User authentication is the critical first step in detecting identity-based attacks and preventing subsequent malicious attacks. However, the increasingly dynamic mobile environments make it harder to always apply cryptographic-based methods for user authentication due to their infrastructural and key management overhead. Exploiting non-cryptographic based techniques grounded on physical layer properties to perform user authentication appears promising. In this work, the use of channel state information (CSI), which is available from off-the-shelf WiFi devices, to perform fine-grained user authentication is explored. Particularly, a user-authentication framework that can work with both stationary and mobile users is proposed. When the user i...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
User authentication is the critical first step to detect identity-based attacks and prevent subseque...
Physical-layer authentication techniques exploit the unique properties of the wireless medium to enh...
Abstract—Comparing to well protected data frames, Wi-Fi management frames (MFs) are extremely vulner...
Recently, channel state information (CSI) is shown to be an effective side-channel to perform attack...
Due to the open nature of radio propagation, information security in wireless communications has bee...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
The Internet of Things (IoT) is ubiquitous thanks to the rapid development of wireless technology. H...
User authentication is a critical process in both corporate and home environments due to the ever-gr...
Authentication is an indispensable part of information security. It serves to distinguish legitimate...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
User authentication, the process of verifying the identity of a person who connects to important mob...
Strong authentication is crucial as wireless networks become more widespread and relied upon. The r...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
User authentication is the critical first step to detect identity-based attacks and prevent subseque...
Physical-layer authentication techniques exploit the unique properties of the wireless medium to enh...
Abstract—Comparing to well protected data frames, Wi-Fi management frames (MFs) are extremely vulner...
Recently, channel state information (CSI) is shown to be an effective side-channel to perform attack...
Due to the open nature of radio propagation, information security in wireless communications has bee...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
The Internet of Things (IoT) is ubiquitous thanks to the rapid development of wireless technology. H...
User authentication is a critical process in both corporate and home environments due to the ever-gr...
Authentication is an indispensable part of information security. It serves to distinguish legitimate...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
User authentication, the process of verifying the identity of a person who connects to important mob...
Strong authentication is crucial as wireless networks become more widespread and relied upon. The r...
Channel state information (CSI) has been recently shown to be useful in performing security attacks ...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...