Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave
Transmission and Machine Learning
- URL: http://arxiv.org/abs/2303.02503v1
- Date: Sat, 4 Mar 2023 21:04:10 GMT
- Title: Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave
Transmission and Machine Learning
- Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb
- Abstract summary: This paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity.
A prototype was developed using Raspberry Pi devices and experiments were conducted to demonstrate the effectiveness and practicality of the proposed approach.
The proposed system holds great promise in revolutionizing the field of 2FA and user authentication, offering a new era of secure and seamless access to sensitive information.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The proliferation of sensitive information being stored online highlights the
pressing need for secure and efficient user authentication methods. To address
this issue, this paper presents a novel zero-effort two-factor authentication
(2FA) approach that combines the unique characteristics of a users environment
and Machine Learning (ML) to confirm their identity. Our proposed approach
utilizes Wi-Fi radio wave transmission and ML algorithms to analyze beacon
frame characteristics and Received Signal Strength Indicator (RSSI) values from
Wi-Fi access points to determine the users location. The aim is to provide a
secure and efficient method of authentication without the need for additional
hardware or software. A prototype was developed using Raspberry Pi devices and
experiments were conducted to demonstrate the effectiveness and practicality of
the proposed approach. Results showed that the proposed system can
significantly enhance the security of sensitive information in various
industries such as finance, healthcare, and retail. This study sheds light on
the potential of Wi-Fi radio waves and RSSI values as a means of user
authentication and the power of ML to identify patterns in wireless signals for
security purposes. The proposed system holds great promise in revolutionizing
the field of 2FA and user authentication, offering a new era of secure and
seamless access to sensitive information.
Related papers
- L2AI: lightweight three-factor authentication and authorization in IOMT blockchain-based environment [0.6554326244334868]
Medical Internet of Things (IoMT) enables individuals to remotely manage their essential activities with minimal interaction.
This paper presents a lightweight multi-factor authentication and anonymous user authentication scheme to access real-time data in a blockchain-based environment.
arXiv Detail & Related papers (2024-07-16T21:33:46Z) - Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.
PLD combines PLS with deception technologies to actively counteract wiretapping attempts.
We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things [0.12289361708127873]
We propose a novel idea to building opportunistic sensor-based authentication factors in the Internet of Things.
We claim that sensors can be utilized to create additional authentication factors, thereby reinforcing existing object-to-object authentication mechanisms.
We demonstrate the feasibility and effectivenness of our idea through illustrative experiments in a parking entry scenario.
arXiv Detail & Related papers (2024-04-11T12:14:04Z) - Domain-Agnostic Hardware Fingerprinting-Based Device Identifier for Zero-Trust IoT Security [7.8344795632171325]
Next-generation networks aim for comprehensive connectivity, interconnecting humans, machines, devices, and systems seamlessly.
To address this challenge, the Zero Trust (ZT) paradigm emerges as a key method for safeguarding network integrity and data confidentiality.
This work introduces EPS-CNN, a novel deep-learning-based wireless device identification framework.
arXiv Detail & Related papers (2024-02-08T00:23:42Z) - Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication [0.44998333629984877]
We present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML)
Our system exploits unique environmental features associated with the user, such as beacon frame characteristics and Received Signal Strength Indicator ( RSSI) values from Wi-Fi Access Points (APs)
For enhanced security, our system mandates that the user's two devices (i.e., a login device and a mobile device) be situated within a predetermined proximity before granting access.
arXiv Detail & Related papers (2024-01-12T14:58:15Z) - DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles [61.394095512765304]
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving.
Recent advancements in quantum computing jeopardize classical public key cryptography.
We propose DynamiQS, the first post-quantum secure authentication protocol for dynamic wireless charging.
arXiv Detail & Related papers (2023-12-20T09:40:45Z) - WiFi-based Spatiotemporal Human Action Perception [53.41825941088989]
An end-to-end WiFi signal neural network (SNN) is proposed to enable WiFi-only sensing in both line-of-sight and non-line-of-sight scenarios.
Especially, the 3D convolution module is able to explore thetemporal continuity of WiFi signals, and the feature self-attention module can explicitly maintain dominant features.
arXiv Detail & Related papers (2022-06-20T16:03:45Z) - A Wireless-Vision Dataset for Privacy Preserving Human Activity
Recognition [53.41825941088989]
A new WiFi-based and video-based neural network (WiNN) is proposed to improve the robustness of activity recognition.
Our results show that WiVi data set satisfies the primary demand and all three branches in the proposed pipeline keep more than $80%$ of activity recognition accuracy.
arXiv Detail & Related papers (2022-05-24T10:49:11Z) - GraSens: A Gabor Residual Anti-aliasing Sensing Framework for Action
Recognition using WiFi [52.530330427538885]
WiFi-based human action recognition (HAR) has been regarded as a promising solution in applications such as smart living and remote monitoring.
We propose an end-to-end Gabor residual anti-aliasing sensing network (GraSens) to directly recognize the actions using the WiFi signals from the wireless devices in diverse scenarios.
arXiv Detail & Related papers (2022-05-24T10:20:16Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - Device Authentication Codes based on RF Fingerprinting using Deep
Learning [2.980018103007841]
Device Authentication Code (DAC) is a novel method for authenticating IoT devices with wireless interface by exploiting their radio frequency (RF) signatures.
We show that DAC is able to prevent device impersonation by extracting salient features that are unique to any wireless device of interest.
arXiv Detail & Related papers (2020-04-19T01:50:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.