Cross-Modality Continuous User Authentication and Device Pairing with Respiratory Patterns

نویسندگان

چکیده

At-home screening systems for obstructive sleep apnea (OSA) can bring convenience to remote chronic disease management. However, the unsupervised home environment is subject spoofing and unintentional interference from household member. To improve robustness, this work presents SIENNA, an insider-resistant breathing-based authentication/pairing protocol. SIENNA leverages uniqueness of breathing patterns automatically continuously authenticate a user pairs mobile OSA app physiological monitoring radar system (PRMS). does not require biometric enrollment instead transforms respiratory measurements taken during users routine physical checkup into biometrics comparable with PRMS readings. Furthermore, it operate within noisy multi-target secure against co-located attacker through usage JADE-ICA, fuzzy commitment, friendly jamming. We fully implemented evaluated its performance medium-scale trials. Results show that achieve reliable (> 90% success rate) authentication device pairing in full knowledge authorized biometrics.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Analysis of Authentication in Bluetooth Device Pairing

Bluetooth is a popular standard for short-range wireless communications. Bluetooth device pairing enables two mobile devices to authenticate each other and establish a secure wireless connection. We present a formal analysis of authentication properties of Bluetooth device pairing. Using the ProVerif cryptographic protocol verifier, we first analyze the standard device pairing protocol specifie...

متن کامل

Continuous user authentication using multi-modal biometrics

As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security e particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the fundamental issue of usable and secure authentication through utilizing biometric-based techniques to continuously verify user identity. This p...

متن کامل

Continuous User Authentication Using Keystroke Dynamics

Behavioural biometric is related to what a person does, or how the person uses the body. Keystroke dynamics (or typing rhythms) is an innovative behavioural biometric technique, refers to a user’s habitual typing characteristics. These typing characteristics are believed to be unique among large populations. Keystroke dynamics allows for the design of more robust authentication systems than tra...

متن کامل

Continuous User Authentication Using Temporal Information

Conventional computer systems authenticate users only at the initial log-in session, which can be the cause of a critical security flaw. To resolve this problem, systems need continuous user authentication methods that continuously monitor and authenticate users based on some biometric trait(s). We propose a new method for continuous user authentication based on a Webcam that monitors a logged ...

متن کامل

Continuous User Authentication on Mobile Devices

Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in the use of mobile devices, one has to constantly worry about the security and privacy as the loss of a mobile device could compromise personal information of the user. To deal with this problem, continuous authentication (also ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Internet of Things Journal

سال: 2023

ISSN: ['2372-2541', '2327-4662']

DOI: https://doi.org/10.1109/jiot.2023.3275099