CLAPAUTH: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure Infrastructure

被引:0
作者
Buriro, Attaullah [1 ]
Ricci, Francesco [1 ]
机构
[1] Free Univ Bolzano, Fac Comp Sci, Bolzano, Italy
来源
EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2022 | 2023年 / 13782卷
关键词
Biometrics; Authentication and access control; Behavioral biometrics; Smartwatch;
D O I
10.1007/978-3-031-25467-3_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a gesture-based user-friendly smartwatch-based user authentication scheme called CLAPAUTH to authenticate the users to gain physical access to a secure infrastructure. In CLAPAUTH users are authenticated by performing clapping actions, while wearing their smartwatch in one hand. CLAPAUTH, while users perform clapping gestures, profiles them by collecting data from their smartwatches' built-in accelerometer and gyroscope sensors. We have evaluated the proposed scheme on a publicly available dataset by using state-of-the-art n-class machine learning classifiers, namely Random Forest (RF), Artificial Neural Network (ANN), and K-Nearest Neighbors (KNN). KNN outperformed other two classifiers and attained 93.3% TAR at the cost of 0.22% FAR. CLAPAUTH could be widely accepted as it utilizes users' familiarity with a common action, such as clapping, and users are not required to remember any secret code or gesture.
引用
收藏
页码:15 / 30
页数:16
相关论文
共 33 条
[1]  
Baidya J., 2017, PROC IEEE 7 ANN COMP, P1
[2]  
Buriro A., 2017, BEHAV BIOMETRICS SMA
[3]   Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme [J].
Buriro, Attaullah ;
Gupta, Sandeep ;
Yautsiukhin, Artsiom ;
Crispo, Bruno .
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2021, 93 (09) :989-1006
[4]  
Buriro A, 2018, INT CARN CONF SECU, P37
[5]   SNAPAUTH: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme [J].
Buriro, Attaullah ;
Crispo, Bruno ;
Eskandri, Mojtaba ;
Gupta, Sandeep ;
Mahboob, Athar ;
Van Acker, Rutger .
EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 :30-37
[6]   Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics [J].
Buriro, Attaullah ;
Crispo, Bruno ;
Del Frari, Filippo ;
Wrona, Konrad .
NEW TRENDS IN IMAGE ANALYSIS AND PROCESSING - ICIAP 2015 WORKSHOPS, 2015, 9281 :27-34
[7]  
Gupta S., 2020, P 2019 3 INT C BIOME, P15
[8]  
Hall M., 2009, SIGKDD Explorations, V11, P10, DOI [10.1145/1656274.1656278, DOI 10.1145/1656274.1656278]
[9]  
Hall M. A., 1999, Correlation-based Feature Subset Selection for Machine Learning
[10]   Smart Locks: Lessons for Securing Commodity Internet of Things Devices [J].
Ho, Grant ;
Leung, Derek ;
Mishra, Pratyush ;
Hosseini, Ashkan ;
Song, Dawn ;
Wagner, David .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :461-472