CN115623531A - Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal - Google Patents
Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal Download PDFInfo
- Publication number
- CN115623531A CN115623531A CN202211504490.XA CN202211504490A CN115623531A CN 115623531 A CN115623531 A CN 115623531A CN 202211504490 A CN202211504490 A CN 202211504490A CN 115623531 A CN115623531 A CN 115623531A
- Authority
- CN
- China
- Prior art keywords
- time
- equipment
- hidden monitoring
- hidden
- discovering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0257—Hybrid positioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
- H04W64/006—Locating users or terminals or network equipment for network management purposes, e.g. mobility management with additional information processing, e.g. for direction or speed determination
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a method for discovering and positioning hidden monitoring equipment by utilizing wireless radio frequency signals, which comprises the following steps: constructing a hidden monitoring equipment classification model in an off-line manner; setting a time period for discovering the hidden monitoring equipment, and carrying out time slice division to discover an active communication channel; designing a self-adaptive spectrum sensing method of the equipment, and determining a communication channel for hiding the discovery and positioning of the monitoring equipment; collecting wireless flow data packets on line, grouping according to physical addresses, and identifying the type of the hidden monitoring equipment; and the equipment positioning is realized by utilizing the wireless flow bit rate and the wireless signal strength of the hidden monitoring equipment. The invention has the beneficial effects that: the method can be deployed on mobile equipment such as a smart phone or a tablet personal computer of a user, has the advantages of universality, easiness in deployment, automation in discovery process and high positioning accuracy, and has great social public benefit significance and economic value.
Description
Technical Field
The invention relates to the technical field of hidden device discovery, in particular to a method for discovering and positioning hidden monitoring devices by utilizing wireless radio frequency signals.
Background
The existing detection method for hiding the monitoring equipment comprises the following steps: 1) Based on the detection method of light reflection, signs of minute reflection from the camera lens are detected. There are studies to detect hidden monitoring devices by detecting infrared rays emitted by an infrared camera in dark light, but this technology can only detect in dark light and can only detect the infrared camera. The research also uses an LED lattice to actively emit laser, and hidden equipment is found by detecting the image of the laser lattice after being refracted by a lens, but the technology can only detect under the condition of dim light and is easy to misjudge; 2) Electromagnetic leakage from an operating camera is identified based on a detection method of the electromagnetic field. The method has the main defects that the interference items are too many, and the high magnetic field can be detected when the interference items approach an electronic device or a piece of metal, so that the false alarm is frequently detected; 3) The detection method based on wireless spectrum sensing, but the prior art fails in two cases, namely, a lawless person can use a separate wireless network for the hidden monitoring device and provide the user with access to a separate guest network, and in another case, the hidden monitoring device is allocated to a different 802.11 wireless channel, encryption is enabled (for example, WPA2/WPA 3), and the network SSID of the device connection is hidden.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provides a hidden monitoring device discovering and positioning method by utilizing wireless radio frequency signals. The technical principle of the invention is that video and audio can be continuously generated in the process of hiding the data recorded by the monitoring equipment, and the audio and the video can generate unique audio and video stream data under the action of a check coding mechanism. Thus, if these invisible network traffic pattern characteristics can be captured, the presence of the hidden camera can be sent and further located. The method comprises the following specific steps:
s1, collecting transmission data packets of various hidden monitoring devices in an off-line stage, designing device identification characteristics by utilizing inherent flow patterns and time fingerprints of different devices, and training a multi-classification model to find the types of the hidden monitoring devices;
s2, setting a time period for discovering the hidden monitoring equipment, dividing the time period into a plurality of time slices with fixed lengths, adopting periodic polling to each time slice, and taking a communication channel receiving a polling reply beacon as an active communication channel;
s3, designing a self-adaptive frequency spectrum sensing method of the equipment, selecting a wireless communication channel for hiding the discovery and positioning of the monitoring equipment from all active communication channels of each time slice, and collecting all wireless flow data packets of the communication channel;
s4, grouping the wireless traffic data packets collected in the step S3 according to the physical addresses of the devices, and inputting each group of wireless traffic data packets into the device classification model established in the step S1 to obtain the device types corresponding to the group of wireless traffic data packets;
s5, in the step S4 of detecting the environment movement record, hiding the rising and falling conditions of the wireless flow bit rate of the monitoring equipment, and carrying out coarse-grained position location on the hidden monitoring equipment; and then, combining the wireless signal strength measurement value with an inertial ranging technology to obtain a final positioning result of the hidden monitoring equipment.
Preferably, S1 comprises:
s101, when different monitoring devices communicate with a gateway, the gateway records a plurality of communication data traffic packets of different monitoring device setting stages, and analyzes traffic packet metadata, wherein attribute information extracted from each data packet comprises: the length of the physical address frame; controlling a frame; a duration of time; a physical address of a network access point; a source device physical address; a physical address of the destination device; a link layer protocol; a transport layer protocol; packet length; an IP address;
s102, constructing a time aggregation characteristic for each attribute information; designing a multi-time scale feature scheme to select a time window suitable for each device transmission mode; first, a maximum sensing time window is definedFor each characteristic attribute, for each time instantDefining different time offsetsTo set time windows of different lengthsWherein
(ii) a Calculating the characteristics of each attribute in each time window by using an aggregation function according to the attribute information of each time window, and splicing and connecting calculation results in series to obtain the equipment identification characteristics of the window; the aggregation function specifically comprises an average value, a standard deviation, a median, a maximum value, a minimum value, a sum, an entropy and a histogram;
s103, standardizing the time aggregation characteristics and eliminating the correlation redundant characteristics;
s104, for each monitoring deviceThe gateway also records the data packet from the equipmentTime of arrival ofAdding it to the packet arrival time seriesTo the end of (c). L is a preset empirical threshold, and when the gateway receives L +1 pieces of coming equipmentData packet ofAfter, profitComputing packet arrivalsSequence of time intervalsWherein, in the step (A),the calculation method is as follows:
s105, calculating time interval sequencePAIThe distribution characteristics are obtained by the sectional density, and the calculation method comprises the following steps: time intervalAverage scoreSub-time intervals. Calculating outPAIThe number of time intervals falling within each subinterval is recorded as. Order toSUMIs composed ofPAIThe time interval in (1) falls within the time intervalThe segment density calculating method is as follows:
S106, for each data packet, the time aggregation characteristics and the time series distribution characteristics processed in the step S103Splicing to form sample characteristic vectors, and establishing a hidden monitoring equipment classification model by adopting the following method: and constructing an integrated classifier by using the Hough tree as a base classifier, creating a classifier pool, and training the examples. When the data stream is input, a fast Hough drift detection method is used for detection, if concept drift occurs, the current data stream instance is cached in a window, a current base classifier is reset, the base classifier is retrained by using the instance in the window, and the base classifier is added into a classifier pool. And updating the base classifier according to the classification accuracy of the test data, and deleting the base classifier with the weight value smaller than the preset threshold while increasing according to the principle of increasing one base classifier at a time when increasing the base classifiers. When the base classifier is reduced, the base classifier with the worst performance is deleted according to the threshold value. Finally, the number of base classifiers for the best ensemble classifier is determined.
Preferably, S3 comprises:
s301, for all active wireless communication channels in the time sliceRandomly initializing its selection score between 0 and 1;
S303, utilizing equipmentIs selected as a scoreObtaining and apparatusAnd selecting the communication channel with the highest selection score as a data packet acquisition channel for discovering the hidden monitoring device in the time slice.
Preferably, S302 includes:
s3021 if it is provided withThe sent data packet is larger than a preset threshold valueThen the device in the time slice is usedIs selected as a scoreSet to 0;
s3022, if the slave deviceThe sent data packet is less than the preset threshold valueExtracting deviceThe data packet in the time slice is used as the output, and the equipment is obtained through the equipment classification model established in the off-line stage in the step S1The device type of (d); counting the time slice deviceAverage packet inter-arrival time of (D), noted(ii) a Calculating the device using the following formulaSelection score of (2):
wherein the content of the first and second substances,indicating that the last received from the device within the time sliceThe time of the data packet of (a),which indicates the current time of day,presentation pairThe result of the calculation of (a) is rounded up.
Preferably, in S4, for any device, the center of the time window is defined asCorresponding to the packet arrival time and extracting the feature vector for that time segment according to step S102Then the device type prediction probability is:
where K is the number of device types,device type specific to step S1The integrated classifier of (a) is provided,is in time slicesClassify the device intoThe probability of (d); feature vectorIs marked as the final predicted equipment label:
Within a given time period for discovering hidden monitoring devicesAnd performing majority voting to obtain a final type prediction label of the equipment.
Preferably, S5 comprises:
s501, automatically extracting an intervention time window by using an accelerometer on intelligent equipment, recording correspondingly found rising and falling conditions of the wireless flow bit rate of the hidden monitoring equipment through multiple movements and stops of a user, judging whether the hidden monitoring equipment and the user are located in the same space, and realizing coarse-grained positioning of the hidden monitoring equipment;
s502, collecting when the user walks in the detection environmentA sample, where x and y are coordinates obtained by the inertial navigation estimation method with respect to the initial point of the user' S initial walking, and RSS represents the signal strength of the hidden monitoring device found in step S4. The method comprises the following steps of carrying out grid division on a walking area of a user, and estimating grids without observing signal strength based on the following steps:
first, for mesh that is not observedSelecting a rectangular region including N meshes centered on the mesh
Secondly, according to the spatial similarity of the wireless radio frequency information, grid coordinates are matchedAnd its signal strengthThe mapping function of (a) is expressed as follows:
wherein the content of the first and second substances,is a multi-quadrilateral radial basis function, parameterFor the distance between the two grids to be calculated,to representGrid to gridN is the number of meshes of the rectangular area.The following 3 rd order polynomial is used for calculation:
and substituting all networks with known signal strength in the rectangular area into the matrix equation, and calculating all estimation parameters.
In S502, all areas are divided into gridsFitting the data set to a form ofSampling to generate a small-area grid (such as 1 x 1 cm) as a query point, generating a three-dimensional linear curved surface on each point based on triangulation interpolation, and extracting the maximum value of the area of the curved surface as a final positioning result of the device position.
The beneficial effects of the invention are: the hidden monitoring equipment discovering and positioning method utilizing the wireless radio frequency signals can be deployed on mobile equipment such as a smart phone or a tablet personal computer of a user, has the advantages of universality and easiness in deployment, automatic discovering process and high positioning accuracy, and has great social and economic significance.
Drawings
FIG. 1 is a schematic diagram of an application scenario provided herein;
FIG. 2 is a flow chart providing hidden monitoring device discovery and location of the present application;
FIG. 3 is a flow chart of a hidden monitoring device classification model configuration provided herein;
fig. 4 is a flowchart of adaptive spectrum sensing for a hidden monitoring device provided in the present application;
FIG. 5 is a flow chart of hidden monitoring device positioning provided herein;
FIG. 6 is a schematic diagram of a user walking track area meshing provided by the present application;
fig. 7 is a surface fitting graph for regional wireless rf signal strength estimation provided herein.
Detailed Description
The present invention will be further described with reference to the following examples. The following examples are set forth merely to provide an understanding of the invention. It should be noted that modifications can be made to the invention by a person skilled in the art without departing from the principle of the invention, and these modifications and modifications also fall within the scope of the claims of the invention.
Example 1:
a suitable scenario for the present invention involves a lawbreaker placing a hidden monitoring device to monitor a user in an unfamiliar environment (e.g., a hotel room or public restroom, etc.), as shown in fig. 1. A lawbreaker would like to hide monitoring devices to monitor users/guests entering this strange environment, and the user would like to discover and locate these hidden monitoring devices. Lawbreakers and users all need to interact with three key resources: physical environment, hidden monitoring devices and wireless networks. The physical environment applicable to the invention can be a single room in a hotel or a complex multi-room setting in a public place. Hidden monitoring devices may be of various types, such as cameras, voice pens, speakers, plugs, vacuum cleaners, and the like. The hidden monitoring equipment carries out flow transmission through a wireless network controlled by a lawless person. The capabilities and resources of the lawbreakers are expressed as follows:
physical environment: lawbreakers have completely controlled the environment in advance, installing and hiding the monitoring devices.
Hiding the monitoring device: lawbreakers purchase and place off-the-shelf monitoring devices to monitor users and can control various device settings, such as resolution, sensitivity, etc., through the device API. Lawbreakers can also physically disguise devices such as cameras hidden in thermostats or smart plugs doubling as cameras.
A wireless network: lawbreakers can gain full access to 802.11 wireless networks and access points and can take a number of measures to hide the internet of things devices. For example, a separate wireless network may be used for the internet of things device and the user may be provided access to a separate guest network, and the device may be assigned to a different 802.11 wireless channel, enabling encryption (e.g., WPA2/WPA 3) to hide the SSID of the network to which the internet of things device is connected.
The capabilities and resources of the user are expressed as follows:
physical environment: the user can search and move around in the physical environment.
Hiding the monitoring device: the user has no knowledge of the hidden monitoring devices and does not know how many hidden monitoring devices are in this unfamiliar environment.
A wireless network: user access to the wireless network is limited; for example, access may be allowed to a guest network that may be different from the network in which the hidden monitoring device operates, but encrypted broadcast wireless traffic packets may be sniffed wirelessly.
Example 2:
considering that a user mostly does not carry expensive hardware or special detection equipment in an unfamiliar environment (such as a hotel or a resident), the invention provides a hidden monitoring equipment discovering and positioning method by using a wireless radio frequency signal, the hidden monitoring equipment can be discovered and positioned only by using mobile equipment such as a smart phone or a tablet personal computer of the user, and the method has great social and social benefits and economic values.
Specifically, as shown in fig. 2, the steps of the present invention include:
s1, collecting transmission data packets of various hidden monitoring devices in an off-line stage, designing device identification characteristics by using inherent flow patterns and time fingerprints of different devices, and training a multi-classification model to find the classes of the hidden monitoring devices;
s2, setting a time period for discovering the hidden monitoring equipment, dividing the time period into a plurality of time slices with fixed lengths, adopting periodic polling to each time slice, and taking a communication channel receiving a polling reply beacon as an active communication channel;
s3, designing a self-adaptive frequency spectrum sensing method of the equipment, selecting a wireless communication channel for hiding the discovery and positioning of the monitoring equipment from all active communication channels of each time slice, and collecting all wireless flow data packets of the communication channel;
s4, grouping the wireless flow data packets collected in the step S3 according to the physical addresses of the devices, and inputting each group of wireless flow data packets into the device classification model established in the step S1 to obtain the device types corresponding to the group of wireless flow data packets;
s5, in the step S4 of detecting environment movement record, hiding the rising and falling conditions of the wireless flow bit rate of the monitoring equipment, and carrying out coarse-grained position location on the hidden monitoring equipment; and then, combining the wireless signal strength measurement value with an inertial ranging technology to obtain a final positioning result of the hidden monitoring equipment.
As shown in fig. 3, S1 includes:
s101, when different monitoring devices communicate with a gateway, the gateway records a plurality of communication data traffic packets of different monitoring device setting stages, and analyzes traffic packet metadata, wherein attribute information extracted from each data packet comprises: the length of the physical address frame; controlling a frame; a duration of time; a physical address of a network access point; a source device physical address; a physical address of the destination device; a link layer protocol; a transport layer protocol; packet length; an IP address;
s102, constructing time aggregation characteristics for each attribute information; designing a multi-time scale feature scheme to select a time window suitable for each device transmission mode; first, a maximum sensing time window is definedFor each characteristic attribute, for each time instantDefining different time offsetsTo set time windows of different lengthsWherein(ii) a Calculating the characteristics of each attribute in each time window by using an aggregation function according to the attribute information of each time window, splicing and connecting the calculation results in series,obtaining the equipment identification characteristics of the window; the aggregation function specifically comprises an average value, a standard deviation, a median, a maximum value, a minimum value, a sum, an entropy and a histogram;
s103, standardizing the time aggregation characteristics and eliminating the correlation redundant characteristics;
s104, for each monitoring deviceThe gateway also records the data packet from the equipmentTime of arrival ofAdding it to the packet arrival time seriesTo the end of (c). L is a preset empirical threshold, and when the gateway receives L +1 pieces of coming equipmentData packet ofThen useCalculating a sequence of data packet arrival intervalsWherein, in the step (A),the calculation method is as follows:
s105, calculating time interval sequencePAIThe distribution characteristics are obtained by the sectional density, and the calculation method comprises the following steps: time intervalIs divided intoSub-time intervals of (). Calculating outPAIThe number of time intervals falling within each subinterval is recorded as. Order toSUMIs composed ofPAIThe time interval in (2) falls within the time intervalThe segment density calculation method is as follows:
S106, for each data packet, the time aggregation characteristics and the time series distribution characteristics processed in the step S103Splicing to form a sample characteristic vector, and establishing a hidden monitoring equipment classification model by adopting the following method: using HoughAnd building an integrated classifier by using the T-tree as a base classifier, creating a classifier pool, and training the examples. And detecting by using a fast Hough drift detection method when the data stream is input, caching the current data stream instance into a window if the concept drift occurs, resetting the current base classifier, retraining the base classifier by using the instance in the window, and adding the base classifier into a classifier pool. And updating the base classifier according to the classification accuracy of the test data, and deleting the base classifier with the weight value smaller than a preset threshold value while increasing according to the principle of increasing one base classifier at a time when increasing the base classifier. When the base classifiers are reduced, the base classifier with the worst performance is deleted according to the threshold value. Finally, the number of base classifiers for the best ensemble classifier is determined.
As shown in fig. 4, S3 includes:
s301, for all active wireless communication channels in the time sliceRandomly initializing its selection score between 0 and 1;
S303, utilization deviceIs selected as a scoreObtaining and apparatusOf associated communication channelsAnd selecting the score, and taking the communication channel with the highest selected score as a data packet acquisition channel for discovering the hidden monitoring device in the time slice.
If the active wireless communication channel is present in S303If there is a transmitting device, the maximum value of all device selection scores transmitted by the wireless channel is used as the frequency channelIs selected score。
S302 comprises:
s3021, if yes, providingThe sent data packet is larger than a preset threshold valueThen the device in the time slice is usedIs divided intoSet to 0;
s3022, if the slave equipmentThe sent data packet is less than the preset threshold valueExtracting deviceThe data packets in the time slice are used as the output, and the equipment classification module is established in the off-line stage through the step S1Mold forming apparatusThe device type of (d); counting the time slice deviceAverage inter-packet arrival time of (D), is noted(ii) a Calculating the device using the following formulaSelection score of (2):
wherein, the first and the second end of the pipe are connected with each other,indicating the last time the time slice received from the deviceThe time of the data packet of (a),which indicates the current time of day,pair of representationsThe result of the calculation of (a) is rounded up.
In S4, for any equipment, the center of the time window is defined asWhich corresponds to the packet arrival time, and extracts the feature vector for the time period according to step S102Then the device type prediction probability is:
where K is the number of device types,device type specific to step S1The multi-classifier of (1) is,is in time slicesClassify the device intoThe probability of (d); feature vectorIs marked as the final predicted equipment label:
Within a given time period for discovering hidden monitoring devicesAnd performing majority voting to obtain a final type prediction label of the equipment.
As shown in fig. 5, S5 includes:
s501, if the hidden monitoring device directly monitors the user (such as video recording or sound recording), when the user starts moving, the bit rate of the device transmission flow should be displayed to be obviously increased, and when the user stops, the bit rate should be displayed to be reduced. Therefore, the method and the device automatically extract the intervention time window by using the accelerometer on the intelligent device, record correspondingly found rising and falling conditions of the wireless flow bit rate of the hidden monitoring device through multiple movements and stops of the user, judge whether the hidden monitoring device and the user are located in the same space, and realize coarse-grained positioning of the hidden monitoring device;
s502, collecting when the user walks in the detection environmentA sample, where x and y are coordinates obtained by an inertial navigation estimation method with respect to an initial point where a user starts to walk, and RSS represents the signal strength of the hidden monitoring device found in step S4; and (3) carrying out grid division (such as 0.5 m-0.5 m grid division) on a user walking area, calculating an average observed signal intensity value of each grid, and selecting a grid center with the maximum average signal intensity value as a positioning result of the hidden monitoring equipment. By way of example, fig. 6 shows a user walking track area meshing schematic diagram, wherein each black point represents a walking coordinate point of a user. The walking area in fig. 6 is divided into four grids of a, B, C and D, each grid is provided with a plurality of walking coordinate points, the average observation signal intensity values of different grids can be obtained by calculating the signal intensity of all the walking coordinate points in each grid, and the positioning result of the hidden monitoring device can be determined. For example, when the average observed signal strength value of grid a is greater than the average observed signal strength values of grids B, C, and D, grid a is used as the positioning result of the hidden monitoring device.
In S502, the grid for which no signal strength is observed is estimated based on the following steps:
first, for mesh that is not observedSelecting a rectangular region including N meshes centering on the mesh;
Secondly, according to the spatial similarity of the wireless radio frequency information, grid coordinates are matchedAnd its signal strengthThe mapping function of (c) is expressed as follows:
wherein, the first and the second end of the pipe are connected with each other,is a multi-quadrilateral radial basis function, parameterFor the distance between the two grids to be calculated,to representGrid to gridN is the number of meshes of the rectangular area;the following polynomial of order 3 is used for calculation:
And substituting all networks with known signal strength in the rectangular area into the matrix equation, and calculating all estimation parameters.
In S502, pairThe data set is fitted to a form ofSampling to generate a small-area grid (such as 1 x 1 cm) as a query point, generating a three-dimensional linear curved surface on each point based on triangulation interpolation, and extracting the maximum value of the area of the curved surface as a final positioning result of the device position. Illustratively, FIG. 7 shows a surface fitting graph for regional radio frequency signal strength estimation, dividing a walking region into an A region, a B region, a C region and a D region, and determining the walking region according to the area in each regionFitting the data set to obtain correspondingA curved surface. In the surface, the X, Y, axis represents the planar position of the query point, and the Z axis represents the signal strength of the query point. And then, the final positioning result of the equipment position can be determined according to the maximum value of the area of the curved surface.
In order to verify effectiveness, 50 hidden monitoring devices are selected for experimental testing in an actual scene, and the experimental testing is as follows: a camera: 25 in number; 15 recording pens are provided; a microphone: 10, each category having multiple devices of the same type to avoid overfitting the experimental results to a particular supplier. The experimental environment included 4: 1) 50 square meters of office; 2) Single apartment of 26 and 35 square meters; 3) 300 square meters laboratory.
The experimental results are shown in the table below, and the experimental results show that the method can achieve the precision equivalent to the method assuming the whole network access.
Table 1 hidden monitoring device discovery and localization effects
In summary, the method and the device for detecting the hidden monitoring device in the mobile phone or the tablet computer rapidly identify whether the hidden monitoring device exists in the space and accurately position the hidden monitoring device through detecting whether the network flow mode specific to the hidden monitoring device exists in the environment, the device network does not need to be accessed in the detection process, any information does not need to be provided by a user, the device can be arranged on the mobile phone or the tablet computer carried by the user, and the method and the device have great social public benefit and economic value.
Claims (8)
1. A hidden monitoring device discovering and positioning method using wireless radio frequency signals is characterized by comprising the following steps:
s1, collecting transmission data packets of various hidden monitoring devices in an off-line stage, designing device identification characteristics by using inherent flow patterns and time fingerprints of different devices, and training a multi-classification model to find the classes of the hidden monitoring devices;
s2, setting a time period for discovering the hidden monitoring equipment, dividing the time period into a plurality of time slices with fixed lengths, adopting periodic polling to each time slice, and taking a communication channel receiving a polling reply beacon as an active communication channel;
s3, designing a self-adaptive frequency spectrum sensing method of the equipment, selecting a wireless communication channel for hiding the discovery and positioning of the monitoring equipment from all active communication channels of each time slice, and collecting all wireless flow data packets of the communication channel;
s4, grouping the wireless flow data packets collected in the step S3 according to the physical addresses of the devices, and inputting each group of wireless flow data packets into the device classification model established in the step S1 to obtain the device types corresponding to the group of wireless flow data packets;
s5, in the step S4 of detecting environment movement record, hiding the rising and falling conditions of the wireless flow bit rate of the monitoring equipment, and carrying out coarse-grained position location on the hidden monitoring equipment; and then, combining the wireless signal strength measurement value with an inertial ranging technology to obtain a final positioning result of the hidden monitoring equipment.
2. The hidden monitoring device discovering and locating method using wireless radio frequency signals according to claim 1, wherein S1 comprises:
s101, when different monitoring devices communicate with a gateway, the gateway records a plurality of communication data traffic packets of different monitoring device setting stages, and analyzes traffic packet metadata, wherein attribute information extracted from each data packet comprises: the length of the physical address frame; controlling a frame; a duration of time; a physical address of a network access point; a source device physical address; a physical address of the destination device; a link layer protocol; a transport layer protocol; packet length; an IP address;
s102, constructing a time aggregation characteristic for each attribute information; designing a multi-time scale feature scheme to select a time window suitable for each device transmission mode;first, a maximum sensing time window is definedFor each characteristic attribute, for each time instantDefining different time offsetsTo set time windows of different lengthsWherein(ii) a Calculating the characteristics of each attribute in each time window by using an aggregation function according to the attribute information of each time window, and splicing and connecting calculation results in series to obtain the equipment identification characteristics of the window; the aggregation function specifically comprises an average value, a standard deviation, a median, a maximum value, a minimum value, a sum, an entropy and a histogram;
s103, standardizing the time aggregation characteristics and eliminating the correlation redundant characteristics;
s104, for each monitoring deviceThe gateway also records the data packet from the deviceTime of arrival ofAdding it to the packet arrival time seriesEnd of (3); l is a preset empirical threshold, and when the gateway receives L +1 pieces of coming equipmentData packet of,,…,Then useCalculating a sequence of data packet arrival intervals Wherein, in the step (A),the calculation method is as follows:
s105, calculating time interval sequencePAIThe distribution characteristics are obtained by the sectional density, and the calculation method comprises the following steps: time intervalIs divided intoA sub-time interval; computingPAIThe number of time intervals falling within each subinterval is recorded as
(ii) a Order toSUMIs composed ofPAIThe time interval in (1) falls within the time intervalThe segment density calculation method is as follows:
s106, for each data packet, the time aggregation characteristics and the time series distribution characteristics processed in the step S103Splicing to form a sample characteristic vector, and establishing a hidden monitoring equipment classification model by adopting the following method: constructing an integrated classifier by using the Hough tree as a base classifier, creating a classifier pool, and training an example; detecting by using a fast Hough drift detection method when a data stream is input, caching a current data stream instance into a window if concept drift occurs, resetting a current base classifier, retraining the base classifier by using the instance in the window, and adding the base classifier into a classifier pool; classifying the basis according to the classification accuracy of the test dataUpdating the base classifier, and deleting the base classifier with the weight value smaller than the preset threshold while increasing according to the principle of increasing one base classifier at a time when increasing the base classifiers; when the base classifiers are reduced, deleting the base classifier with the worst performance according to a threshold value; finally, the number of base classifiers for the best ensemble classifier is determined.
3. The hidden monitoring device discovering and locating method using wireless radio frequency signals according to claim 1, wherein S3 comprises:
s301, for all active wireless communication channels in the time sliceRandomly initializing its selection score between 0 and 1;
4. The hidden monitoring device discovering and locating method according to claim 3, wherein S302 comprises:
s3021, if the slave equipmentThe sent data packet is larger than the preset threshold valueThen the device in the time slice is usedIs selected as a scoreSet to 0;
s3022, if the slave equipmentThe sent data packet is less than the preset threshold valueExtracting deviceThe data packet in the time slice is used as input, and the equipment is obtained through the equipment classification model established in the off-line stage in the step S1The device type of (d); counting the time slice deviceAverage inter-packet arrival time of (D), is noted(ii) a Calculating the device using the following formulaSelection score of (2):
5. The hidden monitoring device discovering and locating method according to claim 2 wherein in S4, for any device, the center of the time window is defined asWhich corresponds to the packet arrival time, and extracts the feature vector for the time period according to step S102Then the device typeThe prediction probability is:
where K is the number of device types,device type specific to step S1The integrated classifier of (a) is provided,is in time slicesClassify the device intoThe probability of (d); feature vectorIs marked as the final predicted equipment label:
6. The hidden monitoring device discovering and locating method according to claim 1 utilizing wireless radio frequency signals, wherein S5 comprises:
s501, an intervention time window is automatically extracted by an accelerometer on intelligent equipment, the rising and falling conditions of the wireless flow bit rate of the hidden monitoring equipment correspondingly found are recorded through multiple movements and stops of a user, whether the hidden monitoring equipment and the user are located in the same space or not is judged, and coarse-grained positioning of the hidden monitoring equipment is achieved;
s502, collecting when the user walks in the detection environmentA sample, wherein x and y are coordinates relative to an initial point where a user starts to walk obtained by an inertial navigation calculation method, and RSS represents the signal strength of the hidden monitoring device found in step S4; and carrying out grid division on a walking area of the user, calculating an average observation signal intensity value of each grid, and selecting a grid center with the maximum average signal intensity value as a positioning result of the hidden monitoring equipment.
7. The hidden monitoring device discovering and locating method according to claim 6, wherein in S502, the grid without observed signal strength is estimated based on the following steps:
first, for mesh that is not observedSelecting a rectangular region including N meshes centering on the mesh
Secondly, according to the spatial similarity of the wireless radio frequency information, grid coordinates are matchedAnd its signal is strongDegree of rotationThe mapping function of (c) is expressed as follows:
wherein, the first and the second end of the pipe are connected with each other,is a multi-quadrilateral radial basis function, parameterFor the distance between the two grids to be calculated,to representGrid to gridN is the number of meshes of the rectangular area;the following 3 rd order polynomial is used for calculation:
and substituting all networks with known signal strength in the rectangular area into the matrix equation, and calculating all estimation parameters.
8. The hidden monitoring device discovering and locating method according to claim 7, wherein in S502, the area is griddedFitting the data set to a form ofSampling to generate a small-area grid as a query point, generating a three-dimensional linear curved surface at each point based on triangulation interpolation, and extracting the maximum value of the area of the curved surface as a final positioning result of the device position.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211504490.XA CN115623531B (en) | 2022-11-29 | 2022-11-29 | Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211504490.XA CN115623531B (en) | 2022-11-29 | 2022-11-29 | Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115623531A true CN115623531A (en) | 2023-01-17 |
CN115623531B CN115623531B (en) | 2023-03-31 |
Family
ID=84879556
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211504490.XA Active CN115623531B (en) | 2022-11-29 | 2022-11-29 | Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115623531B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014210246A1 (en) * | 2013-06-28 | 2014-12-31 | Mcafee, Inc. | Rootkit detection by using hardware resources to detect inconsistencies in network traffic |
CN108718257A (en) * | 2018-05-23 | 2018-10-30 | 浙江大学 | A kind of wireless camera detection and localization method based on network flow |
CN109581282A (en) * | 2018-11-06 | 2019-04-05 | 宁波大学 | Indoor orientation method based on the semi-supervised deep learning of Bayes |
CN112073988A (en) * | 2020-07-31 | 2020-12-11 | 中国科学院信息工程研究所 | Detection method for hidden camera in local area network |
WO2021114231A1 (en) * | 2019-12-11 | 2021-06-17 | 中国科学院深圳先进技术研究院 | Training method and detection method for network traffic anomaly detection model |
CN113873674A (en) * | 2015-11-05 | 2021-12-31 | 索尼公司 | Electronic device in wireless communication system and method for wireless communication |
WO2022116420A1 (en) * | 2020-12-01 | 2022-06-09 | 平安科技(深圳)有限公司 | Speech event detection method and apparatus, electronic device, and computer storage medium |
-
2022
- 2022-11-29 CN CN202211504490.XA patent/CN115623531B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014210246A1 (en) * | 2013-06-28 | 2014-12-31 | Mcafee, Inc. | Rootkit detection by using hardware resources to detect inconsistencies in network traffic |
CN113873674A (en) * | 2015-11-05 | 2021-12-31 | 索尼公司 | Electronic device in wireless communication system and method for wireless communication |
CN108718257A (en) * | 2018-05-23 | 2018-10-30 | 浙江大学 | A kind of wireless camera detection and localization method based on network flow |
CN109581282A (en) * | 2018-11-06 | 2019-04-05 | 宁波大学 | Indoor orientation method based on the semi-supervised deep learning of Bayes |
WO2021114231A1 (en) * | 2019-12-11 | 2021-06-17 | 中国科学院深圳先进技术研究院 | Training method and detection method for network traffic anomaly detection model |
CN112073988A (en) * | 2020-07-31 | 2020-12-11 | 中国科学院信息工程研究所 | Detection method for hidden camera in local area network |
WO2022116420A1 (en) * | 2020-12-01 | 2022-06-09 | 平安科技(深圳)有限公司 | Speech event detection method and apparatus, electronic device, and computer storage medium |
Non-Patent Citations (1)
Title |
---|
BRENT LAGESSE等: "Detecting Spies in IoT Systems using Cyber-Physical Correlation" * |
Also Published As
Publication number | Publication date |
---|---|
CN115623531B (en) | 2023-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abdelnasser et al. | SemanticSLAM: Using environment landmarks for unsupervised indoor localization | |
JP5495235B2 (en) | Apparatus and method for monitoring the behavior of a monitored person | |
TWI587717B (en) | Systems and methods for adaptive multi-feature semantic location sensing | |
JP5165181B2 (en) | System and method for determining the location and dynamics of portable computer devices | |
US9728009B2 (en) | Augmented reality based management of a representation of a smart environment | |
Zhang et al. | Ev-loc: integrating electronic and visual signals for accurate localization | |
CN104335564A (en) | A system and method for identifying and analyzing personal context of a user | |
CN107223332A (en) | Audio-visual scene analysis based on acoustics camera | |
US9107045B2 (en) | Crowdsourcing method to detect broken WiFi indoor locationing model | |
Singh et al. | Ensemble based real-time indoor localization using stray WiFi signal | |
US20150189240A1 (en) | System and method for detecting an object of interest | |
Campana et al. | Towards an indoor navigation system using Bluetooth Low Energy Beacons | |
Jang et al. | Survey of landmark-based indoor positioning technologies | |
CN112381853A (en) | Apparatus and method for person detection, tracking and identification using wireless signals and images | |
Alawami et al. | LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics | |
Liu et al. | Vi-Fi: Associating moving subjects across vision and wireless sensors | |
CN115623531B (en) | Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal | |
Luo et al. | Indoor smartphone slam with learned echoic location features | |
Marakkalage et al. | Identifying indoor points of interest via mobile crowdsensing: An experimental study | |
Shad et al. | Precise location acquisition of mobility data using cell-id | |
Ludziejewski et al. | Integrated human tracking based on video and smartphone signal processing within the Arahub system | |
Hoffmann et al. | Indoor navigation using virtual anchor points | |
Pipelidis et al. | Models and tools for indoor maps | |
KR20200107419A (en) | Fusion positioning method using environmental information fingerprint construction | |
Akhtar et al. | IoT Based Indoor and Outdoor Localization Framework with WI-FI Fingerprinting Based on Scalable Resnet Models. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |