2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) 2018
DOI: 10.1109/percomw.2018.8480248
|View full text |Cite
|
Sign up to set email alerts
|

Demo of BANDANA - Body Area Network Device-to-device Authentication using Natural gAit

Abstract: We demonstrate the BANDANA gait-based ad-hoc device pairing scheme. Our quantization approach extracts binary fingerprints from the deviation of acceleration sequences representing instantaneous gait vs. mean gait and establishes identical keys for fingerprints generated at distinct locations on the same body via a fuzzy commitment scheme. The separation between device-pairs on same-body and distinct body is possible as the fingerprint similarity exceeds 70% for same-body device pairs but on average reaches on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…If more physiological data need to be obtained in some cases, such as an emergency, the access rights of personal information need to be realized based on device authentication. In reference [11], a device-to-device authentication scheme is proposed, that is, the authentication mechanism between two sensor nodes deployed on the human body. e key is always fresh and secure from the user's gait mode through the change of instantaneous acceleration.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…If more physiological data need to be obtained in some cases, such as an emergency, the access rights of personal information need to be realized based on device authentication. In reference [11], a device-to-device authentication scheme is proposed, that is, the authentication mechanism between two sensor nodes deployed on the human body. e key is always fresh and secure from the user's gait mode through the change of instantaneous acceleration.…”
Section: Related Workmentioning
confidence: 99%
“…e network model based on three roles is shown in Figure 10 (five sensor nodes). Use equation ( 4) to calculate the results of the cross-correlation algorithm of ECG signals at Ti − 2 and Ti; (7) Use equation ( 9) to calculate the cross-correlation coefficient; (8) ELSE the result of Ti executing the algorithm is normal; (9) Select the ECG signal at Ti − 1; (10) Use equation ( 4) to calculate the results of the cross-correlation algorithm of ECG signals at Ti − 2 and Ti or Ti − 1 and Ti; (11) Use equation ( 9 (1). //INPUT: request access to information.…”
Section: Simulation Of Functional Modulesmentioning
confidence: 99%