2018
DOI: 10.1016/j.asoc.2017.07.032
|View full text |Cite
|
Sign up to set email alerts
|

Real-time electrocardiogram streams for continuous authentication

Abstract: Security issues are becoming critical in modern smart systems. Particularly, ensuring that only legitimate users get access to them is essential. New access control systems must rely on continuous authentication (CA) to provide higher security level. To achieve this, recent research has shown how biological signals, such as electroencephalograms (EEGs) or electrocardiograms (ECGs), can be useful for this purpose. In this paper, we introduce a new CA scheme that, contrarily to previous works in this area, consi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 30 publications
0
19
0
3
Order By: Relevance
“…One of the most important examples is the use of ECG information in real time. The studies shown in [ 50 , 51 ] demonstrate the feasibility of non-contact ECG measurements for CA purposes using different classifiers (SVM, KNN, etc.) and information (statistical, morphological, or wavelet properties).…”
Section: Continuous Authenticationmentioning
confidence: 99%
“…One of the most important examples is the use of ECG information in real time. The studies shown in [ 50 , 51 ] demonstrate the feasibility of non-contact ECG measurements for CA purposes using different classifiers (SVM, KNN, etc.) and information (statistical, morphological, or wavelet properties).…”
Section: Continuous Authenticationmentioning
confidence: 99%
“…Estes trabalhos consideraram a hipótese de que o ECG possui informações suficientes para aplicabilidade no reconhecimento humano. Especificamente, [Odinaka et al 2012] pesquisou cinquenta estudos dedicadosà identificação humana, onde 66% dos artigos pesquisados empregaram características não-fiduciais, 26% aplicaram características fiduciais, e 8% [ Camara et al 2018] consideraram um cenário de uma torre de controle de tráfego aéreo. Nesse conceito, os pesquisadores assumiram que os controladores exigiam monitoramento permanente para evitar incidentes de segurança, como um intruso tentando usar o sistema de controle, um controlador assumindo a posição de um colega e a alta variação da frequência cardíaca do controlador devido a uma situação estressante.…”
Section: Features Consideradas Para Sinais Ecgunclassified
“…Nesse sentido, o módulo de extração de recursos analisa a janela de ECG e a envia para uma Transformada Walsh-Hadamard (HT). [Camara et al 2018] consideraram o HT menos computacionalmente complexo que as transformadas de Fourier ou Wavelet. O modelo de aprendizado de máquina implementou um algoritmo k-NN, usando o conjunto de dados MIT-BIH Normal Sinus Rhythm [Goldberger et al 2000a].…”
Section: Features Consideradas Para Sinais Ecgunclassified
See 1 more Smart Citation
“…Biometrics solutions based on ECG [8,9] or EEG signals [10,11] have been proposed for authentication purposes. Some authors have even studied its feasibility (ECG [12,13] or EEG [14,15]) in the context of continuous authentication—the verifier validates the credentials at regular intervals, ideally at every instant. The key distribution problem between two devices (e.g., two ECG sensors [16]) has also attracted the attention of some researchers.…”
Section: Introductionmentioning
confidence: 99%