Performance and security analysis of Gait-based user authentication
نویسنده
چکیده
Verifying the identity of a user, usually referred to as user authentication, before granting access to the services or objects is a very important step in many applications. People pass through some sorts of authentication process in their daily life. For example, to prove having access to the computer the user is required to know a password. Similarly, to be able to activate a mobile phone the owner has to know its PIN code, etc. Some user authentication techniques are based on human physiological or behavioral characteristics such as fingerprints, face, iris and so on. Authentication methods differ in their advantages and disadvantages, e.g. PIN codes and passwords have to be remembered, eye-glasses must be taken off for face authentication, etc. Security and usability are important aspects of user authentication. The usability aspect relates to the unobtrusiveness, convenience and user-friendliness of the authentication technique. Security is related to the robustness of the authentication method against attacks. Recent advances in electronic chip development offer new opportunities for person authentication based on his gait (walking style) using small, light and cheap sensors. One of the primary advantages of this approach is that it enables unobtrusive user authentication. Although studies on human recognition based on gait indicate encouraging performances, the security per se (i.e. robustness and/or vulnerability) of gait-based recognition systems has received little or no attention. The overall goal of the work presented in this thesis is on performance and security analysis of gait-based user authentication. The nature of the contributions is not on developing novel algorithms, but rather on enhancing existing approaches in gait-based recognition using small and wearable sensors, and developing new knowledge on security and uniqueness of gait. The three main research questions addressed in this thesis are: (1) What are the performances of recognition methods that are based on the motion of particular body parts during gait? (2) How robust is the gait-based user authentication? (3) What aspects do influence the uniqueness of human gait? In respect to the first research question, the thesis identifies several locations on the body of the person, whose motion during gait can provide identity information. These body parts include hip, trouser pockets, arm and ankle. Analysis of acceleration signals indicates that movements of these body segments have some discriminative power. This might make these modalities suitable as an additional factor in multi-factor authentica-
منابع مشابه
A Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملGaithashing: A two-factor authentication scheme based on gait features
Recently, gait recognition has attracted much attention as a biometric feature for real-time person authentication. The main advantage of gait is that it can be observed at a distance in an unobtrusive manner. However, the security of an authentication system, based only on gait features, can be easily broken. A malicious actor can observe the gait of an unsuspicious person and extract the rela...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008