
position. This ensures that users’ locations remain
protected while still enabling effective authentication
based on the unique features of a location.
We focus on a dedicated area to apply RoomKey.
We consider on-site and off-site locations to balance
the set of measured APs for robust authentication. By
selecting the number of APs considered and addition-
ally training on proximity locations that must not be
able to reconstruct a key, locations are distinct, while
on-site and off-site measurements can be differenti-
ated. We observe an average success rate of 91%
successful reconstructions from an on-site location,
while we have at most 0.5% successful reconstruction
from an off-site location. Our results further show that
smaller rooms can deal with and perform better with
less information assumed (e.g., a minimum entropy
of 9 bits), while larger rooms require more informa-
tion per AP to provide similar performance (a mini-
mum entropy of 17 bits). However, an increased min-
entropy demands the mitigation techniques provided.
In conclusion, the integration of location recogni-
tion into MFA systems through RoomKeyrepresents
an improvement in authentication capabilities and the
use of WiFi beacon frames to derive a key not in
a fixed location but in a designated area. Our ap-
proach adds an employable method to use location in
a privacy-preserving manner while enhancing the user
experience by reducing the number of authentication
prompts. We envision RoomKey to strengthen the ex-
isting authentication infrastructure and open up new
possibilities for seamless authentication.
REFERENCES
Allan, A. (2023). Macvendor. Website. https://gist.github.
com/aallan/b4bb86db86079509e6159810ae9bd3e4.
Bertoni, G., Daemen, J., Peeters, M., and Van Assche, G.
(2011). The keccak sponge function family: Spec-
ifications summary. Ref: http://keccak. noekeon.
org/specs summary. html.
Carter, J. L. and Wegman, M. N. (1977). Universal classes
of hash functions. In Proceedings of the ninth annual
ACM symposium on Theory of computing, pages 106–
112.
Chandran, N., Goyal, V., Moriarty, R., and Ostrovsky, R.
(2009). Position based cryptography. In CRYPTO,
volume 9, pages 391–407. Springer.
Ciresica, V. (2023). Authentication method for windows
os based on location classification using wifi signals.
Master’s thesis, University of Twente.
Dodis, Y., Reyzin, L., and Smith, A. (2004). Fuzzy extrac-
tors: How to generate strong keys from biometrics and
other noisy data. In International conference on the
theory and applications of cryptographic techniques,
pages 523–540. Springer.
European Parliament and Council (2016). Regulation (eu)
2016/679 of the european parliament and of the coun-
cil of 27 april 2016 on the protection of natural per-
sons with regard to the processing of personal data and
on the free movement of such data, and repealing di-
rective 95/46/ec (general data protection regulation).
Accessed: 07.2023.
Hartley, R. V. (1928). Transmission of information 1. Bell
System technical journal, 7(3):535–563.
Henry, J. (2021). Indoor Location: study on the IEEE
802.11 Fine Timing Measurement standard. PhD the-
sis, Ecole nationale sup
´
erieure Mines-T
´
el
´
ecom Atlan-
tique.
IEEE Standard (2007). Wireless lan medium access control
(mac)and physical layer (phy) specifications. https:
//www.iith.ac.in/
∼
tbr/teaching/docs/802.11-2007.pdf.
Jagadeesan, A., Thillaikkarasi, T., and Duraiswamy, K.
(2010). Cryptographic key generation from multiple
biometric modalities: Fusing minutiae with iris fea-
ture. International Journal of Computer Applications,
2(6):16–26.
Jakubeit, P., Peter, A., and van Steen, M. (2022). The
measurable environment as nonintrusive authentica-
tion factor on the example of wifi beacon frames.
In International Workshop on Emerging Technologies
for Authorization and Authentication, pages 48–69.
Springer.
Jakubeit, P., Peter, A., and van Steen, M. (2023). Lockey:
Location-based key extraction from the wifi environ-
ment in the user’s vicinity. In Proceedings of the eigh-
teenth interntation conference on information security
practice and experience.
Mohsen, M., Rizk, H., Yamaguchi, H., and Youssef, M.
(2023). Locfree: Wifi rtt-based device-free indoor lo-
calization system.
NIST (2021). Digital identity guidelines, authentication
and lifecycle management. https://pages.nist.gov/
800-63-3/sp800-63b.html.
Rayani, P. K. and Changder, S. (2023). Continuous user au-
thentication on smartphone via behavioral biometrics:
a survey. In Multimedia Tools and Applications, pages
1633–1667. Springer.
Schrijen, G.-J. and Van Der Leest, V. (2012). Comparative
analysis of sram memories used as puf primitives. In
2012 Design, Automation & Test in Europe Confer-
ence & Exhibition (DATE), pages 1319–1324. IEEE.
Song, Y., Chen, B., Wu, T., Zheng, T., Chen, H., and Wang,
J. (2021). Enhancing packet-level wi-fi device au-
thentication protocol leveraging channel state infor-
mation. Wireless Communications and Mobile Com-
puting, 2021:1–12.
Yang, C. and Shao, H.-R. (2015). Wifi-based indoor posi-
tioning. IEEE Communications Magazine, 53(3):150–
157.
RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area
569