Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3274783.3274833acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article
Public Access

E-Eye: Hidden Electronics Recognition through mmWave Nonlinear Effects

Published: 04 November 2018 Publication History

Abstract

While malicious attacks on electronic devices (e-devices) have become commonplace, the use of e-devices themselves for malicious attacks has increased (e.g., explosives and eavesdropping). Modern e-devices (e.g., spy cameras, bugs or concealed weapons) can be sealed in parcels/boxes, hidden under clothing or disguised with cardboard to conceal their identities (named as hidden e-devices hereafter), which brings challenges in security screening. Inspection equipment (e.g., X-ray machines) is bulky and expensive. Moreover, screening reliability still rests on human performance, and the throughput in security screening of passengers and luggages is very limited. To this end, we propose to develop a low-cost and practical hidden e-device recognition technique to enable efficient screenings for threats of hidden electronic devices in daily life. First, we investigate and model the characteristics of nonlinear effects, a special passive response of electronic devices under millimeter-wave (mmWave) sensing. Based on this theory and our preliminary experiments, we design and implement, E-Eye, an end-to-end portable hidden electronics recognition system. E-Eye comprises a low-cost (i.e., under $100), portable (i.e., 11.8cm by 4.5cm by 1.8cm) and light-weight (i.e., 45.5g) 24GHz mmWave probe and a smartphone-based e-device recognizer. To validate the E-Eye performance, we conduct experiments with 46 commodity electronic devices under 39 distinct categories. Results show that E-Eye can recognize hidden electronic devices in parcels/boxes with an accuracy of more than 99% and has an equal error rate (EER) approaching 0.44% under a controlled lab setup. Moreover, we evaluate the reliability, robustness and performance variation of E-Eye under various real-world circumstances, and E-Eye can still achieve accuracy over 97%. Intensive evaluation indicates that E-Eye is a promising solution for hidden electronics recognition in daily life.

References

[1]
Accessed: 2018-1-11. IS turns hobby drones into remote-control bombs. https://nakedsecurity.sophos.com/2017/01/19/is-turns-hobby-drones-into-remote-control-bombs/.
[2]
Accessed: 2018-1-11. ISM band. https://en.wikipedia.org/wiki/ISM_band.
[3]
Accessed: 2018-1-21. ISIS' Online 'Training Manual' Teaches Sympathizers How to Disguise Themselves as Westerners and Build Bombs to Carry Out Attacks. https://www.christianpost.com/news/isis-training-manual-teaches-sympathizers-how-to-disguise-themselves-as-westerners-and-build-bombs-to-carry-out-terror-attacks-139253/.
[4]
Accessed: 2018-1-21. Mobile-phone cheating in exams on the rise. https://www.cnet.com/news/mobile-phone-cheating-in-exams-on-the-rise/.
[5]
Accessed: 2018-2-19. MSP430 Microcontrollers With CapTIvate Touch Technology. http://www.ti.com/lit/wp/slay044/slay044.pdf.
[6]
Accessed: 2018-3-13. Sound card. https://en.wikipedia.org/wiki/Sound_card.
[7]
Accessed: 2018-3-21. Bombs disguised as rocks in Yemen reportedly show Iran aid. https://www.defensenews.com/global/mideast-africa/2018/03/26/bombs-disguised-as-rocks-in-yemen-reportedly-show-iran-aid/.
[8]
Accessed: 2018-3-22. International Telecommunication Union. https://www.itu.int/en/Pages/default.aspx.
[9]
Accessed: 2018-3-23. Millimeter Scanning at Airports: Is It Worth the Cost? https://www.securitymagazine.com/articles/79508-millimeter-scanning-at-airports-is-it-worth-the-cost-1.
[10]
Accessed: 2018-3-31. 5G mmWave: the next frontier in mobile broadband. https://www.qualcomm.com/invention/technologies/5g-nr/mmwave.
[11]
Accessed: 2018-3-31. Digital Consumers Own 3.2 Connected Devices. https://blog.globalwebindex.net/chart-of-the-day/digital-consumers-own-3-point-2-connected-devices/.
[12]
Accessed: 2018-3-31. Features of the Terahertz technology in security applications. http://terasense.com/news/thz-in-security/.
[13]
Accessed: 2018-3-31. Geddes town supervisor's secretary faces felony for eavesdropping on co-workers. http://www.syracuse.com/crime/index.ssf/2016/12/geddes_town_supervisors_secretary_faces_felony_for_evesdropping_on_co-workers.html.
[14]
Accessed: 2018-3-31. Package Explosion in Austin. https://www.washingtonpost.com/news/morning-mix/wp/2018/03/20/package-believed-to-be-bound-for-austin-explodes-at- texas-\fedex- facility-police- say/?utm_term=.8b593439781e.
[15]
Accessed: 2018-3-31. Phone and Electronic Device Policy. https://collegereadiness.collegeboard.org/sat/taking-the-test/phone-electronic-device-policy.
[16]
Accessed: 2018-3-31. Use of Cell Phones, Laptops, and Other Electronic Devices by Visitors. https://www.cadc.uscourts.gov/internet/home.nsf/Content/VL+-+Courthouse+-+Cell+Phones+Laptops+and+Other+Electronic+Devices.
[17]
Fadel Adib and Dina Katabi. 2013. See through walls with WiFi! Vol. 43. ACM.
[18]
Ruud M Bolle, Jonathan H Connell, Sharath Pankanti, Nalini K Ratha, and Andrew W Senior. 2013. Guide to biometrics. Springer Science & Business Media.
[19]
Jamie Bullock and UCEB Conservatoire. 2007. Libxtract: a Lightweight Library for audio Feature Extraction. In ICMC.
[20]
Chedsada Chinrungrueng. 2003. Combining Savitzky-Golay filters and median filters for reducing speckle noise in SAR images. In Systems, Man and Cybernetics, 2003. IEEE International Conference on, Vol. 1. IEEE, 690--696.
[21]
Seungjin Choi, Andrzej Cichocki, Hyung-Min Park, and Soo-Young Lee. 2005. Blind source separation and independent component analysis: A review. Neural Information Processing-Letters and Reviews 6, 1 (2005), 1--57.
[22]
Federal Communications Commission and others. 2016. Use of spectrum bands above 24 GHz for mobile radio services. Fed Regist 81, 164 (2016), 58270--58308.
[23]
Christine Connolly. 2008. X-ray systems for security and industrial inspection. Sensor Review 28, 3 (2008), 194--198.
[24]
Morten W Fagerland, Stian Lydersen, and Petter Laake. 2013. The McNemar test for binary matched-pairs data: mid-p and asymptotic are better than exact conditional. BMC medical research methodology 13, 1 (2013), 91.
[25]
John F Federici, Brian Schulkin, Feng Huang, Dale Gary, Robert Barat, Filipe Oliveira, and David Zimdars. 2005. THz imaging and sensing for security applications: explosives, weapons and drugs. Semiconductor Science and Technology 20, 7 (2005), S266. http://stacks.iop.org/0268-1242/20/i=7/a=018
[26]
Kevin G Gard, Lawrence E Larson, and Michael B Steer. 2005. The impact of RF front-end characteristics on the spectral regrowth of communications signals. IEEE Transactions on Microwave Theory and Techniques 53, 6 (2005), 2179--2186.
[27]
Khaled M Gharaibeh. 2011. Nonlinear distortion in wireless systems: Modeling and simulation with MATLAB. John Wiley & Sons.
[28]
Franco Giannini and Giorgio Leuzzi. 2004. Nonlinear microwave circuit design. John Wiley & Sons.
[29]
U Gudaru and Vishal B Waje. 2012. Analysis of harmonics in power system using wavelet transform. In Electrical, Electronics and Computer Science (SCEECS), 2012 IEEE Students' Conference on. IEEE, 1--5.
[30]
S. Hantscher, B. Schlenther, M. Hagelen, S. A. Lang, H. Essen, A. Tessmann, A. Hulsmann, A. Leuther, and M. Schlechtweg. 2012. Security Pre-screening of Moving Persons Using a Rotating Multichannel W-Band Radar. IEEE Transactions on Microwave Theory and Techniques 60, 3 (March 2012), 870--880.
[31]
J. Hertenstein and S. Jagannathan. 2013. Simulation and Detection of Unintended Electromagnetic Emissions From Super-Regenerative Receivers. IEEE Transactions on Instrumentation and Measurement 62, 7 (July 2013), 2093--2100.
[32]
M. C. Huang, J. J. Liu, W. Xu, C. Gu, C. Li, and M. Sarrafzadeh. 2016. A Self-Calibrating Radar Sensor System for Measuring Vital Signs. IEEE Transactions on Biomedical Circuits and Systems 10, 2 (April 2016), 352--363.
[33]
Handan Ilbegi, Harun Taha Hayvaci, Imam Samil Yetik, and Asim Egemen Yilmaz. 2017. Distinguishing electronic devices using harmonic radar. In Radar Conference (RadarConf), 2017 IEEE. IEEE, 1527--1530.
[34]
Jianhua Jia, Zi Liu, Xuan Xiao, Bingxiang Liu, and Kuo-Chen Chou. 2015. iPPI-Esml: an ensemble classifier for identifying the interactions of proteins by incorporating their physicochemical properties and wavelet transforms into PseAAC. Journal of theoretical biology 377 (2015), 47--56.
[35]
Jaime Lien, Nicholas Gillian, M. Emre Karagozler, Patrick Amihood, Carsten Schwesig, Erik Olson, Hakim Raja, and Ivan Poupyrev. 2016. Soli: Ubiquitous Gesture Sensing with Millimeter Wave Radar. ACM Trans. Graph. 35, 4, Article 142 (July 2016), 19 pages.
[36]
Feng Lin, Chen Song, Yan Zhuang, Wenyao Xu, Changzhi Li, and Kui Ren. 2017. Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (MobiCom '17). ACM, New York, NY, USA, 315--328.
[37]
F. Lin, Y. Zhuang, C. Song, A. Wang, Y. Li, C. Gu, C. Li, and W. Xu. 2017. SleepSense: A Noncontact and Cost-Effective Sleep Monitoring System. IEEE Transactions on Biomedical Circuits and Systems 11, 1 (Feb 2017), 189--202.
[38]
Hai-Bo Liu, Hua Zhong, Nicholas Karpowicz, Yunqing Chen, and Xi-Cheng Zhang. 2007. Terahertz spectroscopy and imaging for defense and security applications. Proc. IEEE 95, 8 (2007), 1514--1527.
[39]
J Michael Lloyd. 2013. Thermal imaging systems. Springer Science & Business Media.
[40]
Stephane G Mallat. 1989. A theory for multiresolution signal decomposition: the wavelet representation. IEEE transactions on pattern analysis and machine intelligence 11, 7 (1989), 674--693.
[41]
Gregory J Mazzaro, Anthony F Martone, Kenneth I Ranney, and Ram M Narayanan. 2017. Nonlinear radar for finding rf electronics: System design and recent advancements. IEEE Transactions on Microwave Theory and Techniques 65, 5 (2017), 1716--1726.
[42]
Gregory J Mazzaro and Kelly D Sherbondy. 2013. Combined linear and nonlinear radar: waveform generation and capture. Technical Report. ARMY RESEARCH LAB ADELPHI MD SENSORS AND ELECTRON DEVICES DIRECTORATE.
[43]
I. V. Mikhelson, S. Bakhtiari, T. W. Elmer II, and A. V. Sahakian. 2011. Remote Sensing of Heart Rate and Patterns of Respiration on a Stationary Subject Using 94-GHz Millimeter-Wave Interferometry. IEEE Transactions on Biomedical Engineering 58, 6 (June 2011), 1671--1677.
[44]
Phuc Nguyen, Hoang Truong, Mahesh Ravindranathan, Anh Nguyen, Richard Han, and Tam Vu. 2017. Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone's RF Communication. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 211--224.
[45]
Amy Nordrum. 2016. Popular internet of things forecast of 50 billion devices by 2020 is outdated. IEEE Spectrum 18 (2016).
[46]
J Pedro and N Carvalho. 2003. Intermodulation distortion in microwave and wireless circuits. Norwood, MA: Artech House. (2003).
[47]
Zhengyu Peng, José-María Muñoz-Ferreras, Roberto Gómez-García, Lixin Ran, and Changzhi Li. 2016. 24-GHz biomedical radar on flexible substrate for ISAR imaging. In Wireless Symposium (IWS), 2016 IEEE MTT-S International. IEEE, 1--4.
[48]
Adam C Polak, Sepideh Dolatshahi, and Dennis L Goeckel. 2011. Identifying wireless users via transmitter imperfections. IEEE Journal on selected areas in communications 29, 7 (2011), 1469--1479.
[49]
Adam C Polak and Dennis L Goeckel. 2011. RF fingerprinting of users who actively mask their identities with artificial distortion. In Signals, Systems and Computers (ASILOMAR), 2011 Conference Record of the Forty Fifth Asilomar Conference on. IEEE, 270--274.
[50]
Lawrence R Rabiner and Bernard Gold. 1975. Theory and application of digital signal processing. Englewood Cliffs, NJ, Prentice-Hall, Inc., 1975. 777 p. (1975).
[51]
C. J. Reddy. 1998. Control And Measurement Of Unintentional Electromagnetic Radiation. IEEE Antennas and Propagation Magazine 40, 2 (1998), 88--89.
[52]
Matteo Rinaldi, Chiara Zuniga, Chengjie Zuo, and Gianluca Piazza. 2010. Super-high-frequency two-port AlN contour-mode resonators for RF applications. IEEE transactions on ultrasonics, ferroelectrics, and frequency control 57, 1 (2010).
[53]
D. M. Sheen, D. L. McMakin, and T. E. Hall. 2001. Three-dimensional millimeter-wave imaging for concealed weapon detection. IEEE Transactions on Microwave Theory and Techniques 49, 9 (Sep 2001), 1581--1592.
[54]
Aditya Singh and Victor Lubecke. 2010. A heterodyne receiver for harmonic Doppler radar cardiopulmonary monitoring with body-worn passive RF tags. In Microwave Symposium Digest (MTT), 2010 IEEE MTT-S International. IEEE, 1600--1603.
[55]
Satish Sinha, Partha S Routh, Phil D Anno, and John P Castagna. 2005. Spectral decomposition of seismic data with continuous-wavelet transform. Geophysics 70, 6 (2005), P19-P25.
[56]
Chen Song, Aosen Wang, Kui Ren, and Wenyao Xu. 2016. Eyeveri: A secure and usable approach for smartphone user authentication. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on. IEEE, 1--9.
[57]
C. Stagner, A. Conrad, C. Osterwise, D. G. Beetner, and S. Grant. 2011. A Practical Superheterodyne-Receiver Detector Using Stimulated Emissions. IEEE Transactions on Instrumentation and Measurement 60, 4 (April 2011), 1461--1468.
[58]
Colin Blake Stagner. 2013. Detecting and Locating Electronic Devices Using Their Unintended Electromagnetic Emissions. Doctoral Dissertations (2013). http://scholarsmine.mst.edu/doctoral_dissertations/2152
[59]
J Svatoš, J Vedral, and P Nováček. 2012. Metal object detection and discrimination using Sinc signal. In Electronics Conference (BEC), 2012 13th Biennial Baltic. IEEE, 307--310.
[60]
Serioja O Tatu and Ke Wu. 2013. Six-port technology and applications. In Telecommunication in Modern Satellite, Cable and Broadcasting Services (TELSIKS), 2013 11th International Conference on, Vol. 1. IEEE, 239--248.
[61]
Phan Thanh Noi and Martin Kappas. 2017. Comparison of random forest, k-nearest neighbor, and support vector machine classifiers for land cover classification using Sentinel-2 imagery. Sensors 18, 1 (2017), 18.
[62]
V. Thotla, M. J. Zawodniok, S. Jagannathan, M. T. A. Ghasr, and S. Agarwal. 2015. Detection and Localization of Multiple R/C Electronic Devices Using Array Detectors. IEEE Transactions on Instrumentation and Measurement 64, 1 (Jan 2015), 241--251.
[63]
Guochao Wang, Jose-Maria Munoz-Ferreras, Changzhan Gu, Changzhi Li, and Roberto Gomez-Garcia. 2014. Application of linear-frequency-modulated continuous-wave (LFMCW) radars for tracking of vital signs. IEEE Transactions on Microwave Theory and Techniques 62, 6 (2014), 1387--1399.
[64]
Teng Wei and Xinyu Zhang. 2015. mtrack: High-precision passive tracking using millimeter wave radios. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, 117--129.
[65]
Ozgur Yilmaz and Scott Rickard. 2004. Blind separation of speech mixtures via time-frequency masking. IEEE Transactions on signal processing 52, 7 (2004), 1830--1847.
[66]
Yanzi Zhu, Yibo Zhu, Ben Y Zhao, and Haitao Zheng. 2015. Reusing 60ghz radios for mobile radar imaging. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking. ACM, 103--116.

Cited By

View all
  • (2024)GaN HEMT Power Amplifier for S-Band 2nd Harmonic-Based Target Detection RadarThe Journal of Korean Institute of Electromagnetic Engineering and Science10.5515/KJKIEES.2024.35.7.60835:7(608-611)Online publication date: 31-Jul-2024
  • (2024)Seaweed as a Safe Nutraceutical Food: How to Increase Human Welfare?Nutraceuticals10.3390/nutraceuticals40300204:3(323-362)Online publication date: 29-Jun-2024
  • (2024)HandKey: Knocking-Triggered Robust Vibration Signature for Keyless UnlockingIEEE Transactions on Mobile Computing10.1109/TMC.2022.321686823:1(520-534)Online publication date: Jan-2024
  • Show More Cited By

Index Terms

  1. E-Eye: Hidden Electronics Recognition through mmWave Nonlinear Effects

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SenSys '18: Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems
    November 2018
    449 pages
    ISBN:9781450359528
    DOI:10.1145/3274783
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 November 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Hardware Security
    2. Pattern Recognition
    3. Wireless Sensing

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    Conference

    Acceptance Rates

    Overall Acceptance Rate 174 of 867 submissions, 20%

    Upcoming Conference

    SenSys '24

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)384
    • Downloads (Last 6 weeks)49
    Reflects downloads up to 02 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)GaN HEMT Power Amplifier for S-Band 2nd Harmonic-Based Target Detection RadarThe Journal of Korean Institute of Electromagnetic Engineering and Science10.5515/KJKIEES.2024.35.7.60835:7(608-611)Online publication date: 31-Jul-2024
    • (2024)Seaweed as a Safe Nutraceutical Food: How to Increase Human Welfare?Nutraceuticals10.3390/nutraceuticals40300204:3(323-362)Online publication date: 29-Jun-2024
    • (2024)HandKey: Knocking-Triggered Robust Vibration Signature for Keyless UnlockingIEEE Transactions on Mobile Computing10.1109/TMC.2022.321686823:1(520-534)Online publication date: Jan-2024
    • (2024)Two-Tone Suppressed Third-Order Intermodulation Transponder Based on Transmission-Line-Based Fourth-Order Filter Combined Matching NetworkIEEE Access10.1109/ACCESS.2024.338016112(43918-43923)Online publication date: 2024
    • (2023)Sneaky spy devices and defective detectorsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620245(123-140)Online publication date: 9-Aug-2023
    • (2023)Spacelord: Private and Secure Smart Space SharingDigital Threats: Research and Practice10.1145/36378795:2(1-27)Online publication date: 19-Dec-2023
    • (2023)mmStressProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36109267:3(1-36)Online publication date: 27-Sep-2023
    • (2023)IoTBeholderProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35808907:1(1-26)Online publication date: 28-Mar-2023
    • (2023)Caveat (IoT) Emptor: Towards Transparency of IoT Device PresenceProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623089(1347-1361)Online publication date: 15-Nov-2023
    • (2023)VocalPrint: A mmWave-Based Unmediated Vocal Sensing System for Secure AuthenticationIEEE Transactions on Mobile Computing10.1109/TMC.2021.308497122:1(589-606)Online publication date: 1-Jan-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media