Find Me A Safe Zone:A Countermeasure for Channel State Information Based Attacks

Zhang, Jie and Tang, Zhanyong and Li, Meng and Fang, Dingyi and Chen, Xiaojiang and Wang, Zheng (2019) Find Me A Safe Zone:A Countermeasure for Channel State Information Based Attacks. Computers and Security, 80. pp. 273-290. ISSN 0167-4048

[thumbnail of elsarticle-template-5-harv]
Preview
PDF (elsarticle-template-5-harv)
elsarticle_template_5_harv.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial-NoDerivs.

Download (2MB)

Abstract

Recently, channel state information (CSI) is shown to be an effective side-channel to perform attacks in public environments. Prior work has demonstrated that by analyzing how the CSI measurements of the wireless signal are affected by the mobile user's finger movements or gestures, an attacker can recover the user's input with a high success rate. Furthermore, the setup of this new attack is trivial, where the adversary only needs to place one or two malicious wireless devices near the target user. It would be difficult for many users to identify the nearby malicious devices while they want to continue to use mobile applications in public places. This dilemma makes protection of CSI-based attacks an urgent need. This article presents the first countermeasure for CSI-based attacks. Our key insight is that the success of any CSI-based attack requires high-quality CSI measurements; and we can significantly reduce the risk of information leakage by directing the user to a nearby location where the CSI readings are inherently noisy. To this end, we develop a regression based method to assess the risk of CSI-based attacks and exploit a well-established localization technique to identify potential malicious wireless devices. We then use this information to guide the user to a safe zone. We evaluate our approach by applying it to protect pattern lock and keystrokes in various indoor and outdoor environments. Experimental results show that our approach can effectively protect mobile users against CSI-based attacks.

Item Type:
Journal Article
Journal or Publication Title:
Computers and Security
Additional Information:
This is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, 80, 2019 DOI: 10.1016/j.cose.2018.09.017
Uncontrolled Keywords:
/dk/atira/pure/subjectarea/asjc/1700
Subjects:
?? CHANNEL STATE INFORMATION-BASED ATTACKSCOUNTERMEASURESGESTURE RECOGNITIONPRIVACY PROTECTIONSECURITYSENSINGLAWCOMPUTER SCIENCE(ALL) ??
ID Code:
128071
Deposited By:
Deposited On:
08 Oct 2018 08:18
Refereed?:
Yes
Published?:
Published
Last Modified:
19 Sep 2023 02:00