- User Authentication and Security Systems
- RFID technology advancements
- Advanced Malware Detection Techniques
- Security in Wireless Sensor Networks
- Network Security and Intrusion Detection
- Interactive and Immersive Displays
- Indoor and Outdoor Localization Technologies
- Wireless Signal Modulation Classification
- Biometric Identification and Security
- Speech and Audio Processing
- Wireless Communication Security Techniques
- Music and Audio Processing
- Mobile Crowdsensing and Crowdsourcing
- Advanced Authentication Protocols Security
- Full-Duplex Wireless Communications
- Mathematical Approximation and Integration
- Digital Media Forensic Detection
- Energy Harvesting in Wireless Networks
- Mobile Ad Hoc Networks
- Internet Traffic Analysis and Secure E-voting
- Hate Speech and Cyberbullying Detection
- Bluetooth and Wireless Communication Technologies
- Cognitive Radio Networks and Spectrum Sensing
- Probabilistic and Robust Engineering Design
- Gait Recognition and Analysis
The University of Texas at Arlington
2022-2024
Sun Yat-sen University
2023
Arizona State University
2018-2022
Mobile two-factor authentication (2FA) has become commonplace along with the popularity of mobile devices. Current 2FA solutions all require some form user effort which may seriously affect experience users, especially senior citizens or those disability such as visually impaired users. In this paper, we propose Proximity-Proof, a secure and usable system without involving interactions. Proximity-Proof automatically transmits user's response via inaudible OFDM-modulated acoustic signals to...
Indoor navigation systems are very useful in large complex indoor environments such as shopping malls. Current focus on improving localization accuracy and must be combined with an accurate labeled floor plan to provide usable services. Such plans often unavailable or involve a prohibitive cost manually obtain. In this paper, we present IndoorWaze, novel crowdsourcing-based context-aware system that can automatically generate POIs for the first time literature. IndoorWaze combines Wi-Fi...
Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user’s tapping rhythm. addition verifying card’s identification information as usual, backend server compares...
Commodity ultra-high-frequency (UHF) RFID authentication systems only provide weak user authentication, as tags can be easily stolen, lost, or cloned by attackers. This paper presents the design and evaluation of SmartRFID, a novel UHF system to promote commodity crypto-less for security-sensitive applications. SmartRFID explores extremely popular smart devices requires legitimate enroll his device along with tag. Besides authenticating tag usual, verifies whether simultaneously possesses...
Cooperative spectrum sensing (CSS) adopted by spectrum-sensing providers (SSPs) plays a key role for dynamic access and is essential avoiding interference with licensed primary users (PUs). A typical SSP system consists of geographically distributed sensors which can be compromised to submit fake reports. In this paper, we propose SpecKriging, new spatial-interpolation technique based on Inductive Graph Neural Network Kriging (IGNNK) secure CSS. first pretrain graphical neural network (GNN)...
Tag cloning and spoofing pose great challenges to RFID applications. This paper presents the design evaluation of RCID, a novel system fingerprint tags based on unique reflection coefficient each tag circuit. Based OFDM-based collector, our can quickly acquire verify tag's RCID which are independent reader measurement environment. Our applies COTS readers after firmware update at reader. Extensive prototyped experiments 600 confirm that is highly secure with authentication accuracy up 97.15%...
The Internet of Things (IoT) networks are finding massive applications in mission-critical contexts. A group key is needed to encrypt and authenticate broadcast/multicast messages commonly seen large-scale wireless networks. In this paper, we propose DroneKey, a novel drone-aided PHY-based Group-Key Generation (GKG) scheme for IoT drone dispatched fly along random 3D trajectories keep broadcasting standard signals refresh the keys whole network. Every device receives broadcast from which...
Wireless home alarm systems are being widely deployed, but their security has not been well studied. Existing attacks on wireless exploit the vulnerabilities of networking protocols while neglecting problems arising from physical component IoT devices. In this paper, we present new event-eliminating and event-spoofing commercial by interfering with reed switch in almost all COTS sensors. both attacks, external adversary uses his own magnet to control state order either eliminate legitimate...
Secure and usable user authentication is the first line of defense against cyber attacks on smart end-user devices. Advanced hacking techniques pose severe threats to traditional systems based password/PIN/fingerprint. We propose MagAuth, a secure two-factor scheme with commercial off-the-shelf (COTS) wrist wearables magnetic strap bands enhance security usability password-based for mobile touchscreen In enrolls self-chosen unlock pattern or touch gesture into his device by performing it...
Wireless networks of different technologies may interfere with each other when they are deployed at proximity. Such cross-technology interference (CTI) has become prevalent the surge IoT devices. In this paper, we exploit CTI in coexisting WiFi-Zigbee and propose DeepJam, a new stealthy jamming strategy, to jam Zigbee traffic. DeepJam relies on deep learning techniques capture temporal pattern past wireless traffic predict future By only victim's transmissions that not disrupted by CTI, can...
Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user's tapping rhythm. addition verifying card's identification information as usual, backend server compares...
Continuous location authentication (CLA) seeks to continuously and automatically verify the physical presence of legitimate users in a protected indoor area. CLA can play an important role contexts where access electrical or resources must be limited physically present users. In this paper, we WearRF-CLA, novel scheme built upon increasingly popular wrist wearables UHF RFID systems. WearRF-CLA explores observation that human daily routines area comprise sequence human-states (e.g., walking...
Acoustic fingerprinting aims to identify a mobile device based on its internal microphone(s) and speaker(s) which are unique due manufacturing imperfection. This paper seeks thorough understanding of the (in)security exploring acoustic fingerprints for achieving distributed authentication. Our contributions threefold. First, we present new fingerprint-emulation attack demonstrate that it is common vulnerability authentication systems. Second, propose dynamic challenge-response defense secure...
We propose WristUnlock, a novel technique that uses wrist wearable to unlock smartphone in secure and usable fashion. WristUnlock explores both the physical proximity Bluetooth connection between wearable. There are two modes with different security usability features. In WristRaise mode, user raises his natural way same arm carrying wearable; gets unlocked if acceleration data on satisfy an anticipated relationship specific himself. WristTouch sends random number through channel touch-based...
In this paper, we first use an L2−discrepancy bound to give the expected uniform integration approximation for functions in Sobolev space H1(K) equipped with a reproducing kernel. The concept of stratified sampling under general equal measure partition is introduced into research. For different modes, obtain better convergence order O(N−1−1d) set than Monte Carlo method and Latin hypercube method. Second, several bounds boundary conditions Fd,q∗, where 1p+1q=1. Probabilistic Lp−discrepancy...
Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure usable two-factor system with strong resilience to lost/stolen/cloned cards. In each legitimate performs sequence of taps on his/her card according self-chosen secret melody. Such rhythmic can induce phase changes the backscattered signals, which reader detect recover user's tapping rhythm. addition verifying card's identification information as usual, backend server compares...
Ubiquitous smartphones can be powerful tools to access IoT devices. Proximity-based control (PBAC) is needed such that devices only allow data by legitimate users in close proximity. Traditional smartphone-based authentication techniques do not satisfy the PBAC requirements. This paper presents SmartMagnet, a novel scheme combines and cheap magnets achieve for SmartMagnet explores few cheap, tiny commodity which we propose attach or embed into devices, as well magnetometer attitude sensor on...