Ghostbuster: Detecting the Presence of Hidden Eavesdroppers

被引:52
|
作者
Chaman, Anadi [1 ]
Wang, Jiaming [1 ]
Sun, Jiachen [2 ]
Hassanieh, Haitham [1 ]
Choudhury, Romit Roy [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
[2] Univ Michigan, Ann Arbor, MI 48109 USA
关键词
Wireless; Security; Eavesdropper;
D O I
10.1115/3211539.3211580
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tins paper explores the possibility of detecting the hidden presence of wireless eavesdroppers. Such eavesdroppers employ passive receivers that only listen and never transmit any signals making them very hard to detect. In this paper, we show that even passive receivers leak RE signals on the wireless medium. This RE leakage, however, is extremely weak and buried under noise and other transmitted signals that can be 3-5 orders of magnitude larger. illence, it is missed by today's radios. We design and build Ghostbuster, the first device that can reliably extract this leakage, even when it is buried under ongoing transmissions, in order to detect the hidden presence of eavesdroppers. Ghostbuster does not require any modifications to current transmitters and receivers and can accurately detect the eavesdropper in the presence of ongoing transmissions. Empirical results show that Ghostbuster can detect eavesdroppers with more than 95% accuracy up to 5 meters away.
引用
收藏
页码:337 / 351
页数:15
相关论文
共 50 条
  • [1] Detecting stealth software with strider ghostbuster
    Wang, YM
    Beck, D
    Vo, B
    Roussev, R
    Verbowski, C
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 368 - 377
  • [2] GhostBuster: Detecting Misbehaving Remote ID-enabled Drones
    Keizer, Mart
    Sciancalepore, Savio
    Oligeri, Gabriele
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 324 - 332
  • [3] Secure Distributed Detection in the Presence of Eavesdroppers
    Nadendla, V. Sriram Siddhardh
    Chen, Hao
    Varshney, Pramod K.
    2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 1437 - 1441
  • [4] DETECTING PASSIVE EAVESDROPPERS IN THE MIMO WIRETAP CHANNEL
    Mukherjee, Amitav
    Swindlehurst, A. Lee
    2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 2809 - 2812
  • [5] Distributed Inference in the Presence of Eavesdroppers: A Survey
    Kailkhura, Bhavya
    Nadendla, V. Sriram Siddhardh
    Varshney, Pramod K.
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) : 40 - 46
  • [6] Secret communication in presence of colluding eavesdroppers
    Goel, Satashu
    Negi, Rohit
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1501 - 1506
  • [7] Secure network coding in the presence of eavesdroppers
    LUO MingXing1
    2Key Laboratory of Network and Information Attack and Defence Technology of MOE
    3National Engineering Laboratory for Disaster Backup and Recovery
    Science China(Information Sciences), 2010, 53 (03) : 648 - 658
  • [8] Secure network coding in the presence of eavesdroppers
    MingXing Luo
    YiXian Yang
    LiCheng Wang
    XinXin Niu
    Science China Information Sciences, 2010, 53 : 648 - 658
  • [9] Secure network coding in the presence of eavesdroppers
    Luo MingXing
    Yang YiXian
    Wang LiCheng
    Niu XinXin
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 648 - 658
  • [10] Secure Wireless Multicasting in Presence of Multiple Eavesdroppers
    Shrestha, Anish Prasad
    Jung, Jaijin
    Kwak, Kyung Sup
    2013 13TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT): COMMUNICATION AND INFORMATION TECHNOLOGY FOR NEW LIFE STYLE BEYOND THE CLOUD, 2013, : 814 - 817