2019
DOI: 10.1109/access.2019.2906663
|View full text |Cite
|
Sign up to set email alerts
|

You Walk, We Authenticate: Lightweight Seamless Authentication Based on Gait in Wearable IoT Systems

Abstract: With a plethora of wearable IoT devices available today, we can easily monitor human activities, many of which are unconscious or subconscious. Interestingly, some of these activities exhibit distinct patterns for each individual, which can provide an opportunity to extract useful features for user authentication. Among those activities, walking is one of the most rudimentary and mundane activity. Considering each individual's unique walking pattern, gait, which is the pattern of limb movements during locomoti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(19 citation statements)
references
References 16 publications
0
19
0
Order By: Relevance
“…Authors claimed that this software-based solution can be integrated into any smartwatch with PPG sensors for multi-factor authentication. On the other hand, Musale et al (Musale et al 2019) proposed a lightweight authentication approach using gait biometric for authenticating users of commercial smart watches. This was realized by extracting the statistical features and person's actions-related features from the collected data of sensors, thereby improving both accuracy and efficiency.…”
Section: Computer Sciencementioning
confidence: 99%
“…Authors claimed that this software-based solution can be integrated into any smartwatch with PPG sensors for multi-factor authentication. On the other hand, Musale et al (Musale et al 2019) proposed a lightweight authentication approach using gait biometric for authenticating users of commercial smart watches. This was realized by extracting the statistical features and person's actions-related features from the collected data of sensors, thereby improving both accuracy and efficiency.…”
Section: Computer Sciencementioning
confidence: 99%
“…Recently, a gait based user authentication method is introduced by [22]. The authors have developed an android application for collecting data from smartwatches and cellphones and transfer it to the authentication server.…”
Section: Related Workmentioning
confidence: 99%
“…We also performed the experiments on the machine learningbased tools for validation of the proposed approach and comparison of the results. The random forest classifier performs better than other algorithms for activity and user Identification [21,22]. We select 10 gait cycle features of each subject for training and testing purposes of the ratio of 70 to 30.…”
Section: Machine Learning Based Experimentsmentioning
confidence: 99%
See 1 more Smart Citation
“…Acar et al [38] used smartwatches with keystroke dynamics for continuous authentication. Musale et al [25] proposed a continuous authentication system based on Motorola 360 Sport by using accelerometer and gyroscope features. Vhaduri and Poellabauer [22] proposed continuous user authentication scheme that uses 44 features extracted from various biometrics (calorie burn, metabolic equivalent of task (MET), heart rate and step count) using Fitbit Charge HR device and they achieved average accuracy of 87.37% with Quadratic SVM classifier in one-to-many approach and average accuracy of 93% with Quadratic SVM classifier in oneto-one approach.…”
Section: Related Workmentioning
confidence: 99%