000 03788nam a22005535i 4500
001 978-981-99-5914-3
003 DE-He213
005 20240423130137.0
007 cr nn 008mamaa
008 231016s2023 si | s |||| 0|eng d
020 _a9789819959143
_9978-981-99-5914-3
024 7 _a10.1007/978-981-99-5914-3
_2doi
050 4 _aQA76.59
072 7 _aUMS
_2bicssc
072 7 _aCOM051460
_2bisacsh
072 7 _aUMS
_2thema
082 0 4 _a004.167
_223
100 1 _aYu, Jiadi.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aWiFi signal-based user authentication
_h[electronic resource] /
_cby Jiadi Yu, Hao Kong, Linghe Kong.
250 _a1st ed. 2023.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2023.
300 _aIX, 96 p. 1 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5776
505 0 _aChapter 1.Overview -- Chapter 2. Finger Gesture-based Continuous User Authentication -- Chapter 3. Gesture-Independent User Authentication Using WiFi -- Chapter 4. Multi-User Authentication Using WiFi -- Chapter 5. State-of-Art Researches -- Chapter 6. Summary.
520 _aAs a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment. However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios. Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the keyissues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.
650 0 _aMobile computing.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputers, Special purpose.
650 1 4 _aMobile Computing.
650 2 4 _aMobile and Network Security.
650 2 4 _aSpecial Purpose and Application-Based Systems.
700 1 _aKong, Hao.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aKong, Linghe.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819959136
776 0 8 _iPrinted edition:
_z9789819959150
830 0 _aSpringerBriefs in Computer Science,
_x2191-5776
856 4 0 _uhttps://doi.org/10.1007/978-981-99-5914-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c185520
_d185520