2019
DOI: 10.1109/tifs.2019.2911170
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Modal Biometric-Based Implicit Authentication of Wearable Device Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
44
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 100 publications
(47 citation statements)
references
References 34 publications
(9 reference statements)
3
44
0
Order By: Relevance
“…Vhaduri and Poellabauer [22] proposed continuous user authentication scheme that uses 44 features extracted from various biometrics (calorie burn, metabolic equivalent of task (MET), heart rate and step count) using Fitbit Charge HR device and they achieved average accuracy of 87.37% with Quadratic SVM classifier in one-to-many approach and average accuracy of 93% with Quadratic SVM classifier in oneto-one approach. In their revised scheme [14], they adopted more features (65) with different feature selection approaches and 93% (sedentary) and 90% (non-sedentary) with equal error rates of 5% is obtained. However, the Fitbit framework only provides only one sample each minute and access to the raw data is not possible.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Vhaduri and Poellabauer [22] proposed continuous user authentication scheme that uses 44 features extracted from various biometrics (calorie burn, metabolic equivalent of task (MET), heart rate and step count) using Fitbit Charge HR device and they achieved average accuracy of 87.37% with Quadratic SVM classifier in one-to-many approach and average accuracy of 93% with Quadratic SVM classifier in oneto-one approach. In their revised scheme [14], they adopted more features (65) with different feature selection approaches and 93% (sedentary) and 90% (non-sedentary) with equal error rates of 5% is obtained. However, the Fitbit framework only provides only one sample each minute and access to the raw data is not possible.…”
Section: Related Workmentioning
confidence: 99%
“…• One of the previous studies employed mean heart rate per minute which requires longer recordings and achieves approximately five minutes [14]. The proposed system uses more sophisticated HRV features derived from inter-beat intervals which are extracted from the raw PPG sensor data.…”
Section: Introductionmentioning
confidence: 99%
“…The authentication for multiple servers is a difficult task for that BAN-logic is used for the effective security capability using multiple server architecture. The robust authentication scheme is used for Vehicle Sensor Networks (VSN) for continuous information of the vehicle and decentralized authentication for vehicle communication for fast efficient and security performance [12] [13]. The Proxy-based authentication scheme (PBAS) and Identity message-based authentication scheme (ID-MAP) is used for securing the message-related information which satisfies the Vehicular Ad-Hoc networks (VANETs) and edge computing scheme is also used for authentication of the further need of potential attacks.…”
Section: Dna Computing Based Encryption Algorithm For Wireless Multimmentioning
confidence: 99%
“…Based on the review of the above literature, it appears that the continuous authentication method mixed with biometric features and physiological movement can address many security issues of mobile devices and applications [27]. However, each biometric of the characteristics such as fingerprints, iris, electroencephalography (EEG) data, voice, face, palm, ear, and gait, has its advantage or disadvantage.…”
Section: Related Workmentioning
confidence: 99%