Device interaction at the Physical layer
What the RF-channel can tell us
Stephan Sigg
Milton Keynes, 05.07.2012
Device interaction at the Physical layer What the RF-channel can - - PowerPoint PPT Presentation
Device interaction at the Physical layer What the RF-channel can tell us Stephan Sigg Milton Keynes, 05.07.2012 Introduction Recognition Calculation Security Conclusion Introduction Stephan Sigg | Physical layer device interaction | 2
What the RF-channel can tell us
Milton Keynes, 05.07.2012
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 2
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 2
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 2
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 3
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 4
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 5
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 6
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 7
Introduction Recognition Calculation Security Conclusion
MobiCom2007
static links, IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 2011
Stephan Sigg | Physical layer device interaction | 8
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 9
Introduction Recognition Calculation Security Conclusion
1Stephan Sigg, Markus Scholz, Yusheng Ji, Michael Beigl, Active and Passive sensing of activities from amplitude-based RF-features in device-free recognition systems, (Submitted to IEEE Transaction on Mobile Computing, 01.2012) Stephan Sigg | Physical layer device interaction | 10
Introduction Recognition Calculation Security Conclusion
Classified Truth crawling walking empty lying standing crA .986 .013 .001 waA .019 .975 .006 emA .911 .031 .059 lyA .01 .2 .704 .086 stA .215 .005 .78 crB .998 .002 waB .016 .979 .004 .002 emB .937 .004 .058 lyB .003 .191 .719 .086 stB .007 .001 .252 .005 .736 crC .998 .002 waC .009 .986 .005 emC .002 .933 .005 .061 lyC .001 .156 .646 .197 stC .001 .008 .17 .012 .808 crD .933 .065 .001 .001 waD .034 .964 .001 .001 emD .021 .889 .004 .085 lyD .191 .725 .084 stD .015 .143 .012 .829 crE .991 .001 .008 waE .997 .003 .001 emE .937 .005 .059 lyE .001 .238 .676 .086 stE .001 .005 .157 .016 .82 Stephan Sigg | Physical layer device interaction | 11
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 12
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 12
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 12
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 13
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 14
Introduction Recognition Calculation Security Conclusion
networks, IEEE Comm. Mag., vol. 44, no 4, pp. 98-107, april 2006
sensor multiple-access channels, IEEE Wireless Communications and Networking Conf., 2009
Stephan Sigg | Physical layer device interaction | 15
Introduction Recognition Calculation Security Conclusion
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
t K burst
superimposed received burst sequence transmit burst sequences time
i=1 µi.
Stephan Sigg | Physical layer device interaction | 16
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 17
Introduction Recognition Calculation Security Conclusion
2http://db.csail.mit.edu/labdata/labdata.html Stephan Sigg | Physical layer device interaction | 18
Introduction Recognition Calculation Security Conclusion
Offline Online
Offline Online
Stephan Sigg | Physical layer device interaction | 19
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 20
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 20
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 20
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 21
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 22
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 22
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 23
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 23
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 23
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 24
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 25
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 25
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 26
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 27
Introduction Recognition Calculation Security Conclusion
Pervasive 2007
ambient wireless signals, MobiSys 2011
Stephan Sigg | Physical layer device interaction | 28
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 29
Introduction Recognition Calculation Security Conclusion
Audio, Accepted for IEEE Transactions on Mobile Computing
Clap Music Snap Speak Whistle 0.5 0.55 0.6 0.65 0.7 0.75 0.8
Hamming distance in created fingerprints (loud audio source in 1.5m and 3m)
Audio sequence class
Median percentage of identical bits in fingerprints Fingerprints created for matching audio samples Fingerprints created for non−matching audio samples 2 4 6 8 10 12 14 16 18 20 0.91 0.93 0.95 0.97 0.99 1.01 Test run Percentage of passed tests
Percentage of tests in one test run that passed at >5% for Kuiper KS p−values
1.01947 (confidence value at α = 0.03) 0.92053 (confidence value at α = 0.03) Only music Only whistle Only snap Only speak Only clap
Stephan Sigg | Physical layer device interaction | 30
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 31
Introduction Recognition Calculation Security Conclusion
Identification of common molecular subsequences. Journal of molecular biology, 147(1):195ˆ a197, Mar. 1981 Stephan Sigg | Physical layer device interaction | 32
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 33
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 34
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 34
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 34
Introduction Recognition Calculation Security Conclusion
Stephan Sigg | Physical layer device interaction | 35