Secure user verification and continuous authentication via earphone imu

J Liu, W Song, L Shen, J Han… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Biometric plays an important role in user authentication. However, the most widely used
biometrics, such as facial feature and fingerprint, are easy to capture or record, and thus …

[HTML][HTML] Artificial intelligence in physiological characteristics recognition for internet of things authentication

Z Zhang, H Ning, F Farha, J Ding, KKR Choo - Digital Communications and …, 2022 - Elsevier
Effective user authentication is key to ensuring equipment security, data privacy, and
personalized services in Internet of Things (IoT) systems. However, conventional mode …

A Hybrid Mutual Authentication Approach for Artificial Intelligence of Medical Things

MA Jan, W Zhang, A Akbar, H Song… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Artificial Intelligence of Medical Things (AIoMT) is a hybrid of the Internet of Medical Things
(IoMT) and artificial intelligence to materialize the acquisition of real-time data via the smart …

You walk, we authenticate: lightweight seamless authentication based on gait in wearable IoT systems

P Musale, D Baek, N Werellagama, SS Woo… - IEEE …, 2019 - ieeexplore.ieee.org
With a plethora of wearable IoT devices available today, we can easily monitor human
activities, many of which are unconscious or subconscious. Interestingly, some of these …

Can a smartband be used for continuous implicit authentication in real life

D Ekiz, YS Can, YC Dardagan, C Ersoy - IEEE Access, 2020 - ieeexplore.ieee.org
The use of cloud services that process privacy-sensitive information such as digital banking,
pervasive healthcare, smart home applications requires an implicit continuous …

Challenges and opportunities of biometric user authentication in the age of iot: A survey

CW Lien, S Vhaduri - ACM Computing Surveys, 2023 - dl.acm.org
While the Internet of Things (IoT) devices, such as smartwatches, provide a range of services
from managing financial transactions to monitoring smart homes, these devices often lead to …

Examining Uniqueness and Permanence of the WAY EEG GAL dataset toward User Authentication

A Ray-Dowling - arXiv preprint arXiv:2209.04802, 2022 - arxiv.org
This study evaluates the discriminating capacity (uniqueness) of the EEG data from the WAY
EEG GAL public dataset to authenticate individuals against one another as well as its …

How to Dance Your Passwords: A Biometric MFA-Scheme for Identification and Authentication of Individuals in IIoT Environments

C Lipps, J Herbst, HD Schotten - Proceedings of the ICCWS …, 2021 - books.google.com
Current environments especially in the industrial sector including smart factories, the
Industrial Internet of Things (IIoT) and Cyber-Physical Production Systems (CPPSs) consists …

[PDF][PDF] End-to-end data authentication deep learning model for securing IoT configurations

M Hammad, AM Iliyasu, IA Elgendy… - Human-centric computing …, 2022 - hcisj.com
Compared to other biometrics, electrocardiograms (ECGs) have gained widespread
acceptability as mediums for validating animateness in numerous security applications …

Hand-key: Leveraging multiple hand biometrics for attack-resilient user authentication using COTS RFID

J Liu, X Zou, F Lin, J Han, X Xu… - 2021 IEEE 41st …, 2021 - ieeexplore.ieee.org
Biometrics have been widely used in user authentications. However, existing outer-body
biometrics (eg, fingerprint), collecting from body surface, are vulnerable to spoofing attacks …