2018
DOI: 10.3390/s18010179
|View full text |Cite
|
Sign up to set email alerts
|

A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics

Abstract: Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(30 citation statements)
references
References 44 publications
0
26
0
2
Order By: Relevance
“…This biometric cryptosystem has 4 of low explosibility and can be used by disabled people or users with some missing physical traits. For Continuous authentication, Guannan et al [25] suggested a two-step authentication method based on motion and physiological movement, i.e., photoplethysmography (PPG) signals, especially for wearable devices. Even continuous authentication protocols can be classified into two categories: a) user-to-device and b) device-to-device [26].…”
Section: Related Workmentioning
confidence: 99%
“…This biometric cryptosystem has 4 of low explosibility and can be used by disabled people or users with some missing physical traits. For Continuous authentication, Guannan et al [25] suggested a two-step authentication method based on motion and physiological movement, i.e., photoplethysmography (PPG) signals, especially for wearable devices. Even continuous authentication protocols can be classified into two categories: a) user-to-device and b) device-to-device [26].…”
Section: Related Workmentioning
confidence: 99%
“…Alguns deles consideram características comportamentais ou temporais para a autenticação. Outros seguem estudos práticos utilizando multisensores custosos e requerem constante movimentação do usuário [Wu et al 2018]. [Lin et al 2017] utilizaram a variação de batimentos cardíacos para autenticação contínua, obtendo acurácia de 98,61%.…”
Section: Trabalhos Relacionadosunclassified
“…A biometria é amplamente estudada na literatura e demonstra um grande potencial para a autenticação de usuários no contexto dos dispositivos vestíveis [Wu et al 2018]. As formas mais comuns de autenticação biométrica passam pelo reconhecimento da impressão digital, da facial ou da íris.…”
Section: Introductionunclassified
“…Table1 displays the comparison result and show the ideal authentication framework for IAM will face all challenges. [27] No No No Yes [22] Yes No No Yes [23] Yes Yes Yes No [11] Yes No No Yes [20] No No Yes No [21] Yes Yes No Yes [26] Yes No No Yes [28] No…”
Section: Intelligent Authentications Key Factor Evaluationmentioning
confidence: 99%