AirSign: A Gesture-based Smartwatch User Authentication

被引:0
|
作者
Buriro, Attaullah [1 ,3 ]
Van Acker, Rutger [4 ]
Crispo, Bruno [1 ,2 ]
Mahboob, Athar [3 ]
机构
[1] Univ Trento, Dept Informat Engn & Comp Sci DISI, Via Sommar, I-38123 Trento, Italy
[2] KULeuven, DistriNET, Leuven, Belgium
[3] Khwaja Fareed Univ Engn & Informat Technol, Dept Informat Secur, Rahim Yar Khan, Pakistan
[4] Hamont Achel Hamont, Swift Via Exellys, Flanders, Belgium
关键词
Behavioral Biometrics; User authentication; Smartwatch; Sensors;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smartwatches have been seen as the next generation personal devices, after smartphones, due to their use for wide range of applications, e.g., communication, financial applications, social networking, and fitness tracking, etc. These applications generate and store a lot of personal and private data which needs to be protected from unauthorized access. Several authentication schemes based on PIN/password, graphical password have been proposed, however, it is quite difficult to enter or sketch them because of small smartwatch screen. In addition, these schemes still suffer from unsolved security issues. In this paper, we present a novel movement-based behavioral biometric authentication solution for smartwatch, namely, AIRSIGN. AIRSIGN requires smartwatch worn user to write her name in the air. AIRSIGN leverages the armmovements while the user swings her finger in the air during the process of writing her name. More specifically, AIRSIGN generates arm-movement fingerprint to profile and identify the user. We implemented and evaluated our scheme on Motorola Moto 3G smartwatch. We applied Dynamic Time Warping (DTW), in two settings, and One-class Multilayer Perceptron (OMLP) as classifiers. AIRSIGN has the potential to replace the traditional authentication schemes and be accepted by users.
引用
收藏
页码:37 / 41
页数:5
相关论文
共 50 条
  • [1] SNAPAUTH: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme
    Buriro, Attaullah
    Crispo, Bruno
    Eskandri, Mojtaba
    Gupta, Sandeep
    Mahboob, Athar
    Van Acker, Rutger
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 : 30 - 37
  • [2] Towards Gesture-Based User Authentication
    Lai, Kam
    Konrad, Janusz
    Ishwar, Prakash
    2012 IEEE NINTH INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL-BASED SURVEILLANCE (AVSS), 2012, : 282 - 287
  • [3] Mobile Gesture-Based iPhone User Authentication
    Khare, Karan
    Moh, Teng-Sheng
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2015, : 1615 - 1621
  • [4] The Value of Multiple Viewpoints in Gesture-Based User Authentication
    Wu, Jonathan
    Konrad, Janusz
    Ishwar, Prakash
    2014 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2014, : 90 - 97
  • [5] Smartwatch User Authentication Based on the Arm-Raising Gesture
    Zhao, Yanchao
    Gao, Ran
    Tu, Huawei
    INTERACTING WITH COMPUTERS, 2020, 32 (5-6) : 569 - 580
  • [6] Touch Gesture-Based Active User Authentication Using Dictionaries
    Zhang, Heng
    Patel, Vishal M.
    Fathy, Mohammed
    Chellappa, Rama
    2015 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV), 2015, : 207 - 214
  • [7] The Value of Posture, Build and Dynamics in Gesture-Based User Authentication
    Wu, Jonathan
    Ishwar, Prakash
    Konrad, Janusz
    2014 IEEE/IAPR INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2014), 2014,
  • [8] DYNAMIC TIMEWARPING FOR GESTURE-BASED USER IDENTIFICATION AND AUTHENTICATION WITH KINECT
    Wu, Jonathan
    Konrad, Janusz
    Ishwar, Prakash
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 2371 - 2375
  • [9] Gesture-Based Soft Authentication
    Ferrari, Alan
    Puccinelli, Daniele
    Giordano, Silvia
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 771 - 777
  • [10] Multitouch Gesture-Based Authentication
    Sae-Bae, Napa
    Memon, Nasir
    Isbister, Katherine
    Ahmed, Kowsar
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) : 568 - 582