2018 IEEE 4th World Forum on Internet of Things (WF-IoT) 2018
DOI: 10.1109/wf-iot.2018.8355210
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight gait based authentication technique for IoT using subconscious level activities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Ashibani and Mahmoud [ 22 ] could authenticate users based on network traffic patterns of accessed apps in a accuracy range of 79% to 83% for 10 real users. Musale et al [ 53 ] achieved 97% accuracy using random forest algorithm for 12 real users. Anjomshoa et al [ 91 ] proposed a continuous authentication scheme leveraging five social networking apps usage data from smartphone devices, and could verify genuine users up to 97% success ratio for six real users; however, the architecture is cloud-centric, and it would not be suitable for our proposed edge computing architecture.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Ashibani and Mahmoud [ 22 ] could authenticate users based on network traffic patterns of accessed apps in a accuracy range of 79% to 83% for 10 real users. Musale et al [ 53 ] achieved 97% accuracy using random forest algorithm for 12 real users. Anjomshoa et al [ 91 ] proposed a continuous authentication scheme leveraging five social networking apps usage data from smartphone devices, and could verify genuine users up to 97% success ratio for six real users; however, the architecture is cloud-centric, and it would not be suitable for our proposed edge computing architecture.…”
Section: Discussionmentioning
confidence: 99%
“…The work highlights the possibility of using machine learning models in order to generate user profiles [ 22 ]. The proposed implicit authentication mechanisms for IoT environments can also be found in the literature: some are based only on smartphone data [ 22 , 53 ], while others rely on machine learning applied to WiFi signals [ 54 , 55 ] in order to authenticate IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, Chauhan et al observed that microphones can be used to extract breathing acoustics when the user is present in a smart environment [10]. Similarly, the builtin accelerometers in mobile and IoT devices have been used to characterize gait or human body movements to facilitate authentication [5,21,22,27]. These approaches were the first steps taken to explore the full potential of smart environments to turn contextual and behavioral data into biometric traits for seamless authentication.…”
Section: Single-biometric Systemsmentioning
confidence: 99%
“…Gait: The human gait is a spatio-temporal motor-controlled biometric behavior that can be employed for to recognise individuals unobtrusively, using a camera, radar, position-, motion-, or pressure-based sensors. Musale et al [113] proposed a Lightweight Gait Authentication Technique (Li-GAT) that exploits information, such as the subconscious level of user activities, collected from IoT devices having inbuilt motion sensors including an accelerometer. For evaluation, LR using deep-NN, RF, kNN classifiers were selected and achieved an accuracy of 96.69% on a dataset containing 12 subjects.…”
Section: Footstepmentioning
confidence: 99%