Professional Documents
Culture Documents
net/publication/332797618
CITATIONS READS
50 806
6 authors, including:
Hao Kong Li Lu
Shanghai Jiao Tong University Zhejiang University
8 PUBLICATIONS 169 CITATIONS 25 PUBLICATIONS 433 CITATIONS
Some of the authors of this publication are also working on these related projects:
on each human-computer interaction, so as to achieve continu- exploring robust sequential relationship of finger gestures, and
ous privacy protection. Recently, many works extend the usage further extract unique behavioral characteristics underlying the
of WiFi signals rather than communications, such as indoor loca- sequential relationship for user identification.
tion [26], recognition of human activities [24], and breathing rate • We design a verification mechanism to secure each interaction of
monitoring [10]. This inspires us to leverage WiFi signals for fin- finger gestures, i.e., enable continuous authentication for human-
ger gesture-based user authentication, which is non-intrusive and computer interactions, which achieves real-time response and
device-free. To implement the finger gesture-based continuous user high authentication accuracy simultaneously.
authentication through WiFi signals, we face several challenges in • We conduct experiments in home environments. The results
practice. First, we should mitigate the always-existed interference show that FingerPass can achieve an authentication accuracy of
induced by unconscious finger motions in CSI of WiFi signals to ex- 91.4%, and a response time of 186.6ms during interactions.
tract robust features of finger gestures. Second, the authentication
system needs to be capable of accurately identify each individual 2 RELATED WORK
based on extracted unique behavioral characteristics for secure WiFi Signal-based Applications. Recently, WiFi-based sensing
access control. Finally, the user authentication should provide a attracts considerable attentions because of the wide deployment
real-time response for satisfactory user experiences due to user of WiFi infrastructures in home environments. Previous studies
authentication integrated with human-computer interactions. explore WiFi signals for crowd counting [30], breathing rate moni-
In this paper, we first investigate the feasibility of leveraging WiFi toring [10], indoor location [26], etc. Furthermore, due to the ability
signals for finger gesture-based user authentication in depth. By an- of capturing subtle movement with CSI of WiFi signals, more recent
alyzing Channel State Information (CSI) of WiFi signals induced by works propose to recognize human activity [23], even fine-grained
finger gestures, we find that the behavioral characteristics of differ- finger gestures [9, 21], through WiFi signals.
ent users can be presented in CSI phase of WiFi signals. Also, since User Authentication. Personal Identification Number (PIN) [1]
the user authentication is integrated with human-computer inter- is a common user authentication method, but it is easily leaked to
actions, we are inspired to maintain the real-time response during others. To overcome the vulnerability of PIN-based authentication,
each finger gesture-based user authentication for satisfactory user previous works propose biometric-based authentications, such as
experiences. Toward this end, we propose a finger gesture-based fingerprint [4], voiceprint [28], and face recognition [15], etc. How-
continuous user authentication system, FingerPass, which leverages ever, these works are all vulnerable to replay attacks, which are
CSI of WiFi signals to continuously authenticate users during fin- easy to carry out, requiring neither sophisticated equipment nor
ger gesture-based interactions. First, FingerPass pre-processes the specific expertise. Moreover, the biometric-based authentications
received CSI of WiFi signals and segments the signals into episodes are not appropriate for continuous user authentication, due to poor
for every finger gesture through amplitude differential, and then user experiences under frequent active authentications.
recognizes different finger gestures through Support Vector Machine User Authentication for Smart Homes. Recent works [12,
(SVM). To achieve high authentication accuracy and satisfactory 25] realize user authentication based on human movements for
user experience simultaneously, the whole authentication process smart homes. These works either require users to wear intrusive
of FingerPass is divided into two stages, i.e., the login and interaction sensors or pre-deploy infrastructures to sense human activity for
stages. The login stage identifies a user’s identity based on a spe- user authentication. Such strong requirements hinder the wide de-
cific login finger gesture from multiple registered users. In order to ployment of these works in practical home scenarios. More recently,
ensure high user authentication accuracy in the stage, we propose a some works [16, 27] explore the widely-existed WiFi signals to iden-
deep learning-based approach, i.e., Long Short-Term Memory-based tify the daily human activity (e.g., walking gait) to authenticate
Deep Neural Network (LSTM-based DNN), to mitigate the interfer- users. However, these works are limited to coarse-grained activities
ence induced by unconscious motions and further capture unique (e.g., walking), which cannot provide continuous authentication
behavioral characteristics of finger gestures from CSI phase of WiFi during human-computer interactions.
signals for user identification. After a successful login, the user Unlike existing works, our work aims to capture the unique
can interact with the system in the interaction stage. To provide behavioral characteristics of fine-grained finger gestures during
continuous protection in real time, FingerPass verifies the user’s human-computer interactions, for continuous user authentication
identity during each interaction of finger gestures. We propose a in smart homes, which is non-intrusive and device-free.
verification mechanism integrated with the lightweight Support Vec-
tor Domain Description (SVDD) to achieve the real-time continuous
3 PRELIMINARY
authentication. Experiments demonstrate that FingerPass is reliable
for continuous user authentication in home environments. In this section, we first describe the attack scenario in smart homes,
We highlight our contributions as follow. and then explore commodity WiFi for continuous user authentica-
• We find that utilizing CSI phase of WiFi signals can authenticate tion with satisfactory user experiences.
user’s identity based on each user’s finger gestures, and propose
a finger gesture-based user authentication system, FingerPass, 3.1 Attack Scenario in Smart Homes
which utilizes CSI of WiFi signals to authenticate users based on As the popularity of smart homes, smart household appliances
finger gesture interactions. would not only store individual privacy, but also provide personal-
• We develop a deep learning-based method to mitigate the always- ized services for specific family members. Traditional user authen-
existed interference induced by unconscious finger motions for tication for smart household appliances is usually a one-off process,
FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Mobihoc ’19, July 2–5, 2019, Catania, Italy
20 0.4
User 1 0.3
24 0.3
User 2 0.2
CSI Amplitude
CSI Amplitude
0.2
Relative Phase
Relative Phase
16 0.1
20 0.1
0
0
12 -0.1
16 -0.1
-0.2 User 1
User 1 User 1
-0.2
User 2 -0.3 User 2 User 2
12 8 -0.3
0 0.8 1.6 2.4 0 0.8 1.6 2.4 0 0.8 1.6 2.4 0 0.8 1.6 2.4
Time (s) Time (s) Time (s) Time (s)
(a) Waving right. (b) Circling left. (a) Waving right. (b) Circling left.
Figure 1: CSI Amplitude of two users when performing two Figure 2: Relative phase of two users when performing two
finger gestures. finger gestures.
be used to distinguish different users. This is because subtle dif-
i.e., authenticate user’s identity only once during login. However, ferences between users are overridden by the differences between
users usually do not log out such smart household appliances when different finger gestures. Specifically, a finger gesture blocks the
they are temporarily suspended. This may result in two representa- propagating path of WiFi signals between a transmitter and a re-
tive attack scenarios in smart homes. The first scenario is that the ceiver, which induces significant energy attenuation of received
individual information may be leaked to adversaries. For example, WiFi signals. Thus, the CSI amplitude would change significantly
a malicious guest in the home may eavesdrop privacies of family due to the energy attenuation. However, since the finger block-
members from smart household appliances. The second scenario is age depicts the coarse-grained characteristics of finger gestures,
that the personalized services provided for specific users may be it would override the fine-grained behavioral uniquenesses of dif-
mistakenly provided to other unsuitable users. For example, chil- ferent users, i.e., the subtle differences between users cannot be
dren may interact with smart household appliances out of curiosity exhibited in CSI amplitude of WiFi signals.
during the absence of adults, which makes it possible for children In order to distinguish different users through CSI of WiFi sig-
to use unsuitable services (e.g., adult movie, online shopping, etc.). nals, we consider another measure, i.e., CSI phase of WiFi signals,
The traditional user authentication cannot provide a continuous which can express the movement of an object in the propagating
guarantee for privacy protection to prevent the two attack scenar- path of WiFi signals [23]. However, the absolute CSI phase has an
ios. Therefore, it is necessary to secure each interaction between unpredictable offset due to hardware imperfection [29]. Hence, we
users and smart household appliances, i.e., enable a continuous user employ relative phase to eliminate the offset and further reveal
authentication during the use of smart household appliances. fine-grained behavioral characteristics. The relative phase at the
k th subcarrier can be represented as:
3.2 Authentication Feasibility via Finger 2π
Gesture Sensing using WiFi ∆d, ∠Hˆk = − (1)
λ
The finger gesture is a natural and common way of human-computer where ∆d is the length difference of two transmitting paths, and
interactions between users and smart household appliances. In λ is the signal wavelength. The relative phase can reveal more
smart homes, WiFi infrastructures are widely deployed in home fine-grained behavioral characteristics due to the cm-scale λ [16].
environments. The Channel State Information (CSI) of WiFi signals To explore the feasibility of user authentication through CSI
[5] describes the channel properties of a WiFi signal’s propagating phase of WiFi signals, we analyze the data collected from the previ-
path, which can be utilized to recognize different finger gestures ous experiment. Figure 2 shows the relative phase of WiFi signals
through CSI amplitude [9, 21]. Hence, it is natural to first investi- when the two volunteers perform the two finger gestures respec-
gate the feasibility of utilizing CSI amplitude of WiFi signals for tively. Different from CSI amplitude, there are differences between
finger gesture-based user authentication. different users when performing the same finger gesture, which
To validate whether CSI amplitude can be used to distinguish can be used to distinguish different users. The result indicates that
different users, we conduct an experiment involving two volunteers utilizing CSI phase of WiFi signals is feasible to authenticate user’s
in a lab. Each volunteer is required to perform two different finger identity. This is because the differences between different users
gestures (i.e., waving right and circling left) three times. There is a mainly depend on behavioral characteristics, such as moving dis-
wireless Access Point (TP-LINK-WDR5620) and a laptop (HP Pavil- tance, speed, and orientation of a user’s fingers and palm. The
ion 14) equipped with Intel WiFi Link 5300 NIC. The distance be- moving fingers and palm reflect WiFi signals, which would change
tween the AP and the laptop is 1m. The finger gestures are required the length of a propagating path of the WiFi signals. Such a length
to be conducted in the middle of the two devices. Figure 1 shows change of propagating path can be exhibited as CSI phase shift of
CSI amplitude at 20t h subcarrier when two volunteers perform two WiFi signals [2]. This indicates that the CSI phase of received WiFi
different finger gestures three times respectively. We can see that signals would express how fingers and palm move according to
there are significant differences on CSI amplitudes for the two finger users daily habits. Therefore, the phase shift induced by the path
gestures, which is consistent with existing works[9, 21]. However, length changes can depict the fine-grained behavioral characteris-
the differences between different users are not distinct enough to tics of users when performing finger gestures, which can be further
separate the curves, which indicates that the CSI amplitude cannot used to authenticate users identities.
Mobihoc ’19, July 2–5, 2019, Catania, Italy H. Kong and L. Lu et al.
Login Stage
Through the analysis above, we find CSI phase of WiFi signals Register Stage Interaction Stage
can depict differences between different users due to the exhibition Signals Signals
Pre-processing
of behavioral characteristics. Therefore, we employ CSI amplitude Pre-processing Signals
Pre-processing
to recognize different finger gestures, while leverage CSI phase to Signals Segmentation Signals Segmentation
Episode Episode
14 4.3.1 Signals Segmentation. Different finger gestures would induce
CSI Amplitude
12 different values on CSI amplitude. The top part of figure 4 shows CSI
10 amplitude of WiFi signals induced by two different finger gestures.
8
400 800 1200 1600 2000 2400 2800 Compared with the second finger gesture, the amplitude value
Time(ms)
2.4
of the first finger gesture is not obvious, which is similar to the
Amlitude Differential
1.6
white noises in CSI amplitude. This may results in that some finger
0.8
Threshold gestures cannot be detected, or some white noises in CSI amplitude
0 would be mistakenly detected as a finger gesture. However, we can
20 40 60 80 100 120 140
Index of Sliding Windows observe that CSI amplitude induced by different finger gestures all
Figure 4: Illustration of signals segmentation leveraging am- have significant changes. Hence, we consider utilizing the amplitude
plitude differential. change for signals segmentation.
To depict the change of CSI amplitude, we define amplitude
differential, i.e.,
4.2.1 Multipath Mitigation. Except for the targeted finger, the
nearby moving objects (e.g., walking people) also reflect the omni- (n+1)L−1
Õ
directional WiFi signals, i.e., the multipath effect. Such a multipath D(n) = |(Ct +1 − Ct )| , n ∈ [0, N − 1], (2)
effect could interfere the received WiFi signals of finger gestures, t =nL
and thus reduce the robustness of the finger geature-based user
authentication. Therefore, it is necessary to mitigate the multipath where D(n) denotes the amplitude differential of nth sliding win-
effect from received WiFi signals. The signal reflections from the dow, L is the length of a sliding window, Ct is a CSI amplitude value
distant dynamic movements usually have longer propagation de- at time t, and N is the number of sliding windows. The bottom part
lays before arriving at a receiver. Hence, we remove these signals of figure 4 shows the amplitude differentials of two different finger
components with a large time delay to mitigate multipath effects gestures. We can see that although the amplitude value of the first
[21]. Specifically, given CSI of WiFi signals at each subcarrier in finger gesture is not obvious, the amplitude differential of the finger
the frequency domain, we obtain the power delay profile through gesture is significantly different from that of white noises. Thus,
the n-point Inverse Fast Fourier Transform (IFFT). The previous we can utilize the amplitude differential for signal segmentation
study shows indoor environments have the maximum delay less of finger gesture episodes. Specifically, FingerPass utilizes sliding
than 500ns[7]. Hence, we remove the signal components with a windows to compare the amplitude differential with a predefined
delay longer than 500ns in the power delay profile, which mitigates threshold for capturing the starting and ending point of a finger
multipath effects caused by distant dynamic movements. Note that gesture. The threshold can be obtained through empirical studies.
although the IFFT operation reduces the time resolution of received
WiFi signals, the mitigation of multipath effect based on IFFT con- 4.3.2 Finger Gesture Recognition based on SVM. As mentioned in
tributes more on resisting the interference from ambient moving Section 3.3, the interaction between users and smart household
objects and improving the robustness of user authentication. appliances requires a real-time response for a satisfactory user
experience. Existing works about finger gesture recognition based
4.2.2 Subcarriers Selection. Although WiFi infrastructures usually on CSI of WiFi signals mainly employs Dynamic Time Warping
provide multiple subcarriers for communication (e.g., 30 subcarriers (DTW) [9, 21]. However, the computational complexity of DTW-
of Intel WiFi Link 5300 NIC), not all of them contribute to capturing based recognition is O(Knm) [14], where K is the number of known
human movements [16], due to the insensitivity to specific envi- finger gestures, n and m are the numbers of sampling points in the
ronmental changes. In order to reduce the coverage of insensitive matching finger gesture episodes respectively. Such a computational
subcarriers on unique features of finger gestures, FingerPass needs complexity cannot meet the real-time requirement.
to select sensitive subcarriers from the m subcarriers on CSI of To meet the requirement of real-time response, we employ Sup-
WiFi signals. Specifically, we select k subcarriers whose variance port Vector Machine (SVM) [20] for finger gesture recognition.
values exceed mean variance values as sensitive subcarriers. For Combined with a one-versus-one strategy, FingerPass constructs a
each sensitive subcarrier, we use the proportion of variance values multi-classifier, whose computational complexity of finger gesture
w i as weights to combine each subcarrier so as to get a combined recognition is O(K 2n). Usually, the number of finger gestures is
sensitive subcarrier. Given W = ki=1 w i which represents the sum limited in a human-computer interaction system, which leads to a
Í
of sensitive subcarriers’ variance values, the combined carrier H far smaller K than the number of sampling points n. Therefore, the
is calculated as H = ki=1 w W Hi , where Hi denotes CSI of i
i th sub- time consumption of the SVM-based method would be significantly
Í
carrier. The combined subcarrier with high sensitivity for finger lower than that of DTW, which results in a faster response during
gestures could enhance the feature extraction of unique behavioral human-computer interactions for a satisfactory user experience.
characteristics from different users.
4.4 User Identification through Deep Learning
4.3 Finger Gesture Detection and Recognition for Finger Gesture-based Access Control
In this section, we describe the segmentation of CSI amplitude In smart homes, before a user interacts with smart household appli-
of received WiFi signals to detect each finger gesture, and the ances, FinдerPass should first obtain the identity credential in login
recognition of different finger gestures. stage. The user authentication in the login stage can be considered
Mobihoc ’19, July 2–5, 2019, Catania, Italy H. Kong and L. Lu et al.
90
80
The optimal splicing number
70
100 1.0
80 0.8
CDF
40 0.4
Our experiments involve 7 volunteers. Since the average number of U1 0.93 0.04 0.00 0.00 0.07 0.04 0.04
Authentication Result
U2
people per family in the US is 3.14 [19], we ask 5 of the volunteers
0.00 0.85 0.04 0.00 0.04 0.04 0.04
as registered users in the experiments, and the rest 2 as spoofers, U4 0.04 0.04 0.00 0.96 0.00 0.00 0.00
60
which could meet the needs of most families. All of the volunteers U5 0.00 0.00 0.11 0.04 0.89 0.00 0.00
40
are required to perform finger gestures towards the laptop with a S6 0.00 0.00 0.04 0.00 0.00 0.89 0.00
20 Living Room
Bedroom
distance of 0.5m. This is because users are natural to stand/sit in S7 0.00 0.00 0.00 0.00 0.00 0.00 0.93 Kitchen
0
front of the smart appliance (i.e., laptop in our experiment) during U1 U2 U3 U4
Ground Truth
U5 S6 S7 U1 U2
User
U3 U4 U5
CDF
3 3 300
0.4 40
2 2 200
0.2 20
1 1 Identify a Non-Logged-in User FingerPass 100
Figure 13: False accept rate Figure 14: CDFs of interac- Figure 15: Recognition accu- Figure 16: Response time of
and false reject rate in login tion numbers to misidentify racy of FingerPass and DTW- FingerPass and DTW-based
stage under different home a logged-in user and identify based method for different method for different finger
environments. a non-logged-in user. finger gestures. gestures.
100 100 100 100
60 60 60 60
40 40 40 40
Login Stage (Living Room) Login Stage (Living Room) Login Stage (Living Room) Login Stage (Living Room)
Login Stage (Bedroom) Login Stage (Bedroom) Login Stage (Bedroom) Login Stage (Bedroom)
Login Stage (Kitchen) Login Stage (Kitchen) Login Stage (Kitchen) Login Stage (Kitchen)
20 Interaction Stage (Living Room) 20 Interaction Stage (Living Room) 20 Interaction Stage (Living Room) 20 Interaction Stage (Living Room)
Interaction Stage (Bedroom) Interaction Stage (Bedroom) Interaction Stage (Bedroom) Interaction Stage (Bedroom)
Interaction Stage (Kitchen) Interaction Stage (Kitchen) Interaction Stage (Kitchen) Interaction Stage (Kitchen)
0 0 0 0
2 4 6 8 10 50 150 250 350 450 0.1 0.4 0.7 1 1.3 1.6 1.9 2.2 0 60 120 180 240 300 360
Number of Training Samples Sampling Rates (Hz) Distance between User and Receiving Antennas (m) Orientation of an Ambient Person (degree)
(a) Size of training sets. (b) Sampling rates. (c) Distance between user and antennas. (d) Orientation of an ambient person.