top | item 12376258

FreeSense: Indoor Human Identification with WiFi Signals

161 points| brakmic | 9 years ago |arxiv.org | reply

40 comments

order
[+] noobiemcfoob|9 years ago|reply
This is a type of passive identification I hadn't imagined before. It's pretty impressive to see 90% identification for a set of 6 users.

I can't imagine it's accurate enough to use for secure verification. I could see it's application for a shared entertainment system (ps4, netflix, etc) where identification is primarily for configuration purposes, not security.

[+] SEJeff|9 years ago|reply
Note that this isn't all that dissimilar to Xandem's tomographic motion detection. Their "Xandem Home" product makes a Harry Potter Marauder Map style overlay on a map of your home showing where all moving people are in realtime. It is really cool stuff that I'm about to have installed in my own home:

http://www.securityelectronicsandnetworks.com/articles/2014/...

http://www.xandem.com/motion-detection

Compared to crappy PIRs from companies like ADT, it is great stuff.

[+] BetaCygni|9 years ago|reply
Very cool, and somehow very creepy! This is how we will be hunted when the machines rise up ;)
[+] droopybuns|9 years ago|reply
The only good application of this work I can come up with is to reduce the danger that comes from surprised cops in no-knock warrants.

Still kinda evil though.

[+] RijilV|9 years ago|reply
Would be interesting for a home security system, or for enhancing Nest so the users don't have to walk past it for it to know you are in the home.

Also the paper notes this approach has fewer privacy concerns than other tracking systems, which is true to the degree your goal is tracking locations in a house. However if all the sudden we all ended up with tracking systems in our house that would be a privacy concern.

[+] lovelearning|9 years ago|reply
Useful for detecting if aged or ailing family members haven't moved in a while, and check on them.
[+] EGreg|9 years ago|reply
How would a person be able to avoid this?
[+] AlphaWeaver|9 years ago|reply
That's one scary implication: they can't.
[+] jevyjevjevs|9 years ago|reply
VP Product at aerial.ai (using similar strategies as this paper) here. A few major caveats to make this work:

a) There needs to be enough traffic happening on the network to have the resolution needed to differentiate between people. b) The device needs to be able to see the traffic. This won't protect you from a device in the home that has this technology, but it will from people standing outside of the home (as the signal attenuates a lot outside of the home)

[+] giosch|9 years ago|reply
Probably with a device that transmit in the same frequency of the WiFi network, just ending up distubing the signal
[+] xkcd-sucks|9 years ago|reply
Run a cheap switched mode power supply in their pocket?
[+] homero|9 years ago|reply
Aim a microwave at the door and modify it to run open
[+] goodplay|9 years ago|reply
Tinfoil. Lots and lots of tinfoil.

Conductive meshes work as well provided that the holes are small enough.

[+] lwis|9 years ago|reply
Is this much different to FIND?
[+] qrv3w|9 years ago|reply
FIND author here.

It's not doing internal positioning with Channel State Information (CSI), but there are folks that are [1]. The approach in FIND is different [2] - FIND just uses RSSI+MAC information which works great on mobile devices and simple esp8266 chips and doesn't require code for the specific network interface. As far as I know you have to write some network card specific code to be able to use CSI.

[1] https://arxiv.org/pdf/1603.07080.pdf

[2] https://github.com/schollz/find#about

[+] dynofuz|9 years ago|reply
I building a business around this stuff in boston. If anyone's interested send me an email (in my profile)
[+] jevyjevjevs|9 years ago|reply
Hi everyone! I'm VP Product at aerial.ai. We are using some of these techniques for presence, activity and identification. We have 7 patents in this area.

Happy to answer any questions!

Edit: We're hiring DSP, ML and Growth people

[+] notduncansmith|9 years ago|reply
Can this be executed from phones (which can act as WiFi router, for tethering purposes) by this ubiquitous baseband RCE vulnerability I always hear about on HN?
[+] jevyjevjevs|9 years ago|reply
Some of these WiFi statistics used in this paper are typically not exposed at the user level. You would need to have a modified driver. May or may not be easy to do for an iOS or Android phone.