Review Article

A Survey of User Authentication Based on Channel State Information

Table 2

Activity-based user authentication applications.

SystemUsersSignal/preprocessingExperimental scenePurpose/classificationPerformance

WiAU [53]Office: 12
Corridor: 14 (two users are twins)
Amplitude/Butterworth low-pass filterAn office and three corridors of different floorsIdentity recognition stranger identification/CNN, ResNetLegal user (12 or 14 people): 98%
Illegal user: 92%

WiID [67]10Amplitude and phase/low-pass filter, PCA, and DWTTwo laboratoriesIdentity recognition/SVM and HMM10 people: 90%

Shi et al. [63]Office: 11
Apartment: 5
Amplitude and phase/band-pass filterAn office ()
An apartment ()
Identity recognition stranger identification/DNN, SVMWalking activities: 94%
Stationary activities: 91%
Illegal user: 89.7%

Regani et al. [54]5Phase/PCAIn-car scenariosIdentity recognition stranger identification/KNN, linear SVM, SVM-RBF, and NNSingle driver: 90.66%
Two drivers: 99.36%