CybersecurityWiFi signals can be used to detect attackers

Published 22 December 2015

Wireless devices are increasingly used for critical roles, such as security systems or industrial plant automation. Although wireless transmissions can be encrypted to protect transmitted data, it is hard to determine whether a device has been tampered with. Computer scientists have discovered that physical attacks on devices connected to the Internet can be detected by analyzing WiFi signals.

Wi-fi signals discovered at this "inactive" RAF building // Source: commons.wikimedia.org

Physical attacks on devices connected to the Internet can be detected by analyzing WiFi signals, computer scientists have discovered.

Wireless devices are increasingly used for critical roles, such as security systems or industrial plant automation. Although wireless transmissions can be encrypted to protect transmitted data, it is hard to determine whether a device — such as a wirelessly connected security camera protecting critical buildings in airports or power stations — has been tampered with. An attacker may simply rotate a camera’s view away from the area it is guarding without triggering an alert.

Lancaster U reports that in their study, researchers at Lancaster University have created a method that analyzes WiFi signals at multiple receivers to detect physical attacks. A change in the pattern of wireless signals — known as Channel State Information (CSI) — picked up by the receivers can indicate a tamper situation. The algorithm detects attacks despite signal noise caused by natural changes to the environment such as people walking through the communication paths.

Dr. Utz Roedig, Reader in Lancaster University’s School of Computing and Communications and one of the report’s authors, said: “A large number of Internet of Things systems are using WiFi and many of these require a high level of security. This technique gives us a new way to introduce an additional layer of defense into our communication systems. Given that we use these systems around critically important infrastructure this additional protection is vital.”

— Read more in Ibrahim Ethem Bagci et al., ““Using Channel State Information for Tamper Detection in the Internet of Things,” Proceedings of the 31st Annual Computer Security Applications Conference (7 December 2015): 131-40 (doi: 10.1145/2818000.2818028)