Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2017
DOI: 10.1145/3084041.3084061
|View full text |Cite
|
Sign up to set email alerts
|

Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
109
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 235 publications
(113 citation statements)
references
References 23 publications
3
109
0
1
Order By: Relevance
“…Using these features, the authors developed a DL model (i.e. Deep Neural Network (DNN)) to identify the daily human activity distinctiveness of each individual and subsequently generate a fingerprint for each user, called Wi-Fi fingerprint, to capture the distinct characteristics of different users; the proposed DLbased authentication method exhibited high accuracy [217]. This study validates the potential application of DL algorithms in constructing authentication systems.…”
Section: Edlnsmentioning
confidence: 59%
See 1 more Smart Citation
“…Using these features, the authors developed a DL model (i.e. Deep Neural Network (DNN)) to identify the daily human activity distinctiveness of each individual and subsequently generate a fingerprint for each user, called Wi-Fi fingerprint, to capture the distinct characteristics of different users; the proposed DLbased authentication method exhibited high accuracy [217]. This study validates the potential application of DL algorithms in constructing authentication systems.…”
Section: Edlnsmentioning
confidence: 59%
“…Shi, Liu, Liu and Chen [217] proved that the present Wi-Fi signals generated by IoT objects can be adopted to detect distinctive human behavioural and physiological features and can be utilised to authenticate individuals on the basis of an…”
Section: A Perception Layermentioning
confidence: 99%
“…Real-time processing: Most existing deep learning based security schemes such as the DNN-based authentication in [4] and the RNN-based malware detection in [11] require long training time and are too complicated to be implemented in the practical MCS systems for real-time processing. The widely used hardware for deep learning computation such as graphics processing units (GPUs), is not applicable for most mobile devices such as smartphones in MCS systems.…”
Section: Discussionmentioning
confidence: 99%
“…2) DL-based authentication and access control in IoT: Shi et al [87] proposed a user authentication technique for IoT based on human physiological activities through WiFi signals. The proposed authentication scheme is based on both activity recognition and human identification.…”
Section: A Authentication and Access Control In Iotmentioning
confidence: 99%