An investigation of the private-attribute leakage in WiFi sensing

Yiding Shi , Xueying Zhang , Lei Fu , Huanle Zhang

High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (4) : 100209

PDF (616KB)
High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (4) :100209 DOI: 10.1016/j.hcc.2024.100209
Research Articles
research-article

An investigation of the private-attribute leakage in WiFi sensing

Author information +
History +
PDF (616KB)

Abstract

WiFi sensing is critical to many applications, such as localization, human activity recognition, and contact-less health monitoring. With metaverse and ubiquitous sensing advances, WiFi sensing becomes increasingly imperative. However, as shown in this paper, WiFi sensing data leaks users’ private attributes (e.g., height, weight, and gender), violating increasingly stricter privacy protection laws and regulations. To demonstrate the leakage of private attributes in WiFi sensing, we investigate two public WiFi sensing datasets and apply a deep learning model to recognize users’ private attributes. Our experimental results clearly show that our model can identify users’ private attributes in WiFi sensing data collected by general WiFi applications, with almost 100% accuracy for gender inference, less than 4 cm error for height inference, and about 4 kg error for weight inference, respectively. Our finding calls for research efforts to preserve data privacy while enabling WiFi sensing-based applications.

Keywords

WiFi sensing / Private attribute / Deep learning / Privacy protection

Cite this article

Download citation ▾
Yiding Shi, Xueying Zhang, Lei Fu, Huanle Zhang. An investigation of the private-attribute leakage in WiFi sensing. High-Confidence Computing, 2024, 4(4): 100209 DOI:10.1016/j.hcc.2024.100209

登录浏览全文

4963

注册一个新账户 忘记密码

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (62302265, U23A20332) and Shandong Provincial Natural Science Foundation, China (ZR2023QF172).

Appendix A. Supplementary material

We release our code at https://github.com/SnoopD201/Private-Attribute-Leakage-Investigation to facilitate the research of privacy leakage in WiFi sensing.

References

[1]

H. Jiang, C. Cai, X. Ma, Y. Yang, J. Liu, Smart home based on WiFi sensing: A survey, IEEE Access 6 (2018) 13317-13325.

[2]

Y. Ma, G. Zhou, S. Wang, WiFi sensing with channel state information: A survey, ACM Comput. Surv. 52 (3) (2019) 1-36.

[3]

Y. Zhang, Y. Zheng, K. Qian, G. Zhang, Y. Liu, C. Wu, Z. Yang, Widar3. 0: Zero-effort cross-domain gesture recognition with Wi-Fi, IEEE Trans. Pattern Anal. Mach. Intell. 44 (11) (2021) 8671-8688.

[4]

L. Guo, L. Wang, C. Lin, J. Liu, B. Lu, J. Fang, Z. Liu, Z. Shan, J. Yang, S. Guo, Wiar: A public dataset for wifi-based activity recognition, IEEE Access 7 (2019) 154935-154945.

[5]

A. Khalili, A.-H. Soliman, M. Asaduzzaman, A. Griffiths, Wi-fi sensing: applications and challenges, J. Eng. 2020 (3) (2020) 87-97.

[6]

W. He, K. Wu, Y. Zou, Z. Ming,WiG: WiFi-based gesture recognition system, in: 2015 24th International Conference on Computer Communication and Networks, ICCCN, IEEE, 2015, pp. 1-7.

[7]

Y. He, Y. Chen, Y. Hu, B. Zeng, WiFi vision: Sensing, recognition, and detection with commodity MIMO-OFDM WiFi, IEEE Internet Things J. 7 (9) (2020) 8296-8317.

[8]

H.-H. Chen, C.-L. Lin, C.-H. Chang, WiFi-based detection of human subtle motion for health applications, Bioengineering 10 (2) (2023) 228.

[9]

Y. Ge, A. Taha, S.A. Shah, K. Dashtipour, S. Zhu, J. Cooper, Q.H. Abbasi, M.A. Imran, Contactless WiFi sensing and monitoring for future healthcare - Emerging trends, challenges, and opportunities, IEEE Rev. Biomed. Eng. 16 (2023) 171-191, http://dx.doi.org/10.1109/RBME.2022.3156810.

[10]

B. Tan, Q. Chen, K. Chetty, K. Woodbridge, W. Li, R. Piechocki, Exploiting WiFi channel state information for residential healthcare informatics, IEEE Commun. Mag. 56 (5) (2018) 130-137, http://dx.doi.org/10.1109/MCOM.2018.1700064.

[11]

H. Wang, D. Zhang, J. Ma, Y. Wang, Y. Wang, D. Wu, T. Gu, B. Xie, Human respiration detection with commodity WiFi devices: Do user location and body orientation matter? in: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016, pp. 25-36.

[12]

H. Wang, D. Zhang, Y. Wang, J. Ma, Y. Wang, S. Li, RT-Fall: A real-time and contactless fall detection system with commodity WiFi devices, IEEE Trans. Mob. Comput. 16 (2) (2016) 511-526.

[13]

L. Li, H. Xiaoguang, C. Ke, H. Ketai, The applications of WiFi-based wireless sensor network in internet of things and smart grid, in: 2011 6th IEEE Conference on Industrial Electronics and Applications, 2011, pp. 789-793, http://dx.doi.org/10.1109/ICIEA.2011.5975693.

[14]

Y. Ren, S. Tan, L. Zhang, Z. Wang, Z. Wang, J. Yang, Liquid level sensing using commodity wifi in a smart home environment, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4 (1) (2020) 1-30.

[15]

J. Yang, H. Zou, H. Jiang, L. Xie, Device-free occupant activity sensing using WiFi-enabled IoT devices for smart homes, IEEE Internet Things J. 5 (5) (2018) 3991-4002, http://dx.doi.org/10.1109/JIOT.2018.2849655.

[16]

X. Zheng, J. Wang, L. Shangguan, Z. Zhou, Y. Liu, Smokey: Ubiquitous smoking detection with commercial WiFi infrastructures, in: IEEE International Conference on Computer Communications, IEEE, 2016, pp. 1-9.

[17]

K. Lone, S.A. Sofi, A review on offloading in fog-based Internet of Things: Architecture, machine learning approaches, and open issues, High-Conf. Comput. 3 (2) (2023) 1-10.

[18]

Y. Chen, H. Chen, Y. Zhang, M. Han, M. Siddula, Z. Cai, A survey on blockchain systems: Attacks, defenses, and privacy preservation, High-Conf. Comput. 2 (2) (2022) 1-20.

[19]

G. Bansal, K. Rajgopal, V. Chamola, Z. Xiong, D. Niyato, Healthcare in metaverse: A survey on current metaverse applications in healthcare, IEEE Access 10 (2022) 119914-119946, http://dx.doi.org/10.1109/ACCESS.2022.3219845.

[20]

Q. Yang, Y. Zhao, H. Huang, Z. Xiong, J. Kang, Z. Zheng, Fusing blockchain and AI with metaverse: A survey, IEEE Open J. Comput. Soc. 3 (2022) 122-136, http://dx.doi.org/10.1109/OJCS.2022.3188249.

[21]

S. Tayal, K. Rajagopal, V. Mahajan,Virtual reality based metaverse of gamification, in: 2022 6th International Conference on Computing Method-ologies and Communication, ICCMC, 2022, pp. 1597-1604, http://dx.doi.org/10.1109/ICCMC53470.2022.9753727.

[22]

M.A.I. Mozumder, M.M. Sheeraz, A. Athar, S. Aich, H.-C. Kim,Overview: Technology roadmap of the future trend of metaverse based on IoT, blockchain, AI technique, and medical domain metaverse activity, in: 2022 24th International Conference on Advanced Communication Technology, ICACT, 2022, pp. 256-261, http://dx.doi.org/10.23919/ICACT53585.2022.9728808.

[23]

O. Hajihassnai, O. Ardakanian, H. Khazaei, ObscureNet: Learning attribute-invariant latent representation for anonymizing sensor data,in:International Conference on Internet-of-Things Design and Implementation, IoTDI, 2021, pp. 40-52.

[24]

D. Halperin, W. Hu, A. Sheth, D. Wetherall, Tool release: Gathering 802.11 n traces with channel state information, ACM SIGCOMM Comput. Commun. Rev. 41 (1) (2011) 53.

[25]

K. Cho, B. Van Merriënboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, Y. Bengio, Learning phrase representations using RNN encoder-decoder for statistical machine translation, 2014, arXiv preprint arXiv: 1406.1078.

PDF (616KB)

805

Accesses

0

Citation

Detail

Sections
Recommended

/