Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning

The proliferation of sensitive information being stored online highlights the pressing need for secure and efficient user authentication methods. To address this issue, this paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity. Our proposed approach utilizes Wi-Fi radio wave transmission and ML algorithms to analyze beacon frame characteristics and Received Signal Strength Indicator (RSSI) values from Wi-Fi access points to determine the users location. The aim is to provide a secure and efficient method of authentication without the need for additional hardware or software. A prototype was developed using Raspberry Pi devices and experiments were conducted to demonstrate the effectiveness and practicality of the proposed approach. Results showed that the proposed system can significantly enhance the security of sensitive information in various industries such as finance, healthcare, and retail. This study sheds light on the potential of Wi-Fi radio waves and RSSI values as a means of user authentication and the power of ML to identify patterns in wireless signals for security purposes. The proposed system holds great promise in revolutionizing the field of 2FA and user authentication, offering a new era of secure and seamless access to sensitive information.

READ FULL TEXT

page 1

page 4

page 5

research
07/05/2021

A Review-based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras

Health records data security is one of the main challenges in e-health s...
research
09/24/2019

On the Design and Analysis of a Biometric Authentication System using Keystroke Dynamics

This paper proposes a portable hardware token for user authentication, i...
research
07/20/2018

Machine Learning Attack and Defense on Voltage Over-scaling-based Lightweight Authentication

It is a challenging task to deploy lightweight security protocols in res...
research
10/22/2017

WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

The growing trend of using wearable devices for context-aware computing ...
research
02/26/2021

An Exploration of Hot-Spots in Locimetric Passwords

Locimetric authentication is a form of graphical authentication where us...
research
09/12/2022

Prototyping a Serial Number Based Authentication Model for a Computer in a Wireless Local Area Network

With the increase of wireless LAN usage in homes and enterprises due to ...
research
11/13/2015

Standard methods for inexpensive pollen loads authentication by means of computer vision and machine learning

We present a complete methodology for authenticating local bee pollen ag...

Please sign up or login with your details

Forgot password? Click here to reset