Remote Authentication Using an Ultra-Wideband Radio Frequency Transceiver

In this paper, we propose three new authentication methods using ultra-wideband (UWB) radio frequency (RF) signals. These mid-air-based authentication techniques are different from the conventional touch-based authentication approaches and provide a more convenient and safer user experience. In these methods, the impulse radio UWB transceiver receives the reflected RF signal corresponding to the movement pattern of the user, extracts the pattern information after noise removal, and converts it into image data suitable for use as classifier input through image signal processing. After that, it verifies whether the pattern is the authentication pattern of the user by employing a convolutional neural network and a one-class support vector machine. This report describes the three proposed authentication methods using the advantages of UWB RF signals, as well as their experimental verification. In the first authentication method, ShapeSec, authentication is performed by writing a simple shape pattern in the air. This technique is simple but very convenient. The second method, SignSec, correctly detects the handwriting of different users when signing and overcomes the security vulnerability of signing with the existing pens. Finally, BreatheSec is based on breathing patterns and takes advantage of the ability of a UWB RF transceiver to detect minute breath movements. The authentication pattern could not be imitated even after it was watched from the side, proving that the proposed method has excellent security characteristics. Experiments showed that each method has over 95% accuracy.

[1]  Sung Ho Cho,et al.  Vital sign monitoring of a non-stationary human through IR-UWB radar , 2014, 2014 4th IEEE International Conference on Network Infrastructure and Digital Content.

[2]  Sung Ho Cho,et al.  Human–computer interaction using radio sensor for people with severe disability , 2018, Sensors and Actuators A: Physical.

[3]  Sung Ho Cho,et al.  Detecting Mid-Air Gestures for Digit Writing With Radio Sensors and a CNN , 2020, IEEE Transactions on Instrumentation and Measurement.

[4]  Muhammad Shafi,et al.  Recovery of information through linear prediction technique in attitude estimation of spacecraft systems , 2015 .

[5]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[6]  Takeo Kanade,et al.  Information Systems Security , 2017, Lecture Notes in Computer Science.

[7]  Wing-Kin Ma,et al.  Least squares algorithms for time-of-arrival-based mobile location , 2004, IEEE Transactions on Signal Processing.

[8]  Sung Ho Cho,et al.  3D positioning algorithm based on multiple quasi-monostatic IR-UWB radar sensors , 2017, 2017 IEEE Radar Conference (RadarConf).

[9]  Muhammad Sharif,et al.  A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication , 2012 .

[10]  Sung Ho Cho,et al.  Hand-Based Gesture Recognition for Vehicular Applications Using IR-UWB Radar , 2017, Sensors.

[11]  Sung Ho Cho,et al.  Vital Sign Monitoring and Mobile Phone Usage Detection Using IR-UWB Radar for Intended Use in Car Crash Prevention , 2017, Sensors.

[12]  Ted Taekyoung Kwon,et al.  TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems , 2014, Comput. Secur..

[13]  J. Ma,et al.  Time-series novelty detection using one-class support vector machines , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[14]  Weihua Zhuang,et al.  Ultra-wideband wireless communications , 2005, Wirel. Commun. Mob. Comput..

[15]  Sung Ho Cho,et al.  People Counting Based on an IR-UWB Radar Sensor , 2017, IEEE Sensors Journal.

[16]  Massimo Piccardi,et al.  Background subtraction techniques: a review , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[17]  Arash Habibi Lashkari,et al.  Shoulder Surfing attack in graphical password authentication , 2009, ArXiv.