Font Size: a A A

Research On Auxiliary Identity Authentication Technology Based On CSI Features

Posted on:2020-10-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z WangFull Text:PDF
GTID:2428330596485627Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of modern communication and computer technology,identity authentication in real life based on name,appearance,timbre and even height can provide security,stability and "real" identity verification for virtual cyberspace.With the serious problems of dictionary salary,inconvenience and loss of smart cards,strong privacy and slow change of biological characteristics,passwords in single-factor and multi-factor authentication based on knowledge,ownership and all passwords,physical equipment and biological characteristics pose a great threat to the modern information society.Therefore,at the 2009 US Secret Conference,N.Chandran,V.Goyal,R.Moriarty and R.Ostrovsky jointly proposed the use of geographic location information verification strategy,which can solve the security risks such as illegal access caused by information leakage in active authentication.The popularity of wireless networks provides a convenient way to describe the location and human behavior of complex indoor environments using changes in wireless signals.The wireless signal characteristics based on signal received strength(RSSI)can provide indoor location information as auxiliary authentication,but there are large fluctuations and errors.As the physical layer description of the wireless network describes the channel state information(CSI),the space-time uniqueness of the wireless channel response is utilized by the channel state information(CSI)physical layer authentication technique,by comparing the correlation between successive channel responses.Perform message authentication.Since the comparison of continuous channel responses involves only hardware operations,physical layer authentication has the characteristics of fast and efficient,and is very suitable for continuous and realtime authentication of terminals with limited resources and resources in wireless devices.This thesis takes the application of physical layer authentication technology in network identity authentication as the research object,and mainly accomplishes the following work:1.Firstly study the current application of identity authentication technology,analyze the advantages and disadvantages of various identity authentication technologies,and propose the use of CSI-based location and action features as a network authentication assistance method,combined with other identity authentication methods to provide a multi-level,passive and secure Certification scheme.2.A CSI-based WLAN-assisted identity authentication technology is proposed.Orthogonal Frequency Division Multiplexing(OFDM)is used to obtain fine-grained channel state information(CSI)to describe the signal characteristics of position and fixed motion,effectively reducing indoor multipath effects.The interference improves the accuracy of location fingerprint based authentication and attack detection and location.3.Summarization and comparison Based on the current research status of CSI indoor positioning,the improved K-means algorithm is adopted in data processing and feature extraction.The improvement is proposed from the selection of initial clustering points and later iterative calculations,the clustering effect is enhanced,and the timeliness of the algorithm is improved.4.Summarizing and comparing the current research status of human behavior perception based on CSI,in the processing of continuous changing feature data,this thesis adopts low-pass filtering to denoise,and performs PCA dimensionality reduction on denoised data,and proposes channel state information mainly describing behavior characteristics.The low-dimensional CSI action feature uses a one-to-one multi-class SVM(support vector machine)to classify and match the action CSI features,improve the classification and recognition of low-dimensional CSI action data,and enhance the effectiveness.5.The CSI-based authentication map is constructed,and the NSI access authentication is performed on the user accessing the WLAN by using the CSI location and the action feature,and the attack detection and location are performed on the user who fails the authentication.In summary,this thesis proposes to use CSI location and fixed action features as the auxiliary authentication method for WLAN access,and combined with other mainstream network identity authentication technologies,it can provide a multi-level,passive and secure and convenient authentication service.This solution requires resource visitors to use fixed devices in a fixed location or make required actions for data matching to complete WLAN authentication and access resources.Strong authentication services can be provided to the core area on a smaller scale to ensure information security.Finally,the thesis summarizes and expounds the work of this thesis,and proposes the work and direction of the auxiliary identity authentication technology based on CSI features in the future.
Keywords/Search Tags:authentication, k-means algorithm optimize, CSI, SVM, auxiliary authentication
PDF Full Text Request
Related items