Walls Have No Ears: A Non-Intrusive WiFi-Based User Identification System for Mobile Devices

被引:26
作者
Cheng, Linsong [1 ,2 ]
Wang, Jiliang [1 ,2 ]
机构
[1] Tsinghua Univ, Sch Software, Beijing 100084, Peoples R China
[2] Tsinghua Univ, TNLIST, Beijing 100084, Peoples R China
基金
国家重点研发计划;
关键词
User identification; mobile device; AP; WiFi signals;
D O I
10.1109/TNET.2018.2886411
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development and popularization of WiFi, surfing on the Internet with mobile devices has become an indispensable part of people's daily life. However, as an infrastructure, WiFi access points (APs) are easily connected by some undesired users nearby. In this paper, we propose NiFi, a non-intrusive WiFi user-identification system based on WiFi signals that enable AP to automatically identify legitimate users in indoor environments, such as home, office, and hotel. The core idea is that legitimate and undesired users may have different physical constraints, e.g., moving area, walking path, and so on, leading to different signal sequences. NiFi analyzes and exploits the characteristics of signal sequences generated by mobile devices. NiFi proposes a practical and effective method to extract useful features and measures similarity for signal sequences while not relying on precise user location information. We implement NiFi on Commercial Off-The-Shelf APs, and the implementation does not require any modification to user devices. The experiment results demonstrate that NiFi is able to achieve an average identification accuracy at 90.83% with true positive rate at 98.89%.
引用
收藏
页码:245 / 257
页数:13
相关论文
共 25 条
[1]  
Abdelnasser H, 2015, IEEE CONF COMPUT, P17, DOI 10.1109/INFCOMW.2015.7179321
[2]  
Adib F., 2015, P 12 USENIX S NETW S, P279
[3]   Keystroke Recognition Using WiFi Signals [J].
Ali, Kamran ;
Liu, Alex X. ;
Wang, Wei ;
Shahzad, Muhammad .
MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2015, :90-102
[4]  
[Anonymous], 2010, Proceedings of the 8th international conference on Mobile systems, applications, and services
[5]  
Bahl P., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P775, DOI 10.1109/INFCOM.2000.832252
[6]   Detecting the Performance Impact of Upgrades in Large Operational Networks [J].
Mahimkar, Ajay ;
Song, Han Hee ;
Ge, Zihui ;
Shaikh, Aman ;
Wang, Jia ;
Yates, Jennifer ;
Zhang, Yin ;
Emmons, Joanne .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) :303-314
[7]  
Nandakumar R., 2014, ARXIV14115394
[8]  
Nandakumar R, 2012, MOBICOM 12: PROCEEDINGS OF THE 18TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, P281
[9]  
Pu Q., 2013, P 19 ANN INT C MOB C, P27, DOI DOI 10.1145/2500423.2500436
[10]   A TUTORIAL ON HIDDEN MARKOV-MODELS AND SELECTED APPLICATIONS IN SPEECH RECOGNITION [J].
RABINER, LR .
PROCEEDINGS OF THE IEEE, 1989, 77 (02) :257-286