skip to main content
research-article
Public Access

WiFi-Enabled User Authentication through Deep Learning in Daily Activities

Published: 04 May 2021 Publication History

Abstract

User authentication is a critical process in both corporate and home environments due to the ever-growing security and privacy concerns. With the advancement of smart cities and home environments, the concept of user authentication is evolved with a broader implication by not only preventing unauthorized users from accessing confidential information but also providing the opportunities for customized services corresponding to a specific user. Traditional approaches of user authentication either require specialized device installation or inconvenient wearable sensor attachment. This article supports the extended concept of user authentication with a device-free approach by leveraging the prevalent WiFi signals made available by IoT devices, such as smart refrigerator, smart TV, and smart thermostat, and so on. The proposed system utilizes the WiFi signals to capture unique human physiological and behavioral characteristics inherited from their daily activities, including both walking and stationary ones. Particularly, we extract representative features from channel state information (CSI) measurements of WiFi signals, and develop a deep-learning-based user authentication scheme to accurately identify each individual user. To mitigate the signal distortion caused by surrounding people’s movements, our deep learning model exploits a CNN-based architecture that constructively combines features from multiple receiving antennas and derives more reliable feature abstractions. Furthermore, a transfer-learning-based mechanism is developed to reduce the training cost for new users and environments. Extensive experiments in various indoor environments are conducted to demonstrate the effectiveness of the proposed authentication system. In particular, our system can achieve over 94% authentication accuracy with 11 subjects through different activities.

References

[1]
Adam J. Aviv, Katherine L. Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. 2010. Smudge attacks on smartphone touch screens. Woot 10 (2010), 1--7.
[2]
Christopher M. Bishop. 2006. Pattern recognition. Machine Learning 128 (2006).
[3]
Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Machine Learning 20, 3 (1995), 273--297.
[4]
Rachna Dhamija and Adrian Perrig. 2000. Deja Vu - A user study: Using images for authentication. In Proceedings of the 9th Conference on USENIX Security Symposium (SSYM), Vol. 9. 4. https://dl.acm.org/doi/10.5555/1251306.1251310
[5]
Benoit Duc, Stefan Fischer, and Josef Bigün. 1999. Face authentication with Gabor information on deformable graphs. IEEE Transactions on Image Processing (IEEE TIP) 8, 4 (1999), 504--516.
[6]
Dumitru Erhan, Yoshua Bengio, Aaron Courville, Pierre-Antoine Manzagol, Pascal Vincent, and Samy Bengio. 2010. Why does unsupervised pre-training help deep learning?Journal of Machine Learning Research 11 (2010), 625--660.
[7]
Ross Girshick, Jeff Donahue, Trevor Darrell, and Jitendra Malik. 2016. Region-based convolutional networks for accurate object detection and segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence 38, 1 (2016), 142--158.
[8]
Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. 2011. Tool release: Gathering 802.11 n traces with channel state information. ACM SIGCOMM Computer Communication Review (2011), 53--53.
[9]
Keerati Inthavisas and D. Lopresti. 2012. Secure speech biometric templates for user authentication. IET Biometrics 1, 1 (2012), 46--54.
[10]
Robert Keys. 1981. Cubic convolution interpolation for digital image processing. IEEE Transactions on Acoustics, Speech, and Signal Processing 29, 6 (1981), 1153--1160.
[11]
Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, Linghe Kong, and Minglu Li. 2019. FingerPass: Finger gesture-based continuous user authentication for smart homes using commodity WiFi. In Proceedings of the 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 201--210.
[12]
Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, and Sachin Katti. 2015. SpotFi: Decimeter level localization using WiFi. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (ACM SIGCOMM). 269--282.
[13]
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems. 1097--1105.
[14]
Ajay Kumar and Arun Passi. 2010. Comparison and combination of iris matchers for reliable personal authentication. Pattern Recognition 43, 3 (2010), 1016--1026.
[15]
Chi Lin, Jiaye Hu, Yu Sun, Fenglong Ma, Lei Wang, and Guowei Wu. 2018. WiAU: An accurate device-free authentication system with ResNet. In Proceedings of the 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON). 1--9.
[16]
Jian Liu, Yan Wang, Yingying Chen, Jie Yang, Xu Chen, and Jerry Cheng. 2015. Tracking vital signs during sleep leveraging off-the-shelf WiFi. In Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc). 267--276.
[17]
Cástor Mariño, Manuel G. Penedo, Marta Penas, María J. Carreira, and F. Gonzalez. 2006. Personal authentication using digital retinal images. Pattern Analysis and Applications 9, 1 (2006), 21.
[18]
Robert Morris and Ken Thompson. 1979. Password security: A case history. Commun. ACM 22, 11 (1979), 594--597.
[19]
Sinno Jialin Pan and Qiang Yang. 2010. A survey on transfer learning. IEEE Transactions on Knowledge and Data Engineering 22, 10 (2010), 1345--1359.
[20]
Lawrence R. Rabiner, Bernard Gold, and C. K. Yuen. 1978. Theory and application of digital signal processing. IEEE Transactions on Systems, Man, and Cybernetics 8, 2 (1978), 33--43.
[21]
Juhi Ranjan and Kamin Whitehouse. 2015. Object hallmarks: Identifying object users using wearable wrist sensors. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM Ubicomp). 51--61.
[22]
Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, and Jie Yang. 2013. Smartphone based user verification leveraging gait recognition for mobile healthcare systems. In Proceedings of the Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). 149--157.
[23]
Kenneth Revett. 2009. A bioinformatics based approach to user authentication via keystroke dynamics. International Journal of Control, Automation and Systems 7, 1 (2009), 7--15.
[24]
David E. Rumelhart, Geoffrey E. Hinton, and Ronald J. Williams. 1986. Learning representations by back-propagating errors. Nature 323, 6088 (1986), 533.
[25]
Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 5.
[26]
Burrhus Frederic Skinner. 1953. Science and Human Behavior. Simon and Schuster.
[27]
David Tse and Pramod Viswanath. 2005. Fundamentals of Wireless Communication. Cambridge University Press.
[28]
Pascal Vincent, Hugo Larochelle, Isabelle Lajoie, Yoshua Bengio, and Pierre-Antoine Manzagol. 2010. Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. Journal of Machine Learning Research 11 (2010), 3371--3408.
[29]
Ding Wang and Ping Wang. 2016. Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Transactions on Dependable and Secure Computing 15, 4 (2016), 708--722.
[30]
Wei Wang, Alex X. Liu, and Muhammad Shahzad. 2016. Gait recognition using WiFi signals. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM Ubicomp). 363--373.
[31]
Wei Wang, Alex X. Liu, Muhammad Shahzad, Kang Ling, and Sanglu Lu. 2015. Understanding and modeling of WiFi signal based human activity recognition. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (ACM MobiCom). 65--76.
[32]
Yan Wang, Jian Liu, Yingying Chen, Marco Gruteser, Jie Yang, and Hongbo Liu. 2014. E-eyes: Device-free location-oriented activity identification using fine-grained WiFi signatures. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (ACM MobiCom). 617--628.
[33]
Dan Wu, Daqing Zhang, Chenren Xu, Yasha Wang, and Hao Wang. 2016. WiDir: Walking direction estimation using wireless signals. In Proceedings of ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM Ubicomp). 351--362.
[34]
Yaxiong Xie, Zhenjiang Li, and Mo Li. 2018. Precise power delay profiling with commodity Wi-Fi. IEEE Transactions on Mobile Computing (2018).
[35]
Yunze Zeng, Parth H. Pathak, and Prasant Mohapatra. 2016. WiWho: WiFi-based person identification in smart spaces. In Proceedings of 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IEEE IPSN). 1--12.
[36]
J. Zhang, B. Wei, W. Hu, and S. Kenhere. 2016. WiFi-ID: Human identification using WiFi signal. In Proceedings of International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS). 75--82.
[37]
Nan Zheng, Aaron Paloski, and Haining Wang. 2011. An efficient user verification system via mouse movements. In Proceedings of the 18th ACM Conference on Computer and Communications Security (ACM CCS). 139--150.

Cited By

View all
  • (2024)User Authentication in the IoT and IIoT EnvironmentSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch008(169-194)Online publication date: 30-Jun-2024
  • (2024)Poster: Desk Activity Recognition Using On-desk Low-cost WiFi TransceiverProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661452(702-703)Online publication date: 3-Jun-2024
  • (2024)CODE$^{+}$+: Fast and Accurate Inference for Compact Distributed IoT Data CollectionIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2024.345360735:11(2006-2022)Online publication date: 1-Nov-2024
  • Show More Cited By

Index Terms

  1. WiFi-Enabled User Authentication through Deep Learning in Daily Activities

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Internet of Things
    ACM Transactions on Internet of Things  Volume 2, Issue 2
    May 2021
    176 pages
    EISSN:2577-6207
    DOI:10.1145/3458923
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 04 May 2021
    Accepted: 01 February 2021
    Revised: 01 October 2020
    Received: 01 February 2020
    Published in TIOT Volume 2, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IoT
    2. User authentication
    3. WiFi signals

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)346
    • Downloads (Last 6 weeks)30
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)User Authentication in the IoT and IIoT EnvironmentSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch008(169-194)Online publication date: 30-Jun-2024
    • (2024)Poster: Desk Activity Recognition Using On-desk Low-cost WiFi TransceiverProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661452(702-703)Online publication date: 3-Jun-2024
    • (2024)CODE$^{+}$+: Fast and Accurate Inference for Compact Distributed IoT Data CollectionIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2024.345360735:11(2006-2022)Online publication date: 1-Nov-2024
    • (2024)CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identificationPervasive and Mobile Computing10.1016/j.pmcj.2024.101947103(101947)Online publication date: Oct-2024
    • (2024)Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challengesFuture Generation Computer Systems10.1016/j.future.2024.04.033158(427-446)Online publication date: Sep-2024
    • (2024)CATFSIDComputer Communications10.1016/j.comcom.2024.06.014224:C(275-284)Online publication date: 1-Aug-2024
    • (2023)Person re-identification in 3D spaceProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620529(5217-5234)Online publication date: 9-Aug-2023
    • (2023)airBP: Monitor Your Blood Pressure with Millimeter-Wave in the AirACM Transactions on Internet of Things10.1145/36144394:4(1-32)Online publication date: 22-Nov-2023
    • (2023)Toward Multi-area Contactless Museum Visitor Counting with Commodity WiFiJournal on Computing and Cultural Heritage 10.1145/353069416:1(1-26)Online publication date: 14-Mar-2023
    • (2023)Toward Multi-User Authentication Using WiFi SignalsIEEE/ACM Transactions on Networking10.1109/TNET.2023.323768631:5(2117-2132)Online publication date: 24-Jan-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media