On-phone CNN model-based implicit authentication to secure IoT wearables

SV Dibbo, W Cheung, S Vhaduri - … Conference on Safety and Security with …, 2022 - Springer
The connectivity of smart technologies, such as smartphones and smart wearables, is ever-
increasing with the emergence of the internet of things (IoT). This technological …

Bag of on-phone ANNs to secure IoT objects using wearable and smartphone biometrics

S Vhaduri, W Cheung, SV Dibbo - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The introduction of the Internet of Things (IoT) has made several emerging applications, from
financial transactions to property access, possible through IoT-connected smart wearables …

Implicit IoT authentication using on-phone ANN models and breathing data

S Vhaduri, SV Dibbo, W Cheung - Internet of Things, 2023 - Elsevier
The expansionist nature of the Internet of Things (IoT) with smart sensing has integrated
smart technology into the fabric of daily life. From digital health check-ups and personal …

Context-dependent implicit authentication for wearable device users

W Cheung, S Vhaduri - … on Personal, Indoor and Mobile Radio …, 2020 - ieeexplore.ieee.org
As market wearables are becoming popular with a range of services, including making
financial transactions, accessing cars, etc. that they provide based on various private …

Summary: Multi-modal biometric-based implicit authentication of wearable device users

S Vhaduri, C Poellabauer - arXiv preprint arXiv:1907.06563, 2019 - arxiv.org
The Internet of Things (IoT) is increasingly empowering people with an interconnected world
of physical objects ranging from smart buildings to portable smart devices such as …

Thumbup: Identification and authentication by smartwatch using simple hand gestures

X Yu, Z Zhou, M Xu, X You, XY Li - 2020 IEEE international …, 2020 - computer.org
The widespread creative application and smart devices call for convenient and secure
interaction with human users. We propose, design, and implement a smartwatch-based two …

Mandipass: Secure and usable user authentication via earphone imu

J Liu, W Song, L Shen, J Han, X Xu… - 2021 IEEE 41st …, 2021 - ieeexplore.ieee.org
Biometric plays an important role in user authentication. However, the most widely used
biometrics, such as facial feature and fingerprint, are easy to capture or record, and thus …

Opportunistic multi-modal user authentication for health-tracking IoT wearables

A Muratyan, W Cheung, SV Dibbo… - The Fifth International …, 2022 - Springer
With the advancement of technologies, market wearables are becoming increasingly
popular with a range of services, including providing access to bank accounts, accessing …

Warmup and transfer knowledge-based federated learning approach for iot continuous authentication

M Wazzeh, H Ould-Slimane, C Talhi, A Mourad… - arXiv preprint arXiv …, 2022 - arxiv.org
Continuous behavioural authentication methods add a unique layer of security by allowing
individuals to verify their unique identity when accessing a device. Maintaining session …

The house that knows you: User authentication based on iot data

T Ongun, A Oprea, C Nita-Rotaru… - Proceedings of the …, 2018 - dl.acm.org
Home-based Internet of Things (IoT) devices have gained in popularity and many
households became" smart''by using devices such as smart sensors, locks, and voice-based …