CN115623531B - Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal - Google Patents

Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal Download PDF

Info

Publication number
CN115623531B
CN115623531B CN202211504490.XA CN202211504490A CN115623531B CN 115623531 B CN115623531 B CN 115623531B CN 202211504490 A CN202211504490 A CN 202211504490A CN 115623531 B CN115623531 B CN 115623531B
Authority
CN
China
Prior art keywords
time
hidden
hidden monitoring
equipment
monitoring equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211504490.XA
Other languages
Chinese (zh)
Other versions
CN115623531A (en
Inventor
陈垣毅
王德志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou City University
Original Assignee
Hangzhou City University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou City University filed Critical Hangzhou City University
Priority to CN202211504490.XA priority Critical patent/CN115623531B/en
Publication of CN115623531A publication Critical patent/CN115623531A/en
Application granted granted Critical
Publication of CN115623531B publication Critical patent/CN115623531B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0257Hybrid positioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/006Locating users or terminals or network equipment for network management purposes, e.g. mobility management with additional information processing, e.g. for direction or speed determination
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a hidden monitoring equipment discovering and positioning method by utilizing wireless radio frequency signals, which comprises the following steps: constructing a hidden monitoring equipment classification model in an off-line manner; setting a time period for discovering the hidden monitoring equipment, and carrying out time slice division to discover an active communication channel; designing a self-adaptive spectrum sensing method of the equipment, and determining a communication channel for hiding the discovery and positioning of the monitoring equipment; collecting wireless flow data packets on line, grouping the wireless flow data packets according to physical addresses, and identifying the type of the hidden monitoring equipment; and the equipment positioning is realized by utilizing the wireless flow bit rate and the wireless signal strength of the hidden monitoring equipment. The beneficial effects of the invention are: the method can be deployed on mobile equipment such as a smart phone or a tablet personal computer of a user, has the advantages of universality, easiness in deployment, automation in discovery process and high positioning accuracy, and has great social public benefit significance and economic value.

Description

Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal
Technical Field
The invention relates to the technical field of hidden device discovery, in particular to a method for discovering and positioning hidden monitoring devices by utilizing wireless radio frequency signals.
Background
The existing detection method for hiding the monitoring equipment comprises the following steps: 1) Based on the detection method of light reflection, signs of minute reflection from the camera lens are detected. There are studies to detect hidden monitoring devices by detecting infrared rays emitted by an infrared camera in dark light, but this technology can only detect in dark light and can only detect the infrared camera. The research also uses an LED lattice to actively emit laser, and hidden equipment is found by detecting the image of the laser lattice after being refracted by a lens, but the technology can only detect under the condition of dim light and is easy to misjudge; 2) Electromagnetic leakage from an operating camera is identified based on a detection method of the electromagnetic field. The method has the main defects that the interference items are too many, and the high magnetic field can be detected when the interference items approach an electronic device or a piece of metal, so that the false alarm is frequently detected; 3) The detection method based on wireless spectrum sensing, but the prior art fails in two cases, namely, a lawless person can use a separate wireless network for the hidden monitoring device and provide the user with access to a separate guest network, and in another case, the hidden monitoring device is allocated to a different 802.11 wireless channel, encryption is enabled (for example, WPA2/WPA 3), and the network SSID of the device connection is hidden.
Disclosure of Invention
The invention aims to overcome the defects in the prior art and provides a hidden monitoring device discovering and positioning method by utilizing wireless radio frequency signals. The technical principle of the invention is that video and audio can be continuously generated in the process of hiding the data recorded by the monitoring equipment, and the audio and the video can generate unique audio and video stream data under the action of a check coding mechanism. Thus, if these invisible network traffic pattern characteristics can be captured, the presence of the hidden camera can be sent and further located. The method comprises the following specific steps:
s1, collecting transmission data packets of various hidden monitoring devices in an off-line stage, designing device identification characteristics by using inherent flow patterns and time fingerprints of different devices, and training a multi-classification model to find the classes of the hidden monitoring devices;
s2, setting a time period for discovering the hidden monitoring equipment, dividing the time period into a plurality of time slices with fixed lengths, adopting periodic polling to each time slice, and taking a communication channel receiving a polling reply beacon as an active communication channel;
s3, designing a self-adaptive frequency spectrum sensing method of the equipment, selecting a wireless communication channel for hiding the discovery and positioning of the monitoring equipment from all active communication channels of each time slice, and collecting all wireless flow data packets of the communication channel;
s4, grouping the wireless flow data packets collected in the step S3 according to the physical addresses of the devices, and inputting each group of wireless flow data packets into the device classification model established in the step S1 to obtain the device types corresponding to the group of wireless flow data packets;
s5, in the step S4 of detecting environment movement record, hiding the rising and falling conditions of the wireless flow bit rate of the monitoring equipment, and carrying out coarse-grained position location on the hidden monitoring equipment; and then, combining the wireless signal strength measurement value with an inertial ranging technology to obtain a final positioning result of the hidden monitoring equipment.
Preferably, S1 comprises:
s101, when different monitoring devices communicate with a gateway, the gateway records a plurality of communication data traffic packets of different monitoring device setting stages, and analyzes traffic packet metadata, wherein attribute information extracted from each data packet comprises: the length of the physical address frame; controlling a frame; a duration of time; a physical address of a network access point; a source device physical address; a physical address of the destination device; a link layer protocol; a transport layer protocol; packet length; an IP address;
s102, constructing time aggregation characteristics for each attribute information; designing a multi-time scale feature scheme to select a time window suitable for each device transmission mode; first, a maximum sensing time window is defined
Figure SMS_1
For each characteristic attribute, for each time instant +>
Figure SMS_2
Defining different time offsets>
Figure SMS_3
To set time windows of different lengths>
Figure SMS_4
In which
Figure SMS_5
(ii) a Calculating the characteristics of each attribute in each time window by using an aggregation function according to the attribute information of each time window, and splicing and connecting calculation results in series to obtain the equipment identification characteristics of the window; the aggregation function specifically comprises an average value, a standard deviation, a median, a maximum value, a minimum value, a sum, an entropy and a histogram;
s103, standardizing the time aggregation characteristics and eliminating the correlation redundant characteristics;
s104, for each monitoring device
Figure SMS_8
The gateway also records data packets &fromthe device>
Figure SMS_11
Is reached time->
Figure SMS_12
It is added to the data packet arrival time sequence->
Figure SMS_7
To the end of (c). L is a preset empirical threshold when the gateway receives L +1 slave devices +>
Figure SMS_9
Is greater than or equal to>
Figure SMS_13
Figure SMS_16
,…,
Figure SMS_6
Then utilize>
Figure SMS_10
Counting a sequence of data packet arrival intervals>
Figure SMS_14
In which>
Figure SMS_15
The calculation method of (A) is as follows:
Figure SMS_17
s105, calculating time interval sequencePAIThe distribution characteristics of the distribution are obtained by the sectional density, and the calculation method is as follows: time interval
Figure SMS_18
Average score->
Figure SMS_19
Sub-time interval (` or `)>
Figure SMS_20
). ComputingPAIThe number of middle time intervals falling in each subinterval is recorded as @>
Figure SMS_21
. Order toSUMIs composed ofPAIIn which the time interval falls in a time interval +>
Figure SMS_22
The segment density calculation method is as follows:
Figure SMS_23
the
Figure SMS_24
Dimension sequence->
Figure SMS_25
Is recorded as device>
Figure SMS_26
The time fingerprint of (c).
S106, for each data packet, the time aggregation characteristics and the time series distribution characteristics processed in the step S103 are processed
Figure SMS_27
Splicing to form sample characteristic vectors, and establishing a hidden monitoring equipment classification model by adopting the following method: and constructing an integrated classifier by using the Hough tree as a base classifier, creating a classifier pool, and training the examples. When the data stream is input, a fast Hough drift detection method is used for detection, if concept drift occurs, the current data stream instance is cached in a window, a current base classifier is reset, the base classifier is retrained by using the instance in the window, and the base classifier is added into a classifier pool. Updating the base classifier according to the classification accuracy of the test data, and when the base classifier is added, adding one base classifier at a timeAnd the basic classifier with the weight value smaller than the preset threshold value is deleted while the basic classifier is increased according to the principle of the basic classifier. When the base classifier is reduced, the base classifier with the worst performance is deleted according to the threshold value. Finally, the number of base classifiers for the best ensemble classifier is determined.
Preferably, S3 comprises:
s301, for all active wireless communication channels in the time slice
Figure SMS_28
Randomly initializing its selection score between 0 and 1
Figure SMS_29
S302, each device related to the time slice collection data packet
Figure SMS_30
Calculate its selection score ≥>
Figure SMS_31
S303, utilizing equipment
Figure SMS_32
Is selected score->
Figure SMS_33
Obtaining and device>
Figure SMS_34
And selecting the communication channel with the highest selection score as a data packet acquisition channel for discovering the hidden monitoring equipment in the time slice.
Preferably, S302 includes:
s3021, if the slave device
Figure SMS_35
The issued data packet is greater than a preset threshold value>
Figure SMS_36
Then the device in the time slice is used
Figure SMS_37
Selection of score->
Figure SMS_38
Set to 0;
s3022, if the slave device
Figure SMS_39
Issued data packets which are smaller than a preset threshold value>
Figure SMS_40
Picking device>
Figure SMS_41
The data packet in the time slice is taken as input, and the device classification model established in the off-line stage in step S1 is used to obtain the device->
Figure SMS_42
The device type of (d); counting the devices in the time slice>
Figure SMS_43
Is counted as ≧ based on the average packet inter-arrival time>
Figure SMS_44
(ii) a Calculating device/s using the formula>
Figure SMS_45
Selection score of (2):
Figure SMS_46
wherein,
Figure SMS_47
indicating that the last time a message was received from the device in the time slice>
Figure SMS_48
The time of the data packet of (a), device for combining or screening>
Figure SMS_49
Indicates the current time instant, <' > is>
Figure SMS_50
Representing a pair>
Figure SMS_51
The result of the calculation of (2) is rounded up.
Preferably, in S4, for any device, the center of the time window is defined as
Figure SMS_52
Which corresponds to the arrival time of the data packet and extracts the feature vector { -greater than or equal to the time period in accordance with step S102>
Figure SMS_53
Then the device type prediction probability is:
Figure SMS_54
where K is the number of device types,
Figure SMS_55
built for step S1 for a device type +>
Figure SMS_56
In conjunction with a classifier, in combination with a classifier>
Figure SMS_57
Is at a time slice->
Figure SMS_58
Classifying a device as +>
Figure SMS_59
The probability of (d); feature vector +>
Figure SMS_60
In a final predictive device tag of &>
Figure SMS_61
Figure SMS_62
Within a given time period for discovering hidden monitoring devices
Figure SMS_63
And performing majority voting to obtain a final type prediction label of the equipment.
Preferably, S5 includes:
s501, automatically extracting an intervention time window by using an accelerometer on intelligent equipment, recording correspondingly found rising and falling conditions of the wireless flow bit rate of the hidden monitoring equipment through multiple movements and stops of a user, judging whether the hidden monitoring equipment and the user are located in the same space, and realizing coarse-grained positioning of the hidden monitoring equipment;
s502, collecting when the user walks in the detection environment
Figure SMS_64
A sample, where x and y are coordinates obtained by the inertial navigation estimation method with respect to the initial point of the user' S initial walking, and RSS represents the signal strength of the hidden monitoring device found in step S4. The method comprises the following steps of carrying out grid division on a walking area of a user, and estimating grids without observing signal strength based on the following steps:
first, for mesh that is not observed
Figure SMS_65
Selecting a rectangular area comprising N grids based on the grid as a center>
Figure SMS_66
Secondly, according to the spatial similarity of the wireless radio frequency information, grid coordinates are matched
Figure SMS_67
And its signal strength->
Figure SMS_68
The mapping function of (c) is expressed as follows:
Figure SMS_69
wherein,
Figure SMS_70
is a multi-quad radial basis function, parameter->
Figure SMS_71
For the distance between two grids to be calculated, is->
Figure SMS_72
Represent
Figure SMS_73
Grid to grid &>
Figure SMS_74
N is the number of meshes of the rectangular area.
Figure SMS_75
The following 3 rd order polynomial is used for calculation:
Figure SMS_76
wherein
Figure SMS_77
To estimate the parameters.
Will be provided with
Figure SMS_78
Rewriting as matrix form:
Figure SMS_79
Wherein:
Figure SMS_80
Figure SMS_81
Figure SMS_82
Figure SMS_83
c represents a matrix of the signal strengths of the grid,
Figure SMS_84
and expressing a radial basis function, substituting all networks with known signal strength in a rectangular area into the matrix equation, and calculating all estimation parameters.
In S502, all areas are divided into grids
Figure SMS_85
The data set is fitted to a form of ^ h>
Figure SMS_86
Sampling to generate a small area mesh (such as 1 x 1 cm) as a query point, generating a three-dimensional linear curved surface at each point based on triangulation interpolation, and extracting the maximum value of the area of the curved surface as a final positioning result of the device position.
The beneficial effects of the invention are: the hidden monitoring equipment discovering and positioning method utilizing the wireless radio frequency signals can be deployed on mobile equipment such as a smart phone or a tablet personal computer of a user, has the advantages of universality, easiness in deployment, automatic discovering process and high positioning accuracy, and has great social public benefit significance and economic value.
Drawings
FIG. 1 is a schematic diagram of an application scenario provided herein;
FIG. 2 is a flow chart providing hidden monitoring device discovery and location of the present application;
FIG. 3 is a flow chart of a hidden monitoring device classification model configuration provided herein;
fig. 4 is a flowchart of adaptive spectrum sensing for a hidden monitoring device provided in the present application;
FIG. 5 is a flow chart of hidden monitoring device positioning provided by the present application;
FIG. 6 is a schematic diagram of a user walking track area meshing provided by the present application;
fig. 7 is a surface fitting graph for regional radio frequency signal strength estimation provided in the present application.
Detailed Description
The present invention will be further described with reference to the following examples. The following examples are set forth merely to aid in the understanding of the invention. It should be noted that, for a person skilled in the art, several modifications can be made to the invention without departing from the principle of the invention, and these modifications and modifications also fall within the protection scope of the claims of the present invention.
Example 1:
a suitable scenario for the invention involves a lawbreaker placing a hidden surveillance device to monitor a user in an unfamiliar environment (e.g., hotel rooms or public restrooms, etc.), as shown in fig. 1. A lawbreaker would like to hide monitoring devices to monitor users/guests entering this strange environment, and the user would like to discover and locate these hidden monitoring devices. Lawbreakers and users all have to interact with three key resources: physical environment, hidden monitoring devices and wireless networks. The physical environment applicable to the invention can be a single room in a hotel or a complex multi-room setting in a public place. The hidden monitoring device may be of various types, such as a camera, a recording pen, a speaker, a plug, a dust collector, and the like. The hidden monitoring equipment carries out flow transmission through a wireless network controlled by a lawless person. The capabilities and resources of the lawbreakers are expressed as follows:
the physical environment: lawbreakers have completely controlled the environment in advance, installing and hiding the monitoring devices.
Hide the supervisory equipment: lawbreakers purchase and place off-the-shelf monitoring devices to monitor users and can control various device settings, such as resolution, sensitivity, etc., through the device API. Lawbreakers can also physically disguise devices such as cameras hidden in thermostats or smart plugs doubling as cameras.
A wireless network: lawbreakers can gain full access to 802.11 wireless networks and access points and can take a number of measures to hide the internet of things devices. For example, a separate wireless network may be used for the internet of things device and the user is provided access to a separate guest network, and the device may also be assigned to a different 802.11 wireless channel, enabling encryption (e.g., WPA2/WPA 3) to hide the SSID of the network to which the internet of things device is connected.
The user's capabilities and resources are expressed as follows:
physical environment: the user can search and move around in the physical environment.
Hiding the monitoring device: the user has no knowledge of the hidden surveillance devices and does not know how many hidden surveillance devices are in this unfamiliar environment.
A wireless network: user access to the wireless network is limited; for example, access may be allowed to a guest network that may be different from the network in which the hidden monitoring device operates, but encrypted broadcast wireless traffic packets may be sniffed wirelessly.
Example 2:
considering that a user mostly does not carry expensive hardware or special detection equipment in an unfamiliar environment (such as a hotel or a living room), the invention provides a hidden monitoring equipment discovering and positioning method by using a wireless radio frequency signal, the hidden monitoring equipment can be discovered and positioned only by using mobile equipment such as a smart phone or a tablet personal computer of the user, and the method has great social and economic significance.
Specifically, as shown in fig. 2, the steps of the present invention include:
s1, collecting transmission data packets of various hidden monitoring devices in an off-line stage, designing device identification characteristics by using inherent flow patterns and time fingerprints of different devices, and training a multi-classification model to find the classes of the hidden monitoring devices;
s2, setting a time period for discovering the hidden monitoring equipment, dividing the time period into a plurality of time slices with fixed lengths, adopting periodic polling to each time slice, and taking a communication channel receiving a polling reply beacon as an active communication channel;
s3, designing a self-adaptive frequency spectrum sensing method of the equipment, selecting a wireless communication channel for hiding the discovery and positioning of the monitoring equipment from all active communication channels of each time slice, and collecting all wireless flow data packets of the communication channel;
s4, grouping the wireless flow data packets collected in the step S3 according to the physical addresses of the devices, and inputting each group of wireless flow data packets into the device classification model established in the step S1 to obtain the device types corresponding to the group of wireless flow data packets;
s5, in the step S4 of detecting environment movement record, hiding the rising and falling conditions of the wireless flow bit rate of the monitoring equipment, and carrying out coarse-grained position location on the hidden monitoring equipment; and then, combining the wireless signal strength measurement value with an inertial ranging technology to obtain a final positioning result of the hidden monitoring equipment.
As shown in fig. 3, S1 includes:
s101, when different monitoring devices communicate with a gateway, the gateway records a plurality of communication data traffic packets of different monitoring device setting stages, and analyzes traffic packet metadata, wherein attribute information extracted from each data packet comprises: the length of the physical address frame; controlling a frame; a duration of time; a physical address of a network access point; a source device physical address; a physical address of the destination device; a link layer protocol; a transport layer protocol; packet length; an IP address;
s102, constructing time aggregation characteristics for each attribute information; designing a multi-time scale feature scheme to select a time window suitable for each device transmission mode; first, a maximum sensing time window is defined
Figure SMS_87
For each characteristic attribute, for each time instant +>
Figure SMS_88
Defining different time offsets>
Figure SMS_89
To set time windows of different lengths>
Figure SMS_90
Wherein
Figure SMS_91
(ii) a Calculating the characteristics of each attribute in each time window by using an aggregation function according to the attribute information of each time window, and splicing and connecting calculation results in series to obtain the equipment identification characteristics of the window; the aggregation function specifically comprises an average value, a standard deviation, a median, a maximum value, a minimum value, a sum, an entropy and a histogram;
s103, standardizing the time aggregation characteristics, and eliminating the correlation redundant characteristics;
s104, for each monitoring device
Figure SMS_94
The gateway also records data packets &fromthe device>
Figure SMS_96
Is reached time->
Figure SMS_98
It is added to the data packet arrival time sequence->
Figure SMS_93
To the end of (c). L is a preset empirical threshold, and when the gateway receives L +1 slave devices->
Figure SMS_97
Is greater than or equal to>
Figure SMS_100
Figure SMS_101
,…,
Figure SMS_92
Then utilize->
Figure SMS_95
Evaluating a sequence of data packet arrival intervals>
Figure SMS_99
In which>
Figure SMS_102
The calculation method is as follows:
Figure SMS_103
s105, calculating time interval sequencePAIThe distribution characteristics are obtained by the sectional density, and the calculation method comprises the following steps: time interval
Figure SMS_104
Averagely divide into>
Figure SMS_105
Sub-time interval (` or `)>
Figure SMS_106
). ComputingPAIThe number of middle time intervals falling in each subinterval is recorded as @>
Figure SMS_107
. Order toSUMIs composed ofPAIIn falls in the time interval->
Figure SMS_108
The segment density calculating method is as follows:
Figure SMS_109
the device is
Figure SMS_110
Dimension sequence>
Figure SMS_111
Is recorded as device>
Figure SMS_112
Time fingerprint of (2).
S106, for each data packet, the time aggregation characteristics and the time series distribution characteristics processed in the step S103
Figure SMS_113
Splicing to form a sample characteristic vector, and establishing a hidden monitoring equipment classification model by adopting the following method: and constructing an integrated classifier by using the Hough tree as a base classifier, creating a classifier pool, and training the examples. When the data stream is input, a fast Hough drift detection method is used for detection, if concept drift occurs, the current data stream instance is cached in a window, a current base classifier is reset, the base classifier is retrained by using the instance in the window, and the base classifier is added into a classifier pool. And updating the base classifier according to the classification accuracy of the test data, and deleting the base classifier with the weight value smaller than a preset threshold value while increasing according to the principle of increasing one base classifier at a time when increasing the base classifier. When the base classifier is reduced, the base classifier with the worst performance is deleted according to the threshold value. Finally, the number of base classifiers for the best ensemble classifier is determined.
As shown in fig. 4, S3 includes:
s301, for all active wireless communication channels in the time slice
Figure SMS_114
Randomly initializing its selection score between 0 and 1
Figure SMS_115
S302, each device related to the time slice collection data packet
Figure SMS_116
Calculating a selection score thereof>
Figure SMS_117
S303, utilizing equipment
Figure SMS_118
Selection of score->
Figure SMS_119
Obtaining and device>
Figure SMS_120
And selecting the communication channel with the highest selection score as a data packet acquisition channel for discovering the hidden monitoring device in the time slice.
If in S303, the wireless communication channel is active
Figure SMS_121
If there is a transmitting device, the maximum value of the selection scores of all the devices transmitting on the wireless channel is used as the channel->
Figure SMS_122
Is selected score of->
Figure SMS_123
S302 comprises the following steps:
s3021, if the slave equipment
Figure SMS_124
The issued data packet is greater than a preset threshold value>
Figure SMS_125
Then the device is asserted on that time slice>
Figure SMS_126
Is selected score->
Figure SMS_127
Set to 0;
s3022, if the slave device
Figure SMS_128
Issued data packets which are smaller than a preset threshold value>
Figure SMS_129
Picking device>
Figure SMS_130
Taking the data packet in the time slice as input, obtaining the device based on the device classification model established in the off-line stage in the step S1>
Figure SMS_131
The device type of (d); statistics of the device in the time slice>
Figure SMS_132
Is recorded as @, based on the average packet inter-arrival time>
Figure SMS_133
(ii) a Calculating device/s using the formula>
Figure SMS_134
The selection score of (2):
Figure SMS_135
wherein,
Figure SMS_136
indicating the last reception in the time slice from a device +>
Figure SMS_137
The time of the data packet of (a), device for combining or screening>
Figure SMS_138
Which is indicative of the current time of day,
Figure SMS_139
represents a pair->
Figure SMS_140
The result of the calculation of (a) is rounded up.
In S4, for any equipment, the center of the time window is defined as
Figure SMS_141
Which corresponds to the arrival time of the data packet and extracts the feature vector { -greater than or equal to the time period in accordance with step S102>
Figure SMS_142
Then the device type prediction probability is:
Figure SMS_143
where K is the number of device types,
Figure SMS_144
built for step S1 for a device type +>
Figure SMS_145
In the multi-classifier of (4), in>
Figure SMS_146
Is at a time slice>
Figure SMS_147
Classifying a device as +>
Figure SMS_148
The probability of (d); pick up the feature vector>
Figure SMS_149
Is flagged as +>
Figure SMS_150
Figure SMS_151
Within a given time period for discovering hidden monitoring devices
Figure SMS_152
And performing majority voting to obtain a final type prediction label of the equipment.
As shown in fig. 5, S5 includes:
s501, if the hidden monitoring device directly monitors the user (such as video recording or sound recording), when the user starts moving, the bit rate of the device transmission flow should be displayed to be obviously increased, and when the user stops, the bit rate should be displayed to be reduced. Therefore, the method and the device automatically extract the intervention time window by using the accelerometer on the intelligent device, record the correspondingly found wireless flow bit rate rising and falling conditions of the hidden monitoring device through multiple movements and stops of the user, judge whether the hidden monitoring device and the user are positioned in the same space, and realize coarse-grained positioning of the hidden monitoring device;
s502, collecting when the user walks in the detection environment
Figure SMS_153
A sample, where x and y are coordinates obtained by an inertial navigation estimation method with respect to an initial point where a user starts to walk, and RSS represents the signal strength of the hidden monitoring device found in step S4; and (3) performing grid division (for example, dividing into 0.5 m by 0.5 m grids) on the walking area of the user, calculating the average observed signal intensity value of each grid, and then selecting the center of the grid with the maximum average signal intensity value as the positioning result of the hidden monitoring equipment. By way of example, fig. 6 shows a user walking track area meshing schematic diagram, wherein each black point represents a walking coordinate point of a user. The walking area in fig. 6 is divided into four grids a, B, C and D, each grid is provided with a plurality of walking coordinate points, the average observation signal intensity values of different grids can be obtained by calculating the signal intensity of all the walking coordinate points in each grid, and the positioning result of the hidden monitoring device can be determined. For example, when the average observed signal strength value of grid a is greater than the average observed signal strength values of grids B, C, and D, grid a is used as the positioning result of the hidden monitoring device.
In S502, the grid for which no signal strength is observed is estimated based on the following steps:
first, for mesh that is not observed
Figure SMS_154
Selecting, centered on the gridRectangular area comprising N grids>
Figure SMS_155
Secondly, according to the spatial similarity of the wireless radio frequency information, grid coordinates are matched
Figure SMS_156
And its signal strength->
Figure SMS_157
The mapping function of (a) is expressed as follows:
Figure SMS_158
wherein,
Figure SMS_159
is a multi-quad radial basis function, a parameter->
Figure SMS_160
For the distance between two grids to be calculated, is->
Figure SMS_161
Represents->
Figure SMS_162
Grid to grid &>
Figure SMS_163
N is the number of meshes of the rectangular area;
Figure SMS_164
The following 3 rd order polynomial is used for calculation:
Figure SMS_165
wherein
Figure SMS_166
To estimate the parameters;
will be provided with
Figure SMS_167
Rewriting is in matrix form:
Figure SMS_168
Wherein:
Figure SMS_169
Figure SMS_170
Figure SMS_171
Figure SMS_172
c represents a matrix of the signal strengths of the grid,
Figure SMS_173
and expressing a radial basis function, substituting all networks with known signal strength in a rectangular area into the matrix equation, and calculating all estimation parameters.
In S502, the pairs
Figure SMS_174
The data set is fitted to a pattern->
Figure SMS_175
Sampling to generate a small-area grid (such as 1 x 1 cm) as a query point, generating a three-dimensional linear curved surface on each point based on triangulation interpolation, and extracting the maximum value of the area of the curved surface as a final positioning result of the device position. Illustratively, FIG. 7 shows a surface fitting graph for regional radio frequency signal strength estimation, dividing a walking region into an A region, a B region, a C region and a D region, and determining the walking region according to the area in each region
Figure SMS_176
The data set is fitted and,a corresponding->
Figure SMS_177
A curved surface. In the surface, the X, Y, axis represents the planar position of the query point, and the Z axis represents the signal strength of the query point. And then, the final positioning result of the equipment position can be determined according to the maximum value of the area of the curved surface.
In order to verify effectiveness, 50 hidden monitoring devices are selected for experimental testing in an actual scene, and the experimental testing is as follows: a camera: 25, the number of the channels is 25; 15 recording pens are arranged; a microphone: 10, each category having multiple devices of the same type, to avoid overfitting the experimental results to a particular supplier. The experimental environment included 4: 1) 50 square meters of office; 2) Apartment of 26 square meters and 35 square meters; 3) 300 square meters laboratory.
The experimental results are shown in the table below, and the experimental results show that the method can achieve the precision equivalent to the method assuming the whole network access.
Table 1 hidden monitoring device discovery and localization effects
Experimental Environment Number of deployed hidden monitoring devices Hidden monitoring device identification accuracy Concealing positioning errors of monitoring device
Office
22 95.45% 1.2m
Apartment units (26 flat rice) 12 91.7% 0.8m
Apartment single body (35 square meter) 18 94.5% 1.1m
Laboratory 50 96.0% 1.5m
In summary, the method and the device for detecting the hidden monitoring device in the space rapidly identify whether the hidden monitoring device exists in the space and perform accurate positioning by detecting whether the network flow mode specific to the hidden monitoring device exists in the environment, the detection process does not need to be accessed to a device network, does not need to provide any information for a user, can be deployed on a mobile phone or a tablet personal computer carried by the user, and have great social and economic benefits and values.

Claims (7)

1. A hidden monitoring device discovering and positioning method using wireless radio frequency signals is characterized by comprising the following steps:
s1, collecting transmission data packets of various hidden monitoring devices in an off-line stage, designing device identification characteristics by using inherent flow patterns and time fingerprints of different devices, and training a multi-classification model to find the classes of the hidden monitoring devices;
s2, setting a time period for discovering the hidden monitoring equipment, dividing the time period into a plurality of time slices with fixed lengths, adopting periodic polling to each time slice, and taking a communication channel receiving a polling reply beacon as an active communication channel;
s3, designing a self-adaptive frequency spectrum sensing method of the equipment, selecting a wireless communication channel for hiding the discovery and positioning of the monitoring equipment from all active communication channels of each time slice, and collecting all wireless flow data packets of the communication channel;
s4, grouping the wireless flow data packets collected in the step S3 according to the physical addresses of the devices, and inputting each group of wireless flow data packets into the device classification model established in the step S1 to obtain the device types corresponding to the group of wireless flow data packets;
s5, in the step S4 of detecting the environment movement record, hiding the rising and falling conditions of the wireless flow bit rate of the monitoring equipment, and carrying out coarse-grained position location on the hidden monitoring equipment; then, combining the wireless signal strength measurement value with an inertial ranging technology to obtain a final positioning result of the hidden monitoring equipment;
s1 comprises the following steps:
s101, when different monitoring devices communicate with a gateway, the gateway records a plurality of communication data traffic packets of different monitoring device setting stages, and analyzes traffic packet metadata, wherein attribute information extracted from each data packet comprises: the length of the physical address frame; controlling a frame; a duration of time; a physical address of a network access point; a source device physical address; a physical address of the destination device; a link layer protocol; a transport layer protocol; packet length; an IP address;
s102, constructing time aggregation characteristics for each attribute information; designing a multi-time scale feature scheme to select a time window suitable for each device transmission mode; first, a maximum sensing time window is defined
Figure QLYQS_1
For each characteristic attribute, for each time instant +>
Figure QLYQS_2
Defining different time offsets>
Figure QLYQS_3
To set time windows of different lengths>
Figure QLYQS_4
In which>
Figure QLYQS_5
(ii) a Calculating the characteristics of each attribute in each time window by using an aggregation function according to the attribute information of each time window, and splicing and connecting calculation results in series to obtain the equipment identification characteristics of the window; the aggregation function specifically comprises an average value, a standard deviation, a median, a maximum value, a minimum value, a sum, an entropy and a histogram;
s103, standardizing the time aggregation characteristics, and eliminating the correlation redundant characteristics;
s104, for each monitoring device
Figure QLYQS_8
The gateway also records data packets &fromthe device>
Figure QLYQS_10
Is reached time->
Figure QLYQS_14
Adding it to a sequence of arrival times in data packets->
Figure QLYQS_7
End of (3); l is a preset empirical threshold, and when the gateway receives L +1 slave devices->
Figure QLYQS_11
In a data packet>
Figure QLYQS_13
Figure QLYQS_16
,…,
Figure QLYQS_6
Then utilize->
Figure QLYQS_9
Counting a sequence of data packet arrival intervals>
Figure QLYQS_12
Wherein is present>
Figure QLYQS_15
The calculation method is as follows:
Figure QLYQS_17
s105, calculating time interval sequencePAIThe distribution characteristics are obtained by the sectional density, and the calculation method comprises the following steps: time interval
Figure QLYQS_18
Is averagely divided into>
Figure QLYQS_19
A sub-time interval; calculating outPAIThe number of the middle time interval falling in each sub-interval is recorded as
Figure QLYQS_20
(ii) a Order toSUMIs composed ofPAIIn which the time interval falls in a time interval +>
Figure QLYQS_21
The segment density calculation method is as follows:
Figure QLYQS_22
the device is
Figure QLYQS_23
Dimension sequence->
Figure QLYQS_24
Is recorded as device>
Figure QLYQS_25
The time fingerprint of (a);
s106, for each data packet, the time aggregation characteristics and the time series distribution characteristics processed in the step S103 are processed
Figure QLYQS_26
Splicing to form a sample characteristic vector, and establishing a hidden monitoring equipment classification model by adopting the following method: constructing an integrated classifier by using a Hough tree as a base classifier, creating a classifier pool, and training an example; detecting by using a fast Hough drift detection method when a data stream is input, caching a current data stream instance into a window if concept drift occurs, resetting a current base classifier, retraining the base classifier by using the instance in the window, and adding the base classifier into a classifier pool; updating the base classifier according to the classification accuracy of the test data, and deleting the base classifier with the weight value smaller than a preset threshold while increasing according to the principle of increasing one base classifier at a time when increasing the base classifiers; when the base classifiers are reduced, deleting the base classifier with the worst performance according to a threshold value; finally, the number of base classifiers for the best ensemble classifier is determined.
2. The hidden monitoring device discovering and locating method using wireless radio frequency signals according to claim 1, wherein S3 comprises:
s301, for all active wireless communication channels in the time slice
Figure QLYQS_27
Initializing its selection score randomly between 0 and 1>
Figure QLYQS_28
S302, each device related to the time slice collection data packet
Figure QLYQS_29
Calculate its selection score
Figure QLYQS_30
S303, utilization equipment
Figure QLYQS_31
Is selected score->
Figure QLYQS_32
Get and device->
Figure QLYQS_33
And selecting the communication channel with the highest selection score as a data packet acquisition channel for discovering the hidden monitoring device in the time slice.
3. The hidden monitoring device discovering and locating method according to claim 2 utilizing wireless radio frequency signals, wherein S302 comprises:
s3021, if the slave device
Figure QLYQS_34
The issued data packet is greater than a preset threshold value>
Figure QLYQS_35
Then the device on that time slice is taken>
Figure QLYQS_36
Selection of score->
Figure QLYQS_37
Set to 0;
s3022, if the slave device
Figure QLYQS_38
Issued data packets which are smaller than a preset threshold value>
Figure QLYQS_39
Extracting device
Figure QLYQS_40
Taking the data packet in the time slice as input, obtaining the device based on the device classification model established in the off-line stage in the step S1>
Figure QLYQS_41
The device type of (d); statistics of the device in the time slice>
Figure QLYQS_42
Is counted as ≧ based on the average packet inter-arrival time>
Figure QLYQS_43
(ii) a Calculating device/s using the formula>
Figure QLYQS_44
Selection score of (2):
Figure QLYQS_45
wherein,
Figure QLYQS_46
indicating the last reception in the time slice from a device +>
Figure QLYQS_47
The time of the data packet of (a), device for selecting or keeping>
Figure QLYQS_48
Which is indicative of the current time of day,
Figure QLYQS_49
representing a pair>
Figure QLYQS_50
The result of the calculation of (a) is rounded up.
4.The hidden monitoring device discovering and locating method according to claim 1 wherein in S4, for any device, the center of the time window is defined as
Figure QLYQS_51
Corresponding to the packet arrival time and extracting a feature vector { (R) } for the time segment according to step S102>
Figure QLYQS_52
Then the device type prediction probability is:
Figure QLYQS_53
where K is the number of device types,
Figure QLYQS_54
device type for which step S1 is designed>
Figure QLYQS_55
In conjunction with a classifier, in combination with a classifier>
Figure QLYQS_56
Is at a time slice->
Figure QLYQS_57
Classifying a device as->
Figure QLYQS_58
The probability of (d); pick up the feature vector>
Figure QLYQS_59
Is flagged as +>
Figure QLYQS_60
Figure QLYQS_61
Within a given time period for discovering hidden monitoring devices
Figure QLYQS_62
And performing majority voting to obtain a final type prediction label of the equipment.
5. The hidden monitoring device discovering and locating method according to claim 1 utilizing wireless radio frequency signals, wherein S5 comprises:
s501, an intervention time window is automatically extracted by an accelerometer on intelligent equipment, the rising and falling conditions of the wireless flow bit rate of the hidden monitoring equipment correspondingly found are recorded through multiple movements and stops of a user, whether the hidden monitoring equipment and the user are located in the same space or not is judged, and coarse-grained positioning of the hidden monitoring equipment is achieved;
s502, collecting when the user walks in the detection environment
Figure QLYQS_63
A sample, wherein x and y are coordinates relative to an initial point where a user starts to walk obtained by an inertial navigation calculation method, and RSS represents the signal strength of the hidden monitoring device found in step S4; and carrying out grid division on a walking area of the user, calculating an average observation signal intensity value of each grid, and selecting a grid center with the maximum average signal intensity value as a positioning result of the hidden monitoring equipment.
6. The hidden monitoring device discovering and locating method according to claim 5 wherein in S502, the grid without observed signal strength is estimated based on the following steps:
first, for mesh that is not observed
Figure QLYQS_64
Selecting a rectangular region including N meshes centering on the mesh
Figure QLYQS_65
Secondly, according to the spatial similarity of the wireless radio frequency information, grid coordinates are matched
Figure QLYQS_66
And its signal strength->
Figure QLYQS_67
The mapping function of (a) is expressed as follows:
Figure QLYQS_68
wherein,
Figure QLYQS_69
is a multi-quad radial basis function, a parameter->
Figure QLYQS_70
For the distance between two grids to be calculated>
Figure QLYQS_71
Represents->
Figure QLYQS_72
Grid to grid->
Figure QLYQS_73
N is the number of meshes of the rectangular region;
Figure QLYQS_74
The following polynomial of order 3 is used for calculation:
Figure QLYQS_75
wherein
Figure QLYQS_76
To estimate the parameters;
will be provided with
Figure QLYQS_77
Rewriting as matrix form:
Figure QLYQS_78
Wherein:
Figure QLYQS_79
Figure QLYQS_80
Figure QLYQS_81
Figure QLYQS_82
c represents a matrix of the strength of the grid signal,
Figure QLYQS_83
and expressing a radial basis function, substituting all networks with known signal strength in a rectangular area into the matrix equation, and calculating all estimation parameters.
7. The hidden monitoring device discovering and locating method according to claim 6 wherein in S502 zones are gridded
Figure QLYQS_84
The data set is fitted to a pattern->
Figure QLYQS_85
Sampling to generate a small-area mesh as a query point, and triangulating the small-area mesh on each pointAnd (4) generating a three-dimensional linear curved surface by interpolation, and extracting the maximum value of the area of the curved surface as a final positioning result of the equipment position. />
CN202211504490.XA 2022-11-29 2022-11-29 Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal Active CN115623531B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211504490.XA CN115623531B (en) 2022-11-29 2022-11-29 Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211504490.XA CN115623531B (en) 2022-11-29 2022-11-29 Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal

Publications (2)

Publication Number Publication Date
CN115623531A CN115623531A (en) 2023-01-17
CN115623531B true CN115623531B (en) 2023-03-31

Family

ID=84879556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211504490.XA Active CN115623531B (en) 2022-11-29 2022-11-29 Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal

Country Status (1)

Country Link
CN (1) CN115623531B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118714567A (en) * 2024-08-28 2024-09-27 中国科学院信息工程研究所 Equipment identification and access method and device based on radio frequency information and network traffic

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014210246A1 (en) * 2013-06-28 2014-12-31 Mcafee, Inc. Rootkit detection by using hardware resources to detect inconsistencies in network traffic
CN108718257A (en) * 2018-05-23 2018-10-30 浙江大学 A kind of wireless camera detection and localization method based on network flow
CN109581282A (en) * 2018-11-06 2019-04-05 宁波大学 Indoor orientation method based on the semi-supervised deep learning of Bayes
CN112073988A (en) * 2020-07-31 2020-12-11 中国科学院信息工程研究所 Detection method for hidden camera in local area network
WO2021114231A1 (en) * 2019-12-11 2021-06-17 中国科学院深圳先进技术研究院 Training method and detection method for network traffic anomaly detection model
CN113873674A (en) * 2015-11-05 2021-12-31 索尼公司 Electronic device in wireless communication system and method for wireless communication
WO2022116420A1 (en) * 2020-12-01 2022-06-09 平安科技(深圳)有限公司 Speech event detection method and apparatus, electronic device, and computer storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014210246A1 (en) * 2013-06-28 2014-12-31 Mcafee, Inc. Rootkit detection by using hardware resources to detect inconsistencies in network traffic
CN113873674A (en) * 2015-11-05 2021-12-31 索尼公司 Electronic device in wireless communication system and method for wireless communication
CN108718257A (en) * 2018-05-23 2018-10-30 浙江大学 A kind of wireless camera detection and localization method based on network flow
CN109581282A (en) * 2018-11-06 2019-04-05 宁波大学 Indoor orientation method based on the semi-supervised deep learning of Bayes
WO2021114231A1 (en) * 2019-12-11 2021-06-17 中国科学院深圳先进技术研究院 Training method and detection method for network traffic anomaly detection model
CN112073988A (en) * 2020-07-31 2020-12-11 中国科学院信息工程研究所 Detection method for hidden camera in local area network
WO2022116420A1 (en) * 2020-12-01 2022-06-09 平安科技(深圳)有限公司 Speech event detection method and apparatus, electronic device, and computer storage medium

Also Published As

Publication number Publication date
CN115623531A (en) 2023-01-17

Similar Documents

Publication Publication Date Title
Abdelnasser et al. SemanticSLAM: Using environment landmarks for unsupervised indoor localization
US11164329B2 (en) Multi-channel spatial positioning system
JP5495235B2 (en) Apparatus and method for monitoring the behavior of a monitored person
Wittenburg et al. A system for distributed event detection in wireless sensor networks
US10198625B1 (en) Association of unique person to a mobile device using repeat face image matching
Zhang et al. Ev-loc: integrating electronic and visual signals for accurate localization
CN104335564B (en) For identify and analyze user personal scene system and method
TWI587717B (en) Systems and methods for adaptive multi-feature semantic location sensing
CN107223332A (en) Audio-visual scene analysis based on acoustics camera
US9167554B1 (en) Method and system for tracking communication devices in a radio communication network in a facility
Singh et al. Ensemble based real-time indoor localization using stray WiFi signal
Tang et al. Indoor crowd density estimation through mobile smartphone wi-fi probes
CN115623531B (en) Hidden monitoring equipment discovering and positioning method using wireless radio frequency signal
CN111294728A (en) Method and device for analyzing same lines
Higuchi et al. Mobile devices as an infrastructure: A survey of opportunistic sensing technology
Ding et al. Counting human objects using backscattered radio frequency signals
Ravi et al. Fiatlux: Fingerprinting rooms using light intensity
Alawami et al. LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics
Liu et al. Vi-Fi: Associating moving subjects across vision and wireless sensors
Luo et al. Indoor smartphone SLAM with learned echoic location features
Marakkalage et al. Identifying indoor points of interest via mobile crowdsensing: An experimental study
Teng et al. EV: Efficient visual surveillance with electronic footprints
Van Hyfte et al. Immediate proximity detection using wi-fi–enabled smartphones
Shad et al. Precise location acquisition of mobility data using cell-id
CN115696195A (en) Position semantic fingerprint database construction method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant