Patterns-of-Life Aided Authentication
نویسندگان
چکیده
Wireless Body Area Network (WBAN) applications have grown immensely in the past few years. However, security and privacy of the user are two major obstacles in their development. The complex and very sensitive nature of the body-mounted sensors means the traditional network layer security arrangements are not sufficient to employ their full potential, and novel solutions are necessary. In contrast, security methods based on physical layers tend to be more suitable and have simple requirements. The problem of initial trust needs to be addressed as a prelude to the physical layer security key arrangement. This paper proposes a patterns-of-life aided authentication model to solve this issue. The model employs the wireless channel fingerprint created by the user's behavior characterization. The performance of the proposed model is established through experimental measurements at 2.45 GHz. Experimental results show that high correlation values of 0.852 to 0.959 with the habitual action of the user in different scenarios can be used for auxiliary identity authentication, which is a scalable result for future studies.
منابع مشابه
Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملThe shelf-life of conventional surimi and recovery of functional proteins from silver carp (Hypophthalmichthys molitrix) muscle by an acid or alkaline solubilization process during frozen storage
The shelf-life of conventional surimi and isolated proteins that modified by acidic pH (2.5) and by using alkali pH (11) from silver carp (Hypophthalmichthys molitrix) was studied during months of storage at -18±2 °C. For conventional surimi, three washing steps were used. In the third stage of washing, 0.2% NaCl was used to withdraw more water. The result showed that isolated protein by alkali...
متن کاملUser-aided data authentication
All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreem...
متن کاملThe shelf-life of conventional surimi and recovery of functional proteins from silver carp (Hypophthalmichthys molitrix) muscle by an acid or alkaline solubilization process during frozen storage
The shelf-life of conventional surimi and isolated proteins that modified by acidic pH (2.5) and by using alkali pH (11) from silver carp (Hypophthalmichthys molitrix) was studied during months of storage at -18±2 °C. For conventional surimi, three washing steps were used. In the third stage of washing, 0.2% NaCl was used to withdraw more water. The result showed that isolated protein by alkali...
متن کاملارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
متن کامل