Toward Multi-User Authentication Using WiFi Signals

被引:2
|
作者
Kong, Hao [1 ]
Lu, Li [2 ,3 ,4 ]
Yu, Jiadi [1 ]
Chen, Yingying [5 ,6 ]
Xu, Xiangyu [7 ]
Lyu, Feng [8 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310027, Peoples R China
[3] Zhejiang Univ, Key Lab Blockchain & Cyberspace Governance Zhejian, Hangzhou 310027, Peoples R China
[4] ZJU Hangzhou Global Sci & Technol Innovat Ctr, Hangzhou 311200, Peoples R China
[5] Rutgers State Univ, Wireless Informat Network Lab WINLAB, New Brunswick, NJ 08854 USA
[6] Rutgers State Univ, Dept Elect & Comp Engn, New Brunswick, NJ 08854 USA
[7] Southeast Univ, Sch Comp Sci & Engn, Nanjing 211189, Peoples R China
[8] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless fidelity; Authentication; Covariance matrices; Feature extraction; Time of arrival estimation; Signal resolution; Matrix decomposition; WiFi signals; multi-user authentication; multipath profiling; individual CSI construction;
D O I
10.1109/TNET.2023.3237686
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication nowadays has become an important support for not only security guarantees but also emerging novel applications. Although WiFi signal-based user authentication has achieved initial success, it works in single-user scenarios while multi-user authentication remains a challenging task. In this paper, we present MultiAuth, a multi-user authentication system that can authenticate multiple users with a single pair of commodity WiFi devices. The basic idea is to profile multipath components of WiFi signals, and leverage the multipath components to characterize each user individually for multi-user authentication. MultiAuth first profiles multipath components of WiFi signals through a proposed MUltipath Time-of-Arrival estimation algorithm (MUTA). Then, after matching corresponding multipath components to each user in complex multi-user scenarios, MultiAuth constructs individual CSI based on the multipath components to characterize each user individually. An AoA-based approach is exploited to further separate individual CSI constructed by the users with same ToA. To identify users through their activities, MultiAuth extracts user behavior profiles based on the individual CSI, and leverages a dual-task neural network for robust user authentication. Extensive experiments involving 3 simultaneously present users demonstrate that MultiAuth is effective in multi-user authentication with 86.2% average accuracy and 9.5% average false accept rate.
引用
收藏
页码:2117 / 2132
页数:16
相关论文
共 50 条
  • [31] Research for multi-user wearable monitor system of physiological signals
    Tu, Qiaoling
    2007 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS AND AUTOMATION, VOLS I-V, CONFERENCE PROCEEDINGS, 2007, : 2721 - 2725
  • [32] SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems
    Chen, Jiayi
    Hengartner, Urs
    Khan, Hassan
    COMPUTERS & SECURITY, 2024, 137
  • [33] User Authentication leveraging behavioral information using Commodity WiFi devices
    Yang, Shulin
    Wang, Yantong
    Yu, Xiaoxiao
    Gu, Yu
    Ren, Fuji
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 530 - 535
  • [34] Toward Interactive Multi-User Extended Reality Using Millimeter-Wave Networking
    Struye, Jakob
    Van Damme, Sam
    Bhat, Nabeel Nisar
    Troch, Arno
    Van Liempd, Barend
    Assasa, Hany
    Lemic, Filip
    Famaey, Jeroen
    Vega, Maria Torres
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (08) : 54 - 60
  • [35] Your Breath Doesn't Lie: Multi-user Authentication by Sensing Respiration Using mmWave Radar
    Wang, Yao
    Gu, Tao
    Luan, Tom H.
    Yu, Yong
    2022 19TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2022, : 64 - 72
  • [36] Non-Cooperative High-Efficiency Multi-User Ranging Using OFDM Signals
    Yazgan, Mehmet
    Arslan, Huseyin
    Vakalis, Stavros
    2024 IEEE WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE, WAMICON, 2024,
  • [37] Reinventing Multi-User Authentication Security From Cross-Chain Perspective
    Lv, Yongyang
    Feng, Ruitao
    Ma, Maode
    Zhu, Manqing
    Wu, Hanwei
    Li, Xiaohong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8908 - 8923
  • [38] Efficient encrypted image retrieval in IoT-cloud with multi-user authentication
    Al Sibahee, Mustafa A.
    Lu, Songfeng
    Abduljabbar, Zaid Ameen
    Ibrahim, Ayad
    Hussien, Zaid Alaa
    Mutlaq, Keyan Abdul-Aziz
    Hussain, Mohammed Abdulridha
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (02):
  • [39] Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits
    Arafin, Md Tanvir
    Qu, Gang
    2016 INTERNATIONAL GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI), 2016, : 169 - 174
  • [40] Turbo multi-user receiver for asynchronous multi-user OFDM systems
    Jung, HJ
    Zoltowski, MD
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 693 - 696