RFPass: Towards Environment-Independent Gait-based User Authentication Leveraging RFID

被引:5
|
作者
Chen, Yunzhong [1 ]
Yu, Jiadi [1 ]
Kong, Linghe [1 ]
Zhu, Yanmin [1 ]
Tang, Feilong [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
关键词
RECOGNITION;
D O I
10.1109/SECON55815.2022.9918573
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Gait-based user authentication schemes have been widely explored because of their ability of non-invasive sensing and avoid replay attacks. However, existing gait-based user authentication methods are environment-dependent. In this paper, we present an environment-independent gait-based user authentication system, RFPass, which can identify different individuals leveraging RFID signals. Specifically, we find that Doppler shift of RF signals can describe environment-independent gait features for different individuals. In RFPass, when a user walks through the RFPass system, RF signals are first collected by a deployed RFID tag array. Then, RFPass removes environmental interference from the collected RF signals through a proposed Multipath Direction of arrival (DoA) Signal Select (MDSS) algorithm. Next, we construct an environment-independent gait profile to describe the user's walking movements. Afterward, environment-independent gait features are extracted by a proposed CNN-RNN model. Based on the extracted gait features, a trained model is constructed for user authentication and spoofer detection. Extensive experiments in different real environments demonstrate that RFPass can achieve environment-independent gait-based user authentication.
引用
收藏
页码:289 / 297
页数:9
相关论文
共 50 条
  • [41] Extended Sammon Projection and Wavelet Kernel Extreme Learning Machine for Gait-based Legitimate User Identification
    Ahmad, Muhammad
    Khan, Adil Mehmood
    Mazzara, Manuel
    Distefano, Salvatore
    Ali, Amjad
    Tufail, Ali
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1216 - 1219
  • [42] KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting
    Xu, Weitao
    Lan, Guohao
    Lin, Qi
    Khalifa, Sara
    Bergmann, Neil
    Hassan, Mahbub
    Hu, Wen
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [43] Towards Environment-Independent Activity Recognition Using Wi-Fi CSI with an Encoder-Decoder Network
    Sugimoto, Yu
    Rizk, Hamada
    Uchiyama, Akira
    Yamaguchi, Hirozumi
    PROCEEDINGS OF THE 2023 8TH WORKSHOP ON BODY-CENTRIC COMPUTING SYSTEMS, BODYSYS 2023, 2023, : 13 - 18
  • [44] Towards an Efficient Scheme for User Authentication based on Decentralized Blockchain
    Singh, Narayani
    Patekar, Rahul
    Kedia, Gaurav
    Tirpude, Neha
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2023, 14 (01): : 321 - 329
  • [45] Poster: Towards Practical Brainwave-based User Authentication
    Fallahi, Matin
    Arias-Cabarcos, Patricia
    Strufe, Thorsten
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3627 - 3629
  • [46] Biometric based User Authentication Protocol for Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasalu
    2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [47] Towards Behavior-Independent in-hand User Authentication on Smartphone Using Vibration
    Song, Wei
    Wang, Min
    Wu, Yuezhong
    Chou, Chun Tung
    Hu, Jiankun
    Hu, Wen
    PROCEEDINGS OF THE 2022 THE 28TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2022, 2022, : 844 - 846
  • [48] User Authentication Protocol Based on the Location Factor for a Mobile Environment
    Bartlomiejczyk, Maciej
    El Fray, Imed
    Kurkowski, Miroslaw
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    IEEE ACCESS, 2022, 10 : 16439 - 16455
  • [49] Trusted computing based open environment user authentication model
    Cyber Security Cluster, MIMOS Berhad, Technology Park Malaysia, Kuala Lumpur, Malaysia
    不详
    ICACTE - Int. Conf. Adv. Comput. Theory Eng., Proc., (V6487-V6491):
  • [50] Password-based user authentication protocol for mobile environment
    Moon, Sung-Won
    Kim, Young-Gab
    Moon, Chang-Joo
    Baik, Doo-Kwon
    Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753