Robust Synchronized Data Acquisition for Biometric Authentication

نویسندگان

چکیده

Owing to its unique, concealment and easy customization by combining different wrist hand gestures, high-density surface electromyogram (HD-sEMG) is recognized as a potential solution the next generation biometric authentication, which usually adopts wireless body sensor network (BSN) acquire multi-channel HD-sEMG biosignals from distributed electrode arrays. For more accurate reliable classification, authentication requires be sampled simultaneously well aligned, means that sampling jitters among arrays need tiny. To synchronize data clocks of cluster BSN nodes for this article modifies packet-coupled oscillators protocol using dynamic controller (D-PkCOs). This only involves one-way single packet exchange, reduces communication overhead significantly. purpose maintaining precise these subject drifting clock frequency varying delays, designed via $H_\infty$ robust method, it proved all nodes’ are bounded. The experimental results demonstrate D-PkCOs can keep less than microsecond in 10-node IEEE 802.15.4 network. application shows signal with high signal-to-noise ratio obtained, leads better gesture classification performance.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multimodal Biometric Hand-Off for Robust Unobtrusive Continuous Biometric Authentication

Conventional access control solutions rely on a single authentication to verify a user’s identity but do nothing to ensure the authenticated user is indeed the same person using the system afterwards. Without continuous monitoring, unauthorized individuals have an opportunity to “hijack” or “tailgate” the original user’s session. Continuous authentication attempts to remedy this security loopho...

متن کامل

Robust Biometric Based Authentication Using Watermarking

In wireless communications, significant information are getting exchanged frequently. Inorder to avoid the illegal access of that sensitive information remote authentication is being done extensively. Remote authentication involves the submission of encrypted information, along with visual and audio cues. Incase of remote examination or interviewing, Trojan Horse and other attacks can cause sev...

متن کامل

Robust biometric-based user authentication scheme for wireless sensor networks

Wireless sensor networks (WSNs) are applied widely a variety of areas such as realtime traffic monitoring, measurement of seismic activity, wildlife monitoring and so on. User authentication in WSNs is a critical security issue due to their unattended and hostile deployment in the field. In 2010, Yuan et al. proposed the first biometric-based user authentication scheme for WSNs. However, Yoon e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Industrial Informatics

سال: 2022

ISSN: ['1551-3203', '1941-0050']

DOI: https://doi.org/10.1109/tii.2022.3182326