Skip to main content

Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi

  • Conference paper
  • First Online:
Network and System Security (NSS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11058))

Included in the following conference series:

Abstract

The increasing credit card consumption makes the security of keypad input become a problem that cannot be ignored. We propose a novel keystroke recognition system called WiKey. When the user enters the password on the keypad with his/her fingers, the posture and position of different keystrokes will introduce a unique interference to the multi-path signals, which can be reflected by the Channel State Information. After analysis of the fluctuation of the CSI waveform between two keystrokes, we find that there is a strong correlation between the distance of finger movement and the shape of the waveform. We exploit the association to infer the user’s number input. Compared with the previous approaches of keystroke inference, the use of auxiliary information improves their cognition accuracy. We implemented the WiKey in the normal Point Of Sale. The results of experiment show that the average accuracy rate is about 90%, which are 5–10% higher than the rate of the previous keystroke inference approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Halperin, D., Wenjun, H., Shethy, A., Wetherall, D.: Tool release: gathering 802.11n traces with channel state information. ACM SIGCOMM Comput. Commun. Rev. 41(1), 53 (2011)

    Article  Google Scholar 

  2. Wang, Y., Liu, J., Chen, Y., Gruteser, M., Yang, J., Liu, H.: E-eyes: device-free location-oriented activity identification using fine-grained WiFi signatures. In: MobiCom 2014, September 7–11, 2014, Maui, Hawaii, USA, pp. 617–628. ACM (2014)

    Google Scholar 

  3. Zeng, Y., Pathak, P.H., Xu, C., Mohapatra, P.: Your AP knows how you move: fine-grained device motion recognition through WiFi. In: HotWireless 2014, September 11, 2014, Maui, Hawaii, USA (2014)

    Google Scholar 

  4. Wang, W., Liu, A.X., Shahzad, M., et al.: Understanding and modeling of WiFi signal based human activity recognition. In: International Conference on Mobile Computing and NETWORKING, pp. 65–76. ACM (2015)

    Google Scholar 

  5. Adib, F., Katabi, D.: See through walls with WiFi! Comput. Commun. Rev. 43(4), 75–86 (2013)

    Article  Google Scholar 

  6. Pu, Q., Gupta, S., Gollakota, S., et al.: Whole-home gesture recognition using wireless signals. In: International Conference on Mobile Computing & Networking, pp. 27–38. ACM (2013)

    Google Scholar 

  7. Wang, W., Liu, A.X., Shahzad, M., Ling, K., Lu, S.: Understanding and modeling of WiFi signal based human activity recognition. In: MobiCom 2015, September 7–11, 2015, Paris, France, pp. 65–76. ACM (2015)

    Google Scholar 

  8. Abdelnasser, H., Harras, K.A., Youssef, M.: WiGest demo: a ubiquitous WiFi-based gesture recognition system. In: IEEE Infocom 2015 Live/Video Demonstration, pp. 17–18 (2015)

    Google Scholar 

  9. Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.M.: We can hear you with Wi-Fi! In: MobiCom 2014, September 7–11, 2014, Maui, Hawaii, USA, pp. 593–604 (2014)

    Google Scholar 

  10. Li, M., Meng, Y., Liu, J., et al.: When CSI meets public WiFi: inferring your mobile phone password via WiFi signals. In: ACM SIGSAC Conference, pp. 1068–1079. ACM (2016)

    Google Scholar 

  11. Ali, K., Liu, A.X., Wang, W., et al.: Keystroke recognition using WiFi signals. In: International Conference on Mobile Computing and Networking, pp. 90–102. ACM (2015)

    Google Scholar 

  12. Chen, P.H., Lin, C.J., Scholkopf, B.: A tutorial on v-support vector machines. Appl. Stoch. Models Bus. Ind. 21(2), 111–136 (2005)

    Article  MathSciNet  Google Scholar 

  13. Halperin, D., Wenjun, H., Sheth, A., Wetherall, D.: 802.11 with multiple antennas for dummies. ACM SigComm. Comput. Commun. Rev. 40(1), 19–25 (2010)

    Article  Google Scholar 

  14. Schafer, R.W.: What is a Savitzky-Golay filter? IEEE Signal Process. Mag. 28(4), 111–117 (2011)

    Article  Google Scholar 

  15. Shlens, J.: A tutorial on principal component analysis. 51(3), 219–226 (2014)

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank the reviewers for their insight and comments on this paper. This work was supported by the National Natural Science Foundation of China (Grant No. 61272422 and 61202353).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Wei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yunfang, C., Yihong, Z., Hao, Z., Wei, C., Wei, Z. (2018). Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi. In: Au, M., et al. Network and System Security. NSS 2018. Lecture Notes in Computer Science(), vol 11058. Springer, Cham. https://doi.org/10.1007/978-3-030-02744-5_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02744-5_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02743-8

  • Online ISBN: 978-3-030-02744-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics