LEADER 03779nam 22006015 450 001 9910751391803321 005 20231016081208.0 010 $a981-9959-14-4 024 7 $a10.1007/978-981-99-5914-3 035 $a(MiAaPQ)EBC30789689 035 $a(Au-PeEL)EBL30789689 035 $a(DE-He213)978-981-99-5914-3 035 $a(PPN)272915645 035 $a(EXLCZ)9928517195200041 100 $a20231016d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aWiFi signal-based user authentication$b[electronic resource] /$fby Jiadi Yu, Hao Kong, Linghe Kong 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (105 pages) 225 1 $aSpringerBriefs in Computer Science,$x2191-5776 311 08$aPrint version: Yu, Jiadi WiFi Signal-Based User Authentication Singapore : Springer,c2023 9789819959136 320 $aIncludes bibliographical references. 327 $aChapter 1.Overview -- Chapter 2. Finger Gesture-based Continuous User Authentication -- Chapter 3. Gesture-Independent User Authentication Using WiFi -- Chapter 4. Multi-User Authentication Using WiFi -- Chapter 5. State-of-Art Researches -- Chapter 6. Summary. 330 $aAs a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment. However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios. Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the key issues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field. 410 0$aSpringerBriefs in Computer Science,$x2191-5776 606 $aMobile computing 606 $aComputer networks$xSecurity measures 606 $aComputers, Special purpose 606 $aMobile Computing 606 $aMobile and Network Security 606 $aSpecial Purpose and Application-Based Systems 615 0$aMobile computing. 615 0$aComputer networks$xSecurity measures. 615 0$aComputers, Special purpose. 615 14$aMobile Computing. 615 24$aMobile and Network Security. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a005.8 700 $aYu$b Jiadi$0921500 702 $aKong$b Hao 702 $aKong$b Linghe 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910751391803321 996 $aWiFi Signal-Based User Authentication$93582305 997 $aUNINA