Computer Science ›› 2021, Vol. 48 ›› Issue (6): 343-348.doi: 10.11896/jsjkx.200700006

• Information Security • Previous Articles    

Intrusion Detection Method Based on WiFi-CSI

WANG Ying-ying, CHANG Jun, WU Hao, ZHOU Xiang, PENG Yu   

  1. School of Information Science and Engineering,Yunnan University,Kunming 650500,China
  • Received:2020-07-01 Revised:2020-09-10 Online:2021-06-15 Published:2021-06-03
  • About author:WANG Ying-ying,born in 1994,postgraduate,is a member of China Computer Federation.Her main research interests include wireless sensing and so on.(wyy6021@foxmail.com)
    CHANG Jun,born in 1970,postgra-duate,assistant professor,is a member of China Computer Federation.His main research interests include wireless communication and network.
  • Supported by:
    National Natural Science Foundation of China(61562090) and Research Fund of Yunnan Provincial Department of Education(2019J0007).

Abstract: At present,Wi-Fi has been widely used in public and private fields.Deviceless human intrusion detection based on wireless technology has a broad application prospect for realizing indoor services such as asset security,emergency response and personalized services.Aiming at the problems of serious false positives and false negatives,difficult analysis of massive information,troublesome deployment,etc. of existing methods,this paper proposes an intrusion detection method based on Wi-Fi signals.Firstly,it uses the fine-grained Channel State Information(CSI) on the Wi-Fi device to capture small changes caused by human movements.Then it uses the Multiple Signal Classification(MUSIC) to sample the covariance matrix eigen decomposition.The obtained noise subspace is used to estimate the target angle(AOA).Finally,the intrusion is judged by calculating the phase difference changes of different paths caused by the movements of the human body.The difference between traditional methods and the proposed method is that the spectral peak search and phase difference are combined,with complementary advantages,the two overcome the environmental and noise interference,and solve the influence of multipath effects on the results of this paper.There are two typical indoor environments in this paper,namely the conference room and the dark room.Experimental results show that the average false negative(FN) and false positive(FP) of the method in the two indoor environments are 1.83% and 1.4%,respectively.In addition,this paper also evaluates the detection performance of the proposed method in different sports modes,and the average false negative and false positive are 2.26% and 1.46%,respectively.By comparing with other methods,the validity and stability of the proposed method are verified.It shows that this method has strong robustness and practical value,and provides a feasible scheme for the development of intrusion detection technology in the future.

Key words: Channel state information, Intrusion detection, Multiple signal classification algorithm, Phase difference, Training-free

CLC Number: 

  • TP391
[1]ZHENG D,HONG Z,WANG N,et al.An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application[J].Sensors,2020,20(6),1706.
[2]DALCONZO A,DRAGO I,MORICHETTA A,et al.A Survey on Big Data for Network Traffic Monitoring and Analysis[J].IEEE Transactions on Network and Service Management,2019,16(3):800-813.
[3]STAN O,COHEN A,ELOVICI Y,et al.Intrusion DetectionSystem for the MIL-STD-1553 Communication Bus[J].IEEE Transactions on Aerospace and Electronic Systems,2019,PP(99):1-1.
[4]LI Z,ZHAO X,HU F,et al.SoiCP:A Seamless Outdoor-Indoor Crowdsensing Positioning System[J].IEEE Internet of Things Journal,2019,6(5):8626-8644.
[5]SEYEDI B,FOTOHI R.NIASHPT:a novel intelligent agent-based strategy using hello packet table(HPT) function for trust Internet of Things[J].The Journal of Supercomputing,2020,75(276):1-24.
[6]YANG G,SHI X,FENG L,et al.CEDAR:A Cost-effectiveCrowdsensing System for Detecting and Localizing Drones[J].IEEE Transactions on Mobile Computing,2019(9):2028-2043.
[7]KOTARU M,KATTI S.Position Tracking for Virtual Reality Using Commodity WiFi[C]//IEEE Conference onComputer Vision and Pattern Recognition.IEEE,2017:2671-2681.
[8]YOUSSEF M,MAH M,AGRAWALA A.Challenges:Device-free passive localization for wireless environments[C]//ACM International Conference on Mobile Computing and Networking.Montreal:ACM,2007:222-229.
[9]YANG Z,LIU Y H.Wi-Fi Radar:From RSSI To CSI[J].Communication of China computer Society,2014,11(10):55-60.
[10]DESHMUKH-BHOSALE S,SONAVANE S S.A Real-TimeIntrusion Detection System for Wormhole Attack in the RPL Based Internet of Things[J].Procedia Manufacturing,2019,32:840-847.
[11]JIN Y,TIAN Z,ZHOU M,et al.An Adaptive and Robust Device-Free Intrusion Detection Using Ubiquitous WiFi Signals[C]//International Conference on Digital Signal Processing.2018:1-5.
[12]DING Y S,GUO B,XIN T,et al.WiCount:A Crowd Counting Method Based on WiFi Channel State Information[J].Computer Science,2019,46(11):297-303.
[13]SHAH S I,SHAH S Y,SHAH S A.Intrusion Detectionthrough Leaky Wave Cable in Conjunction with Channel State Information[C]//2019 UK/China Emerging Technologies(UCET).2019:1-4.
[14]WANG T,YANG D,ZHANG S,et al.Wi-Alarm:Low-CostPassive Intrusion Detection Using WiFi[J].Sensors,2019,19(10):2335.
[15]HAN K,SHI L J,DENG Z L,et al.Indoor NLOS Positioning System Based on Enhanced CSI Feature with IntrusionAdaptabi-lity[J].Sensors,2020,20(4):1211.
[16]LYU J,MAN D,YANG W,et al.Robust Device-Free Intrusion Detection Using Physical Layer Information of WiFi Signals[J].Applied Sciences,2019,9(1):175.
[17]BAO Y,DONG L,ZHENG Y,et al.WiSafe:a real-time system for intrusion detection based on wifi signals[C]//Proceedings of the ACM Turing Celebration Conference-China.ACM,2019:1-5.
[18]TIAN Z,SHAO L,ZHOU M,et al.A highly-accurate device-free passive motion detection system using cellular network[C]//2016 IEEE Wireless Communications and Networking Conference.IEEE,2016:1-6.
[19]XIN T,GUO B,WANG Z,et al.FreeSense:behavior under-standing using Wi-Fi signals[J].Ambient Intelligence,2018,9(5):1611-1622.
[1] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[2] ZHOU Zhi-hao, CHEN Lei, WU Xiang, QIU Dong-liang, LIANG Guang-sheng, ZENG Fan-qiao. SMOTE-SDSAE-SVM Based Vehicle CAN Bus Intrusion Detection Algorithm [J]. Computer Science, 2022, 49(6A): 562-570.
[3] CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587.
[4] QING Chao-jin, DU Yan-hong, YE Qing, YANG Na, ZHANG Min-tao. Enhanced ELM-based Superimposed CSI Feedback Method with CSI Estimation Errors [J]. Computer Science, 2022, 49(6A): 632-638.
[5] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[6] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[7] WANG Chi, CHANG Jun. CSI Cross-domain Gesture Recognition Method Based on 3D Convolutional Neural Network [J]. Computer Science, 2021, 48(8): 322-327.
[8] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
[9] CHENG Xi, CAO Xiao-mei. SQL Injection Attack Detection Method Based on Information Carrying [J]. Computer Science, 2021, 48(7): 70-76.
[10] YU Jian-ye, QI Yong, WANG Bao-zhuo. Distributed Combination Deep Learning Intrusion Detection Method for Internet of Vehicles Based on Spark [J]. Computer Science, 2021, 48(6A): 518-523.
[11] YOU Ling, GUAN Zhang-jun. Low-complexity Subcarrier Allocation Algorithm for Underwater OFDM Acoustic CommunicationSystems [J]. Computer Science, 2021, 48(6A): 387-391.
[12] CAO Yang-chen, ZHU Guo-sheng, QI Xiao-yun, ZOU Jie. Research on Intrusion Detection Classification Based on Random Forest [J]. Computer Science, 2021, 48(6A): 459-463.
[13] JIA Lin, YANG Chao, SONG Ling-ling, CHENG Zhenand LI Bei-jun. Improved Negative Selection Algorithm and Its Application in Intrusion Detection [J]. Computer Science, 2021, 48(6): 324-331.
[14] LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332.
[15] HUAN Wen-ming, LIN Hai-tao. Design of Intrusion Detection System Based on Sampling Ensemble Algorithm [J]. Computer Science, 2021, 48(11A): 705-712.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!