924 Hits in 4.8 sec

Secure and Privacy Enhanced Gait Authentication on Smart Phone

Thang Hoang, Deokjai Choi
2014 The Scientific World Journal  
In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone.  ...  Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements.  ...  A Google Nexus One smart phone put inside front pocket is employed to collect user gait signal ( Figure 2 ).  ... 
doi:10.1155/2014/438254 pmid:24955403 pmcid:PMC4052054 fatcat:vt2jputgmvbu3cuc3mcwzzd2eq

Secure techniques and methods for authenticating visually impaired mobile phone users

Md Munirul Haque, Shams Zawoad, Ragib Hasan
2013 2013 IEEE International Conference on Technologies for Homeland Security (HST)  
Our proposed scheme proves that each person's gait pattern is unique and can be used as a bio-metric data for authentication.  ...  Though researchers have developed many well known methods for user authentication in smartphone, little has been done focusing on visually impaired mobile device users.  ...  In this paper we describe a novel authentication scheme for visually impaired mobile phone users using only the accelerometer sensors of a mobile phone.  ... 
doi:10.1109/ths.2013.6699095 fatcat:73ruxomxbvakdorzo7xaeecmsa

On the Instability of Sensor Orientation in Gait Verification on Mobile Phone

Thang Hoang, Deokjai Choi, Thuc Nguyen
2015 Proceedings of the 12th International Conference on Security and Cryptography  
Authentication schemes using tokens or biometric modalities have been proposed to ameliorate the security strength on mobile devices.  ...  While the gait signal captured by inertial sensors is understood to be a reliable profile for effective implicit authentication, recent studies have been conducted in ideal conditions and might therefore  ...  The dataset consists of gait signals of 38 subjects captured by using a Google Nexus One mobile phone.  ... 
doi:10.5220/0005572001480159 dblp:conf/secrypt/HoangCN15 fatcat:mkdtnlcwwfdtxkgdwai3mvneem

Gait-Based Implicit Authentication Using Edge Computing and Deep Learning for Mobile Devices

Xin Zeng, Xiaomei Zhang, Shuqun Yang, Zhicai Shi, Chihung Chi
2021 Sensors  
Implicit authentication mechanisms are expected to prevent security and privacy threats for mobile devices using behavior modeling.  ...  In addition, to reduce computation overhead of mobile devices, the model for implicit authentication is generated on the cloud server, and the user authentication process also takes place on the edge devices  ...  For the gait signal, a signal-to-image method is used to convert the onedimensional gait data into a two-dimension grayscale image.  ... 
doi:10.3390/s21134592 fatcat:jwj4ozwgkzai3coib7ekplk7zi

A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error [chapter]

Thang Hoang, Deokjai Choi, Viet Vo, Anh Nguyen, Thuc Nguyen
2013 IFIP Advances in Information and Communication Technology  
In this paper, we propose a novel gait authentication mechanism by mining sensor resources on mobile phone.  ...  A novel and effective segmentation algorithm is also provided to segment signal into separate gait cycles with perfect accuracy.  ...  [18] used HTC G1 cell phone with built-in accelerometer attached at the trouser pocket position to collect gait signal.  ... 
doi:10.1007/978-3-642-39218-4_7 fatcat:cpp62qpkgjhh7jbxuzwka3iquy

Biometrics on mobile phone [chapter]

Shuo Wang, Jing Liu
2011 Recent Application in Biometrics  
Mobile phone based biometrics uses the acceleration signal characteristics produced by walking for verifying the identity of the users of a mobile phone while they walk with it.  ...  Generally, several key factors should be considered when implementing such biometrics within a mobile phone.  ...  Biometrics on mobile phone, Recent Application in Biometrics, Dr.  ... 
doi:10.5772/17151 fatcat:lyo3l55xujctplyrdv6w6uzd7y

Adversary Models for Mobile Device Authentication [article]

René Mayrhofer, Vishwath Mohan, Stephan Sigg
2020 arXiv   pre-print
Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods having been proposed and analyzed.  ...  In this article, we first introduce a new classification of adversaries to better analyze and compare mobile device authentication methods.  ...  Our intention is for this scheme to be used for future research, giving authentication methods a concrete security level to aim for and to test against.  ... 
arXiv:2009.10150v1 fatcat:hxdqh4hpqvg2dfwf54o7hggvnm

Secure key generation using gait features for Body Sensor Networks

Yingnan Sun, Charence Wong, Guang-Zhong Yang, Benny Lo
2017 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN)  
However, behavioural traits such as gait are rarely studied. In this paper, a novel lightweight symmetric key generation scheme based on the timing information of gait is proposed.  ...  By extracting similar timing information from gait acceleration signals simultaneously from body worn sensors, symmetric keys can be generated on all the sensor nodes at the same time.  ...  With the aim of developing a security scheme for BSN, we propose the use of gait biometrics for key generation for BSN.  ... 
doi:10.1109/bsn.2017.7936042 dblp:conf/bsn/SunWYL17 fatcat:p2yybrf2vzdznc6u4rtn6ji6de

Authentication of Smartphone Users Using Behavioral Biometrics [article]

Abdulaziz Alzubaidi, Jugal Kalita
2019 arXiv   pre-print
These devices have provided new avenues for consumers to play, work, and socialize whenever and wherever they want.  ...  However, mobile devices are also susceptible to various problems. One of the greatest concerns is the possibility of breach in security and privacy if the device is seized by an outside party.  ...  Schlegel et al., “Touch gestures based svms and hmms for accelerometer-based biometric gait recognition,” in biometric authentication scheme for touchscreen mobile phones,” in  ... 
arXiv:1911.04104v1 fatcat:yxx7pagj3ff6rok7zaq3f5psua


Mohammad Tamviruzzaman, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan, Casey O'brien
2009 Proceedings of the 2nd ACM workshop on Assurable and usable security configuration - SafeConfig '09  
In this paper an adaptive solution to secure the authentication process of cellular phones has been proposed. Gait and location tracks of the owner are used as the metrics for authentication.  ...  A fast and memory efficient variation of Dynamic Time Warping (DTW) algorithm called FastDTW has been used to compute the similarity score between gait samples.  ...  Thus security for cellular phones has become a dire necessity. A mobile phone is stolen every three minutes in the UK [14] .  ... 
doi:10.1145/1655062.1655066 dblp:conf/safeconfig/TanviruzzamanAHO09 fatcat:zv7cj73qrzevdb4upei5o3hvmu

Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends [article]

Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab
2019 arXiv   pre-print
Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented.  ...  The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided.  ...  With the category of behavior, authentication and authorization schemes use the behavior of doing signatures with a finger. • Gait recognition: The gait templates can be used for user verification.  ... 
arXiv:1901.09374v1 fatcat:tglfqlpnczhufoutjae6ogunz4

Biometric Authentication and Verification for Medical Cyber Physical Systems

Abdullah Alhayajneh, Alessandro Baccarini, Gary Weiss, Thaier Hayajneh, Aydin Farajidavar
2018 Electronics  
Preserving user security and privacy is a fundamental concern of WBANs, which introduces the notion of using biometric readings as a mechanism for authentication.  ...  WBANs used for recording biometric information and administering medication are classified as part of a Cyber Physical System (CPS).  ...  The biometric fingerprint recognition system is used in the new generations of smart mobile phones such as Samsung and Apple.  ... 
doi:10.3390/electronics7120436 fatcat:zhywz5zhzjh3ne7y4uj2pnaw4i

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues [article]

Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke
2019 arXiv   pre-print
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices.  ...  According to these, we categorize authentication schemes for smart mobile devices in four categories, namely, 1) biometric-based authentication schemes, 2) channel-based authentication schemes, 3) factor-based  ...  Storage capabilities of mobile phones increase rapidly, and phones can today generate and store large amounts of different types of data.  ... 
arXiv:1803.10281v2 fatcat:yjkohnh3qje3zk2yzp5xoakzfi

Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing

Muhammad Ehatisham-ul-Haq, Muhammad Awais Azam, Usman Naeem, Yasar Amin, Jonathan Loo
2018 Journal of Network and Computer Applications  
To address these 19 challenges, a novel continuous authentication scheme is presented in this study, which recognizes smartphone 20 users on the basis of their physical activity patterns using accelerometer  ...  A series of experiments are performed for user recognition using different machine learning 22 classifiers, where six different activities are analyzed for the multiple locations of smartphone on the user's  ...  Gait recognition with motion sensors provides a gateway for user authentication.  ... 
doi:10.1016/j.jnca.2018.02.020 fatcat:4tu22aitbzaqxjbmpnsbkakhde

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends

Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab
2019 Security and Communication Networks  
Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented.  ...  The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided.  ...  With the category of behavior, authentication and authorization schemes use the behavior of doing signatures with a finger.(v) Gait recognition: the gait templates can be used for user verification.  ... 
doi:10.1155/2019/5452870 fatcat:wvabztvuvndoloe3p2gyvoy5ha
« Previous Showing results 1 — 15 out of 924 results