Authenticating users through their arm movement patterns

03/07/2016
by   Rajesh Kumar, et al.
0

In this paper, we propose four continuous authentication designs by using the characteristics of arm movements while individuals walk. The first design uses acceleration of arms captured by a smartwatch's accelerometer sensor, the second design uses the rotation of arms captured by a smartwatch's gyroscope sensor, third uses the fusion of both acceleration and rotation at the feature-level and fourth uses the fusion at score-level. Each of these designs is implemented by using four classifiers, namely, k nearest neighbors (k-NN) with Euclidean distance, Logistic Regression, Multilayer Perceptrons, and Random Forest resulting in a total of sixteen authentication mechanisms. These authentication mechanisms are tested under three different environments, namely an intra-session, inter-session on a dataset of 40 users and an inter-phase on a dataset of 12 users. The sessions of data collection were separated by at least ten minutes, whereas the phases of data collection were separated by at least three months. Under the intra-session environment, all of the twelve authentication mechanisms achieve a mean dynamic false accept rate (DFAR) of 0 and dynamic false reject rate (DFRR) of 0 feature level fusion-based design with classifier k-NN achieves the best error rates that are a mean DFAR of 2.2 increased from 5.68 level fusion-based design with classifier k-NN was tested under the inter-phase environment on a dataset of 12 users.

READ FULL TEXT

page 8

page 14

page 18

research
08/15/2017

Continuous User Authentication via Unlabeled Phone Movement Patterns

In this paper, we propose a novel continuous authentication system for s...
research
03/07/2019

Dynamic Anonymized Evaluation for Behavioral Continuous Authentication

Emerging technology demands reliable authentication mechanisms, particul...
research
02/28/2018

WACA: Wearable-Assisted Continuous Authentication

One-time login process in conventional authentication systems does not g...
research
09/21/2023

De-authentication using Ambient Light Sensor

While user authentication happens before initiating or resuming a login ...
research
10/15/2021

Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft

Mouse dynamics has grown in popularity as a novel irreproducible behavio...
research
01/10/2019

Dynamic Multiparty Authentication of Data Analytics Services within Cloud Environments

Business analytics processes are often composed from orchestrated, colla...

Please sign up or login with your details

Forgot password? Click here to reset