SmartEar: Rhythm-Based Tap Authentication Using Earphone in Information-Centric Wireless Sensor Network

被引:17
作者
Bi, Hongliang [1 ]
Sun, Yuanyuan [2 ]
Liu, Jiajia [1 ]
Cao, Lihao [3 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Natl Engn Lab Integrated Aerosp Ground Ocean Big, Xian 710072, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[3] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Headphones; Authentication; Rhythm; Probability density function; Accelerometers; Internet of Things; Euclidean distance; Accelerometer; earphone; tap gesture; user authentication;
D O I
10.1109/JIOT.2021.3063479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of the information-centric wireless sensor network (ICWSN) has solved the challenges of information transmission and processing caused by the accelerated growth of wearable devices and the wide deployment of the Internet of Things (IoT) recently. The privacy security is also a growing problem. The existing works use earphones, covert, and user-friendly wearable devices, for user authentication. However, some of the earphone-based authentication solutions need to customize special earphones, which are not universal. Other solutions use microphones and speakers of earphones for authentication, which are susceptible to changes in the auricle's internal environment, resulting in a decline in performance. To solve this problem, a new authentication solution based on the existing commercial earphones is proposed to authenticate a user by tapping on the earphone rhythmically. This rhythmic tap behavior causes a change of the signal waveform of the built-in accelerometer in the earphone. Based on this, we design a pipeline to authenticate the user's identity. We first design an event detection algorithm to segment the tap signal accurately. Then, we use the global features calculated based on the event detection algorithm and local features extracted from the convolutional neural network (CNN) for building an authentication model using the Naive Bayes (NB) classifier. Finally, 20 users are recruited to evaluate the experiment and the recognition accuracy reaches 98%. Moreover, we extend the experiment to prove that it has a good performance against the different attacks and is robust in different scenarios.
引用
收藏
页码:885 / 896
页数:12
相关论文
共 37 条
[1]   Acoustic ear recognition for person identification [J].
Akkermans, AHM ;
Kevenaar, TAM ;
Schobben, DWE .
FOURTH IEEE WORKSHOP ON AUTOMATIC IDENTIFICATION ADVANCED TECHNOLOGIES, PROCEEDINGS, 2005, :219-223
[2]  
[Anonymous], 2020, AIRPODS PRO
[3]   Recent Advances in Information-Centric Networking-Based Internet of Things (ICN-IoT) [J].
Arshad, Sobia ;
Azam, Muhammad Awais ;
Rehmani, Mubashir Husain ;
Loo, Jonathan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2128-2158
[4]  
Carlucci M., 2020, IEEE CONF COMM NETW, P1, DOI DOI 10.1109/cns48642.2020.9162343
[5]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[6]   Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing [J].
Chen, Jiayi ;
He, Jianping ;
Cai, Lin ;
Pan, Jianping .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1173-1187
[7]  
Chen YM, 2015, IEEE INFOCOM SER, DOI 10.1109/INFOCOM.2015.7218660
[8]  
Chuang J., 2018, P INT C PHYSL COMP S, P30
[9]  
Curran MT, 2016, IEEE ENG MED BIO, P1979, DOI 10.1109/EMBC.2016.7591112
[10]  
Ding SY, 2016, NAT REV MATER, V1, DOI [10.1038/natrevmats.2016.71, 10.1038/natrevmats.2016.21]