SlideShare a Scribd company logo
Wi-Fi Sensing:
Attack on Privacy &Countermeasures
Advanced Networking Systems, DII
University of Brescia – Italy
https://ans.unibs.it/
Renato Lo Cigno
with the fundamental contribution of
• Francesco Gringoli
• Marco Cominelli
• Lorenzo Ghiro
Outline& Goals
• Wi-Fi Fundamentals
• CSI-based Wi-Fi Localization & Sensing
• Learning positions with CNNs fingerprinting
• Obfuscation through CSI randomization
• Proper manipulation of the CSI at the transmitter or with and intelligent ambient can
hide position information & maintain communication performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
1
Outline& Goals
• Wi-Fi Fundamentals
• CSI-based Wi-Fi Localization & Sensing
• Learning positions with CNNs fingerprinting
• Obfuscation through CSI randomization
• Proper manipulation of the CSI at the transmitter or with and intelligent ambient can
hide position information & maintain communication performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
2
Common view of Wi-Fi
But we are interested in Wi-Fi
packets and signals, not the network!
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
3
AP
AP
AP Wired LAN / Eth Switch
AP: Access Point
"INTERNET"
Router
Wi-Fi packets & signals - 1
• 802.11 comes in many flavors: g/a/h/ac/ax ...
• They define different packet formats and transmission technologies,
including MIMO
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
4
h11
h22
Wi-Fi packets & signals - 2
• 802.11 comes in many flavors: g/a/h/ac/ax ...
• Some fields in the packets remain fixed and are used to help the correct
reception
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
5
L-STF
L-LTF
L-SIG
VHT-SIG-A
VHT-STF
VHT-LTF
VHT-SIG-B
DATA
8µs 8µs 4µs 8µs 4µs 4µs 8µs 4µs 4µs
...
20MHz
20MHz
20MHz
20MHz
256
carriers
80MHz
IDFT X
{...,SIN
n,...}
I/Q samples
central
carrier
modulated signal s(t)
to antenna
{...,Sout
n,...}
randomizer
Wi-Fi packets & signals - 3
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
6
• 802.11 comes in many flavors: g/a/h/ac/ax ...
• All versions use OFDM as modulation technique
Wi-Fi ChannelStateInformation(CSI)
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
7
• Packet decoding happens
thanks to the knowledge
of the distortion
introduced by the channel
(multipath, refractions, ...)
• This knowledge (CSI) is
obtained thanks analyzing
known portions of the
packets
Outline& Goals
• Wi-Fi Fundamentals
• CSI-based Wi-Fi Localization & Sensing
• Learning positions with CNNs fingerprinting
• Obfuscation through CSI randomization
• Proper manipulation of the CSI at the transmitter or with and intelligent ambient can
hide position information & maintain communication performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
8
Wi-Fi PositionSensing
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
9
input
filter
sampling
equalizer
decoding
localization
system
received
bits
estimated
position
CSI extraction
input
filter
sampling
equalizer
decoding
received
bits
CSI extraction
RX1
RX2
U
• CSI is essential for equalization and high
throughput
• Once extracted the CSI can also be used
to sense & probe the environment
• People (& objects) change the
channel response
Wi-Fi PositionSensing
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
10
• CSI most evident
characteristic is the
amplitude change
in frequency
• Amplitude heatmap
with the same person
in two different positions in our lab
• Question: how to exploit this information?
CNN Fingerprinting
• Most recent "trend" is using supervised learning with a Convolutional Neural Network
• CSI I/Q samples are fed to the CNN that returns a position classification
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
11
Conv.
Layer
1
Conv.
Layer
2
Fully-Conn.
Layer
1
Fully-Conn.
Layer
2
Fully-Conn.
Layer
3
CNN
CSI
values
(real
/
imag)
8
Indoor
Locations
• It works, we'll see
results
• Still fragile, but AI is
improving VERY fast
Localization
• Tracking a person without her/his consent
• Violate privacy
• Often violate laws / rules
• Channel State Information (CSI) carries
details on the propagation environment
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
12
6.60 m
Tx
Rx2
7.00
m
P1
P2
P3
P8
P4
P7
P6
P5
Rx5
Rx1
Rx3
Rx4
`
BIG BROTHER IS
SENSING YOU
Localization
• Big Brother
• Controls one (or more) receivers
• Knows the position of Tx (e.g., an Access Point)
• The victim
• Is unaware of the system
• Does not need to hold a Wi-Fi device
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
13
6.60 m
Tx
Rx2
7.00
m
P1
P2
P3
P8
P4
P7
P6
P5
Rx5
Rx1
Rx3
Rx4
`
BIG BROTHER IS
SENSING YOU
Outline& Goals
• Wi-Fi Fundamentals
• CSI-based Wi-Fi Localization & Sensing
• Learning positions with CNNs fingerprinting
• Obfuscation through CSI randomization
• Proper manipulation of the CSI at the transmitter or with and intelligent ambient
can hide position information & maintain communication performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
14
CSI Randomization
• Proper manipulation at the
transmitter "blur" the fingerprints
• Different manipulations result in
different "blurring"
• Manipulation should not hamper
communication
performance
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
15
ManipulationPrinciples
1. Do not alter power emission
2. Guarantee that the pre-distortion random changes are compatible with
human (time correlation)
3. Guarantee that the pre-distortion random changes in frequency are
compatible with the real channel
4. Hide distortion information to prevent reverse
engineering within a reasonable time horizon
5. Do not change the communication performance
of the system
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
16
Basic Manipulation
• Multiply the samples amplitude by a Uniform-Markov random process
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
17
Localization Results
• Performance of single receivers
Percentage of correct decision: random choice = 12.5%
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
18
6.60 m
Tx
Rx2
7.00
m
P1
P2
P3
P8
P4
P7
P6
P5
Rx5
Rx1
Rx3
Rx4
Rx1 Rx2 Rx3 Rx4 Rx5
Clean 90.6 89.6 93.1 83.1 67.6
Obfuscate 17.6 41.9 15.4 33.6 15.6
C&F, nm 12.9 57.4 30.6 60.5 21.4
F&C 8.8 28.0 7.4 15.2 0.0
F&Cm nm 24.5 37.8 22.1 44.9 22.6
Localization Results
• Majority vote with Nr receivers, average of all
combinations
• Correct decision (not decided)
Percentage of correct (not decided) localization
Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it
19
6.60 m
Tx
Rx2
7.00
m
P1
P2
P3
P8
P4
P7
P6
P5
Rx5
Rx1
Rx3
Rx4
Nr=2 Nr = 3 Nr = 4 Nr = 54
Clean 71.1 (28.9) 95.7 ( 4.3) 99.1 ( 0.1) 100.0 ( 0.0)
Obfuscate 8.7 (72.5) 18.1 (39.1) 19.2 (22.9) 18.2 (20.1)
C&F, nm 13.7 (75.0) 29.8 (42.0) 36.4 (24.4) 34.0 (23.0)
F&C 1.1 (70.2) 3.1 (35.9) 2.6 (23.2) 1.5 (31.2)
F&Cm nm 18.2 (60.6) 25.4 (33.1) 27.3 (23.9) 31.4 (16.5)
Packet Delivery Rate
• PDR is influenced by
manipulation
MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it
20
0 1 2 3 4 5 6 7 8 9
MCS
0
20
40
60
80
100
PDR
[%]
Clean
Packet Delivery Rate
• PDR is influenced by
manipulation
MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it
21
0 1 2 3 4 5 6 7 8 9
MCS
0
20
40
60
80
100
PDR
[%]
Clean
Filter & Clip
Filter & Clip no Max
Packet Delivery Rate
• PDR is influenced by
manipulation
• Proper analysis of the
properties can reduce
the impact
MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it
22
0 1 2 3 4 5 6 7 8 9
MCS
0
20
40
60
80
100
PDR
[%]
Clean
Filter & Clip
Filter & Clip no Max
Clip & Filter
Clip & Filter no Max
Wi-Fi Sensing:
Attack on Privacy &Countermeasures
Advanced Networking Systems, DII
University of Brescia – Italy
https://ans.unibs.it/
Renato Lo Cigno
¡Thanks for theAttention!

More Related Content

Similar to Wi-Fi Sensing: Attack on Privacy & Countermeasures

Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico City
Nicolas Lesconnec
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
RISC-V International
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
ijcsa
 
Ingrid moerman isbo ng wi nets - overview of the project
Ingrid moerman   isbo ng wi nets - overview of the projectIngrid moerman   isbo ng wi nets - overview of the project
Ingrid moerman isbo ng wi nets - overview of the project
imec.archive
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
Felipe Prado
 
Wardiving and Network-Sniffing
Wardiving and Network-SniffingWardiving and Network-Sniffing
Wardiving and Network-Sniffing
An Dy L
 
Adaptable AES Implementation with Power-Gating Support
Adaptable AES Implementation with Power-Gating SupportAdaptable AES Implementation with Power-Gating Support
Adaptable AES Implementation with Power-Gating Support
MDC_UNICA
 
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa ConnectivityGlobal Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Andri Yadi
 
Gigabit Fidelity: The next generation wireless technology
Gigabit Fidelity: The next generation wireless technologyGigabit Fidelity: The next generation wireless technology
Gigabit Fidelity: The next generation wireless technology
Nimisha Radhakrishnan
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4
Chaesub Lee
 
NI_Wireless_Research_Handbook_May_2016_FINAL
NI_Wireless_Research_Handbook_May_2016_FINALNI_Wireless_Research_Handbook_May_2016_FINAL
NI_Wireless_Research_Handbook_May_2016_FINAL
binjon
 
Sub10 presentation
Sub10 presentationSub10 presentation
Sub10 presentation
Advantec Distribution
 
Sub10 presentation
Sub10 presentationSub10 presentation
Sub10 presentation
Advantec Distribution
 
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET Journal
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
deepak171991
 
2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader
Electrical Consultant Engineers Branch - Order of Engineers & Architects - Beirut
 
Towards Telepresence
Towards TelepresenceTowards Telepresence
Towards Telepresence
Larry Smarr
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
PositiveTechnologies
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
TELKOMNIKA JOURNAL
 
Internet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart BuildingsInternet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart Buildings
Faheem Zafari
 

Similar to Wi-Fi Sensing: Attack on Privacy & Countermeasures (20)

Sigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico CitySigfox Makers Tour - Mexico City
Sigfox Makers Tour - Mexico City
 
Coco co-desing and co-verification of masked software implementations on cp us
Coco   co-desing and co-verification of masked software implementations on cp usCoco   co-desing and co-verification of masked software implementations on cp us
Coco co-desing and co-verification of masked software implementations on cp us
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Ingrid moerman isbo ng wi nets - overview of the project
Ingrid moerman   isbo ng wi nets - overview of the projectIngrid moerman   isbo ng wi nets - overview of the project
Ingrid moerman isbo ng wi nets - overview of the project
 
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblinsDEF CON 23 - Desfigies Brierton Islam - guests n goblins
DEF CON 23 - Desfigies Brierton Islam - guests n goblins
 
Wardiving and Network-Sniffing
Wardiving and Network-SniffingWardiving and Network-Sniffing
Wardiving and Network-Sniffing
 
Adaptable AES Implementation with Power-Gating Support
Adaptable AES Implementation with Power-Gating SupportAdaptable AES Implementation with Power-Gating Support
Adaptable AES Implementation with Power-Gating Support
 
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa ConnectivityGlobal Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa Connectivity
 
Gigabit Fidelity: The next generation wireless technology
Gigabit Fidelity: The next generation wireless technologyGigabit Fidelity: The next generation wireless technology
Gigabit Fidelity: The next generation wireless technology
 
I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4I Pv6 Presentation 310510 V4
I Pv6 Presentation 310510 V4
 
NI_Wireless_Research_Handbook_May_2016_FINAL
NI_Wireless_Research_Handbook_May_2016_FINALNI_Wireless_Research_Handbook_May_2016_FINAL
NI_Wireless_Research_Handbook_May_2016_FINAL
 
Sub10 presentation
Sub10 presentationSub10 presentation
Sub10 presentation
 
Sub10 presentation
Sub10 presentationSub10 presentation
Sub10 presentation
 
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader
 
Towards Telepresence
Towards TelepresenceTowards Telepresence
Towards Telepresence
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
 
Internet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart BuildingsInternet of Things (IoT): Micro-location and Smart Buildings
Internet of Things (IoT): Micro-location and Smart Buildings
 

More from Speck&Tech

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Dati aperti: un diritto digitale, da rivendicare e da alimentare
Dati aperti: un diritto digitale, da rivendicare e da alimentareDati aperti: un diritto digitale, da rivendicare e da alimentare
Dati aperti: un diritto digitale, da rivendicare e da alimentare
Speck&Tech
 
AI nel diritto penale, dalle indagini alla redazione delle sentenze
AI nel diritto penale, dalle indagini alla redazione delle sentenzeAI nel diritto penale, dalle indagini alla redazione delle sentenze
AI nel diritto penale, dalle indagini alla redazione delle sentenze
Speck&Tech
 
Vecchi e nuovi diritti per l'intelligenza artificiale
Vecchi e nuovi diritti per l'intelligenza artificialeVecchi e nuovi diritti per l'intelligenza artificiale
Vecchi e nuovi diritti per l'intelligenza artificiale
Speck&Tech
 
What should 6G be? - 6G: bridging gaps, connecting futures
What should 6G be? - 6G: bridging gaps, connecting futuresWhat should 6G be? - 6G: bridging gaps, connecting futures
What should 6G be? - 6G: bridging gaps, connecting futures
Speck&Tech
 
Creare il sangue artificiale: "buon sangue non mente"
Creare il sangue artificiale: "buon sangue non mente"Creare il sangue artificiale: "buon sangue non mente"
Creare il sangue artificiale: "buon sangue non mente"
Speck&Tech
 
AWS: gestire la scalabilità su larga scala
AWS: gestire la scalabilità su larga scalaAWS: gestire la scalabilità su larga scala
AWS: gestire la scalabilità su larga scala
Speck&Tech
 
Praticamente... AWS - Amazon Web Services
Praticamente... AWS - Amazon Web ServicesPraticamente... AWS - Amazon Web Services
Praticamente... AWS - Amazon Web Services
Speck&Tech
 
Data Sense-making: navigating the world through the lens of information design
Data Sense-making: navigating the world through the lens of information designData Sense-making: navigating the world through the lens of information design
Data Sense-making: navigating the world through the lens of information design
Speck&Tech
 
Data Activism: data as rhetoric, data as power
Data Activism: data as rhetoric, data as powerData Activism: data as rhetoric, data as power
Data Activism: data as rhetoric, data as power
Speck&Tech
 
Delve into the world of the human microbiome and metagenomics
Delve into the world of the human microbiome and metagenomicsDelve into the world of the human microbiome and metagenomics
Delve into the world of the human microbiome and metagenomics
Speck&Tech
 
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Speck&Tech
 
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Speck&Tech
 
Why LLMs should be handled with care
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with care
Speck&Tech
 
Building intelligent applications with Large Language Models
Building intelligent applications with Large Language ModelsBuilding intelligent applications with Large Language Models
Building intelligent applications with Large Language Models
Speck&Tech
 
Privacy in the era of quantum computers
Privacy in the era of quantum computersPrivacy in the era of quantum computers
Privacy in the era of quantum computers
Speck&Tech
 
Machine learning with quantum computers
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computers
Speck&Tech
 
Give your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUs
Speck&Tech
 
From leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technology
Speck&Tech
 
Innovating Wood
Innovating WoodInnovating Wood
Innovating Wood
Speck&Tech
 

More from Speck&Tech (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Dati aperti: un diritto digitale, da rivendicare e da alimentare
Dati aperti: un diritto digitale, da rivendicare e da alimentareDati aperti: un diritto digitale, da rivendicare e da alimentare
Dati aperti: un diritto digitale, da rivendicare e da alimentare
 
AI nel diritto penale, dalle indagini alla redazione delle sentenze
AI nel diritto penale, dalle indagini alla redazione delle sentenzeAI nel diritto penale, dalle indagini alla redazione delle sentenze
AI nel diritto penale, dalle indagini alla redazione delle sentenze
 
Vecchi e nuovi diritti per l'intelligenza artificiale
Vecchi e nuovi diritti per l'intelligenza artificialeVecchi e nuovi diritti per l'intelligenza artificiale
Vecchi e nuovi diritti per l'intelligenza artificiale
 
What should 6G be? - 6G: bridging gaps, connecting futures
What should 6G be? - 6G: bridging gaps, connecting futuresWhat should 6G be? - 6G: bridging gaps, connecting futures
What should 6G be? - 6G: bridging gaps, connecting futures
 
Creare il sangue artificiale: "buon sangue non mente"
Creare il sangue artificiale: "buon sangue non mente"Creare il sangue artificiale: "buon sangue non mente"
Creare il sangue artificiale: "buon sangue non mente"
 
AWS: gestire la scalabilità su larga scala
AWS: gestire la scalabilità su larga scalaAWS: gestire la scalabilità su larga scala
AWS: gestire la scalabilità su larga scala
 
Praticamente... AWS - Amazon Web Services
Praticamente... AWS - Amazon Web ServicesPraticamente... AWS - Amazon Web Services
Praticamente... AWS - Amazon Web Services
 
Data Sense-making: navigating the world through the lens of information design
Data Sense-making: navigating the world through the lens of information designData Sense-making: navigating the world through the lens of information design
Data Sense-making: navigating the world through the lens of information design
 
Data Activism: data as rhetoric, data as power
Data Activism: data as rhetoric, data as powerData Activism: data as rhetoric, data as power
Data Activism: data as rhetoric, data as power
 
Delve into the world of the human microbiome and metagenomics
Delve into the world of the human microbiome and metagenomicsDelve into the world of the human microbiome and metagenomics
Delve into the world of the human microbiome and metagenomics
 
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
 
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
 
Why LLMs should be handled with care
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with care
 
Building intelligent applications with Large Language Models
Building intelligent applications with Large Language ModelsBuilding intelligent applications with Large Language Models
Building intelligent applications with Large Language Models
 
Privacy in the era of quantum computers
Privacy in the era of quantum computersPrivacy in the era of quantum computers
Privacy in the era of quantum computers
 
Machine learning with quantum computers
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computers
 
Give your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUs
 
From leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technology
 
Innovating Wood
Innovating WoodInnovating Wood
Innovating Wood
 

Recently uploaded

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 

Recently uploaded (20)

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 

Wi-Fi Sensing: Attack on Privacy & Countermeasures

  • 1. Wi-Fi Sensing: Attack on Privacy &Countermeasures Advanced Networking Systems, DII University of Brescia – Italy https://ans.unibs.it/ Renato Lo Cigno with the fundamental contribution of • Francesco Gringoli • Marco Cominelli • Lorenzo Ghiro
  • 2. Outline& Goals • Wi-Fi Fundamentals • CSI-based Wi-Fi Localization & Sensing • Learning positions with CNNs fingerprinting • Obfuscation through CSI randomization • Proper manipulation of the CSI at the transmitter or with and intelligent ambient can hide position information & maintain communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 1
  • 3. Outline& Goals • Wi-Fi Fundamentals • CSI-based Wi-Fi Localization & Sensing • Learning positions with CNNs fingerprinting • Obfuscation through CSI randomization • Proper manipulation of the CSI at the transmitter or with and intelligent ambient can hide position information & maintain communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 2
  • 4. Common view of Wi-Fi But we are interested in Wi-Fi packets and signals, not the network! Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 3 AP AP AP Wired LAN / Eth Switch AP: Access Point "INTERNET" Router
  • 5. Wi-Fi packets & signals - 1 • 802.11 comes in many flavors: g/a/h/ac/ax ... • They define different packet formats and transmission technologies, including MIMO Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 4 h11 h22
  • 6. Wi-Fi packets & signals - 2 • 802.11 comes in many flavors: g/a/h/ac/ax ... • Some fields in the packets remain fixed and are used to help the correct reception Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 5 L-STF L-LTF L-SIG VHT-SIG-A VHT-STF VHT-LTF VHT-SIG-B DATA 8µs 8µs 4µs 8µs 4µs 4µs 8µs 4µs 4µs ... 20MHz 20MHz 20MHz 20MHz 256 carriers 80MHz IDFT X {...,SIN n,...} I/Q samples central carrier modulated signal s(t) to antenna {...,Sout n,...} randomizer
  • 7. Wi-Fi packets & signals - 3 Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 6 • 802.11 comes in many flavors: g/a/h/ac/ax ... • All versions use OFDM as modulation technique
  • 8. Wi-Fi ChannelStateInformation(CSI) Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 7 • Packet decoding happens thanks to the knowledge of the distortion introduced by the channel (multipath, refractions, ...) • This knowledge (CSI) is obtained thanks analyzing known portions of the packets
  • 9. Outline& Goals • Wi-Fi Fundamentals • CSI-based Wi-Fi Localization & Sensing • Learning positions with CNNs fingerprinting • Obfuscation through CSI randomization • Proper manipulation of the CSI at the transmitter or with and intelligent ambient can hide position information & maintain communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 8
  • 10. Wi-Fi PositionSensing Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 9 input filter sampling equalizer decoding localization system received bits estimated position CSI extraction input filter sampling equalizer decoding received bits CSI extraction RX1 RX2 U • CSI is essential for equalization and high throughput • Once extracted the CSI can also be used to sense & probe the environment • People (& objects) change the channel response
  • 11. Wi-Fi PositionSensing Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 10 • CSI most evident characteristic is the amplitude change in frequency • Amplitude heatmap with the same person in two different positions in our lab • Question: how to exploit this information?
  • 12. CNN Fingerprinting • Most recent "trend" is using supervised learning with a Convolutional Neural Network • CSI I/Q samples are fed to the CNN that returns a position classification Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 11 Conv. Layer 1 Conv. Layer 2 Fully-Conn. Layer 1 Fully-Conn. Layer 2 Fully-Conn. Layer 3 CNN CSI values (real / imag) 8 Indoor Locations • It works, we'll see results • Still fragile, but AI is improving VERY fast
  • 13. Localization • Tracking a person without her/his consent • Violate privacy • Often violate laws / rules • Channel State Information (CSI) carries details on the propagation environment Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 12 6.60 m Tx Rx2 7.00 m P1 P2 P3 P8 P4 P7 P6 P5 Rx5 Rx1 Rx3 Rx4 ` BIG BROTHER IS SENSING YOU
  • 14. Localization • Big Brother • Controls one (or more) receivers • Knows the position of Tx (e.g., an Access Point) • The victim • Is unaware of the system • Does not need to hold a Wi-Fi device Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 13 6.60 m Tx Rx2 7.00 m P1 P2 P3 P8 P4 P7 P6 P5 Rx5 Rx1 Rx3 Rx4 ` BIG BROTHER IS SENSING YOU
  • 15. Outline& Goals • Wi-Fi Fundamentals • CSI-based Wi-Fi Localization & Sensing • Learning positions with CNNs fingerprinting • Obfuscation through CSI randomization • Proper manipulation of the CSI at the transmitter or with and intelligent ambient can hide position information & maintain communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 14
  • 16. CSI Randomization • Proper manipulation at the transmitter "blur" the fingerprints • Different manipulations result in different "blurring" • Manipulation should not hamper communication performance Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 15
  • 17. ManipulationPrinciples 1. Do not alter power emission 2. Guarantee that the pre-distortion random changes are compatible with human (time correlation) 3. Guarantee that the pre-distortion random changes in frequency are compatible with the real channel 4. Hide distortion information to prevent reverse engineering within a reasonable time horizon 5. Do not change the communication performance of the system Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 16
  • 18. Basic Manipulation • Multiply the samples amplitude by a Uniform-Markov random process Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 17
  • 19. Localization Results • Performance of single receivers Percentage of correct decision: random choice = 12.5% Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 18 6.60 m Tx Rx2 7.00 m P1 P2 P3 P8 P4 P7 P6 P5 Rx5 Rx1 Rx3 Rx4 Rx1 Rx2 Rx3 Rx4 Rx5 Clean 90.6 89.6 93.1 83.1 67.6 Obfuscate 17.6 41.9 15.4 33.6 15.6 C&F, nm 12.9 57.4 30.6 60.5 21.4 F&C 8.8 28.0 7.4 15.2 0.0 F&Cm nm 24.5 37.8 22.1 44.9 22.6
  • 20. Localization Results • Majority vote with Nr receivers, average of all combinations • Correct decision (not decided) Percentage of correct (not decided) localization Speck&Tech- Trento, Sept.29, 2022. Wi-FiSensing:Attack ... renato.locigno@unibs.it 19 6.60 m Tx Rx2 7.00 m P1 P2 P3 P8 P4 P7 P6 P5 Rx5 Rx1 Rx3 Rx4 Nr=2 Nr = 3 Nr = 4 Nr = 54 Clean 71.1 (28.9) 95.7 ( 4.3) 99.1 ( 0.1) 100.0 ( 0.0) Obfuscate 8.7 (72.5) 18.1 (39.1) 19.2 (22.9) 18.2 (20.1) C&F, nm 13.7 (75.0) 29.8 (42.0) 36.4 (24.4) 34.0 (23.0) F&C 1.1 (70.2) 3.1 (35.9) 2.6 (23.2) 1.5 (31.2) F&Cm nm 18.2 (60.6) 25.4 (33.1) 27.3 (23.9) 31.4 (16.5)
  • 21. Packet Delivery Rate • PDR is influenced by manipulation MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it 20 0 1 2 3 4 5 6 7 8 9 MCS 0 20 40 60 80 100 PDR [%] Clean
  • 22. Packet Delivery Rate • PDR is influenced by manipulation MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it 21 0 1 2 3 4 5 6 7 8 9 MCS 0 20 40 60 80 100 PDR [%] Clean Filter & Clip Filter & Clip no Max
  • 23. Packet Delivery Rate • PDR is influenced by manipulation • Proper analysis of the properties can reduce the impact MedComNet'21- PassiveDevice Free... marco.cominelli@unibs.it 22 0 1 2 3 4 5 6 7 8 9 MCS 0 20 40 60 80 100 PDR [%] Clean Filter & Clip Filter & Clip no Max Clip & Filter Clip & Filter no Max
  • 24. Wi-Fi Sensing: Attack on Privacy &Countermeasures Advanced Networking Systems, DII University of Brescia – Italy https://ans.unibs.it/ Renato Lo Cigno ¡Thanks for theAttention!

Editor's Notes

  1. - Describe the scenario - How come we can localize people with WiFi? Not everyone knows it. - STRESS the person does not neet to wear a device
  2. - Describe the scenario - How come we can localize people with WiFi? Not everyone knows it. - STRESS the person does not neet to wear a device - Skip detailed description of the lab here, it comes later
  3. - Very quik presentation, refer to the paper for details
  4. - The figure is just for exemplification, doesn't matter if it has not been obtained with the specific technique of this paper – Highlight on the picture that keeping Principle 3 is not trivial - The formula is used only to refer to the paper for the math
  5. Explain that there are collisions due to the missing MAC in the SDR
  6. Highlight that maximum obfuscation obtained with rule of thumb ruins communications, but does not destroy them
  7. Stress that this correction is a first attempt based on the observation that clipping at the very end may introduce high frequency components, and even this "small correction" leads to very good results.