Toward Robust and Effective Behavior Based User Authentication With Off-the-Shelf Wi-Fi

被引:0
|
作者
Zhang, Lei [1 ,2 ,3 ]
Jiang, Yunzhe [1 ,2 ]
Ma, Yazhou [1 ,2 ]
Mao, Shiwen [4 ]
Huang, Wenyuan [1 ,2 ]
Yu, Zhiyong [5 ]
Zheng, Xiao [6 ,7 ]
Shu, Lin [8 ]
Fan, Xiaochen [9 ,10 ]
Xu, Guangquan [1 ,2 ]
Dong, Changyu [11 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin 300050, Peoples R China
[2] Tianjin Univ, Tianjin Key Lab Adv Network Technol & Applicat, Tianjin 300050, Peoples R China
[3] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Peoples R China
[4] Auburn Univ, Dept Elect & Comp Engn, Auburn, AL 36849 USA
[5] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350108, Fujian, Peoples R China
[6] Anhui Univ Technol, Sch Comp Sci & Technol, Maanshan 243032, Anhui, Peoples R China
[7] Anhui Engn Res Ctr Intelligent Applicat & Secur In, Maanshan 243032, Peoples R China
[8] South China Univ Technol, Sch Future Technol, Guangzhou 510641, Peoples R China
[9] Tsinghua Univ, Inst Elect & Informat Technol Tianjin, Tianjin 300467, Peoples R China
[10] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[11] Guangzhou Univ, Inst Artificial Intelligence, Guangzhou 510700, Peoples R China
关键词
Authentication; Wireless fidelity; Passwords; Libraries; Computational modeling; Adaptation models; Training data; Wi-Fi; channel state information; action recognition; cross-environment; GAIT;
D O I
10.1109/TIFS.2024.3428367
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Behavior-based Wi-Fi user authentication has gained popularity in user-centered smart systems. However, its wide adoption has been hindered by certain critical issues, including significant performance degradation when the environment changes, the inability to handle unknown activities, and weak security due to basing authentication on the recognition of a single, one-off activity. In this paper, we propose Wi-Dist, which authenticates a user using a behavior password, i.e. a pre-chosen sequence of activities. Wi-Dist addressed the previously mentioned technical challenges through a cross-layer joint optimization framework. In particular, we address environment dependency by incorporating adversarial learning and optimizing both the signal layer and the domain adaptation layer. This enhances the performance of the learned model across various environments. To effectively handle unknown behaviors, we utilize an adversarial learning-based network. This network establishes a pseudo-decision boundary between samples from known and unknown sources, ensuring robust authentication. Additionally, for authentication using continuous activities, we employ double-sliding windows activity monitoring. This approach, coupled with activity state correction, partitions activities for accurate recognition. We also conducted extensive experiments in indoor environments to demonstrate that Wi-Dist is effective and robust.
引用
收藏
页码:8731 / 8746
页数:16
相关论文
共 50 条
  • [31] Smartphone-based user positioning in a multiple-user context with Wi-Fi and Bluetooth
    Viet-Cuong Ta
    Trung-Kien Dao
    Vaufreydaz, Dominique
    Castelli, Eric
    2018 NINTH INTERNATIONAL CONFERENCE ON INDOOR POSITIONING AND INDOOR NAVIGATION (IPIN 2018), 2018,
  • [32] Wi-Fi Based User Identification Using In-Air Handwritten Signature
    Jung, Junsik
    Moon, Han-Cheol
    Kim, Jooyoung
    Kim, Donghyun
    Toh, Kar-Ann
    IEEE ACCESS, 2021, 9 : 53548 - 53565
  • [33] Enhancement to the Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems
    Barriga A, Jhonattan J.
    Yoo, Sang Guun
    Polo, Juan Carlos
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, 2019, 11605 : 143 - 155
  • [34] Time-based One-Time Password for Wi-Fi Authentication and Security
    Sudar, Chandramohan
    Arjun, S. K.
    Deepthi, L. R.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1212 - 1215
  • [35] Robust Recognition of Indoor Educational Activity Based on Wi-Fi Signals with SSGAN
    Zhao, Jian
    Li, Xin
    Huang, Liang
    Chong, Shangwu
    Jia, Jian
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (07): : 1543 - 1552
  • [36] Robust Wi-Fi fingerprinting-based positioning in the presence of lying identities
    Lu, Wei-Chung
    Yeh, Shih-Chun
    Chuang, Chung-Chih
    Fang, Shih-Hau
    2018 INTERNATIONAL JOINT CONFERENCE ON MATERIALS SCIENCE AND MECHANICAL ENGINEERING, 2018, 383
  • [37] A Robust Dead Reckoning Algorithm Based on Wi-Fi FTM and Multiple Sensors
    Yu, Yue
    Chen, Ruizhi
    Chen, Liang
    Guo, Guangyi
    Ye, Feng
    Liu, Zuoya
    REMOTE SENSING, 2019, 11 (05)
  • [38] Optimal MRUs Allocation Mechanism Based on User Priority for Wi-Fi 7 Network
    Pan, Jialiang
    He, Rong
    Lin, Yang
    Fang, Xuming
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 359 - 364
  • [39] Implementation of A User Account Provisioning System Based on NFC for Public Wi-Fi Services
    Nobu, Yusuke
    Takeda, Keiji
    Yamaki, Hirofumi
    2015 International Conference on Computer Application Technologies (CCATS), 2015, : 114 - 117
  • [40] Wi-Fi Fingerprint-Based Topological Map Building for Indoor User Tracking
    Shin, Hyojeong
    Cha, Hojung
    16TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA 2010), 2010, : 105 - 113