Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2023, Vol. 17 Issue (3) : 173704    https://doi.org/10.1007/s11704-022-1550-6
RESEARCH ARTICLE
Jointly beam stealing attackers detection and localization without training: an image processing viewpoint
Yaoqi YANG1, Xianglin WEI2(), Renhui XU1(), Weizheng WANG3, Laixian PENG1, Yangang WANG2
1. College of Communication Engineer, Army Engineering University of PLA, Nanjing 210000, China
2. The 63rd Research Institute, National University of Defense Technology, Nanjing 210007, China
3. Department of Computer Science, City University of Hong Kong, Hong Kong 999077, China
 Download: PDF(10873 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Recently revealed beam stealing attacks could greatly threaten the security and privacy of IEEE 802.11ad communications. The premise to restore normal network service is detecting and locating beam stealing attackers without their cooperation. Current consistency-based methods are only valid for one single attacker and are parameter-sensitive. From the viewpoint of image processing, this paper proposes an algorithm to jointly detect and locate multiple beam stealing attackers based on RSSI (Received Signal Strength Indicator) map without the training process involved in deep learning-based solutions. Firstly, an RSSI map is constructed based on interpolating the raw RSSI data for enabling high-resolution localization while reducing monitoring cost. Secondly, three image processing steps, including edge detection and segmentation, are conducted on the constructed RSSI map to detect and locate multiple attackers without any prior knowledge about the attackers. To evaluate our proposal’s performance, a series of experiments are conducted based on the collected data. Experimental results have shown that in typical parameter settings, our algorithm’s positioning error does not exceed 0.41 m with a detection rate no less than 91%.

Keywords beam-stealing attacks      detection      localization      image processing     
Corresponding Author(s): Xianglin WEI,Renhui XU   
Just Accepted Date: 08 April 2022   Issue Date: 27 October 2022
 Cite this article:   
Yaoqi YANG,Xianglin WEI,Renhui XU, et al. Jointly beam stealing attackers detection and localization without training: an image processing viewpoint[J]. Front. Comput. Sci., 2023, 17(3): 173704.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-022-1550-6
https://academic.hep.com.cn/fcs/EN/Y2023/V17/I3/173704
Algorithm proposed Identification object Attack or signal type Images format Prior knowledge Training format Cooperation with attackers Function Identification rate/% Positioning error
Faster-RNN based method [15] Interfered signals Radio frequency interference Spectrogram Yes Supervised learning Yes Detection & localization signals 80 N/A
CNN based method [16] Different RF signals Radar signals Spectrogram Yes Supervised learning Yes Classification 99.6 N/A
DL based method [17] Different radar signals Radar signals with 3.5 GHz Spectrogram Yes Supervised learning Yes Classification 95 N/A
ML based method [18] False data injection False data injection attack Spectrogram Yes Supervised learning Yes Detection 98 N/A
This work Beam-stealing attack launcher Beam-stealing attack RSSI map No No training No Detection & localization attackers 91 0.41 m
Tab.1  A comparison of this work and existing algorithms.
Fig.1  Directional and omnidirectional beam stealing attackers. (a) Directional attack scenario; (b) omnidirectional attack scenario
Notation Description
?1 The data set collected in the interested area
?2 The data set in the interested area after interpolation
ME RSSI map in an interested area with no attacker
MD RSSI map in an interested area with only one directional antenna
MO RSSI map in an interested area with only one omnidirectional antenna
HE Normalized gray matrix corresponding to the RSSI map without an attacker
HD Normalized gray matrix corresponding to RSSI map with only one directional antenna
HO Normalized gray matrix corresponding to RSSI map with only one omnidirectional antenna
HDi(g) Matrix after preprocessing of RSSI map with only one directional antenna
HOi(g) Matrix after preprocessing of RSSI map with only one omnidirectional antenna
N Total number of attackers
TS Scale transformation function
TR Direction transformation function
TM Position transformation function
H Matrix of each image after preprocessing
σi The distance between the pre-processed image and the i-th training image
ND Number of detected directional attackers
NO Number of detected omnidirectional attackers
θ The vertical lobe width of the antenna (when θ =0, it means that no attacker is detected)
M RSSI map in the scene to be detected
(x,y) The position coordinates of the attacker in the RSSI map (when (x,y) =?, it means that no attacker has been detected)
d The distance between two attackers
Tab.2  Notations
Fig.2  The principle of the 2nd Bernstein Bezier interpolation
  
Fig.3  The working flow of attack detection and localization
  
Fig.4  Experimental scenario. (a) Structure of experiment scene; (b) experimental setting scenario
Parameters Meaning
α Detection rate
λD Identification rate for directional attacks
λO Identification rate of omnidirectional attacks
μ(i) Positioning error in ith experiment
μA Average positioning error
Tab.3  Performance metrics
Fig.5  RSSI map built on the collected raw data
Fig.6  RSSI map built using interpolated data set
Fig.7  Interpolated RSSI maps with different deployment densities of the monitors. (a) 12 monitors; (b) 33 monitors; (c) 66 monitors; (d) 132 monitors
Algorithm Area size Number of monitors Horizontal interval/m Directional interval/m Deployment density (monitors per m2) Positioning error/m Cost
Weighted fusion based positioning algorithm [36] 5 m × 10 m 36 1 2 0.72 1.54 Low
Bayesian probability and K-Nearest Neighbor based positioning algorithm [37] 3.6 m × 4.8 m 117 0.4 0.45 6.77 0.15 High
This work 1.5 m × 44 m 132 0.3 2 2 0.41 Medium
Tab.4  Monitor deployment cost comparison.
Fig.8  RSSI maps using different interpolation methods. (a) without interpolation; (b) bilinear interpolation; (c) nearest-neighbor interpolation; (d) proposed interpolation
Algorithm Bilinear Nearest-neighbor Proposed
SSE 3.74×10?27 1.17×10?21 3.74×10?35
R-square 0.93 0.89 0.99
RMSE 5.32×10?15 2.97×10?12 5.32×10?19
AdjustedR-square 0.86 0.79 0.98
Tab.5  Comparison results
Fig.9  The correctness verification of Algorithm 2 with d = 0.6 m. (a) RSSI map; (b) remove signals; (c) smoothing process; (d) OSTU process; (e) edge detection; (f) segmentation
Fig.10  The correctness verification of Algorithm 2 with d = 0.3 m. (a) RSSI map; (b) remove signals; (c) smoothing process; (d) OSTU process; (e) edge detection; (f) segmentation
Fig.11  The correctness verification of Algorithm 2 with d = 0.15 m. (a) RSSI map; (b) remove signals; (c) smoothing process; (d) OSTU process; (e) edge detection; (f) segmentation
Strategy θ of antenna 1 θ of antenna 2
S1 47°(D) 47°(D)
S2 47°(D) 120°(D)
S3 120°(D) 120°(D)
S4 47°(D) 47°(O)
S5 47°(D) 120°(O)
S6 120°(D) 47°(O)
S7 120°(D) 120°(O)
S8 47°(O) 47°(O)
S9 47°(O) 120°(O)
S10 120°(O) 120°(O)
Tab.6  Proposed attack strategies
Fig.12  Algorithm 2’s detection rate in different strategies. (a) Detection rate for S1 to S5; (b) detection rate for S6 to S10
Fig.13  ROC curves for different attack strategies. (a) ROC curve for S1 to S5; (b) ROC curve for S6 to S10
Fig.14  The identification performance of Algorithm 2. (a) λD under S1 to S3; (b) λD under S4 to S7; (c) λO under S4 to S7; (d) λO under S8 to S10
Fig.15  ROC curves of the identification performance. (a) ROC curve for λD; (b) ROC curve for λO
Fig.16  The positioning error of Algorithm 2 in 10 scenarios. (a) Positioning error under S1 to S5; (b) positioning error under S6 to S10
Fig.17  The tracking results of two moving attackers in S8. (a) Directional attacker tracking; (b) omnidirectional attacker tracking
Segmentation algorithm Strategy Detection rate/% Average positioning error/m
Gradient-based [36] S1 92 0.81
S8 95 0.66
Distance-based [36] S1 91 0.77
S8 93 0.54
Proposed S1 96 0.65
S8 98 0.41
Tab.7  Segmentation algorithm comparison results
Segmentation algorithm Strategy Detection rate/% Average positioning error/m
Sobel operator [36] S1 91 0.71
S8 93 0.61
Prewitt operator [36] S1 90 0.74
S8 92 0.69
Canny operator (proposed) S1 96 0.65
S8 98 0.41
Tab.8  Edge detection operator comparison results
  
  
  
  
  
  
1 W, Wu N, Cheng N, Zhang P, Yang K, Aldubaikhy X Shen . Performance analysis and enhancement of beamforming training in 802.11ad. IEEE Transactions on Vehicular Technology, 2020, 69( 5): 5293–5306
2 D, Steinmetzer Y, Yuan M Hollick . Beam-stealing: intercepting the sector sweep to launch man-in-the-middle attacks on wireless IEEE 802.11ad networks. In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. 2018, 12–22
3 Z, Shen K, Xu X, Xia W, Xie D Zhang . Spatial sparsity based secure transmission strategy for massive MIMO systems against simultaneous jamming and eavesdropping. IEEE Transactions on Information Forensics and Security, 2020, 15: 3760–3774
4 B, Molina-Coronado U, Mori A, Mendiburu J Miguel-Alonso . Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process. IEEE Transactions on Network and Service Management, 2020, 17( 4): 2451–2479
5 N G B, Amma S, Selvakumar R L Velusamy . A statistical approach for detection of denial of service attacks in computer networks. IEEE Transactions on Network and Service Management, 2020, 17( 4): 2511–2522
6 U, Ahmed J C W, Lin G Srivastava . Generative ensemble learning for mitigating adversarial malware detection in IoT. In: Proceedings of the 29th IEEE International Conference on Network Protocols (ICNP). 2021, 1–5
7 U, Ahmed J C W, Lin G Srivastava . Network-aware SDN load balancer with deep active learning based intrusion detection model. In: Proceedings of 2021 International Joint Conference on Neural Networks (IJCNN). 2021, 1–6
8 J C W, Lin G, Srivastava Y, Zhang Y, Djenouri M Aloqaily . Privacy-preserving multiobjective sanitization model in 6G IoT environments. IEEE Internet of Things Journal, 2021, 8( 7): 5340–5349
9 X, Wei C Tang . Location consistency-based MITM attack detection in 802.11ad networks. In: Proceedings of the 11th International Symposium on Cyberspace Safety and Security. 2019, 18–29
10 Y, Yang X, Wei R, Xu L, Peng L, Zhang L Ge . Man-in-the-middle attack detection and localization based on cross-layer location consistency. IEEE Access, 2020, 8: 103860–103874
11 S, Li M, Hedley K, Bengston D, Humphrey M, Johnson W Ni . Passive localization of standard WiFi devices. IEEE Systems Journal, 2019, 13( 4): 3929–3932
12 Y, Zhao J, Xu J, Wu J, Hao H Qian . Enhancing camera-based multimodal indoor localization with device-free movement measurement using WiFi. IEEE Internet of Things Journal, 2020, 7( 2): 1024–1038
13 E, Grossi M, Lops A M, Tulino L Venturino . Extended target detection and localization in 802.11ad/y radars. In: Proceedings of 2020 IEEE Radar Conference (RadarConf20). 2020, 1–5
14 W Y, Al-Rashdan A Tahat . A comparative performance evaluation of machine learning algorithms for fingerprinting based localization in DM-MIMO wireless systems relying on big data techniques. IEEE Access, 2020, 8: 109522–109534
15 K N R S V, Prasad K B, D’souza V K Bhargava . A downscaled faster-RCNN framework for signal detection and time-frequency localization in wideband RF systems. IEEE Transactions on Wireless Communications, 2020, 19( 7): 4847–4862
16 A, Selim F, Paisana J A, Arokkiam Y, Zhang L, Doyle L A DaSilva . Spectrum monitoring for radar bands using deep convolutional neural networks. In: Proceedings of GLOBECOM 2017−2017 IEEE Global Communications Conference. 2017, 1–6
17 W M, Lees A, Wunderlich P J, Jeavons P D, Hale M R Souryal . Deep learning classification of 3.5-GHz band spectrograms with applications to spectrum sensing. IEEE Transactions on Cognitive Communications and Networking, 2019, 5( 2): 224–236
18 D, Huang X, Shi W A Zhang . False data injection attack detection for industrial control systems based on both time-and frequency-domain analysis of sensor data. IEEE Internet of Things Journal, 2020, 8( 1): 585–595
19 J Yoo . Change detection of RSSI fingerprint pattern for indoor positioning system. IEEE Sensors Journal, 2020, 20( 5): 2608–2615
20 Y, You C Wu . Indoor positioning system with cellular network assistance based on received signal strength indication of beacon. IEEE Access, 2019, 8: 6691–6703
21 F, Liu J, Liu Y, Yin W, Wang D, Hu P, Chen Q Niu . Survey on WiFi-based indoor positioning techniques. IET Communications, 2020, 14( 9): 1372–1383
22 W, Xue Q, Li X, Hua K, Yu W, Qiu B Zhou . A new algorithm for indoor RSSI radio map reconstruction. IEEE Access, 2018, 6: 76118–76125
23 Y, Tao L Zhao . A novel system for WiFi radio map automatic adaptation and indoor positioning. IEEE Transactions on Vehicular Technology, 2018, 67( 11): 10683–10692
24 K, Katagiri T Fujii . Radio environment map updating procedure considering change of surrounding environment. In: Proceedings of 2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). 2020, 1–6
25 Y, Zheng Z Lin . The augmented homogeneous coordinates matrix-based projective mismatch removal for partial-duplicate image search. IEEE Transactions on Image Processing, 2019, 28( 1): 181–193
26 Y, Yang X, Wei R, Xu L, Peng Y, Liao L Ge . Security-oriented indoor robots tracking: an object recognition viewpoint. Security and Communication Networks, 2021, 2021: 7456552
27 S, Lembo S, Horsmanheimo M, Somersalo M, Laukkanen L, Tuomimäki S Huilla . Enhancing WiFi RSS fingerprint positioning accuracy: lobe-forming in radiation pattern enabled by an air-gap. In: Proceedings of 2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN). 2019, 1–8
28 N N C, Draman S A A, Karim I Hashim . Scattered data interpolation using rational quartic triangular patches with three parameters. IEEE Access, 2020, 8: 44239–44262
29 H, Zhuang B S, Oh D, Lin K A, Toh Z P Lin . Multicomponent signal decomposition using morphological operations. In: Proceedings of the 23rd IEEE International Conference on Digital Signal Processing (DSP). 2018, 1–5
30 N Otsu . A threshold selection method from gray-level histograms. IEEE Transactions on Systems, Man, and Cybernetics, 1979, 9( 1): 62–66
31 S, Gong G, Li Y, Zhang C, Li L Yu . Application of static gesture segmentation based on an improved canny operator. The Journal of Engineering, 2019, 2019( 15): 543–546
32 J Canny . A computational approach to edge detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986, 8( 6): 679–698
33 M C, Bakkay S, Chambon H A, Rashwan C, Lubat S Barsotti . Automatic detection of individual and touching moths from trap images by combining contour-based and region-based segmentation. IET Computer Vision, 2018, 12( 2): 138–145
34 M A, Nassar M, Hasan M, Khan M, Sultana M, Hasan L, Luxford P, Cole G, Oatley P Koutsakis . Wifi-based localisation datasets for No-GPS open areas using smart bins. Computer Networks, 2020, 180: 107422
35 F, Zafari A, Gkelias K K Leung . A survey of indoor localization systems and technologies. IEEE Communications Surveys & Tutorials, 2019, 21( 3): 2568–2599
36 R, Ma Q, Guo C, Hu J Xue . An improved WiFi indoor positioning algorithm by weighted fusion. Sensors, 2015, 15( 9): 21824–21843
37 H, Xu Y, Ding P, Li R, Wang Y Li . An RFID indoor positioning algorithm based on Bayesian probability and K-nearest neighbor. Sensors, 2017, 17( 8): 1806
38 Y, Bai V, Berezovsky V Popov . Digital core 3D reconstruction based on micro-CT images via a deep learning method. In: Proceedings of 2020 International Conference on High Performance Big Data and Intelligent Systems (HPBD&IS). 2020, 1–6
39 A, Rosenfeld A C Kak . Digital Picture Processing. New York: Academic Press, 1976
40 J, Redmon A Farhadi . YOLOv3: an incremental improvement. 2018, arXiv preprint arXiv: 1804.02767
41 C, Rupa G, Srivastava S, Bhattacharya P, Reddy T R Gadekallu . A machine learning driven threat intelligence system for malicious URL detection. In: Proceedings of the 16th International Conference on Availability, Reliability and Security. 2021, 154
42 R, Ch G, Srivastava T R, Gadekallu P K R, Maddikunta S Bhattacharya . Security and privacy of UAV data using blockchain technology. Journal of Information Security and Applications, 2020, 55: 102670
43 R, Chiramdasu G, Srivastava S, Bhattacharya P K, Reddy T R Gadekallu . Malicious URL detection using logistic regression. In: Proceedings of 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). 2021, 1–6
[1] FCS-21550-OF-YY_suppl_1 Download
[1] Zhuo ZHANG, Jianxin XUE, Deheng YANG, Xiaoguang MAO. ContextAug: model-domain failing test augmentation with contextual information[J]. Front. Comput. Sci., 2024, 18(2): 182202-.
[2] Haoyu MA, Ningning LU, Junjun MEI, Tao GUAN, Yu ZHANG, Xin GENG. Label distribution learning for scene text detection[J]. Front. Comput. Sci., 2023, 17(6): 176339-.
[3] Haisheng LI, Guiqiong LI, Haiying XIA. Three-dimensional quantum wavelet transforms[J]. Front. Comput. Sci., 2023, 17(5): 175905-.
[4] Shan AN, Jianye CHEN, Zhaoqi ZHU, Fangru ZHOU, Yuxing YANG, Yuqing MA, Xianglong LIU, Haogang ZHU. ARCosmetics: a real-time augmented reality cosmetics try-on system[J]. Front. Comput. Sci., 2023, 17(4): 174706-.
[5] Yuan GAO, Xiang WANG, Xiangnan HE, Huamin FENG, Yongdong ZHANG. Rumor detection with self-supervised learning on texts and social graph[J]. Front. Comput. Sci., 2023, 17(4): 174611-.
[6] Hongting NIU, Ying SUN, Hengshu ZHU, Cong GENG, Jiuchun YANG, Hui XIONG, Bo LANG. Exploring the tidal effect of urban business district with large-scale human mobility data[J]. Front. Comput. Sci., 2023, 17(3): 173319-.
[7] Qingyang LI, Zhiwen YU, Huang XU, Bin GUO. Human-machine interactive streaming anomaly detection by online self-adaptive forest[J]. Front. Comput. Sci., 2023, 17(2): 172317-.
[8] Hongsheng XU, Zihan CHEN, Yu ZHANG, Xin GENG, Siya MI, Zhihong YANG. Weakly supervised temporal action localization with proxy metric modeling[J]. Front. Comput. Sci., 2023, 17(2): 172309-.
[9] Momo MATSUDA, Yasunori FUTAMURA, Xiucai YE, Tetsuya SAKURAI. Distortion-free PCA on sample space for highly variable gene detection from single-cell RNA-seq data[J]. Front. Comput. Sci., 2023, 17(1): 171310-.
[10] Yang CHANG, Huifang MA, Liang CHANG, Zhixin LI. Community detection with attributed random walk via seed replacement[J]. Front. Comput. Sci., 2022, 16(5): 165324-.
[11] Zhao-Yue ZHANG, Zi-Jie SUN, Yu-He YANG, Hao LIN. Towards a better prediction of subcellular location of long non-coding RNA[J]. Front. Comput. Sci., 2022, 16(5): 165903-.
[12] Guoshuai ZHOU, Xiuxia TIAN, Aoying ZHOU. Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images[J]. Front. Comput. Sci., 2022, 16(4): 164705-.
[13] Awais KHAN, Aun IRTAZA, Ali JAVED, Tahira NAZIR, Hafiz MALIK, Khalid Mahmood MALIK, Muhammad Ammar KHAN. Defocus blur detection using novel local directional mean patterns (LDMP) and segmentation via KNN matting[J]. Front. Comput. Sci., 2022, 16(2): 162702-.
[14] Dongming HAN, Jiacheng PAN, Rusheng PAN, Dawei ZHOU, Nan CAO, Jingrui HE, Mingliang XU, Wei CHEN. iNet: visual analysis of irregular transition in multivariate dynamic networks[J]. Front. Comput. Sci., 2022, 16(2): 162701-.
[15] Zhusen LIU, Zhenfu CAO, Xiaolei DONG, Xiaopeng ZHAO, Haiyong BAO, Jiachen SHEN. A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid[J]. Front. Comput. Sci., 2022, 16(1): 161810-.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed