scispace - formally typeset
Open AccessProceedings ArticleDOI

Leveraging Breathing for Continuous User Authentication

Reads0
Chats0
TLDR
A respiration-based user authentication scheme is developed to accurately identify users and reject spoofers and can achieve a high authentication success rate of over 93% and robustly defend against various types of attacks.
Abstract
This work proposes a continuous user verification system based on unique human respiratory-biometric characteristics extracted from the off-the-shelf WiFi signals. Our system innovatively re-uses widely available WiFi signals to capture the unique physiological characteristics rooted in respiratory motions for continuous authentication. Different from existing continuous authentication approaches having limited applicable scenarios due to their dependence on restricted user behaviors (e.g., keystrokes and gaits) or dedicated sensing infrastructures, our approach can be easily integrated into any existing WiFi infrastructure to provide non-invasive continuous authentication independent of user behaviors. Specifically, we extract representative features leveraging waveform morphology analysis and fuzzy wavelet transformation of respiration signals derived from the readily available channel state information (CSI) of WiFi. A respiration-based user authentication scheme is developed to accurately identify users and reject spoofers. Extensive experiments involving 20 subjects demonstrate that the proposed system can achieve a high authentication success rate of over 93% and robustly defend against various types of attacks.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Human Behavior Recognition Using Channel State Information

TL;DR: This paper analyzes the key components and core characteristics of the system architecture of human behavior recognition using CSI and elaborates the typical behavior recognition applications from five aspects, including experimental equipment, experimental scenario, behavior, classifier, and system performance.
Journal ArticleDOI

Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective

TL;DR: The nature of CA in IoT applications is outlined, the key behavioral signals are highlighted, the extant solutions from an AI perspective are summarized, and the challenges and promising future directions to guide the next generation of AI-based CA research are discussed.
Journal ArticleDOI

G2F: A Secure User Authentication for Rapid Smart Home IoT Management

TL;DR: This article proposes gateway-based 2 factor authentication (G2F), a secure user authentication framework dedicated for a gateway based on the universal 2nd factor (U2F) protocol to enhance the security of IoT devices management.
Proceedings ArticleDOI

Mask does not matter: anti-spoofing face authentication using mmWave without on-site registration

TL;DR: The penetrability, material sensitivity, and fine-grained sensing capability of millimeter wave (mmWave) is exploited to build an anti-spoofing FA system, named mmFace, which can realize accurate FA as well as reliable liveness detection and FA.
References
More filters
Journal ArticleDOI

Driver Drowsiness Classification Using Fuzzy Wavelet-Packet-Based Feature-Extraction Algorithm

TL;DR: The experimental results proved the significance of FMIWPT in extracting features that highly correlate with the different drowsiness levels achieving a classification accuracy of 95%-97% on an average across all subjects.
Proceedings ArticleDOI

Tracking Vital Signs During Sleep Leveraging Off-the-shelf WiFi

TL;DR: The extensive experiments demonstrate that the system can accurately capture vital signs during sleep under realistic settings, and achieve comparable or even better performance comparing to traditional and existing approaches, which is a strong indication of providing non-invasive, continuous fine-grained vital signs monitoring without any additional cost.
Related Papers (5)