Attack Evaluations of Deep Learning Empowered WiFi Sensing in IoT Systems

Jianchao Song, Cheng Qian, Y. Guo, Kun Hua, Wei Yu
{"title":"Attack Evaluations of Deep Learning Empowered WiFi Sensing in IoT Systems","authors":"Jianchao Song, Cheng Qian, Y. Guo, Kun Hua, Wei Yu","doi":"10.1109/INFOCOMWKSHPS57453.2023.10226121","DOIUrl":null,"url":null,"abstract":"Recently, the market has witnessed fabulous growths of WiFi sensing technologies to advance the deployment of Internet of Things (IoT) systems. Besides being an essential IoT enabler, WiFi devices with smart sensing techniques carry more helpful information to improve the performance of IoT systems. However, there is a lack of research efforts on systematically investigating the potential security threats of smart WiFi Sensing assisted IoT systems. In this paper, we systematically investigate the vulnerability of existing deep learning empowered WiFi sensing systems under False Data Injection (FDI) attacks. First, we analyze the attack vendors in three different IoT layers and consider violating the data integrity in three dimensions (i.e., time, space, and value). Second, we design three attack schemes to realize FDI attacks on smart WiFi sensing models. By measuring the performance of activity recognition on seven datasets under diverse WiFi sensing, experimental results demonstrate that the accuracy of activity recognition drastically decreases under our attacks.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226121","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Recently, the market has witnessed fabulous growths of WiFi sensing technologies to advance the deployment of Internet of Things (IoT) systems. Besides being an essential IoT enabler, WiFi devices with smart sensing techniques carry more helpful information to improve the performance of IoT systems. However, there is a lack of research efforts on systematically investigating the potential security threats of smart WiFi Sensing assisted IoT systems. In this paper, we systematically investigate the vulnerability of existing deep learning empowered WiFi sensing systems under False Data Injection (FDI) attacks. First, we analyze the attack vendors in three different IoT layers and consider violating the data integrity in three dimensions (i.e., time, space, and value). Second, we design three attack schemes to realize FDI attacks on smart WiFi sensing models. By measuring the performance of activity recognition on seven datasets under diverse WiFi sensing, experimental results demonstrate that the accuracy of activity recognition drastically decreases under our attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网系统中基于深度学习的WiFi传感攻击评估
最近,市场见证了WiFi传感技术的惊人增长,以推进物联网(IoT)系统的部署。除了作为必不可少的物联网推动者外,具有智能传感技术的WiFi设备还携带更多有用的信息,以提高物联网系统的性能。然而,缺乏系统调查智能WiFi传感辅助物联网系统潜在安全威胁的研究工作。在本文中,我们系统地研究了现有的深度学习WiFi传感系统在虚假数据注入(FDI)攻击下的脆弱性。首先,我们分析了三个不同物联网层的攻击供应商,并考虑在三个维度(即时间、空间和价值)上违反数据完整性。其次,我们设计了三种攻击方案来实现对智能WiFi传感模型的FDI攻击。通过对不同WiFi传感条件下7个数据集上的活动识别性能进行测量,实验结果表明,在我们的攻击下,活动识别的准确率急剧下降。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Hasty Grid S&R Prototype Using Autonomous UTM and AI-Based Mission Coordination Trajectory Design for Unmanned Aerial Vehicles via Meta-Reinforcement Learning CICADA: Cloud-based Intelligent Classification and Active Defense Approach for IoT Security Learning-Aided Multi-UAV Online Trajectory Coordination and Resource Allocation for Mobile WSNs Vulnerability Exploit Pattern Generation and Analysis for proactive security risk mitigation for 5G networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1