Secure User Authentication Leveraging Keystroke Dynamics via Wi-Fi Sensing

被引:14
作者
Gu, Yu [1 ,2 ]
Wang, Yantong [1 ,2 ]
Wang, Meng [1 ,2 ]
Pan, Zulie [3 ,4 ]
Hu, Zhihao [3 ,4 ]
Liu, Zhi [5 ]
Shi, Fan [3 ,4 ]
Dong, Mianxiong [6 ]
机构
[1] Hefei Univ Technol, Anhui Prov Key Lab Affect Comp & Adv Intelligence, Hefei 230009, Peoples R China
[2] Hefei Univ Technol, Sch Comp & Informat, Hefei 230009, Peoples R China
[3] Natl Univ Def Technol, Coll Elect Engn, Hefei 230047, Peoples R China
[4] Anhui Prov Key Lab Cyberspace Secur Situat Awaren, Hefei 230037, Peoples R China
[5] Univ Electrocommun, Dept Comp & Network Engn, Tokyo 1828585, Japan
[6] Muroran Inst Technol, Dept Sci & Informat, Muroran, Hokkaido 0508585, Japan
基金
中国国家自然科学基金;
关键词
Authentication; Wireless fidelity; Support vector machines; Password; Fading channels; Informatics; Feature extraction; Behavioral features; channel state information (CSI); convolutional neural network (CNN); Ricean distribution; user authentication; SYSTEM;
D O I
10.1109/TII.2021.3108850
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication plays a critical role in access control of a man-machine system, where the knowledge factor, such as a personal identification number, constitutes the most widely used authentication element. However, knowledge factors are usually vulnerable to the spoofing attack. Recently, the inheritance factor, such as fingerprints, emerges as an efficient alternative resilient to malicious users, but it normally requires special equipment. To this end, in this article, we propose WiPass, a device-free authentication system only leveraging the pervasive Wi-Fi infrastructure to explore keystroke dynamics (manner and rhythm of keystrokes) captured by the channel state information to recognize legitimate users while rejecting spoofers. However, it remains an open challenge to characterize the behavioral features hidden in the human subtle motions, such as keystrokes. Therefore, we build a signal enhancement model using Ricean distribution to amplify user keystroke dynamics and a hybrid learning model for user authentication, which consists of two parts, i.e., convolutional neural network based feature extraction and support vector machine based classification. The former relies on visualizing the channel responses into time-series images to learn the behavioral features of keystrokes in energy and spectrum domains, whereas the latter exploits such behavioral features for user authentication. We prototype WiPass on the low-cost off-the-shelf Wi-Fi devices and verify its performance. Empirical results show that WiPass achieves on average 92.1% authentication accuracy, 5.9% false accept rate, and 6.3% false reject rate in three real environments.
引用
收藏
页码:2784 / 2795
页数:12
相关论文
共 36 条
  • [1] Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
    Abuhamad, Mohammed
    Abusnaina, Ahmed
    Nyang, Daehun
    Mohaisen, David
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (01) : 65 - 84
  • [2] WiGeR: WiFi-Based Gesture Recognition System
    Al-qaness, Mohammed Abdulaziz Aide
    Li, Fangmin
    [J]. ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2016, 5 (06)
  • [3] Recognizing Keystrokes Using WiFi Devices
    Ali, Kamran
    Liu, Alex X.
    Wang, Wei
    Shahzad, Muhammad
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (05) : 1175 - 1190
  • [4] [Anonymous], 2018, IEEE T MOBILE COMPUT
  • [5] Fast Continuous User Authentication using Distance Metric Fusion of Free-text Keystroke Data
    Ayotte, Blaine
    Huang, Jiaju
    Banavar, Mahesh K.
    Hou, Daqing
    Schuckers, Stephanie
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2019), 2019, : 2380 - 2388
  • [6] Type Like a Man! Inferring Gender from Keystroke Dynamics in Live-Chats
    Buker, Abeer A. N.
    Roffo, Giorgio
    Vinciarelli, Alessandro
    [J]. IEEE INTELLIGENT SYSTEMS, 2019, 34 (06) : 53 - 59
  • [7] Walls Have No Ears: A Non-Intrusive WiFi-Based User Identification System for Mobile Devices
    Cheng, Linsong
    Wang, Jiliang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (01) : 245 - 257
  • [8] Giuffrida C, 2014, LECT NOTES COMPUT SC, V8550, P92
  • [9] Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
  • [10] WiONE: One-Shot Learning for Environment-Robust Device-Free User Authentication via Commodity Wi-Fi in Man-Machine System
    Gu, Yu
    Yan, Huan
    Dong, Mianxiong
    Wang, Meng
    Zhang, Xiang
    Liu, Zhi
    Ren, Fuji
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2021, 8 (03) : 630 - 642