Passive, device-free localization of a person exploiting the Channel State Information (CSI) from Wi-Fi signals is quickly becoming a reality. While this capability would enable new applications and services, it also raises concerns about citizens’ privacy. In this work, we propose a carefully-crafted obfuscating technique against one of such CSI-based localization methods. In particular, we modify the transmitted I/Q samples by leveraging an irreversible randomized sequence. I/Q symbol manipulation at the transmitter distorts the location-specific information in the CSI while preserving communication, so that an attacker can no longer derive information on user’s location. We test this technique against a Neural Network (NN)-based localiza...
Recently, channel state information (CSI) is shown to be an effective side-channel to perform attack...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
We present several novel techniques to track (unassociated) mobile devices by abusing features of th...
Passive, device-free localization of a person exploiting the Channel State Information (CSI) from Wi...
Channel State Information (CSI) based localization with 802.11 has been proven feasible in multiple ...
The use of Channel State Information (CSI) as a means of sensing the environment through Wi-Fi commu...
The use of Channel State Information (CSI) as a means of sensing the environment through Wi-Fi commu...
This dataset has been used to study CSI-based device-free localization and test the performance of d...
Many emerging applications such as intruder detection and border protection drive the fast increasin...
Abstract—Internet privacy is a serious concern nowadays. Users ’ activity leaves a vast digital foot...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Abstract—CSI fingerprint localization is an advanced and promising technique for indoor localization...
Accurately positioning nodes in wireless and sensor networks is important because the location of de...
The research on indoor localization has received great interest in recent years. This has been fuell...
Recently, channel state information (CSI) is shown to be an effective side-channel to perform attack...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
We present several novel techniques to track (unassociated) mobile devices by abusing features of th...
Passive, device-free localization of a person exploiting the Channel State Information (CSI) from Wi...
Channel State Information (CSI) based localization with 802.11 has been proven feasible in multiple ...
The use of Channel State Information (CSI) as a means of sensing the environment through Wi-Fi commu...
The use of Channel State Information (CSI) as a means of sensing the environment through Wi-Fi commu...
This dataset has been used to study CSI-based device-free localization and test the performance of d...
Many emerging applications such as intruder detection and border protection drive the fast increasin...
Abstract—Internet privacy is a serious concern nowadays. Users ’ activity leaves a vast digital foot...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hots...
Abstract—CSI fingerprint localization is an advanced and promising technique for indoor localization...
Accurately positioning nodes in wireless and sensor networks is important because the location of de...
The research on indoor localization has received great interest in recent years. This has been fuell...
Recently, channel state information (CSI) is shown to be an effective side-channel to perform attack...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
We present several novel techniques to track (unassociated) mobile devices by abusing features of th...