A User Security Continuous Authentication Method for Earable Devices

被引:0
|
作者
Wang, Yong [1 ,2 ]
Xiong, Yi [1 ]
Yang, Tianyu [1 ]
Shen, Yiran [3 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University, Harbin,150001, China
[2] Modeling and Emulation in E-Government National Engineering Laboratory, Harbin Engineering University, Harbin,150001, China
[3] School of Software, Shandong University, Jinan,250100, China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Authentication - Network coding - Network security - Support vector machines - Voting machines;
D O I
10.7544/issn1000-1239.202440415
中图分类号
学科分类号
摘要
Earable devices are used as typical AIoT edge sensing devices. Protecting the privacy of legitimate users and preventing illegal use has become extremely important. In response to the current user authentication methods for earable devices, which are limited by input interfaces, sensor costs, and device power consumption, resulting in insufficient security, low universality, and poor user experience, a user authentication model based on the built-in inertial measurement unit (IMU) of earable devices is proposed. This model extracts user-specific information by collecting vibration signals generated by users performing facial interaction gestures, and achieves diversified implicit continuous user authentication based on intelligent analysis of the above information. To extract accurate and reliable user-specific information, a deep neural network feature encoder based on a Siamese network is proposed, which maps gesture samples of the same user closer in the feature space and enlarges the distance between gesture samples of different users, achieving effective encoding of user-specific information. For continuous user authentication based on user-specific information, a weighted voting strategy based on the distance of the one-class support vector machine hyperplane is proposed, which can adaptively optimize the discrimination boundary to better capture the contained features and structures. The confidence level of the sample is determined based on the distance of the sample points inside and outside the hyperplane, and a weighted voting is designed for authentication. Experimental results show that the method in this paper achieves an authentication accuracy of 97.33% in a single vote, and achieves an authentication accuracy of 99.993% after seven rounds of continuous authentication, which is better than all the methods compared in this paper. It provides a smoother user experience and a higher level of security without the need for passwords, and has a high practical application value. © 2024 Science Press. All rights reserved.
引用
收藏
页码:2821 / 2834
相关论文
共 50 条
  • [21] A novel continuous authentication method using biometrics for IOT devices
    Bhuva, Dipen R.
    Kumar, Sathish
    INTERNET OF THINGS, 2023, 24
  • [22] Earable Authentication via Acoustic Toothprint
    Wang, Zi
    Ren, Yili
    Chen, Yingying
    Yang, Jie
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2390 - 2392
  • [23] Improving security and flexibility of user authentication
    Hajny, Jan
    Pelka, Tomas
    Zeman, Vaclav
    APPLIED AND COMPUTATIONAL MATHEMATICS, 2ND EDITION, 2008, : 258 - +
  • [24] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [25] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [26] Continuous User Authentication by the Classification Method Based on the Dynamic Touchscreen Biometrics
    Leyfer, Kirill
    Spivak, Anton
    PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 228 - 234
  • [27] Using Mobile Devices for User Authentication
    Lach, Jacek
    COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [28] Trends in User Identity and Continuous Authentication
    Lopes dos Santos, Uelison Jean
    da Costa, Cristiano Andre
    Mayer, Andre Henrique
    dos Reis, Eduardo Souza
    Cruz Maldonado, Juan Eduardo
    Victoria Barbosa, Jorge Luis
    Antunes, Rodolfo Stoffel
    Righi, Rodrigo da Rosa
    Flores, Nelson Eduardo
    COMPUTER, 2022, 55 (11) : 52 - 61
  • [29] Continuous User Authentication using WiFi
    Huang, Pengcheng
    Zhang, Dongheng
    Geng, Ruixu
    Chen, Yan
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 2083 - 2088
  • [30] Leveraging Breathing for Continuous User Authentication
    Liu, Jian
    Dong, Yudi
    Chen, Yingying
    Wang, Yan
    Zhao, Tianming
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 786 - 788