{"id":7285,"date":"2016-01-12T08:07:26","date_gmt":"2016-01-12T08:07:26","guid":{"rendered":"http:\/\/revoscience.com\/en\/?p=7285"},"modified":"2016-01-12T08:07:26","modified_gmt":"2016-01-12T08:07:26","slug":"wifi-signals-can-be-utlized-to-detect-attackers","status":"publish","type":"post","link":"https:\/\/www.revoscience.com\/en\/wifi-signals-can-be-utlized-to-detect-attackers\/","title":{"rendered":"WiFi Signals can be utlized to Detect Attackers"},"content":{"rendered":"<figure id=\"attachment_7286\" aria-describedby=\"caption-attachment-7286\" style=\"width: 618px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7286\" src=\"http:\/\/revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg\" alt=\"WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440\" width=\"618\" height=\"315\" title=\"\"><\/a><figcaption id=\"caption-attachment-7286\" class=\"wp-caption-text\">Research reveals that WiFi signals can be used to detect tampering with connected devices, such as wireless security cameras.<\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Physical attacks on devices connected to the Internet can be detected by analyzing WiFi signals, computer scientists have discovered.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Wireless devices are increasingly used for critical roles, such as security systems or industrial plant automation. Although wireless transmissions can be encrypted to protect transmitted data, it is hard to determine if a device \u2014 such as a wirelessly connected security camera protecting critical buildings in airports or power stations \u2014 has been tampered with. An attacker may simply rotate a camera\u2019s view away from the area it is guarding without triggering an alert.<\/span><\/p>\n<p style=\"text-align: justify;\">[pullquote]Researchers at Lancaster University, in their study \u201cUsing Channel State Information for Tamper Detection in the Internet of Things\u201d have created a method that analyzes WiFi signals at multiple receivers to detect physical attacks.[\/pullquote]<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Researchers at Lancaster University, in their study \u201cUsing Channel State Information for Tamper Detection in the Internet of Things\u201d have created a method that analyzes WiFi signals at multiple receivers to detect physical attacks. A change in the pattern of wireless signals \u2014 known as Channel State Information (CSI) \u2014 picked up by the receivers can indicate a tamper situation. The algorithm detects attacks despite signal noise caused by natural changes to the environment such as people walking through the communication paths.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Dr. Utz Roedig, Reader in Lancaster University\u2019s School of Computing and Communications and one of the report\u2019s authors, said: \u201cA large number of Internet of Things systems are using WiFi and many of these require a high level of security. This technique gives us a new way to introduce an additional layer of defense into our communication systems. Given that we use these systems around critically important infrastructure this additional protection is vital.\u201d<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">The paper was presented by lead author Ibrahim Ethem Bagci at the 31st Annual Computer Applications Conference (ACSAC) in Los Angeles on December 9, 2015.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Other contributors to the research include Ivan Martinovic from the University of Oxford and Matthias Schulz and Matthias Hollick from the Technische Universitat Darmstadt.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Physical attacks on devices connected to the Internet can be detected by analyzing WiFi signals, computer scientists have discovered.<\/p>\n","protected":false},"author":6,"featured_media":7286,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43,47,17],"tags":[],"class_list":["post-7285","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-science","category-it","category-research"],"featured_image_urls":{"full":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440-150x150.jpg",150,150,true],"medium":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440-300x150.jpg",300,150,true],"medium_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"1536x1536":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"2048x2048":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"ultp_layout_landscape_large":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"ultp_layout_landscape":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"ultp_layout_portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"ultp_layout_square":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"newspaper-x-single-post":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"newspaper-x-recent-post-big":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"newspaper-x-recent-post-list-image":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",95,48,false],"web-stories-poster-portrait":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",440,220,false],"web-stories-publisher-logo":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",96,48,false],"web-stories-thumbnail":["https:\/\/www.revoscience.com\/en\/wp-content\/uploads\/2016\/01\/WiFi_Signals_can_be_Exploited_to_Detect_Attackers_440.jpg",150,75,false]},"author_info":{"info":["Amrita Tuladhar"]},"category_info":"<a href=\"https:\/\/www.revoscience.com\/en\/category\/computer-science\/\" rel=\"category tag\">Computer Science<\/a> <a href=\"https:\/\/www.revoscience.com\/en\/category\/news\/it\/\" rel=\"category tag\">IT<\/a> <a href=\"https:\/\/www.revoscience.com\/en\/category\/news\/research\/\" rel=\"category tag\">Research<\/a>","tag_info":"Research","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/7285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/comments?post=7285"}],"version-history":[{"count":0,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/posts\/7285\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media\/7286"}],"wp:attachment":[{"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/media?parent=7285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/categories?post=7285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revoscience.com\/en\/wp-json\/wp\/v2\/tags?post=7285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}