2018
DOI: 10.1016/j.future.2017.11.037
|View full text |Cite
|
Sign up to set email alerts
|

Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things

Abstract: HIGHLIGHTS• Security and privacy issues must be addressed in the Internet ofThings (loT).• We have focused on the use of ElectroCardioGram (ECG) signals for Continuous Authentication (CA).• We have explored different ECG-based CA techniques for th ree attacker settings.• Our results exhibit promising accu racy figures, which support the use of ECG as identifier in the loT.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(20 citation statements)
references
References 42 publications
0
20
0
Order By: Relevance
“…In [14], the authors claimed that "known-plaintext and chosen-plaintext attacks are infeasible for the proposed encryption algorithm" based on the sensitivity of matrix C 0 on the change of plain-images, caused by the mechanism shown in Eq. (5). Actually, the sensitivity mechanism is cancelled due to the modulo addition in Eq.…”
Section: Known-plaintext Attack On Ieaementioning
confidence: 99%
“…In [14], the authors claimed that "known-plaintext and chosen-plaintext attacks are infeasible for the proposed encryption algorithm" based on the sensitivity of matrix C 0 on the change of plain-images, caused by the mechanism shown in Eq. (5). Actually, the sensitivity mechanism is cancelled due to the modulo addition in Eq.…”
Section: Known-plaintext Attack On Ieaementioning
confidence: 99%
“…Along with collecting medical data, this technology allows performing biometric identification of patients based on their physiological and behavioral patterns. Medical Internet of Things technologies allow, on the one hand, generating the flow of medical data, and, on the other hand, performing continuous biometric identification of patients (Altop, Seymen, & Levi, 2019;Arteaga-Falconi et al, 2018;Berkaya et al, 2018;Bhurane et al, 2019;Challa et al, 2018;Chukwunonyerem et al, 2016;Deng et al, 2018;Dodangeh, & Jahangir, 2018;Ehatisham-ul-Haq et al, 2018;Ellouze et al, 2018;Hu et al, 2018;Kang et al, 2018;Koya & Deepthi, 2018;Krishnan, Lokesh, & Devi, 2019;Kumar, Singhal, Saini, Roy, & Dogra, 2018;Lozoya-Santos et al, 2019;Michael, 2018;Michel-Macarty, Murillo-Escobar, López-Gutiérrez, Cruz-Hernández, & Cardoza-Avendaño, 2018;Modak & Jha, 2019;Moosavi et al, 2018;Nellyzeth, Roberto, Marco, & Conrado, 2018;Peris-Lopez et al, 2018;Pirbhulal et al, 2018;Pirbhulal et al, 2019;Wang et al, 2018;Wazid, Das, & Vasilakos, 2018, Yildirim, 2018.…”
Section: Methodsmentioning
confidence: 99%
“…Extracting cardiac dynamics within ECG signal for human identification and cardiovascular diseases classification. Neural Networks, 100, 70-83.2018(Dodangeh & Jahangir, 2018;Nellyzeth, Roberto, & Marco, 2018;Peris-Lopez, González- Manzano, Camara, & de Fuentes, 2018;Wazid, Das, & Vasilakos, 2018;Yildirim, 2018).…”
mentioning
confidence: 99%
“…In consideration of the actual environment, a user identification system using an ECG has been analyzed with high performance and is being applied in the IoT field. Perio-Lopez et al [ 40 ] defined non-legitimate users as an attacker to prevent attackers from accessing the user’s UI and proposed a continuous user identification system using ECG. Barros et al [ 41 ] proposed an identification system that an ECG acquisition and 14 drivers identified to access objects through sensing in a driving environment.…”
Section: Biometrics Technique Using Ecg Signal For Intelligent Vehmentioning
confidence: 99%