A user behavior privacy protection method against csi time-frequency domain information attack

An information attack and privacy protection technology, applied in the field of information security, can solve the company's economic loss and acquisition problems

Active Publication Date: 2020-06-05
NORTHWEST UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the WiHear system can be implemented with the current wireless signal transmitter, when the WiHear system is used in some private places, such as a wireless router in a company meeting, the content of the company meeting is likely to be obtained by an attacker. Furthermore, the attacker may obtain the company's commercial secrets. If these commercial secrets are leaked, it will cause immeasurable economic losses to the company.
The WiKey system realizes fine-grained key detection. If an attacker installs a wireless signal transmitter in the office of the company's top leaders, the information entered by the leader on the computer is likely to be obtained by the attacker.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user behavior privacy protection method against csi time-frequency domain information attack
  • A user behavior privacy protection method against csi time-frequency domain information attack
  • A user behavior privacy protection method against csi time-frequency domain information attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] like figure 1 As shown, when the user arrives in a certain area, if there is a WIFI transmitter and receiver in the area, when the user is located relatively close to the device deployed by the attacker, the attacker can use the receiver to obtain The CSI value when the user enters the private information, and then combined with its attack knowledge base, the attacker can easily crack the user's private information, such as the unlock password, Alipay payment password, and WeChat payment password. At this time, the user has the risk of privacy leakage. The present invention provides a privacy behavior protection method that can detect whether the current area is safe, and if not, guide the user to a safe area, specifically as follows:

[0050] A method for protecting user behavior privacy against CSI time-frequency domain information attacks, comprising the following steps:

[0051] Step 1: Determine whether the current location is a safe area

[0052] Install the csi t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user behavior privacy protection method aimed at CSI time-frequency domain information attack. The method first detects the SNR value of user behavior privacy through a mobile phone to judge whether the current area is safe, and if it is not safe, walk through the door The data in the process is used as known data, and the location of the malicious device is calculated according to the signal attenuation model and its position is corrected in real time; finally, according to the distribution of the malicious device, the direction of the user's walking is determined, and finally the user reaches the safe area. The present invention has been verified by actual experiments, which proves that the number of steps, step length and direction estimated by the method of the present invention are relatively accurate. Compared with the positioning method of the same type using the signal attenuation model, the positioning result of this method can reach the same accuracy. By guiding the user in real time, we can prove that this method can effectively protect the user's private information, and the user's online experience will not be affected when the user is in a safe area.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for protecting user behavior privacy against CSI time-frequency domain information attacks. Background technique [0002] WiFi is now an important part of the Internet of Things. In recent years, WiFi has been used for indoor positioning, object tracking, gesture recognition, button detection, lip recognition, etc. However, WiFi may also leak user privacy. [0003] Most mobile phones now use graphics and digital passwords to unlock. The security field finds that this method is not safe. It is very easy to obtain channel status information through a pair of transceivers and crack the password entered by the user without the user's knowledge. , which in turn poses a great threat to user privacy, especially when using Alipay or WeChat payment, if the password is cracked and identified, it will cause serious economic and property losses. For example, the WiPas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/62
CPCH04L63/0428G06F21/6245H04L67/52
Inventor 汤战勇张洁李梦房鼎益龚晓庆陈晓江陈峰
Owner NORTHWEST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products