A User Security Continuous Authentication Method for Earable Devices

被引:0
|
作者
Wang, Yong [1 ,2 ]
Xiong, Yi [1 ]
Yang, Tianyu [1 ]
Shen, Yiran [3 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University, Harbin,150001, China
[2] Modeling and Emulation in E-Government National Engineering Laboratory, Harbin Engineering University, Harbin,150001, China
[3] School of Software, Shandong University, Jinan,250100, China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Authentication - Network coding - Network security - Support vector machines - Voting machines;
D O I
10.7544/issn1000-1239.202440415
中图分类号
学科分类号
摘要
Earable devices are used as typical AIoT edge sensing devices. Protecting the privacy of legitimate users and preventing illegal use has become extremely important. In response to the current user authentication methods for earable devices, which are limited by input interfaces, sensor costs, and device power consumption, resulting in insufficient security, low universality, and poor user experience, a user authentication model based on the built-in inertial measurement unit (IMU) of earable devices is proposed. This model extracts user-specific information by collecting vibration signals generated by users performing facial interaction gestures, and achieves diversified implicit continuous user authentication based on intelligent analysis of the above information. To extract accurate and reliable user-specific information, a deep neural network feature encoder based on a Siamese network is proposed, which maps gesture samples of the same user closer in the feature space and enlarges the distance between gesture samples of different users, achieving effective encoding of user-specific information. For continuous user authentication based on user-specific information, a weighted voting strategy based on the distance of the one-class support vector machine hyperplane is proposed, which can adaptively optimize the discrimination boundary to better capture the contained features and structures. The confidence level of the sample is determined based on the distance of the sample points inside and outside the hyperplane, and a weighted voting is designed for authentication. Experimental results show that the method in this paper achieves an authentication accuracy of 97.33% in a single vote, and achieves an authentication accuracy of 99.993% after seven rounds of continuous authentication, which is better than all the methods compared in this paper. It provides a smoother user experience and a higher level of security without the need for passwords, and has a high practical application value. © 2024 Science Press. All rights reserved.
引用
收藏
页码:2821 / 2834
相关论文
共 50 条
  • [31] Known User Continuous Authentication System
    Brosso, Ines
    Ferreira, Fernando
    Bressan, Graca
    Ruggiero, Wilson V.
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 747 - +
  • [32] Improving the Security and QoE in Mobile Devices through an Intelligent and Adaptive Continuous Authentication System
    Jorquera Valero, Jose Maria
    Sanchez Sanchez, Pedro Miguel
    Fernandez Maimo, Lorenzo
    Huertas Celdran, Alberto
    Arjona Fernandez, Marcos
    De Los Santos Vilchez, Sergio
    Martinez Perez, Gregorio
    SENSORS, 2018, 18 (11)
  • [33] Research on user security authentication method of eco-environmental monitoring database
    Tan C.
    Lu X.
    Arabian Journal of Geosciences, 2021, 14 (11)
  • [34] Exploring Earable-Based Passive User Authentication via Interpretable In-Ear Breathing Biometrics
    Han, Feiyu
    Yang, Panlong
    Feng, Yuanhao
    Du, Haohua
    Li, Xiang-Yang
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (12) : 15238 - 15255
  • [35] Towards Implicit Enhancement of Security and User Authentication in Mobile Devices Based on Movement and Audio Analysis
    Ketabdar, Hamed
    Roshandel, Mehran
    Skripko, Daria
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 188 - 191
  • [36] BlinKey: A Two-Factor User Authentication Method for Virtual Reality Devices
    Zhu, Huadi
    Jin, Wenqiang
    Xiao, Mingyan
    Murali, Srinivasan
    Li, Ming
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (04):
  • [37] ToothSonic: Earable Authentication via Acoustic Toothprint
    Wang, Zi
    Ren, Yili
    Chen, Yingying
    Yang, Jie
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2022, 6 (02):
  • [38] An Efficient Multistage Security System for User Authentication
    Gupta, Ashutosh
    Medhi, Prerna
    Pandey, Sujata
    Kumar, Pradeep
    Kumar, Saket
    Singh, H. P.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3194 - 3197
  • [39] A Set of Heuristics for Usable Security and User Authentication
    Realpe, Paulo C.
    Collazos, Cesar A.
    Hurtado, Julio
    Granollers, Antoni
    PROCEEDINGS OF THE XVII INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION INTERACCION 2016, 2016,
  • [40] Security Analysis on Remote User Authentication Methods
    Soni, Mukesh
    Patel, Tejas
    Jain, Anuj
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 506 - 513