Secure User Authentication Leveraging Keystroke Dynamics via Wi-Fi Sensing

被引:14
|
作者
Gu, Yu [1 ,2 ]
Wang, Yantong [1 ,2 ]
Wang, Meng [1 ,2 ]
Pan, Zulie [3 ,4 ]
Hu, Zhihao [3 ,4 ]
Liu, Zhi [5 ]
Shi, Fan [3 ,4 ]
Dong, Mianxiong [6 ]
机构
[1] Hefei Univ Technol, Anhui Prov Key Lab Affect Comp & Adv Intelligence, Hefei 230009, Peoples R China
[2] Hefei Univ Technol, Sch Comp & Informat, Hefei 230009, Peoples R China
[3] Natl Univ Def Technol, Coll Elect Engn, Hefei 230047, Peoples R China
[4] Anhui Prov Key Lab Cyberspace Secur Situat Awaren, Hefei 230037, Peoples R China
[5] Univ Electrocommun, Dept Comp & Network Engn, Tokyo 1828585, Japan
[6] Muroran Inst Technol, Dept Sci & Informat, Muroran, Hokkaido 0508585, Japan
基金
中国国家自然科学基金;
关键词
Authentication; Wireless fidelity; Support vector machines; Password; Fading channels; Informatics; Feature extraction; Behavioral features; channel state information (CSI); convolutional neural network (CNN); Ricean distribution; user authentication; SYSTEM;
D O I
10.1109/TII.2021.3108850
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication plays a critical role in access control of a man-machine system, where the knowledge factor, such as a personal identification number, constitutes the most widely used authentication element. However, knowledge factors are usually vulnerable to the spoofing attack. Recently, the inheritance factor, such as fingerprints, emerges as an efficient alternative resilient to malicious users, but it normally requires special equipment. To this end, in this article, we propose WiPass, a device-free authentication system only leveraging the pervasive Wi-Fi infrastructure to explore keystroke dynamics (manner and rhythm of keystrokes) captured by the channel state information to recognize legitimate users while rejecting spoofers. However, it remains an open challenge to characterize the behavioral features hidden in the human subtle motions, such as keystrokes. Therefore, we build a signal enhancement model using Ricean distribution to amplify user keystroke dynamics and a hybrid learning model for user authentication, which consists of two parts, i.e., convolutional neural network based feature extraction and support vector machine based classification. The former relies on visualizing the channel responses into time-series images to learn the behavioral features of keystrokes in energy and spectrum domains, whereas the latter exploits such behavioral features for user authentication. We prototype WiPass on the low-cost off-the-shelf Wi-Fi devices and verify its performance. Empirical results show that WiPass achieves on average 92.1% authentication accuracy, 5.9% false accept rate, and 6.3% false reject rate in three real environments.
引用
收藏
页码:2784 / 2795
页数:12
相关论文
共 50 条
  • [41] Secure Hotspot A Novel Approach to Secure Public Wi-Fi Hotspot
    Raju, Laiju K.
    Nair, Reena
    2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 642 - 646
  • [42] Wi-Fi and Radar Fusion for Head Movement Sensing Through Walls Leveraging Deep Learning
    Hameed, Hira
    Tahir, Ahsen
    Usman, Muhammad
    Zhu, Jiang
    Lubna
    Abbas, Hasan
    Ramzan, Naeem
    Cui, Tie Jun
    Imran, Muhammad Ali
    Abbasi, Qammer H.
    IEEE SENSORS JOURNAL, 2024, 24 (09) : 14952 - 14961
  • [43] A Scalable Multi-User Uplink for Wi-Fi
    Flores, Adriana B.
    Quadri, Sadia
    Knightly, Edward W.
    13TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '16), 2016, : 179 - 191
  • [44] User-Aware DASH over Wi-Fi
    Chen, Wei
    Ma, Liangping
    Sternberg, Gregory
    Reznik, Yuriy A.
    Shen, Chien-Chung
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 749 - 753
  • [45] Leveraging community Wi-Fi and spaces for digital health use
    Spaulding, Erin M.
    Miller, Hailey N.
    Metlock, Faith E.
    Chepkorir, Joyline
    Benjasirisan, Chitchanok
    Hladek, Melissa D.
    Han, Hae-Ra
    FRONTIERS IN PUBLIC HEALTH, 2024, 12
  • [46] The Wi-Fi Device Authentication Method based on Information Hiding
    Liu, Wei
    Yan, Zhehao
    He, Yunhua
    2018 15TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS (I-SPAN 2018), 2018, : 80 - 86
  • [47] The identity authentication of Wi-Fi system based on network security
    Tao, Hao
    ANNALS OF TELECOMMUNICATIONS, 2021, 76 (5-6) : 313 - 320
  • [48] The identity authentication of Wi-Fi system based on network security
    Hao Tao
    Annals of Telecommunications, 2021, 76 : 313 - 320
  • [49] Secure and Robust User Authentication Using Transfer Learning and CTGAN-based Keystroke Dynamics
    AbdelRaouf, Hussien
    Fouda, Mostafa M.
    Ibrahem, Mohamed I.
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [50] Public Wi-Fi Monetization via Advertising
    Yu, Haoran
    Cheung, Man Hon
    Gao, Lin
    Huang, Jianwei
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (04) : 2110 - 2121