Patterns-of-Life Aided Authentication

نویسندگان

  • Nan Zhao
  • Aifeng Ren
  • Zhiya Zhang
  • Tianqiao Zhu
  • Masood Ur-Rehman
  • Xiaodong Yang
  • Fangming Hu
چکیده

Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user's behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

The shelf-life of conventional surimi and recovery of functional proteins from silver carp (Hypophthalmichthys molitrix) muscle by an acid or alkaline solubilization process during frozen storage

The shelf-life of conventional surimi and isolated proteins that modified by acidic pH (2.5) and by using alkali pH (11) from silver carp (Hypophthalmichthys molitrix) was studied during months of storage at -18±2 °C. For conventional surimi, three washing steps were used. In the third stage of washing, 0.2% NaCl was used to withdraw more water. The result showed that isolated protein by alkali...

متن کامل

User-aided data authentication

All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreem...

متن کامل

The shelf-life of conventional surimi and recovery of functional proteins from silver carp (Hypophthalmichthys molitrix) muscle by an acid or alkaline solubilization process during frozen storage

The shelf-life of conventional surimi and isolated proteins that modified by acidic pH (2.5) and by using alkali pH (11) from silver carp (Hypophthalmichthys molitrix) was studied during months of storage at -18±2 °C. For conventional surimi, three washing steps were used. In the third stage of washing, 0.2% NaCl was used to withdraw more water. The result showed that isolated protein by alkali...

متن کامل

ارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 16  شماره 

صفحات  -

تاریخ انتشار 2016