User behavior privacy protection method aiming at CSI time frequency domain information attacks

An information attack and privacy protection technology, applied in the field of information security, can solve problems such as acquisition and company economic loss

Active Publication Date: 2017-11-24
NORTHWEST UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the WiHear system can be implemented with the current wireless signal transmitter, when the WiHear system is used in some private places, such as a wireless router in a company meeting, the content of the company meeting is likely to be obtained by an attacker. Furthermore, the attacker may obtain the company's commercial secrets. If these commercial secrets are leaked, it will cause immeasurable economic losses to the company.
The WiKey system realizes fine-grained key detection. If an attacker installs a wireless signal transmitter in the office of the company's top leaders, the information entered by the leader on the computer is likely to be obtained by the attacker.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior privacy protection method aiming at CSI time frequency domain information attacks
  • User behavior privacy protection method aiming at CSI time frequency domain information attacks
  • User behavior privacy protection method aiming at CSI time frequency domain information attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Such as figure 1 As shown, when the user arrives in a certain area, if there is a WIFI transmitter and receiver in the area, when the user is located relatively close to the device deployed by the attacker, the attacker can use the receiver to obtain The CSI value when the user enters the private information, and then combined with its attack knowledge base, the attacker can easily crack the user's private information, such as the unlock password, Alipay payment password, and WeChat payment password. At this time, the user has the risk of privacy leakage. The present invention provides a privacy behavior protection method that can detect whether the current area is safe, and guide the user to a safe area if it is not safe, specifically as follows:

[0050] A method for protecting user behavior privacy against CSI time-frequency domain information attacks, comprising the following steps:

[0051] Step 1: Determine whether the current location is a safe area

[0052] Inst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user behavior privacy protection method aiming at CSI time frequency domain information attacks. The method comprises the steps that firstly, the SNR value of user behavior privacy is detected through a mobile phone so as to judge whether a current area is safe or not, and if not, data in the walking process of a user serves as known data, the position of malicious equipment is specifically calculated according to a signal attenuation model, and the position of the malicious equipment is corrected in real time; finally, according to the distribution position of the malicious equipment, the walking direction of the user is determined, and the user is made to reach a safety area eventually. Through actual test verification, it is proved that the number of steps, the step lengths and directions which are estimated through the method are relatively accurate; compared with similar positioning methods using signal attenuation models, positioning results of the method can reach the same precision; it can be proved that the method can effectively protect private information of the user by guiding the user in real time; besides, the user is in the safe area so that the internet surfing experience of the user is not affected.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for protecting user behavior privacy against CSI time-frequency domain information attacks. Background technique [0002] WiFi is now an important part of the Internet of Things. In recent years, WiFi has been used for indoor positioning, object tracking, gesture recognition, button detection, lip recognition, etc. However, WiFi may also leak user privacy. [0003] Most mobile phones now use graphics and digital passwords to unlock. The security field finds that this method is not safe. It is very easy to obtain channel status information through a pair of transceivers and crack the password entered by the user without the user's knowledge. , which in turn poses a great threat to user privacy, especially when using Alipay or WeChat payment, if the password is cracked and identified, it will cause serious economic and property losses. For example, the WiPas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F21/62
CPCH04L63/0428G06F21/6245H04L67/52
Inventor 汤战勇张洁李梦房鼎益龚晓庆陈晓江陈峰
Owner NORTHWEST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products