A User Security Continuous Authentication Method for Earable Devices

被引:0
|
作者
Wang, Yong [1 ,2 ]
Xiong, Yi [1 ]
Yang, Tianyu [1 ]
Shen, Yiran [3 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University, Harbin,150001, China
[2] Modeling and Emulation in E-Government National Engineering Laboratory, Harbin Engineering University, Harbin,150001, China
[3] School of Software, Shandong University, Jinan,250100, China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Authentication - Network coding - Network security - Support vector machines - Voting machines;
D O I
10.7544/issn1000-1239.202440415
中图分类号
学科分类号
摘要
Earable devices are used as typical AIoT edge sensing devices. Protecting the privacy of legitimate users and preventing illegal use has become extremely important. In response to the current user authentication methods for earable devices, which are limited by input interfaces, sensor costs, and device power consumption, resulting in insufficient security, low universality, and poor user experience, a user authentication model based on the built-in inertial measurement unit (IMU) of earable devices is proposed. This model extracts user-specific information by collecting vibration signals generated by users performing facial interaction gestures, and achieves diversified implicit continuous user authentication based on intelligent analysis of the above information. To extract accurate and reliable user-specific information, a deep neural network feature encoder based on a Siamese network is proposed, which maps gesture samples of the same user closer in the feature space and enlarges the distance between gesture samples of different users, achieving effective encoding of user-specific information. For continuous user authentication based on user-specific information, a weighted voting strategy based on the distance of the one-class support vector machine hyperplane is proposed, which can adaptively optimize the discrimination boundary to better capture the contained features and structures. The confidence level of the sample is determined based on the distance of the sample points inside and outside the hyperplane, and a weighted voting is designed for authentication. Experimental results show that the method in this paper achieves an authentication accuracy of 97.33% in a single vote, and achieves an authentication accuracy of 99.993% after seven rounds of continuous authentication, which is better than all the methods compared in this paper. It provides a smoother user experience and a higher level of security without the need for passwords, and has a high practical application value. © 2024 Science Press. All rights reserved.
引用
收藏
页码:2821 / 2834
相关论文
共 50 条
  • [1] User Authentication on Earable Devices via Bone-Conducted Occlusion Sounds
    Xie, Yadong
    Li, Fan
    Wu, Yue
    Wang, Yu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3704 - 3718
  • [2] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [3] Continuous User Authentication on Multiple Smart Devices
    Wang, Yajie
    Zhang, Xiaomei
    Hu, Haomin
    INFORMATION, 2023, 14 (05)
  • [4] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [5] Survey on NonObstructive and Continuous User Authentication on Mobile Devices
    Lalithamani, N.
    Balaji, Raam
    Dev, S. V. P. K. H. Satya
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [6] Continuous Authentication System to Increase Security Level of User Workstations
    Kudinov, A. A.
    Elsakov, S. M.
    2018 GLOBAL SMART INDUSTRY CONFERENCE (GLOSIC), 2018,
  • [7] Attribute-based Continuous User Authentication on Mobile Devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [8] Behavioral biometrics & continuous user authentication on mobile devices: A survey
    Stylios, Ioannis
    Kokolakis, Spyros
    Thanou, Olga
    Chatzis, Sotirios
    INFORMATION FUSION, 2021, 66 : 76 - 99
  • [9] Continuous User Authentication using Keystroke Dynamics for Touch Devices
    Herath, H. M. C. K. B.
    Dulanga, K. G. C.
    Tharindu, N. V. D.
    Ganegoda, G. U.
    2022 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ROBOTICS (ICIPROB), 2022,
  • [10] User perspective and security of a new mobile authentication method
    Laka, Pawel
    Mazurczyk, Wojciech
    TELECOMMUNICATION SYSTEMS, 2018, 69 (03) : 365 - 379