skip to main content
research-article

A Contactless Authentication System Based on WiFi CSI

Authors Info & Claims
Published:25 March 2023Publication History
Skip Abstract Section

Abstract

The ubiquitous and fine-grained features of WiFi signals make it promising for realizing contactless authentication. Existing methods, though yielding reasonably good performance in certain cases, are suffering from two major drawbacks: sensitivity to environmental dynamics and over-dependence on certain activities. Thus, the challenge of solving such issues is how to validate human identities under different environments, even with different activities. Toward this goal, in this article, we develop WiTL, a transfer learning–based contactless authentication system, which works by simultaneously detecting unique human features and removing the environment dynamics contained in the signal data under different environments. To correctly detect human features (i.e., human heights used in this article), we design a Height EStimation (HES) algorithm based on Angle of Arrival (AoA). Furthermore, a transfer learning technology combined with the Residual Network (ResNet) and the adversarial network is devised to extract activity features and learn environmental independent representations. Finally, experiments through multi-activities and under multi-scenes are conducted to validate the performance of WiTL. Compared with the state-of-the-art contactless authentication systems, WiTL achieves a great accuracy over 93% and 97% in multi-scenes and multi-activities identity recognition, respectively.

REFERENCES

  1. [1] Ali Kamran, Liu Alex X., Wang Wei, and Shahzad Muhammad. 2017. Recognizing keystrokes using WiFi devices. IEEE Journal on Selected Areas in Communications 35, 5 (2017), 11751190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Faulkner Nathaniel, Parr Baden, Alam Fakhrul, Legg Mathew, and Demidenko Serge. 2020. CapLoc: Capacitive sensing floor for device-free localization and fall detection. IEEE Access 8 (2020), 187353187364.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Gao Yuan, Ma Jiayi, and Yuille Alan L.. 2017. Semi-supervised sparse representation based classification for face recognition with insufficient labeled samples. IEEE Transactions on Image Processing 26, 5 (2017), 25452560.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Gong Liangyi, Xiang Chaocan, Fan Xiaochen, Wu Tao, Chen Chao, Yu Miao, and Yang Wu. 2020. Device-free near-field human sensing using WiFi signals. Personal and Ubiquitous Computing (2020), 1–14.Google ScholarGoogle Scholar
  5. [5] He Kaiming, Zhang Xiangyu, Ren Shaoqing, and Sun Jian. 2016. Deep residual learning for image recognition. In IEEE CVPR. 770778.Google ScholarGoogle Scholar
  6. [6] He Kaiming, Zhang Xiangyu, Ren Shaoqing, and Sun Jian. 2016. Deep residual learning for image recognition. In IEEE CVPR. 770778.Google ScholarGoogle Scholar
  7. [7] Hong Feng, Wang Xiang, Yang Yanni, Zong Yuan, Zhang Yuliang, and Guo Zhongwen. 2016. WFID: Passive device-free human identification using WiFi signal. In ACM MOBIQUITOUS. 4756.Google ScholarGoogle Scholar
  8. [8] Jiang Wenjun, Miao Chenglin, Ma Fenglong, Yao Shuochao, Wang Yaqing, Yuan Ye, Xue Hongfei, Song Chen, Ma Xin, and Koutsonikolas Dimitrios. 2018. Towards environment independent device free human activity recognition. In ACM MOBICOM. 289304.Google ScholarGoogle Scholar
  9. [9] Kong Hao, Lu Li, Yu Jiadi, Chen Yingying, and Tang Feilong. 2020. Continuous authentication through finger gesture interaction for smart homes using WiFi. IEEE Transactions on Mobile Computing 20, 11 (2020), 3148–3162.Google ScholarGoogle Scholar
  10. [10] Kotaru Manikanta, Joshi Kiran, Bharadia Dinesh, and Katti Sachin. 2015. SpotFi: Decimeter level localization using WiFi. In ACM SIGCOMM. 269282.Google ScholarGoogle Scholar
  11. [11] Li Xiang, Li Shengjie, Zhang Daqing, Xiong Jie, Wang Yasha, and Mei Hong. 2016. Dynamic-MUSIC: Accurate device-free indoor localization. In ACM UBICOMP. 196207.Google ScholarGoogle Scholar
  12. [12] Lin C., Hu J., Sun Y., Ma F., Wang L., and Wu G.. 2018. WiAU: An accurate device-free authentication system with ResNet. In IEEE SECON. 109117.Google ScholarGoogle Scholar
  13. [13] Lin Chi, Xu Tingting, Xiong Jie, Ma Fenglong, Wang Lei, and Wu Guowei. 2020. WiWrite: An accurate device-free handwriting recognition system with COTS WiFi. In IEEE ICDCS. 700709.Google ScholarGoogle Scholar
  14. [14] Ling Kang, Dai Haipeng, Liu Yuntang, Liu Alex X., Wang Wei, and Gu Qing. 2020. UltraGesture: Fine-grained gesture sensing and recognition. IEEE Transactions on Mobile Computing (2020), to appear.Google ScholarGoogle Scholar
  15. [15] Liu Hongbo, Wang Yan, Liu Jian, Yang Jie, Chen Yingying, and Poor H. Vincent. 2018. Authenticating users through fine-grained channel information. IEEE Transactions on Mobile Computing 17, 2 (2018), 251264.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Obaidat Mohammad S., Traore Issa, and Woungang Isaac. 2019. Biometric-Based Physical and Cybersecurity Systems. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Qian Kun, Wu Chenshu, Yang Zheng, Liu Yunhao, He Fugui, and Xing Tianzhang. 2018. Enabling contactless detection of moving humans with dynamic speeds using CSI. ACM Transactions on Embedded Computing Systems 17, 2 (2018), 52:1–52:18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Ruan Hang, Xiao Pei, Xiao Lixia, and Kelly James R.. 2021. Joint iterative optimization-based low-complexity adaptive hybrid beamforming for massive MU-MIMO systems. IEEE Transactions on Communications 69, 3 (2021), 17071722.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Ruiz Carlos, Pan Shijia, Bannis Adeola, Chang Ming-Po, Noh Hae Young, and Zhang Pei. 2020. IDIoT: Towards ubiquitous identification of IoT devices through visual and inertial orientation matching during human activity. In IEEE IoTDI. 4052.Google ScholarGoogle Scholar
  20. [20] Shi Cong, Liu Jian, Liu Hongbo, and Chen Yingying. 2017. Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In ACM MobiHoc. 5:1–5:10.Google ScholarGoogle Scholar
  21. [21] Wang Jindong, Chen Yiqiang, Yu Han, Huang Meiyu, and Yang Qiang. 2019. Easy transfer learning by exploiting intra-domain structures. In IEEE ICME. 12101215.Google ScholarGoogle Scholar
  22. [22] Wang Jie, Zhao Yunong, Ma Xiaorui, Gao Qinghua, Pan Miao, and Wang Hongyu. 2020. Cross-scenario device-free activity recognition based on deep adversarial networks. IEEE Transactions on Vehicular Technology 69, 5 (2020), 5416–5245.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Wang Wei, Liu Alex X., and Shahzad Muhammad. 2016. Gait recognition using wifi signals. In ACM UBICOMP. 363373.Google ScholarGoogle Scholar
  24. [24] Wang Wei, Liu Alex X., Shahzad Muhammad, Ling Kang, and Lu Sanglu. 2015. Understanding and modeling of wifi signal based human activity recognition. In ACM MOBICOM. 6576.Google ScholarGoogle Scholar
  25. [25] Wang Xuyu, Yang Chao, and Mao Shiwen. 2017. PhaseBeat: Exploiting CSI phase data for vital sign monitoring with commodity WiFi devices. In IEEE ICDCS. 12301239.Google ScholarGoogle Scholar
  26. [26] Xie Yaxiong, Xiong Jie, Li Mo, and Jamieson Kyle. 2019. mD-Track: Leveraging multi-dimensionality for passive indoor Wi-Fi tracking. In ACM MOBICOM. 116.Google ScholarGoogle Scholar
  27. [27] Xin Tong, Guo Bin, Wang Zhu, Li Mingyang, Yu Zhiwen, and Zhou Xingshe. 2016. FreeSense: Indoor human identification with Wi-Fi signals. In IEEE Globecom. 17.Google ScholarGoogle Scholar
  28. [28] Xiong Jie and Jamieson Kyle. 2013. ArrayTrack: A fine-grained indoor location system. In USENIX NSDI. 7184.Google ScholarGoogle Scholar
  29. [29] Yang Panlong, Feng Yuanchao, Xiong Jie, Chen Ziyang, and Li Xiangyang. 2020. RF-Ear: Contactless multi-device vibration sensing and identification using COTS RFID. In IEEE INFOCOM. 297306.Google ScholarGoogle Scholar
  30. [30] Ying Shi, Wang Bingming, Wang Lu, Li Qingshan, Zhao Yishi, Shang Jianga, Huang Hao, Cheng Guoli, Yang Zhe, and Geng Jiangyi. 2021. An improved KNN-based efficient log anomaly detection method with automatically labeled samples. In ACM TKDD, Vol. 15. 122.Google ScholarGoogle Scholar
  31. [31] Zeng Yunze, Pathak Parth H., and Mohapatra Prasant. 2016. WiWho: WiFi-based person identification in smart spaces. In ACM IPSN. 112.Google ScholarGoogle Scholar
  32. [32] Zeng Youwei, Wu Dan, Xiong Jie, Yi Enze, Gao RuiYang, and Zhang Daqing. 2019. FarSense: Pushing the range limit of WiFi-based respiration sensing with CSI ratio of two antennas. In ACM UBICOMP. 126.Google ScholarGoogle Scholar
  33. [33] Zhang Pinchang, Liu Jun, Shen Yulong, and Jiang Xiaohong. 2020. Exploiting channel gain and phase noise for PHY-layer authentication in massive MIMO systems. IEEE Transactions on Information Forensics and Security 16 (2020), 42654279.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Zhang Pinchang, Shen Yulong, Jiang Xiaohong, and Wu Bin. 2020. Physical layer authentication jointly utilizing channel and phase noise in MIMO systems. IEEE Transactions on Communications 68, 4 (2020), 24462458.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Zhao Shuangrui, Liu Jia, Shen Yulong, Jiang Xiaohong, and Shiratori Norio. 2020. Secure beamforming for full-duplex MIMO two-way untrusted relay systems. IEEE Transactions on Information Forensics and Security 15 (2020), 37753790.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Zhuo Yiwei, Zhu Hongzi, Xue Hua, and Chang Shan. 2017. Perceiving accurate CSI phases with commodity WiFi devices. In IEEE INFOCOM. 7279.Google ScholarGoogle Scholar

Index Terms

  1. A Contactless Authentication System Based on WiFi CSI

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 19, Issue 2
      May 2023
      599 pages
      ISSN:1550-4859
      EISSN:1550-4867
      DOI:10.1145/3575873
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 March 2023
      • Online AM: 22 April 2022
      • Accepted: 13 April 2022
      • Revised: 31 March 2022
      • Received: 25 November 2021
      Published in tosn Volume 19, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format