference effect of a person δ\delta is much less than MM, this change in power utilization should generally be tolerable.

References

  • [1] M. Abbas, M. Elhamshary, H. Rizk, M. Torki, and M. Youssef. Wideep: Wifi-based accurate and robust indoor localization system using deep learning. In 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom, pages 1–10, 2019.
  • [2] A. S. Abrar, N. Patwari, and S. K. Kasera. Quantifying interference-assisted signal strength surveillance of sound vibrations, 2020.
  • [3] F. Adib, Z. Kabelac, D. Katabi, and R. C. Miller. 3d tracking via body radio reflections. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pages 317–329, Seattle, WA, Apr. 2014. USENIX Association.
  • [4] F. Adib and D. Katabi. See through walls with wifi! SIGCOMM Comput. Commun. Rev., 43(4):75–86, Aug. 2013.
  • [5] P. Bahl and V. N. Padmanabhan. Radar: an in-building rf-based user location and tracking system. In Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), volume 2, pages 775–784 vol.2, 2000.
  • [6] A. Baset, C. Becker, K. Derr, S. Ramirez, S. Kasera, and A. Bhaskara. Towards wireless environment cognizance through incremental learning. In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pages 256–264, 2019.
  • [7] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha. Hiding information in noise: fundamental limits of covert wireless communication. IEEE Communications Magazine, 53(12):26–31, 2015.
  • [8] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin. Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6):2515–2534, 2008.
  • [9] M. Brown, B. An, C. Kiekintveld, F. Ordóñez, and M. Tambe. An extended study on multi-objective security games. Autonomous Agents and Multi-Agent Systems, 28, 01 2014.
  • [10] T. M. Cover and J. A. Thomas. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing). Wiley-Interscience, USA, 2006.
  • [11] C. Dwork. Differential privacy: A survey of results. In International conference on theory and applications of models of computation, pages 1–19. Springer, 2008.
  • [12] S. Hussain, R. Peters, and D. Silver. Using received signal strength variation for surveillance in residential areas. Proceedings of SPIE - The International Society for Optical Engineering, 6973, 03 2008.
  • [13] O. Kaltiokallio, M. Bocca, and N. Patwari. Follow @grandma: Long-term device-free localization for residential monitoring. In 37th Annual IEEE Conference on Local Computer Networks - Workshops, pages 991–998, 2012.
  • [14] S. M. Kay. Fundamentals of Statistical Signal Processing: Estimation Theory. Prentice-Hall, Inc., USA, 1993.
  • [15] A. Moschitta and P. Carbone. Cramer-rao lower bound for parametric estimation of quantized sinewaves. In Proceedings of the 21st IEEE Instrumentation and Measurement Technology Conference (IEEE Cat. No.04CH37510), volume 3, pages 1724–1729 Vol.3, 2004.
  • [16] P. Paruchuri, J. P. Pearce, M. Tambe, F. Ordonez, and S. Kraus. An efficient heuristic approach for security against multiple adversaries. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS ’07, New York, NY, USA, 2007. Association for Computing Machinery.
  • [17] N. Patwari and J. Wilson. Rf sensor networks for device-free localization: Measurements, models, and algorithms. Proceedings of the IEEE, 98(11):1961–1973, 2010.
  • [18] N. Patwari, J. Wilson, S. Ananthanarayanan, S. K. Kasera, and D. R. Westenskow. Monitoring breathing via signal strength in wireless networks. IEEE Transactions on Mobile Computing, 13(8):1774–1786, 2014.
  • [19] D. Rife and R. Boorstyn. Single tone parameter estimation from discrete-time observations. IEEE Transactions on Information Theory, 20(5):591–598, 1974.
  • [20] C. Truong, L. Oudre, and N. Vayatis. A review of change point detection methods. CoRR, abs/1801.00718, 2018.
  • [21] P. M. Wijewardena, A. Bhaskara, S. K. Kasera, S. A. Mahmud, and N. Patwari. A plug-n-play game theoretic framework for defending against radio window attacks. WiSec ’20, page 284–294, New York, NY, USA, 2020. Association for Computing Machinery.
  • [22] M. Youssef, M. Mah, and A. Agrawala. Challenges: Device-free passive localization for wireless environments. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, MobiCom ’07, page 222–229, New York, NY, USA, 2007. Association for Computing Machinery.
  • [23] Y. Zhu, Y. Ju, B. Wang, J. Cryan, B. Y. Zhao, and H. Zheng. Wireless side-lobe eavesdropping attacks, 2018.