A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics.

作者: Guannan Wu , Jian Wang , Yongrong Zhang , Shuai Jiang

DOI: 10.3390/S18010179

关键词:

摘要: Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they also been used for identity authentication. Most of authentication methods adopt a one-time manner which cannot provide continuous certification. To address this issue, we present two-step method based on an own-built fingertip sensor device can capture motion data (e.g., acceleration and angular velocity) physiological photoplethysmography (PPG) signal) simultaneously. When is worn user’s fingertip, it will automatically recognize whether wearer legitimate user or not. More specifically, multisensor collected analyzed extract representative intensive features. Then, human activity recognition applied as first step enhance practicability system. After correctly discriminating state, one-class machine learning algorithm second step. wears device, process carried at set intervals. Analyses were conducted using from 40 individuals across various operational scenarios. Extensive experiments executed examine effectiveness proposed approach, achieved average accuracy rate 98.5% F1-score 86.67%. Our results suggest that scheme provides feasible practical solution

参考文章(36)
Chao Shen, Shichao Pei, Zhenyu Yang, Xiaohong Guan, Input extraction via motion-sensor behavior analysis on smartphones Computers & Security. ,vol. 53, pp. 143- 155 ,(2015) , 10.1016/J.COSE.2015.06.013
Igor Kononenko, Edvard Šimec, Marko Robnik-Šikonja, Overcoming the Myopia of Inductive Learning Algorithms with RELIEFF Applied Intelligence. ,vol. 7, pp. 39- 55 ,(1997) , 10.1023/A:1008280620621
Fen Miao, Yayu Cheng, Yi He, Qingyun He, Ye Li, A Wearable Context-Aware ECG Monitoring System Integrated with Built-in Kinematic Sensors of the Smartphone. Sensors. ,vol. 15, pp. 11465- 11484 ,(2015) , 10.3390/S150511465
Irene Rodriguez-Lujan, Gonzalo Bailador, Carmen Sanchez-Avila, Ana Herrero, Guillermo Vidal-de-Miguel, Analysis of pattern recognition and dimensionality reduction techniques for odor biometrics Knowledge Based Systems. ,vol. 52, pp. 279- 289 ,(2013) , 10.1016/J.KNOSYS.2013.08.002
Isao Nakanishi, Yuuta Sodani, SVM-Based Biometric Authentication Using Intra-Body Propagation Signals advanced video and signal based surveillance. pp. 561- 566 ,(2010) , 10.1109/AVSS.2010.12
Ming Zeng, Le T. Nguyen, Bo Yu, Ole J. Mengshoel, Jiang Zhu, Pang Wu, Joy Zhang, Convolutional Neural Networks for Human Activity Recognition using Mobile Sensors Proceedings of the 6th International Conference on Mobile Computing, Applications and Services. pp. 197- 205 ,(2014) , 10.4108/ICST.MOBICASE.2014.257786
Isaac Triguero, Daniel Paternain, Salvador García, Edurne Barrenechea, José M. Benítez, Humberto Bustince, Francisco Herrera, Daniel Peralta, Mikel Galar, A survey on fingerprint minutiae-based local matching for verification and identification Information Sciences. ,vol. 315, pp. 67- 87 ,(2015) , 10.1016/J.INS.2015.04.013
Yuting Zhang, Gang Pan, Kui Jia, Minlong Lu, Yueming Wang, Zhaohui Wu, Accelerometer-Based Gait Recognition by Sparse Representation of Signature Points With Clusters IEEE Transactions on Systems, Man, and Cybernetics. ,vol. 45, pp. 1864- 1875 ,(2015) , 10.1109/TCYB.2014.2361287
Zhi Xu, Kun Bai, Sencun Zhu, TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors wireless network security. pp. 113- 124 ,(2012) , 10.1145/2185448.2185465
T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining smart-card security under the threat of power analysis attacks IEEE Transactions on Computers. ,vol. 51, pp. 541- 552 ,(2002) , 10.1109/TC.2002.1004593