<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.6 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc ipr="trust200902" docName="draft-hsothers-iotsens-ps-00" category="std">

  <front>
    <title abbrev="IoT Sensing Problem Statement">Problem Statement for  Internet of Things Sensing</title>

    <author initials="D." surname="von Hugo" fullname="Dirk von Hugo">
      <organization abbrev="Deutsche Telekom">Deutsche Telekom</organization>
      <address>
        <postal>
          <street>Deutsche-Telekom-Allee 9</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>Dirk.von-Hugo@telekom.de</email>
      </address>
    </author>
    <author initials="B." surname="Sarikaya" fullname="Behcet Sarikaya">
      <organization></organization>
      <address>
        <email>sarikaya@ieee.org</email>
      </address>
    </author>

    <date year="2021"/>

    
    
    

    <abstract>


<t>The document attempts to establish hardware based Internet of Things authentication
as a future
networking area beyond
5G going into 6G for standardization. The problem of hardware authentication
is discussed and
its relationship with Wireless Local Area network collaborative and/or multi-band
sensing is established
and then recent
research efforts in the area are indicated.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Future networking to make full use of 5G capabilities or even
resembling an evolution to beyond 5G will have to exploit a much
more heterogeneous environment in terms of network and device
connectivity technologies and applications.  In addition ease of use
for customers and human-independent operation of a multitude of
devices and machines (things) has to be provided.</t>

<t>Therefore current authentication models like 802.1X <xref target="IEEE802.1X"/> which
are based on human intervention do not fit well.  Also this model
does not scale well for the Internet of
Things (IoT).  What we need is hardware based admission model.  Such
a model will enable many new applications as we explain more in this
document.</t>

<t>IEEE 802.11 <xref target="IEEE802.11"/> has a project on Wireless LAN (WLAN sensing)
and 802.11bf task group (TG) in charge of this project <xref target="BFSFD"/>.
Use cases for 802.11bf TG includes room sensing, i.e., presence
detection, counting the number of people in the room, localization of
active people, audio with user detection, gesture recognition at
different ranges, device proximity detection, home appliance control.
There are also health care related use cases like breathing/heart rate
detection, surveillance of persons of interest, building a 3D picture
of an environment, as, e.g., in-car sensing for driver sleepiness detection
<xref target="BFUseCases"/>.</t>

<t>Hardware based authentication that we address in this document builds
on similar use cases.
We can summarize the use cases we are currently considering here:
Authenticating the device that is playing a melody, or a person has
just touched; authenticating devices, i.e. smart teapot with certain
manifests, like blinking red and blue; authenticate the device when a
camera is pointed at it; and the like <xref target="Henning"/>.
802.11bf sensing project provides proper framework for hardware based
authentication because 802.11 or Wi-Fi devices are more and more
diverse spanning from personal computers, smartphones, televisions,
tablets, and all sorts of IoT devices or sensors.</t>

<t>TGbf is also working on Specification Framework Document with an
outline of each of the functional blocks that will be a part of the final
amendment like wireless LAN sensing procedure <xref target="BFSFD"/>.
TGbf sensing is based on obtaining physical Channel State Information
(CSI) measurements between a transmitter and receiver WLAN nodes,
called stations (STA). Using these measurements, presence of obstacles
between a transmitter and receiver can be detected and tracked. This
way, using feature extraction and classification provided by means of artificial
intelligence (AI), more higher level tasks like human activity
recognition and object detection are available for authentication
purposes, while hardware based authentication use cases can be
achieved through computation of phase differences, etc.</t>

<t>TGbf Wi-Fi Sensing (SENS) is achieved by signaling between just an
initiator and a responder.
TGbf may also define more effective collaborative SENS (in short,
CSENS) where multiple SENS-enabled devices can collaborate as a group
in an orderly fashion to capture additional information about the
surrounding environment <xref target="Rest21"/>.</t>

<section anchor="conventions-and-terminology"><name>Conventions and Terminology</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t>Sensing (SENS) is defined as the usage of received Wi-Fi signals from
a Station (STA) to detect features (i.e., range, velocity, angular,
motion, presence or proximity, gesture, etc.) of intended targets
(i.e., object, human, animal, etc.) in a given environment (i.e.,
house, office, room, vehicle, enterprise, etc.).</t>

<t>Collaborative sensing (CSENS) defines the operation in which multiple
SENS enabled devices can collaborate as a group in an orderly fashion
to capture additional information about the surrounding environment
and allow for more precise detection, thus enabling a more reliable
authentication.</t>

<t>Multi-band sensing is defined as sensing using both sub-7-GHz Channel
State Information (CSI) measurements that provide indication of
relatively large motions and that can propagate through obstacles
(e.g., walls) and 60-GHz Received Signal Strength Indicator (RSSI)
measurements at mmWave that provide highly-directional information
through the usage of beamforming toward a given receiver, but have
small range due to the presence of blockers (e.g., walls).</t>

</section>
</section>
<section anchor="hardware-based-authentication"><name>Hardware Based Authentication</name>

<t>Aim of this document is to lay ground for the need for new
authentication models in the framework of devices (e.g., machines in
IoT communication) within a (wireless or wireline-based)
network. Currently employed authentication models (such as e.g.,
802.1X certificate model) is based on a human being using the machine
and providing credentials (e.g., user name/password or a permitted
digital certificate) to the authenticator. Similarly, for user
equipment (UE) to access a cellular network the device has to be
equipped with a USIM and the user has to provide a secret key, i.e.,
PIN (Personal Identification Number).
With the use case of massive IoT (mIoT) as foreseen, e.g., in 5G and
with an increasing amount of devices within a household (smart home)
and/or in the ownership of a customer (smart watch etc.)
the need for an ease-of-use hardware-based admission model arises.</t>

<t>Focusing on corresponding procedures starting with detection (sensing)
of a new device and subsequent mutual authenticating of the device by
and to the network a set of potential technologies are identified and
described to allow for analysis in terms of criteria as reliable
operation (working), scalability, ease of use and convenience,
security, and many more.
Sensing is critical to Hardware Based Authentication because sensing 
(together with intelligent interpretation using possibly neural network models) will allow the detection of the device playing a melody, blinking red and blue,
 being pointed at, or somebody just touched and the like.
Furthermore, the method should be applicable to future generations of
network and of users, upcoming new applications and devices, assuming
that todays established standard procedures do not fulfill the
requirements sufficiently.</t>

<t>Hardware based authentication should leverage collaborative and
multi-band sensing technologies to enable sensing with much higher
precision and capacity using the state-of-art equipment. Also equally
important is the use of all artificial intelligence and neural
networks research results developed by the academia.</t>

</section>
<section anchor="solutions"><name>State of the Academic Approaches to IoT Authentication</name>

<t>A detailed review on current topics in IoT Security, Device Authentication
and Access Control was provided in <xref target="Inayat"/>. 
The following list of literature on sensor data and WiFi sensing for
securing and authenticating a user and a device shows the wide range
of approaches and interest in this topic <xref target="Rest21"/>.</t>

<t><xref target="Ma"/>, <xref target="Wang"/>, <xref target="Zhu"/>, <xref target="Wang2"/>, and <xref target="Qian"/> provide a holistic overview
on the evolution of Wi-Fi technology and on investigations in
opportunistic applications of Wi-Fi signals for gesture and motion
detection.</t>

<t><xref target="Henning2"/> is investigating geospatial access control for IoT. There are 
attribute, role and identity based, time based and geospatial access control 
techniques. Real-world IoT access control policies will be a combination of all
 three, leading to powerful access control techniques to use in practice such as
 in university campus. Such access control or authorization techniques will 
likely be used in conjunction with Hardware Based Authentication.</t>

<t>Other notable literature includes <xref target="Al-Qaness"/> on the so-called
device-free CSI-based Wi-Fi sensing mechanism, <xref target="Pahlavan"/> using Wi-Fi
signals for gesture and motion detection as well as for authentication
and security, <xref target="Lui"/> distinguishing between Line-of-Sight (LOS) and
Non-Line-of-Sight (NLOS) conditions in case of obstacles appearing
between the transmitter and the receiver <xref target="Guo"/> studying HuAc (Human
Activity Recognition) as a combination of WiFi-based and Kinect-based
activity recognition system, <xref target="FURQAN"/> analyzing the wireless sensing
and radio environment awareness mechanisms, highlighting their
vulnerabilities such as dependency of sensing modes on external
signals, and provides solutions for mitigating them, e.g., the
different threats to REM (radio environment mapping) and its
consequences in a vehicular communication scenario.</t>

<t><xref target="Ma2"/> has studied reliable SENS algorithm for human and animal
identification.
The aim is to make it resilient to spoofing and adverse channel
conditions, i.e., presence of noise and interference from other
technologies.</t>

<t><xref target="Restuccia"/> investigates data driven algorithms, neural networks,
especially convolutional neural network (CNN) or digital signal
processing (DSP) block to classify complex sensing phenomena.
Also <xref target="Liao"/> and <xref target="Liao2"/> proposed to enhance security of industrial
wireless sensor networks (IWSNs) by neural network based algorithms
for sensor nodes' authentication and implementations in IWSNs have
shown that an improved convolution preprocessing neural network
(CNN)-based algorithm requires few computing resources and has
extremely low latency, thus enabling a lightweight multi-node
PHY-layer authentication.</t>

<t>Further research on these and similar issues can be found in <xref target="Tian"/>,
<xref target="Bai"/>, and <xref target="Axente"/>.</t>

</section>
<section anchor="iot"><name>IoT Authentication Protocols</name>

<t>Since IoT applications cover a broad range of domains from smart
cities, industry, and homes to personal (e.g., wearable) devices,
including security and privacy sensitive areas as e-health, and can
reach a huge number of entities the security requirements in terms of
preventing unauthorized access to data are very high.
Therefore very robust authentication mechanisms have to be applied.
At the same time depending on the specific scenario a trade-off
between resources as processing power and memory and security protocol
complexity has to be considered.
Also a plethora of attack scenarios has to be in focus as well as
scalability of the considered implicit and explicit hardware- and
software-based authentication procedures.
<xref target="RFC8576"/> serves as a reference for details about IoT specific
security considerations including the area of authentication and
documents their specific security challenges, threat models, and
possible mitigations.</t>

<t>A more recent work surveys secure bootstrapping and onboarding protocols <xref target="I-D.irtf-t2trg-secure-bootstrapping-00"/> developed by IETF as well as other standards developing organizations such as IEEE, FIDO alliance, Open Connectivity Foundation (OCF), Open Mobile Alliance (OMA).</t>

<t>Lastly,  the Open Authorization (OAuth) <xref target="RFC6749"></xref> protocol in the area of authorization is a standard for access delegation. It extends traditional client-server authentication by
providing a third party client with a token instead of allowing it to
use the resource owner's credentials to access protected resources
while such token resembles a different set of credentials than those
of the resource owner.</t>

</section>
<section anchor="nextgen"><name>Hardware IoT Authentication Problem</name>

<t>Most of the state-of-art hardware identification techniques to
authenticate the user use finger prints a.k.a. touch id and facial
identification and they use detection by hardware i.e. touch,
accelerometer, and gyro sensors or cameras.
They are based on creating a signature, or the user's already stored
password <xref target="Wang3"/>.</t>

<t>On the other hand to authenticate a device based on a set of
characteristic parameters which should be flexibly chosen by the owner
and subsequently made known to the authentication system will require
a certain level of processing and storage capacity either within the
local system components (e.g., the device itself and the wireless
point of attachment or access point) and/or within the network (e.g.,
an edge cloud instance or a central data base).
The result of the detection process (e.g., radio wave analysis outcome
in terms of parameters as modulation scheme, number of carriers, and
fingerprinting) has to be compared with the required (correct)
parameter values which are safely stored within the network
components.
On all levels of handling these data, i.e., storage, processing, and
transport via a communication network, the integrity of the content
has to be preserved.
One should keep in mind, that any unintended authentication request
should be prevented to minimize the risk of occasional attachment to 
networks and subsequent exposure to attack to sensitive user data.</t>

<section anchor="IPwork"><name>Architectural and Procedural Issues for Future IP-based IoT-Authentication</name>

<t>Here we will discuss possible solutions on IP level and identify
benefits and potential gaps towards the requirements of next
generation IoT systems.
On IP or network layer for IPv6 IPsec protocol suite is mandatory and
provides end-to-end security for authentication procedures, ensuring
confidentiality and integrity of the transmitted data.
Authentication for IoT may rely on a protocol as 6LowPAN (Low-power
Wireless Personal Area Network) which is defined for optimizing the
efficient routing of IPv6 packets for resource constrained machine-
type communication applications.</t>

<t>When compared to a fully certificate-based authentication, however, a
hardware-based AAA mechanism relying e.g., on WiFi sensing gesture
detection does not require the user to know any key, identifier, or
password for the device to be authenticated.  A pre-defined type of access
to the device (e.g., physical, photographic or video representation,
unique description in terms of parameters, etc.) shall be sufficient for
authentication.</t>

<t><xref target="RFC8995"></xref> on ‘Bootstrapping Remote Secure Key Infrastructure’ (BRSKI) deals 
with authentication of devices, including sending authorizations to the 
device as to what network they should join, and how to authenticate that 
network by specifying automated bootstrapping of an Autonomic Control Plane (ACP).
Secure Key Infrastructure (SKI) bootstrapping using manufacturer-installed X.509
certificates combined with a manufacturer's authorizing service, both online and
offline, is called the Bootstrapping Remote Secure Key Infrastructure (BRSKI)
protocol.  Bootstrapping a new device can occur when using a routable address 
and a cloud service, only link-local connectivity, or limited/disconnected networks
and includes support for deployment models with less stringent security requirements.
When the cryptographic identity of the new SKI is successfully deployed to the
device, completion of bootstrapping is achieved. A locally issued certificate can
be deployed to the device via the established secure connection as well.</t>

</section>
</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>TBD.</t>

</section>
<section anchor="Security"><name>Security Considerations</name>

<t>This document raises no new security concerns but tries to identify
how to increase security in future IoT by discussing the issues of
robust but easy to apply authentication mechanisms.</t>

</section>
<section anchor="acks"><name>Acknowledgements</name>

<t>TBD.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC6749' target='https://www.rfc-editor.org/info/rfc6749'>
<front>
<title>The OAuth 2.0 Authorization Framework</title>
<author fullname='D. Hardt' initials='D.' role='editor' surname='Hardt'><organization/></author>
<date month='October' year='2012'/>
<abstract><t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6749'/>
<seriesInfo name='DOI' value='10.17487/RFC6749'/>
</reference>



<reference anchor='RFC8576' target='https://www.rfc-editor.org/info/rfc8576'>
<front>
<title>Internet of Things (IoT) Security: State of the Art and Challenges</title>
<author fullname='O. Garcia-Morchon' initials='O.' surname='Garcia-Morchon'><organization/></author>
<author fullname='S. Kumar' initials='S.' surname='Kumar'><organization/></author>
<author fullname='M. Sethi' initials='M.' surname='Sethi'><organization/></author>
<date month='April' year='2019'/>
<abstract><t>The Internet of Things (IoT) concept refers to the usage of standard Internet protocols to allow for human-to-thing and thing-to-thing communication.  The security needs for IoT systems are well recognized, and many standardization steps to provide security have been taken -- for example, the specification of the Constrained Application Protocol (CoAP) secured with Datagram Transport Layer Security (DTLS).  However, security challenges still exist, not only because there are some use cases that lack a suitable solution, but also because many IoT devices and systems have been designed and deployed with very limited security capabilities.  In this document, we first discuss the various stages in the lifecycle of a thing. Next, we document the security threats to a thing and the challenges that one might face to protect against these threats.  Lastly, we discuss the next steps needed to facilitate the deployment of secure IoT systems.  This document can be used by implementers and authors of IoT specifications as a reference for details about security considerations while documenting their specific security challenges, threat models, and mitigations.</t><t>This document is a product of the IRTF Thing-to-Thing Research Group (T2TRG).</t></abstract>
</front>
<seriesInfo name='RFC' value='8576'/>
<seriesInfo name='DOI' value='10.17487/RFC8576'/>
</reference>



<reference anchor='RFC8995' target='https://www.rfc-editor.org/info/rfc8995'>
<front>
<title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<author fullname='M. Behringer' initials='M.' surname='Behringer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>
</front>
<seriesInfo name='RFC' value='8995'/>
<seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>


<reference anchor='I-D.irtf-t2trg-secure-bootstrapping-00'>
   <front>
      <title>Secure IoT Bootstrapping: A Survey</title>
      <author fullname='Mohit Sethi' initials='M.' surname='Sethi'>
         <organization>Ericsson</organization>
      </author>
      <author fullname='Behcet Sarikaya' initials='B.' surname='Sarikaya'>
         <organization>Denpel Informatique</organization>
      </author>
      <author fullname='Dan Garcia-Carrillo' initials='D.' surname='Garcia-Carrillo'>
         <organization>University of Oviedo</organization>
      </author>
      <date day='7' month='April' year='2021'/>
      <abstract>
	 <t>   This draft provides an overview of the various terms that are used
   when discussing bootstrapping of IoT devices.  We document terms that
   have been used within the IETF as well as other standards bodies.  We
   investigate if the terms refer to the same phenomena or have subtle
   differences.  We provide recommendations on the applicability of
   terms in different contexts.  Finally, this document presents a
   survey of secure bootstrapping mechanisms available for smart objects
   that are part of an Internet of Things (IoT) network.  The survey
   does not prescribe any one mechanism and rather presents IoT
   developers with different options to choose from, depending on their
   use-case, security requirements, and the user interface available on
   their IoT devices.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-irtf-t2trg-secure-bootstrapping-00'/>
   <format target='https://www.ietf.org/archive/id/draft-irtf-t2trg-secure-bootstrapping-00.txt' type='TXT'/>
</reference>


<reference anchor="BFUseCases" >
  <front>
    <title>Institute of Electrical and Electronics Engineers, IEEE P802.11 - TASK GROUP BF (WLAN SENSING) 11-20/1712r2  "WiFi Sensing Use Cases"</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="BFSFD" >
  <front>
    <title>Institute of Electrical and Electronics Engineers, IEEE P802.11 - TASK GROUP BF (WLAN SENSING) 11-21/0504r2   "Specification Framework for TGbf"</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2021" month="July"/>
  </front>
</reference>
<reference anchor="Rest21" >
  <front>
    <title>IEEE 802.11bf: Toward Ubiquitous Wi-Fi Sensing</title>
    <author initials="F." surname="Restuccia">
      <organization></organization>
    </author>
    <date year="2021" month="March"/>
  </front>
  <seriesInfo name="arXiv preprint arXiv:2103.14918" value="7 pages"/>
</reference>
<reference anchor="Henning" >
  <front>
    <title>Do We Still Need Wi-Fi in the Era of 5G (and 6G)?</title>
    <author initials="H." surname="Schulzrinne">
      <organization>IEEE Future Networks Webinar</organization>
    </author>
    <date year="2021" month="February"/>
  </front>
</reference>
<reference anchor="Henning2" >
  <front>
    <title>How do we program the Internet of Things at scale?</title>
    <author initials="." surname="Jan Janak, Luoyao Hao and Henning Schulzrinne">
      <organization>RIOT Key Note Presentation</organization>
    </author>
    <date year="2021" month="September"/>
  </front>
</reference>
<reference anchor="IEEE802.1X" >
  <front>
    <title>Institute of Electrical and Electronics Engineers,    "802.1X - Port Based Network Access Control"</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2020" month="January"/>
  </front>
</reference>
<reference anchor="Ma" >
  <front>
    <title>Location-and Person-Independent Activity Recognition with WiFi, Deep Neural Networks,  and Reinforcement Learning,</title>
    <author initials="Y." surname="Ma">
      <organization></organization>
    </author>
    <author initials="S." surname="Arshad, et al">
      <organization></organization>
    </author>
    <author surname="ACM Transactions on Internet of Things">
      <organization></organization>
    </author>
    <author surname="vol. 2">
      <organization></organization>
    </author>
    <author surname="no. 1">
      <organization></organization>
    </author>
    <author surname="pp. 1-25">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
</reference>
<reference anchor="Wang" >
  <front>
    <title>TensorBeat: Tensor Decomposition for Monitoring Multiperson Breathing Beats with Commodity WiFi,</title>
    <author initials="X." surname="Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Yang, et al">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="ACM Transactions on Intelligent Systems and Technology (TIST)," value=""/>
  <seriesInfo name="vol." value="9"/>
  <seriesInfo name="no." value="1"/>
  <seriesInfo name="pp." value="1-27"/>
</reference>
<reference anchor="Zhu" >
  <front>
    <title>R-TTWD: Robust device-free through-the-wall detection of moving human with WiFi,</title>
    <author initials="H." surname="Zhu">
      <organization></organization>
    </author>
    <author initials="F." surname="Xiao, et al">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="IEEE Journal on Selected Areas in Communications," value=""/>
  <seriesInfo name="vol." value="35"/>
  <seriesInfo name="no." value="5"/>
  <seriesInfo name="pp." value="1090-1103"/>
</reference>
<reference anchor="Wang2" >
  <front>
    <title>PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity  WiFi Devices,</title>
    <author initials="X." surname="Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Yang, et al">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proc. of IEEE ICDCS," value=""/>
</reference>
<reference anchor="Qian" >
  <front>
    <title>Widar: Decimeter-level Passive Tracking via Velocity Monitoring with Commodity WiFi,</title>
    <author initials="K." surname="Xian">
      <organization></organization>
    </author>
    <author initials="C." surname="Wu, et al">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
  <seriesInfo name="Proc. of ACM MobiCom," value=""/>
</reference>
<reference anchor="Restuccia" >
  <front>
    <title>Deep Learning at the Physical Layer: System Challenges and Applications to 5G  and Beyond,</title>
    <author initials="F." surname="Restuccia">
      <organization></organization>
    </author>
    <author initials="T." surname="Melodia">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="IEEE Communications Magazine," value=""/>
  <seriesInfo name="vol." value="58"/>
  <seriesInfo name="no." value="10"/>
  <seriesInfo name="pp." value="58-64"/>
</reference>
<reference anchor="Ma2" >
  <front>
    <title>WiFi Sensing with Channel State Information: A Survey,</title>
    <author initials="Y." surname="Ma">
      <organization></organization>
    </author>
    <author initials="G." surname="Zhou, et al">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="ACM Computing Surveys (CSUR)," value=""/>
  <seriesInfo name="vol." value="52"/>
  <seriesInfo name="no." value="3"/>
  <seriesInfo name="pp." value="1-36"/>
</reference>
<reference anchor="IEEE802.11" target="https://standards.ieee.org/findstds/standard/802.11-2016.html">
  <front>
    <title>IEEE Std. 802.11-2016</title>
    <author >
      <organization>IEEE</organization>
    </author>
    <date year="2016" month="December"/>
  </front>
</reference>
<reference anchor="Al-Qaness" >
  <front>
    <title>Channel State Information (CSI) from Pure Communication to Sense and Track Human Motion: A Survey</title>
    <author initials="M.A.A." surname="Al-Qaness" fullname=" Mohammed A.A. Al-Qaness">
      <organization></organization>
    </author>
    <author initials="M." surname="Abd Elaziz" fullname="Mohamed Abd Elaziz">
      <organization></organization>
    </author>
    <author initials="S." surname="Kim" fullname="Sunghwan Kim">
      <organization></organization>
    </author>
    <author initials="A.A." surname="Ewees" fullname="Ahmed A. Ewees">
      <organization></organization>
    </author>
    <author initials="A.A." surname="Abbasi" fullname="Aaqif A. Abbasi">
      <organization></organization>
    </author>
    <author initials="Y.A." surname="Alhaj" fullname="Yousif A. Alhaj">
      <organization></organization>
    </author>
    <author initials="A." surname="Hawbani" fullname="Ammar Hawbani">
      <organization></organization>
    </author>
    <date year="2019" month="July"/>
  </front>
  <seriesInfo name="Sensors 2019, 19(15), 3329" value=""/>
</reference>
<reference anchor="Axente" >
  <front>
    <title>Gait Recognition as an Authentication Method for Mobile Devices</title>
    <author initials="M.-S." surname="Axente" fullname="Matei-Sorin Axente">
      <organization></organization>
    </author>
    <author initials="C." surname="Dobre" fullname="Ciprian Dobre">
      <organization></organization>
    </author>
    <author initials="R.-I." surname="Ciobanu" fullname="Radu-Ioan Ciobanu">
      <organization></organization>
    </author>
    <author initials="R." surname="Purnichescu-Purtan" fullname="Raluca Purnichescu-Purtan">
      <organization></organization>
    </author>
    <date year="2020" month="July"/>
  </front>
  <seriesInfo name="Sensors 2020, 20, 4110" value=""/>
</reference>
<reference anchor="Bai" >
  <front>
    <title>Physical Layer Authentication in Wireless Communication Networks: A Survey</title>
    <author initials="L." surname="Bai" fullname="Lin Bai">
      <organization></organization>
    </author>
    <author initials="L." surname="Zhu" fullname="Lina Zhu">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jianwei Liu">
      <organization></organization>
    </author>
    <author initials="J." surname="Choi" fullname="Jinho Choi">
      <organization></organization>
    </author>
    <author initials="W." surname="Zhang" fullname="Wei Zhang">
      <organization></organization>
    </author>
    <date year="2020" month="September"/>
  </front>
  <seriesInfo name="Journal of Communications and Information Networks" value="Vol.5, No.3"/>
</reference>
<reference anchor="FURQAN" >
  <front>
    <title>Wireless Communication, Sensing, and REM: A Security Perspective</title>
    <author initials="H.M." surname="Furqan" fullname="Haji M. Furqan">
      <organization></organization>
    </author>
    <author initials="M.S.J." surname="Solaija" fullname="Muhammad Sohaib J. Solaija">
      <organization></organization>
    </author>
    <author initials="H." surname="Tuerkmen" fullname="Halise Tuerkmen">
      <organization></organization>
    </author>
    <author initials="H." surname="Arslan" fullname="Hueseyin Arslan">
      <organization></organization>
    </author>
    <date year="2021" month="January"/>
  </front>
  <seriesInfo name="IEEE Open Journal of the Communications Society Vol. 2" value=""/>
</reference>
<reference anchor="Guo" >
  <front>
    <title>HuAc: Human Activity Recognition Using Crowdsourced WiFi Signals and Skeleton Data</title>
    <author initials="L." surname="Guo" fullname="Linlin Guo">
      <organization></organization>
    </author>
    <author initials="L." surname="Wang" fullname="Lei Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jialin Liu">
      <organization></organization>
    </author>
    <author initials="W." surname="Zhou" fullname="Wei Zhou">
      <organization></organization>
    </author>
    <author initials="B." surname="Lu" fullname="Bingxian Lu">
      <organization></organization>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="Hindawi Wireless Communications and Mobile Computing, Volume 2018" value=""/>
</reference>
<reference anchor="Inayat" >
  <front>
    <title>Internet of Things Security, Device Authentication and Access Control: A Review</title>
    <author initials="I." surname="Ali" fullname="Inayat Ali">
      <organization></organization>
    </author>
    <author initials="S." surname="Sabir" fullname="Sonia Sabir">
      <organization></organization>
    </author>
    <author initials="Z." surname="Ullah" fullname="Zahid Ullah">
      <organization></organization>
    </author>
    <date year="2016" month="August"/>
  </front>
  <seriesInfo name="International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8" value=""/>
</reference>
<reference anchor="Liao" >
  <front>
    <title>Deep-learning-based physical layer authentication for industrial wireless sensor networks</title>
    <author initials="R.-F." surname="Liao" fullname="Run-Fa Liao">
      <organization></organization>
    </author>
    <author initials="H." surname="Wen" fullname="Hong Wen">
      <organization></organization>
    </author>
    <author initials="J." surname="Wu" fullname="Jinsong Wu">
      <organization></organization>
    </author>
    <author initials="F." surname="Pan" fullname="Fei Pan">
      <organization></organization>
    </author>
    <author initials="A." surname="Xu" fullname="Aidong Xu">
      <organization></organization>
    </author>
    <author initials="Y." surname="Jiang" fullname="Yixin Jiang">
      <organization></organization>
    </author>
    <author initials="F." surname="Xie" fullname="Feiyi Xie">
      <organization></organization>
    </author>
    <author initials="M." surname="Cao" fullname="Minggui Cao">
      <organization></organization>
    </author>
    <date year="2019" month="May"/>
  </front>
  <seriesInfo name="Sensors 2019, 19(11), 2440" value=""/>
</reference>
<reference anchor="Liao2" >
  <front>
    <title>Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation</title>
    <author initials="R.-F." surname="Liao" fullname="Run-Fa Liao">
      <organization></organization>
    </author>
    <author initials="H." surname="Wen" fullname="Hong Wen">
      <organization></organization>
    </author>
    <author initials="H." surname="Wen" fullname="Songlin Chen">
      <organization></organization>
    </author>
    <author initials="F." surname="Xie" fullname="Feiyi Xie">
      <organization></organization>
    </author>
    <author initials="F." surname="Pan" fullname="Fei Pan">
      <organization></organization>
    </author>
    <author initials="F." surname="Pan" fullname="Jie Tang">
      <organization></organization>
    </author>
    <author initials="F." surname="Xie" fullname="Huanhuan Song">
      <organization></organization>
    </author>
    <date year="2020" month="March"/>
  </front>
  <seriesInfo name="IEEE Internet of Things Journal, vol. 7, no. 3, pp. 2077-2088" value=""/>
</reference>
<reference anchor="Lui" >
  <front>
    <title>Multi-Target Intense Human Motion Analysis and Detection Using Channel State Information</title>
    <author initials="J." surname="Liu" fullname="Jialin Liu">
      <organization></organization>
    </author>
    <author initials="L." surname="Wang" fullname=" Lei Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Fang" fullname="Jian Fang">
      <organization></organization>
    </author>
    <author initials="L." surname="Guo" fullname="Linlin Guo">
      <organization></organization>
    </author>
    <author initials="B." surname="Lu" fullname="Bingxian Lu">
      <organization></organization>
    </author>
    <author initials="L." surname="Shu" fullname="Lei Shu">
      <organization></organization>
    </author>
    <date year="2018" month="October"/>
  </front>
  <seriesInfo name="Sensors 2018, 18(10), 3379" value=""/>
</reference>
<reference anchor="Pahlavan" >
  <front>
    <title>Evolution and Impact of Wi Fi Technology and Applications: A Historical Perspective</title>
    <author initials="K." surname="Pahlavan" fullname="Kaveh Pahlavan">
      <organization></organization>
    </author>
    <author initials="P." surname="Krishnamurthy" fullname="Prashant Krishnamurthy">
      <organization></organization>
    </author>
    <date year="2020" month="November"/>
  </front>
  <seriesInfo name="Springer Science+Business Media, LLC, part of Springer Nature 2020" value=""/>
</reference>
<reference anchor="Tian" >
  <front>
    <title>An Identity Authentication Method of a MIoT Device Based on Radio Frequency (RF) Fingerprint Technology</title>
    <author initials="Q." surname="Tian" fullname="Qiao Tian">
      <organization></organization>
    </author>
    <author initials="Y." surname="Lin" fullname="Yun Lin">
      <organization></organization>
    </author>
    <author initials="X." surname="Guo" fullname="Xinghao Guo">
      <organization></organization>
    </author>
    <author initials="J." surname="Wang" fullname="Jin Wang">
      <organization></organization>
    </author>
    <author initials="O." surname="AlFarraj" fullname="Osama AlFarraj">
      <organization></organization>
    </author>
    <author initials="A." surname="Tolba" fullname="Amr Tolba">
      <organization></organization>
    </author>
    <date year="2020" month="February"/>
  </front>
  <seriesInfo name="Sensors 2020, 20(4), 1213" value=""/>
</reference>
<reference anchor="Wang3" >
  <front>
    <title>Sensor-Based User Authentication</title>
    <author initials="H." surname="Wang" fullname="He Wang">
      <organization></organization>
    </author>
    <author initials="D." surname="Lymberopoulos" fullname="Dimitrios Lymberopoulos">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jie Liu">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="EWSN 2015, LNCS 8965, 168" value=""/>
</reference>


    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

