Toward Multi-User Authentication Using WiFi Signals

被引:2
|
作者
Kong, Hao [1 ]
Lu, Li [2 ,3 ,4 ]
Yu, Jiadi [1 ]
Chen, Yingying [5 ,6 ]
Xu, Xiangyu [7 ]
Lyu, Feng [8 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310027, Peoples R China
[3] Zhejiang Univ, Key Lab Blockchain & Cyberspace Governance Zhejian, Hangzhou 310027, Peoples R China
[4] ZJU Hangzhou Global Sci & Technol Innovat Ctr, Hangzhou 311200, Peoples R China
[5] Rutgers State Univ, Wireless Informat Network Lab WINLAB, New Brunswick, NJ 08854 USA
[6] Rutgers State Univ, Dept Elect & Comp Engn, New Brunswick, NJ 08854 USA
[7] Southeast Univ, Sch Comp Sci & Engn, Nanjing 211189, Peoples R China
[8] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless fidelity; Authentication; Covariance matrices; Feature extraction; Time of arrival estimation; Signal resolution; Matrix decomposition; WiFi signals; multi-user authentication; multipath profiling; individual CSI construction;
D O I
10.1109/TNET.2023.3237686
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication nowadays has become an important support for not only security guarantees but also emerging novel applications. Although WiFi signal-based user authentication has achieved initial success, it works in single-user scenarios while multi-user authentication remains a challenging task. In this paper, we present MultiAuth, a multi-user authentication system that can authenticate multiple users with a single pair of commodity WiFi devices. The basic idea is to profile multipath components of WiFi signals, and leverage the multipath components to characterize each user individually for multi-user authentication. MultiAuth first profiles multipath components of WiFi signals through a proposed MUltipath Time-of-Arrival estimation algorithm (MUTA). Then, after matching corresponding multipath components to each user in complex multi-user scenarios, MultiAuth constructs individual CSI based on the multipath components to characterize each user individually. An AoA-based approach is exploited to further separate individual CSI constructed by the users with same ToA. To identify users through their activities, MultiAuth extracts user behavior profiles based on the individual CSI, and leverages a dual-task neural network for robust user authentication. Extensive experiments involving 3 simultaneously present users demonstrate that MultiAuth is effective in multi-user authentication with 86.2% average accuracy and 9.5% average false accept rate.
引用
收藏
页码:2117 / 2132
页数:16
相关论文
共 50 条
  • [1] IMar: Multi-user Continuous Action Recognition with WiFi Signals
    He, Jing
    Yang, Wei
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2022, 6 (03):
  • [2] Multi-User Gesture Recognition Using WiFi
    Venkatnarayan, Raghav H.
    Page, Griffin
    Shahzad, Muhammad
    MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2018, : 401 - 413
  • [3] Multi-WiIR: Multi-User Identity Legitimacy Authentication Based on WiFi Device
    Wei, Zhongcheng
    Dong, Yanhu
    FUTURE INTERNET, 2024, 16 (04)
  • [4] WiFi based Multi-User Gesture Recognition
    Venkatnarayan, Raghav H.
    Mahmood, Shakir
    Shahzad, Muhammad
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (03) : 1242 - 1256
  • [5] Continuous User Authentication using WiFi
    Huang, Pengcheng
    Zhang, Dongheng
    Geng, Ruixu
    Chen, Yan
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 2083 - 2088
  • [6] MultiTrack: Multi-User Tracking and Activity Recognition Using Commodity WiFi
    Tan, Sheng
    Zhang, Linghan
    Wang, Zi
    Yang, Jie
    CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [7] Keystroke dynamics in password authentication for multi-user account
    Department of Computer Science and Technology, Tongji University, Shanghai, China
    不详
    J. Comput. Inf. Syst., 1 (321-331): : 321 - 331
  • [8] Multi-user broadcast authentication in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, : 223 - +
  • [9] Certificateless Authentication Searchable Encryption Scheme for Multi-user
    Zhang Yulei
    Wen Long
    Wang Haohao
    Zhang Yongjie
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (05) : 1094 - 1101
  • [10] Multi-User Physical-Layer Authentication and Classification
    Xie, Ning
    Sha, Mingrui
    Hu, Tianxing
    Tan, Haijun
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (09) : 6171 - 6184