MusicID: A Brainwave-Based User Authentication System for Internet of Things
نویسندگان
چکیده
We propose MusicID, an authentication solution for smart devices that uses music-induced brainwave patterns as a behavioral biometric modality. experimentally evaluate MusicID using data collected from real users whilst they are listening to two forms of music: 1) popular English song and 2) individual's favorite song. show accuracy over 98% user identification 97% verification can be achieved by 4-electrode commodity headset. further single electrode is able provide approximately 85% the use electrodes provides 95%. As already shown brain-sensing headsets meditation applications, we believe, including dry electroencephalogram in feasible has potential providing entry point continuous framework upcoming surge mainly driven augmented reality (AR)/virtual (VR) applications.
منابع مشابه
A Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملBrainwave Based Authentication System : Research Issues and Challenges
Despite extensive research conducted in authentication system, security issues are still a challenging task. The most common authentication mechanism is Username and Password. Due to its lack of efficacy, it has been proved as weak method for authentication. In the recent years, Biometric authentication methods have been receiving increasing attention. The design of the biometric system require...
متن کاملDirected Path Based Authentication Scheme for the Internet of Things
The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In this paper, we focus on an existing U2IoT architecture (i.e., Unit IoT and Ubiquitous IoT), and propose a directed path based authentication scheme (DPAS) to realize security protection for the U2IoT architecture. Particularly, the direct...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2021
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2020.3044726