A novel continuous authentication method using biometrics for IOT devices

被引:20
作者
Bhuva, Dipen R. [1 ]
Kumar, Sathish [1 ]
机构
[1] Cleveland State Univ, Dept Elect Engn & Comp Sci, Washkewicz Coll Engn, Cleveland, OH 44115 USA
基金
美国国家科学基金会;
关键词
Continuous authentication; Internet of Things; Electrocardiography (ECG); Electromyography (EMG); Machine learning; Biometrics; INTERNET; ECG;
D O I
10.1016/j.iot.2023.100927
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we examine continuous authentication for IoT devices using real-time biometrics of a person's electrocardiogram (ECG) and electromyography (EMG). ECG is mainly used as a biometric identifier because it has specific features such as mathematical, morphological, and wavelet characteristics. EMG is a bio-signal defining a hand gesture of a person. Our authentication system would require no human interaction as it will have a continuous authentication schema. As soon as the user leaves a specific perimeter, the session will be killed by the system. In this paper, we propose a challenging and integrated methodology for developing, prototyping, and evaluating a continuous authentication scheme to ensure that currently insecure IoT networks are improved to have a high level of security with two layers of biometric security with continuous authentication to perform authentication in an automated manner. We used the dataset from PhysioNet for ECG, which contains samples of around 12 K for 298 people. We also used the EMG dataset available on the geostatic python library containing 150 K samples. In this experiment, we concluded that it is viable to use our continuous authentication for IoT devices with the lowest performance consumption and power consumption. The experimentation also demonstrates that the training model on two bio-signals helps obtain higher accuracy on continuous authentication within an average of 99.6%-99.99%. Our authentication schema can be implemented and integrated on any IoT device with having at least one wireless frequency that can receive and send a signal to the sender/authenticator.
引用
收藏
页数:32
相关论文
共 37 条
[1]   A survey on continuous authentication methods in Internet of Things environment [J].
Al-Naji, Fatimah Hussain ;
Zagrouba, Rachid .
COMPUTER COMMUNICATIONS, 2020, 163 :109-133
[2]   Negative impact of long-term exposure of salinity and drought stress on native Tetraena mandavillei L. [J].
Alam, Hasnain ;
Khattak, Jabar Z. K. ;
Ksiksi, Taoufik S. ;
Saleem, Muhammad H. ;
Fahad, Shah ;
Sohail, Hamza ;
Ali, Qasim ;
Zamin, Muhammad ;
El-Esawi, Mohamed A. ;
Saud, Shah ;
Jiang, Xue ;
Alwahibi, Mona S. ;
Alkahtani, Jawaher .
PHYSIOLOGIA PLANTARUM, 2021, 172 (02) :1336-1351
[3]  
Aziz S, 2019, 2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), P906, DOI [10.1109/IEMCON.2019.8936174, 10.1109/iemcon.2019.8936174]
[4]   A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things [J].
Badhib, Arwa ;
Alshehri, Suhair ;
Cherif, Asma .
IEEE ACCESS, 2021, 9 :124768-124792
[5]   A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters [J].
Bao, Shihan ;
Hathal, Waleed ;
Cruickshank, Haitham ;
Sun, Zhili ;
Asuquo, Phillip ;
Lei, Ao .
ICT EXPRESS, 2018, 4 (04) :221-227
[6]  
Barros A, 2019, INT WIREL COMMUN, P307, DOI 10.1109/IWCMC.2019.8766495
[7]  
Belgacem Noureddine, 2015, Journal of Medical Engineering & Technology, V39, P226, DOI [10.3109/03091902.2015.1021429, 10.3109/03091902.2015.1021429]
[8]  
Chai W., 2019, What is confidentiality, integrity, and availability (CIA triad)?-Definition from WhatIs.com
[9]  
Chandrakar P., 2021, Emerging Trends in Ind. 4.0 (ETI 4.0), P1, DOI [10.1109/ETI4.051663.2021.9619283, DOI 10.1109/ETI4.051663.2021.9619283]
[10]   Leveraging Ambient LTE Traffic for Ubiquitous Passive Communication [J].
Chi, Zicheng ;
Liu, Xin ;
Wang, Wei ;
Yao, Yao ;
Zhu, Ting .
SIGCOMM '20: PROCEEDINGS OF THE 2020 ANNUAL CONFERENCE OF THE ACM SPECIAL INTEREST GROUP ON DATA COMMUNICATION ON THE APPLICATIONS, TECHNOLOGIES, ARCHITECTURES, AND PROTOCOLS FOR COMPUTER COMMUNICATION, 2020, :172-185