03779nam 22006015 450 991075139180332120231016081208.0981-9959-14-410.1007/978-981-99-5914-3(MiAaPQ)EBC30789689(Au-PeEL)EBL30789689(DE-He213)978-981-99-5914-3(PPN)272915645(EXLCZ)992851719520004120231016d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierWiFi signal-based user authentication[electronic resource] /by Jiadi Yu, Hao Kong, Linghe Kong1st ed. 2023.Singapore :Springer Nature Singapore :Imprint: Springer,2023.1 online resource (105 pages)SpringerBriefs in Computer Science,2191-5776Print version: Yu, Jiadi WiFi Signal-Based User Authentication Singapore : Springer,c2023 9789819959136 Includes bibliographical references.Chapter 1.Overview -- Chapter 2. Finger Gesture-based Continuous User Authentication -- Chapter 3. Gesture-Independent User Authentication Using WiFi -- Chapter 4. Multi-User Authentication Using WiFi -- Chapter 5. State-of-Art Researches -- Chapter 6. Summary.As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment. However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios. Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the key issues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.SpringerBriefs in Computer Science,2191-5776Mobile computingComputer networksSecurity measuresComputers, Special purposeMobile ComputingMobile and Network SecuritySpecial Purpose and Application-Based SystemsMobile computing.Computer networksSecurity measures.Computers, Special purpose.Mobile Computing.Mobile and Network Security.Special Purpose and Application-Based Systems.005.8Yu Jiadi921500Kong HaoKong LingheMiAaPQMiAaPQMiAaPQBOOK9910751391803321WiFi Signal-Based User Authentication3582305UNINA