Visible to the public Continuous User Verification via Respiratory Biometrics

TitleContinuous User Verification via Respiratory Biometrics
Publication TypeConference Paper
Year of Publication2020
AuthorsLiu, Jian, Chen, Yingying, Dong, Yudi, Wang, Yan, Zhao, Tiannming, Yao, Yu-Dong
Conference NameIEEE INFOCOM 2020 - IEEE Conference on Computer Communications
Date PublishedJuly 2020
PublisherIEEE
ISBN Number978-1-7281-6412-0
KeywordsBiological system modeling, biometrics (access control), Cavity resonators, feature extraction, Human Behavior, keystroke analysis, Metrics, Muscles, performance evaluation, pubcrawl, Wireless fidelity
AbstractThe ever-growing security issues in various mobile applications and smart devices create an urgent demand for a reliable and convenient user verification method. Traditional verification methods request users to provide their secrets (e.g., entering passwords and collecting fingerprints). We envision that the essential trend of user verification is to free users from active participation in the verification process. Toward this end, we propose a continuous user verification system, which re-uses the widely deployed WiFi infrastructure to capture the unique physiological characteristics rooted in user's respiratory motions. Different from the existing continuous verification approaches, posing dependency on restricted scenarios/user behaviors (e.g., keystrokes and gaits), our system can be easily integrated into any WiFi infrastructure to provide non-intrusive continuous verification. Specifically, we extract the respiration-related signals from the channel state information (CSI) of WiFi. We then derive the user-specific respiratory features based on the waveform morphology analysis and fuzzy wavelet transformation of the respiration signals. Additionally, a deep learning based user verification scheme is developed to identify legitimate users accurately and detect the existence of spoofing attacks. Extensive experiments involving 20 participants demonstrate that the proposed system can robustly verify/identify users and detect spoofers under various types of attacks.
URLhttps://ieeexplore.ieee.org/document/9155258
DOI10.1109/INFOCOM41043.2020.9155258
Citation Keyliu_continuous_2020