skip to main content
10.1145/3300061.3300120acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article
Public Access

Proximity Detection with Single-Antenna IoT Devices

Published: 05 August 2019 Publication History

Abstract

Providing secure communications between wireless devices that encounter each other on an ad-hoc basis is a challenge that has not yet been fully addressed. In these cases, close physical proximity among devices that have never shared a secret key is sometimes used as a basis of trust; devices in close proximity are deemed trustworthy while more distant devices are viewed as potential adversaries. Because radio waves are invisible, however, a user may believe a wireless device is communicating with a nearby device when in fact the user's device is communicating with a distant adversary. Researchers have previously proposed methods for multi-antenna devices to ascertain physical proximity with other devices, but devices with a single antenna, such as those commonly used in the Internet of Things, cannot take advantage of these techniques.
We present theoretical and practical evaluation of a method called SNAP -- SiNgle Antenna Proximity -- that allows a single-antenna Wi-Fi device to quickly determine proximity with another Wi-Fi device. Our proximity detection technique leverages the repeating nature Wi-Fi's preamble and the behavior of a signal in a transmitting antenna's near-field region to detect proximity with high probability; SNAP never falsely declares proximity at ranges longer than 14 cm.

References

[1]
NFC Forum, http://nfc-forum.org, visited 7/28/2018.
[2]
Altelix LLC. 2.4 GHz 15 dBi Wi-Fi Parabolic Antenna, http://www.altelix.com, visited 3/22/2018.
[3]
Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz. On the reliability of wireless fingerprinting using clock skews. In Proceedings of the ACM Conference on Wireless Network Security (WiSec), March 2010.
[4]
Constantine A. Balanis. Antenna Theory: Analysis and Design. Wiley, third edition, 2005.
[5]
Philippe Biondi. Scapy, http://www.secdev.org/projects/scapy, visited 4/15/2018.
[6]
Bastian Bloessl, Michele Segata, Christoph Sommer, and Falko Dressler. An IEEE 802.11a/g/p OFDM receiver for GNU Radio. In Proceedings of the Workshop on Software Radio Implementation Forum (SRIF), pages 9--16. ACM, 2013.
[7]
Bastian Bloessl, Christoph Sommer, and Falko Dressler. Power matters: Automatic Gain Control for a Software Defined Radio IEEE 802.11 a/g/p receiver. In IEEE International Conference on Computer Communications Workshop (INFOCOM), pages 25--26. IEEE, 2015.
[8]
Liang Cai, Kai Zeng, Hao Chen, and Prasant Mohapatra. Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas. In Proceedings of Network and Distributed Systems Security Symposium (NDSS), 2011.
[9]
Jiska Classen, Matthias Schulz, and Matthias Hollick. Practical covert channels for WiFi systems. In Conference on Communications and Network Security (CNS), pages 209--217. IEEE, September 2015.
[10]
Vedat Coskun, Busra Ozdenizci, and Kerem Ok. A survey on Near Field Communication (NFC) technology. Wireless Personal Communications, 71(3):2259--2294, 2013.
[11]
Ettus Research. USRP N210 Software Defined Radio, https://www.ettus.com, visited 3/18/2018.
[12]
Federal Communications Commission. Section 15.247 Operation within the bands 902--928 MHz, 2400--2485.3 MHz, and 5725--5850 MHz, https://www.gpo.gov/fdsys/pkg/CFR-2013-title47-vol1, visited 3/22/2018.
[13]
Mikhail Fomichev, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen, and Matthias Hollick. Survey and systematization of secure device pairing. IEEE Communications Surveys & Tutorials, 2017.
[14]
Google. Share content by NFC with Android Beam, https://support.google.com/nexus/answer/2781895, visited 3/22/2018.
[15]
Great Scott Gadgets. HackRF One, https://greatscottgadgets.com, visited 3/22/2018.
[16]
Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. Tool release: Gathering 802.11n traces with Channel State Information. SIGCOMM Computer Communication Review, 41(1):53, January 2011.
[17]
Institute of Electrical and Electronics Engineers. 802.11n standard, http://standards.ieee.org, visited 7/20/2018.
[18]
Intel. Intel Ultimate N Wi-Fi Link 5300: Product Brief, http://www.intel.com, visited 4/15/2018.
[19]
R. Jin, L. Shi, K. Zeng, A. Pande, and P. Mohapatra. Magpairing: Pairing smartphones in close proximity using magnetometers. IEEE Transactions on Information Forensics and Security, 11(6):1306--1320, June 2016.
[20]
JR Raphael. Android nostalgia: 13 once-trumpeted features that quietly faded away, https://www.computerworld.com/article/3239864, visited 3/22/2018.
[21]
Andre Kalamandeen, Adin Scannell, Eyal de Lara, Anmol N. Sheth, and Anthony LaMarca. Ensemble: cooperative proximity-based authentication. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 331--344. ACM, June 2010.
[22]
Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, and Sachin Katti. SpotFi: Decimeter level localization using WiFi. In Proceedings of the Conference on Special Interest Group on Data Communication (SIGCOMM), pages 269--282. ACM, 2015.
[23]
Xiaohui Liang, Tianlong Yun, Ronald Peterson, and David Kotz. LightTouch: Securely connecting wearables to ambient displays with user intent. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pages 1--9, May 2017.
[24]
Suhas Mathur, Rob Miller, Alexander Varshavsky, Wade Trappe, and Narayan Mandayam. ProxiMate: Proximity-based Secure Pairing using Ambient Wireless Signals. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 211--224. ACM, June 2011.
[25]
Rene Mayrhofer and Hans Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing, 8(6):792--806, June 2009.
[26]
Christoph Neumann, Olivier Heen, and Stephane Onno. An empirical study of passive 802.11 device fingerprinting. In International Conference on Distributed Computing Systems Workshops, pages 593--602. IEEE, June 2012.
[27]
Panda Wireless. Panda Ultra Wireless N USB Wi-Fi adapter, http://www.pandawireless.com, visited 4/15/2018.
[28]
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. Wanda: securely introducing mobile devices. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pages 1--9. IEEE, April 2016.
[29]
Hanif Rahbari and Marwan Krunz. Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Transactions on Wireless Communications, 16(6):3775--3786, June 2017.
[30]
R. Rawassizadeh, T. J. Pierson, R. Peterson, and D. Kotz. NoCloud: Exploring network disconnection through on-device data analysis. IEEE Pervasive Computing, 17(1):64--74, 2018.
[31]
K. Ren, Q. Wang, D. Ma, and X. Jia. Securing emerging short range wireless communications: the state of the art. IEEE Wireless Communications, 21(6):153--159, December 2014.
[32]
The GNU Radio Foundation. GNURadio, https://www.gnuradio.org, visited 3/22/2018.
[33]
David Tse and Pramod Viswanath. Fundamentals of wireless communication. Cambridge University Press, 2005.
[34]
Deepak Vasisht, Swarun Kumar, and Dina Katabi. Decimeter-level localization with a single WiFi access point. In Symposium on Networked Systems Design and Implementation (NSDI), volume 16, pages 165--178. USENIX, 2016.
[35]
Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, and Dingyi Fang. D-watch: Embracing bad multipaths for device-free localization with COTS RFID devices. IEEE Transactions on Networking (TON), 25(6):3559--3572, December 2017.
[36]
Qiang Xu, Rong Zheng, Walid Saad, and Zhu Han. Device fingerprinting in wireless networks: Challenges and opportunities. IEEE Communications Surveys & Tutorials, 18(1):94--104, January 2016.
[37]
Ruogu Zhou and Guoliang Xing. nShield: A noninvasive NFC security system for mobile devices. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 95--108. ACM, 2014.
[38]
Hongzi Zhu, Jingmei Hu, Shan Chang, and Li Lu. ShakeIn: secure user authentication of smartphones with single-handed shakes. IEEE Transactions on Mobile Computing, (10):2901--2912, 2017.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '19: The 25th Annual International Conference on Mobile Computing and Networking
August 2019
1017 pages
ISBN:9781450361699
DOI:10.1145/3300061
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 August 2019

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

MobiCom '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)243
  • Downloads (Last 6 weeks)31
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

EPUB

View this article in ePub.

ePub

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media