Recognizing Keystrokes Using WiFi Devices
Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuit...
Ausführliche Beschreibung
Autor*in: |
Ali, Kamran [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2017 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: IEEE journal on selected areas in communications - New York, NY : IEEE, 1983, 35(2017), 5, Seite 1175-1190 |
---|---|
Übergeordnetes Werk: |
volume:35 ; year:2017 ; number:5 ; pages:1175-1190 |
Links: |
---|
DOI / URN: |
10.1109/JSAC.2017.2680998 |
---|
Katalog-ID: |
OLC1994911999 |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | OLC1994911999 | ||
003 | DE-627 | ||
005 | 20220217045924.0 | ||
007 | tu | ||
008 | 170721s2017 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1109/JSAC.2017.2680998 |2 doi | |
028 | 5 | 2 | |a PQ20170901 |
035 | |a (DE-627)OLC1994911999 | ||
035 | |a (DE-599)GBVOLC1994911999 | ||
035 | |a (PRQ)i943-c372c0d0173aa824fd561135adf03c34b7593ed921addc12520ceeaf3b28e0480 | ||
035 | |a (KEY)0128448720170000035000501175recognizingkeystrokesusingwifidevices | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 620 |q DE-600 |
084 | |a 53.00 |2 bkl | ||
100 | 1 | |a Ali, Kamran |e verfasserin |4 aut | |
245 | 1 | 0 | |a Recognizing Keystrokes Using WiFi Devices |
264 | 1 | |c 2017 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy. | ||
650 | 4 | |a Shape | |
650 | 4 | |a Keystroke recognition | |
650 | 4 | |a Wireless fidelity | |
650 | 4 | |a human computer interaction (HCI) | |
650 | 4 | |a Activity recognition | |
650 | 4 | |a Privacy | |
650 | 4 | |a wireless sensing | |
650 | 4 | |a Wireless communication | |
650 | 4 | |a wireless security | |
650 | 4 | |a Receivers | |
650 | 4 | |a Keyboards | |
700 | 1 | |a Liu, Alex X |4 oth | |
700 | 1 | |a Wang, Wei |4 oth | |
700 | 1 | |a Shahzad, Muhammad |4 oth | |
773 | 0 | 8 | |i Enthalten in |t IEEE journal on selected areas in communications |d New York, NY : IEEE, 1983 |g 35(2017), 5, Seite 1175-1190 |w (DE-627)130399868 |w (DE-600)605072-4 |w (DE-576)015903427 |x 0733-8716 |7 nnns |
773 | 1 | 8 | |g volume:35 |g year:2017 |g number:5 |g pages:1175-1190 |
856 | 4 | 1 | |u http://dx.doi.org/10.1109/JSAC.2017.2680998 |3 Volltext |
856 | 4 | 2 | |u http://ieeexplore.ieee.org/document/7875144 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-TEC | ||
912 | |a SSG-OLC-MKW | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2061 | ||
936 | b | k | |a 53.00 |q AVZ |
951 | |a AR | ||
952 | |d 35 |j 2017 |e 5 |h 1175-1190 |
author_variant |
k a ka |
---|---|
matchkey_str |
article:07338716:2017----::eonznkytoeuig |
hierarchy_sort_str |
2017 |
bklnumber |
53.00 |
publishDate |
2017 |
allfields |
10.1109/JSAC.2017.2680998 doi PQ20170901 (DE-627)OLC1994911999 (DE-599)GBVOLC1994911999 (PRQ)i943-c372c0d0173aa824fd561135adf03c34b7593ed921addc12520ceeaf3b28e0480 (KEY)0128448720170000035000501175recognizingkeystrokesusingwifidevices DE-627 ger DE-627 rakwb eng 620 DE-600 53.00 bkl Ali, Kamran verfasserin aut Recognizing Keystrokes Using WiFi Devices 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy. Shape Keystroke recognition Wireless fidelity human computer interaction (HCI) Activity recognition Privacy wireless sensing Wireless communication wireless security Receivers Keyboards Liu, Alex X oth Wang, Wei oth Shahzad, Muhammad oth Enthalten in IEEE journal on selected areas in communications New York, NY : IEEE, 1983 35(2017), 5, Seite 1175-1190 (DE-627)130399868 (DE-600)605072-4 (DE-576)015903427 0733-8716 nnns volume:35 year:2017 number:5 pages:1175-1190 http://dx.doi.org/10.1109/JSAC.2017.2680998 Volltext http://ieeexplore.ieee.org/document/7875144 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MKW GBV_ILN_70 GBV_ILN_2014 GBV_ILN_2061 53.00 AVZ AR 35 2017 5 1175-1190 |
spelling |
10.1109/JSAC.2017.2680998 doi PQ20170901 (DE-627)OLC1994911999 (DE-599)GBVOLC1994911999 (PRQ)i943-c372c0d0173aa824fd561135adf03c34b7593ed921addc12520ceeaf3b28e0480 (KEY)0128448720170000035000501175recognizingkeystrokesusingwifidevices DE-627 ger DE-627 rakwb eng 620 DE-600 53.00 bkl Ali, Kamran verfasserin aut Recognizing Keystrokes Using WiFi Devices 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy. Shape Keystroke recognition Wireless fidelity human computer interaction (HCI) Activity recognition Privacy wireless sensing Wireless communication wireless security Receivers Keyboards Liu, Alex X oth Wang, Wei oth Shahzad, Muhammad oth Enthalten in IEEE journal on selected areas in communications New York, NY : IEEE, 1983 35(2017), 5, Seite 1175-1190 (DE-627)130399868 (DE-600)605072-4 (DE-576)015903427 0733-8716 nnns volume:35 year:2017 number:5 pages:1175-1190 http://dx.doi.org/10.1109/JSAC.2017.2680998 Volltext http://ieeexplore.ieee.org/document/7875144 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MKW GBV_ILN_70 GBV_ILN_2014 GBV_ILN_2061 53.00 AVZ AR 35 2017 5 1175-1190 |
allfields_unstemmed |
10.1109/JSAC.2017.2680998 doi PQ20170901 (DE-627)OLC1994911999 (DE-599)GBVOLC1994911999 (PRQ)i943-c372c0d0173aa824fd561135adf03c34b7593ed921addc12520ceeaf3b28e0480 (KEY)0128448720170000035000501175recognizingkeystrokesusingwifidevices DE-627 ger DE-627 rakwb eng 620 DE-600 53.00 bkl Ali, Kamran verfasserin aut Recognizing Keystrokes Using WiFi Devices 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy. Shape Keystroke recognition Wireless fidelity human computer interaction (HCI) Activity recognition Privacy wireless sensing Wireless communication wireless security Receivers Keyboards Liu, Alex X oth Wang, Wei oth Shahzad, Muhammad oth Enthalten in IEEE journal on selected areas in communications New York, NY : IEEE, 1983 35(2017), 5, Seite 1175-1190 (DE-627)130399868 (DE-600)605072-4 (DE-576)015903427 0733-8716 nnns volume:35 year:2017 number:5 pages:1175-1190 http://dx.doi.org/10.1109/JSAC.2017.2680998 Volltext http://ieeexplore.ieee.org/document/7875144 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MKW GBV_ILN_70 GBV_ILN_2014 GBV_ILN_2061 53.00 AVZ AR 35 2017 5 1175-1190 |
allfieldsGer |
10.1109/JSAC.2017.2680998 doi PQ20170901 (DE-627)OLC1994911999 (DE-599)GBVOLC1994911999 (PRQ)i943-c372c0d0173aa824fd561135adf03c34b7593ed921addc12520ceeaf3b28e0480 (KEY)0128448720170000035000501175recognizingkeystrokesusingwifidevices DE-627 ger DE-627 rakwb eng 620 DE-600 53.00 bkl Ali, Kamran verfasserin aut Recognizing Keystrokes Using WiFi Devices 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy. Shape Keystroke recognition Wireless fidelity human computer interaction (HCI) Activity recognition Privacy wireless sensing Wireless communication wireless security Receivers Keyboards Liu, Alex X oth Wang, Wei oth Shahzad, Muhammad oth Enthalten in IEEE journal on selected areas in communications New York, NY : IEEE, 1983 35(2017), 5, Seite 1175-1190 (DE-627)130399868 (DE-600)605072-4 (DE-576)015903427 0733-8716 nnns volume:35 year:2017 number:5 pages:1175-1190 http://dx.doi.org/10.1109/JSAC.2017.2680998 Volltext http://ieeexplore.ieee.org/document/7875144 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MKW GBV_ILN_70 GBV_ILN_2014 GBV_ILN_2061 53.00 AVZ AR 35 2017 5 1175-1190 |
allfieldsSound |
10.1109/JSAC.2017.2680998 doi PQ20170901 (DE-627)OLC1994911999 (DE-599)GBVOLC1994911999 (PRQ)i943-c372c0d0173aa824fd561135adf03c34b7593ed921addc12520ceeaf3b28e0480 (KEY)0128448720170000035000501175recognizingkeystrokesusingwifidevices DE-627 ger DE-627 rakwb eng 620 DE-600 53.00 bkl Ali, Kamran verfasserin aut Recognizing Keystrokes Using WiFi Devices 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy. Shape Keystroke recognition Wireless fidelity human computer interaction (HCI) Activity recognition Privacy wireless sensing Wireless communication wireless security Receivers Keyboards Liu, Alex X oth Wang, Wei oth Shahzad, Muhammad oth Enthalten in IEEE journal on selected areas in communications New York, NY : IEEE, 1983 35(2017), 5, Seite 1175-1190 (DE-627)130399868 (DE-600)605072-4 (DE-576)015903427 0733-8716 nnns volume:35 year:2017 number:5 pages:1175-1190 http://dx.doi.org/10.1109/JSAC.2017.2680998 Volltext http://ieeexplore.ieee.org/document/7875144 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MKW GBV_ILN_70 GBV_ILN_2014 GBV_ILN_2061 53.00 AVZ AR 35 2017 5 1175-1190 |
language |
English |
source |
Enthalten in IEEE journal on selected areas in communications 35(2017), 5, Seite 1175-1190 volume:35 year:2017 number:5 pages:1175-1190 |
sourceStr |
Enthalten in IEEE journal on selected areas in communications 35(2017), 5, Seite 1175-1190 volume:35 year:2017 number:5 pages:1175-1190 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Shape Keystroke recognition Wireless fidelity human computer interaction (HCI) Activity recognition Privacy wireless sensing Wireless communication wireless security Receivers Keyboards |
dewey-raw |
620 |
isfreeaccess_bool |
false |
container_title |
IEEE journal on selected areas in communications |
authorswithroles_txt_mv |
Ali, Kamran @@aut@@ Liu, Alex X @@oth@@ Wang, Wei @@oth@@ Shahzad, Muhammad @@oth@@ |
publishDateDaySort_date |
2017-01-01T00:00:00Z |
hierarchy_top_id |
130399868 |
dewey-sort |
3620 |
id |
OLC1994911999 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1994911999</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220217045924.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">170721s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/JSAC.2017.2680998</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20170901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1994911999</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1994911999</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)i943-c372c0d0173aa824fd561135adf03c34b7593ed921addc12520ceeaf3b28e0480</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0128448720170000035000501175recognizingkeystrokesusingwifidevices</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">53.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ali, Kamran</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Recognizing Keystrokes Using WiFi Devices</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Shape</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Keystroke recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless fidelity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">human computer interaction (HCI)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Activity recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">wireless sensing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">wireless security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Receivers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Keyboards</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Alex X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Wei</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shahzad, Muhammad</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">IEEE journal on selected areas in communications</subfield><subfield code="d">New York, NY : IEEE, 1983</subfield><subfield code="g">35(2017), 5, Seite 1175-1190</subfield><subfield code="w">(DE-627)130399868</subfield><subfield code="w">(DE-600)605072-4</subfield><subfield code="w">(DE-576)015903427</subfield><subfield code="x">0733-8716</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:35</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:5</subfield><subfield code="g">pages:1175-1190</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/JSAC.2017.2680998</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/document/7875144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">53.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">35</subfield><subfield code="j">2017</subfield><subfield code="e">5</subfield><subfield code="h">1175-1190</subfield></datafield></record></collection>
|
author |
Ali, Kamran |
spellingShingle |
Ali, Kamran ddc 620 bkl 53.00 misc Shape misc Keystroke recognition misc Wireless fidelity misc human computer interaction (HCI) misc Activity recognition misc Privacy misc wireless sensing misc Wireless communication misc wireless security misc Receivers misc Keyboards Recognizing Keystrokes Using WiFi Devices |
authorStr |
Ali, Kamran |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)130399868 |
format |
Article |
dewey-ones |
620 - Engineering & allied operations |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0733-8716 |
topic_title |
620 DE-600 53.00 bkl Recognizing Keystrokes Using WiFi Devices Shape Keystroke recognition Wireless fidelity human computer interaction (HCI) Activity recognition Privacy wireless sensing Wireless communication wireless security Receivers Keyboards |
topic |
ddc 620 bkl 53.00 misc Shape misc Keystroke recognition misc Wireless fidelity misc human computer interaction (HCI) misc Activity recognition misc Privacy misc wireless sensing misc Wireless communication misc wireless security misc Receivers misc Keyboards |
topic_unstemmed |
ddc 620 bkl 53.00 misc Shape misc Keystroke recognition misc Wireless fidelity misc human computer interaction (HCI) misc Activity recognition misc Privacy misc wireless sensing misc Wireless communication misc wireless security misc Receivers misc Keyboards |
topic_browse |
ddc 620 bkl 53.00 misc Shape misc Keystroke recognition misc Wireless fidelity misc human computer interaction (HCI) misc Activity recognition misc Privacy misc wireless sensing misc Wireless communication misc wireless security misc Receivers misc Keyboards |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
a x l ax axl w w ww m s ms |
hierarchy_parent_title |
IEEE journal on selected areas in communications |
hierarchy_parent_id |
130399868 |
dewey-tens |
620 - Engineering |
hierarchy_top_title |
IEEE journal on selected areas in communications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)130399868 (DE-600)605072-4 (DE-576)015903427 |
title |
Recognizing Keystrokes Using WiFi Devices |
ctrlnum |
(DE-627)OLC1994911999 (DE-599)GBVOLC1994911999 (PRQ)i943-c372c0d0173aa824fd561135adf03c34b7593ed921addc12520ceeaf3b28e0480 (KEY)0128448720170000035000501175recognizingkeystrokesusingwifidevices |
title_full |
Recognizing Keystrokes Using WiFi Devices |
author_sort |
Ali, Kamran |
journal |
IEEE journal on selected areas in communications |
journalStr |
IEEE journal on selected areas in communications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
600 - Technology |
recordtype |
marc |
publishDateSort |
2017 |
contenttype_str_mv |
txt |
container_start_page |
1175 |
author_browse |
Ali, Kamran |
container_volume |
35 |
class |
620 DE-600 53.00 bkl |
format_se |
Aufsätze |
author-letter |
Ali, Kamran |
doi_str_mv |
10.1109/JSAC.2017.2680998 |
dewey-full |
620 |
title_sort |
recognizing keystrokes using wifi devices |
title_auth |
Recognizing Keystrokes Using WiFi Devices |
abstract |
Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy. |
abstractGer |
Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy. |
abstract_unstemmed |
Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-TEC SSG-OLC-MKW GBV_ILN_70 GBV_ILN_2014 GBV_ILN_2061 |
container_issue |
5 |
title_short |
Recognizing Keystrokes Using WiFi Devices |
url |
http://dx.doi.org/10.1109/JSAC.2017.2680998 http://ieeexplore.ieee.org/document/7875144 |
remote_bool |
false |
author2 |
Liu, Alex X Wang, Wei Shahzad, Muhammad |
author2Str |
Liu, Alex X Wang, Wei Shahzad, Muhammad |
ppnlink |
130399868 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth |
doi_str |
10.1109/JSAC.2017.2680998 |
up_date |
2024-07-03T19:44:22.748Z |
_version_ |
1803588324817895424 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1994911999</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220217045924.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">170721s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/JSAC.2017.2680998</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20170901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1994911999</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1994911999</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)i943-c372c0d0173aa824fd561135adf03c34b7593ed921addc12520ceeaf3b28e0480</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0128448720170000035000501175recognizingkeystrokesusingwifidevices</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">53.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ali, Kamran</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Recognizing Keystrokes Using WiFi Devices</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what is being typed could be passwords or privacy sensitive information. In this paper, we show for the first time that WiFi signals can also be exploited to recognize keystrokes. The intuition is that while typing a certain key, the hands and fingers of a user move in a unique formation and direction and thus generate a unique pattern in the time-series of channel state information (CSI) values, which we call CSI-waveform for that key. In this paper, we propose a WiFi signal-based keystroke recognition system called WiKey. WiKey consists of two commercial off-the-shelf WiFi devices, a sender (such as a router) and a receiver (such as a laptop). The sender continuously emits signals and the receiver continuously receives signals. When a human subject types on a keyboard, WiKey recognizes the typed keys based on how the CSI values at the WiFi signal receiver end. We implemented the WiKey system using a TP-Link TL-WR1043ND WiFi router and a Lenovo X200 laptop. WiKey achieves over 97.5% detection rate for detecting the keystroke and 96.4% recognition accuracy for classifying single keys. In real-world experiments, WiKey can recognize keystrokes in a continuously typed sentence with an accuracy of 93.5%. WiKey can also recognize complete words inside a sentence with over 85% accuracy.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Shape</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Keystroke recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless fidelity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">human computer interaction (HCI)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Activity recognition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">wireless sensing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">wireless security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Receivers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Keyboards</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Alex X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Wei</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shahzad, Muhammad</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">IEEE journal on selected areas in communications</subfield><subfield code="d">New York, NY : IEEE, 1983</subfield><subfield code="g">35(2017), 5, Seite 1175-1190</subfield><subfield code="w">(DE-627)130399868</subfield><subfield code="w">(DE-600)605072-4</subfield><subfield code="w">(DE-576)015903427</subfield><subfield code="x">0733-8716</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:35</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:5</subfield><subfield code="g">pages:1175-1190</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1109/JSAC.2017.2680998</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://ieeexplore.ieee.org/document/7875144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-TEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">53.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">35</subfield><subfield code="j">2017</subfield><subfield code="e">5</subfield><subfield code="h">1175-1190</subfield></datafield></record></collection>
|
score |
7.398264 |