Authenticating Users Through Fine-Grained Channel Information

Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen, H. Vincent Poor

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

User authentication is the critical first step in detecting identity-based attacks and preventing subsequent malicious attacks. However, the increasingly dynamic mobile environments make it harder to always apply cryptographic-based methods for user authentication due to their infrastructural and key management overhead. Exploiting non-cryptographic based techniques grounded on physical layer properties to perform user authentication appears promising. In this work, the use of channel state information (CSI), which is available from off-the-shelf WiFi devices, to perform fine-grained user authentication is explored. Particularly, a user-authentication framework that can work with both stationary and mobile users is proposed. When the user is stationary, the proposed framework builds a user profile for user authentication that is resilient to the presence of a spoofer. The proposed machine learning based user-authentication techniques can distinguish between two users even when they possess similar signal fingerprints and detect the existence of a spoofer. When the user is mobile, it is proposed to detect the presence of a spoofer by examining the temporal correlation of CSI measurements. Both office building and apartment environments show that the proposed framework can filter out signal outliers and achieve higher authentication accuracy compared with existing approaches using received signal strength (RSS).

Original languageEnglish (US)
Article number7955011
Pages (from-to)251-264
Number of pages14
JournalIEEE Transactions on Mobile Computing
Volume17
Issue number2
DOIs
StatePublished - Feb 1 2018

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Keywords

  • User authentication
  • channel state information
  • wireless networks

Fingerprint Dive into the research topics of 'Authenticating Users Through Fine-Grained Channel Information'. Together they form a unique fingerprint.

Cite this