A User Security Continuous Authentication Method for Earable Devices

被引:0
|
作者
Wang, Yong [1 ,2 ]
Xiong, Yi [1 ]
Yang, Tianyu [1 ]
Shen, Yiran [3 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University, Harbin,150001, China
[2] Modeling and Emulation in E-Government National Engineering Laboratory, Harbin Engineering University, Harbin,150001, China
[3] School of Software, Shandong University, Jinan,250100, China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Authentication - Network coding - Network security - Support vector machines - Voting machines;
D O I
10.7544/issn1000-1239.202440415
中图分类号
学科分类号
摘要
Earable devices are used as typical AIoT edge sensing devices. Protecting the privacy of legitimate users and preventing illegal use has become extremely important. In response to the current user authentication methods for earable devices, which are limited by input interfaces, sensor costs, and device power consumption, resulting in insufficient security, low universality, and poor user experience, a user authentication model based on the built-in inertial measurement unit (IMU) of earable devices is proposed. This model extracts user-specific information by collecting vibration signals generated by users performing facial interaction gestures, and achieves diversified implicit continuous user authentication based on intelligent analysis of the above information. To extract accurate and reliable user-specific information, a deep neural network feature encoder based on a Siamese network is proposed, which maps gesture samples of the same user closer in the feature space and enlarges the distance between gesture samples of different users, achieving effective encoding of user-specific information. For continuous user authentication based on user-specific information, a weighted voting strategy based on the distance of the one-class support vector machine hyperplane is proposed, which can adaptively optimize the discrimination boundary to better capture the contained features and structures. The confidence level of the sample is determined based on the distance of the sample points inside and outside the hyperplane, and a weighted voting is designed for authentication. Experimental results show that the method in this paper achieves an authentication accuracy of 97.33% in a single vote, and achieves an authentication accuracy of 99.993% after seven rounds of continuous authentication, which is better than all the methods compared in this paper. It provides a smoother user experience and a higher level of security without the need for passwords, and has a high practical application value. © 2024 Science Press. All rights reserved.
引用
收藏
页码:2821 / 2834
相关论文
共 50 条
  • [41] Biometric Authentication: System Security and User Privacy
    Jain, Anil K.
    Nandakumar, Karthik
    COMPUTER, 2012, 45 (11) : 87 - 92
  • [42] Security Analysis and Enhancements of a User Authentication Scheme
    Liu, Wan-Rong
    He, Xin
    Ji, Zhi-Yong
    International Journal of Network Security, 2021, 23 (05): : 895 - 903
  • [43] An Evaluation of the Power Consumption of Coauthentication as a Continuous User Authentication Method in Mobile Systems
    Corn, Brandon
    Perez, Alfredo J.
    Ruiz, Ashley
    Cetin, Cagri
    Ligatti, Jay
    ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE, 2020, : 268 - 271
  • [44] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
  • [45] Biometric user authentication for heightened information security
    Xiao, QH
    BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 708 - 715
  • [46] A Security Architecture Based on User Authentication of Bluetooth
    Xin, Yu
    Ting, Yan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 627 - +
  • [47] Expanding Continuous Authentication with Mobile Devices
    Schaffer, Kim B.
    COMPUTER, 2015, 48 (11) : 92 - 95
  • [48] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [49] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
  • [50] Seeing beyond visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
    Rahman, Farzana
    Gani, Md Osman
    Ahsan, Golam Mushih Tanimul
    Ahamed, Sheikh Iqbal
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 121 - 129