Final Base Paper
Final Base Paper
April 5, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2906663
ABSTRACT With a plethora of wearable IoT devices available today, we can easily monitor human
activities, many of which are unconscious or subconscious. Interestingly, some of these activities exhibit
distinct patterns for each individual, which can provide an opportunity to extract useful features for user
authentication. Among those activities, walking is one of the most rudimentary and mundane activity.
Considering each individual’s unique walking pattern, gait, which is the pattern of limb movements during
locomotion, can be utilized as a biometric feature for user authentication. In this paper, we propose a
lightweight seamless authentication framework based on gait (LiSA-G) that can authenticate and identify
users on the widely available commercial smartwatches. Unlike the existing works, our proposed framework
extracts not only the statistical features but also the human-action-related features from the collected sensor
data in order to more accurately and efficiently reveal distinct patterns. Our experimental results show that
our framework achieves a higher authentication accuracy (i.e., an average equal error rate (EER) of 8.2%) in
comparison with the existing works while requiring fewer features and less amount of sensor data. This makes
our framework more practical and rapidly deployable in the wearable IoT systems with limited computing
power and energy capacity.
INDEX TERMS User authentication, gait, wearable device, Internet of Things, machine learning.
I. INTRODUCTION such as WiFi and a variety of sensors. However, such multiple
The emergence of the Internet of Things (IoT) has revolu- connectives on wearable devices can expose a variety of
tionized numerous systems and the way we interact with the personal information and further increase the risk of security
computing and communication systems. On top of the pre- breaches [2] which necessitates robust security measures.
dominant smartphones, there is a rapid increase in the number However, the attention to security aspects of wearable
of wearable IoT devices such as smartwatches, smartglasses, IoT devices has not kept pace with that to the quantitative
and so on. According to Gartner Inc., we will reach the growth. Compared to the precedent IoT devices, such as
world-wide sales volume of 225 million wearable IoT devices smartphones, wearable IoT devices are more prone to var-
in 2019 [1]. ious security attacks due to the lack of security measures
Although initial wearable devices were equipped with (e.g., insufficient user authentication) and limited resources
limited connectivity such as Bluetooth, the latest wearable (e.g., computing power and energy capacity). For example,
devices are equipped with various communication modules in 2013, hackers were able to remotely infiltrate Google
Glass systems to watch and hear everything wearers did [3].
The associate editor coordinating the review of this manuscript and In 2015, a study conducted by HP demonstrated that all
approving it for publication was Jiafeng Xie. smartwatches can be vulnerable to security attacks [4].
2169-3536
2019 IEEE. Translations and content mining are permitted for academic research only.
VOLUME 7, 2019 Personal use is also permitted, but republication/redistribution requires IEEE permission. 37883
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
P. Musale et al.: You Walk, We Authenticate: Lightweight Seamless Authentication Based on Gait
Thus, to address the vulnerability of current wearable IoT wearable devices: smartwatch, smartring, smartanklet,
security system, we consider user authentication which is smartshoes, and smartbands. Among those various devices,
one of the most principal security measures. In user authen- we select a smartwatch as a wearable IoT device to record gait
tication, one of the most commonly used methods is using data since smartwatches are showing an exponential growth
passwords due to its simplicity. However, to procure a certain and expected to control nearly the half of the world market in
level of strong user authentication, users should maintain wearable devices by 2022 [13].
at least 19 different passwords on average for their various In the literature, various research works [8], [14]–[19]
devices and services [5]. Thus, people often have difficulty have been proposed to authenticate wearable or hand-held
in remembering a correct password. According to the survey device users, using subconscious activities. However, most of
conducted by Centrify at Infosecurity Europe 2015, 33% of the prior research conducted their experiments on their own
participants in the study suffered from password rage [6]. custom-made devices, where the sensors were elaborately
Recently, Hanamsagar et al. [7] showed there is and manually calibrated to meet their own convenience [14],
significant password re-use over multiple different online [15]. In practice, however, such calibration is infeasible for
accounts. Besides, the PIN/Pattern-based authentication on most wearable IoT device users.
smartwatches can be also prone to shoulder surfing and Even though there are some research projects conducted on
social engineering attacks [8]. Though regarded as more commercial devices, they involve a long period of the authen-
robust authentication system than passwords, conventional tication process mostly incurred by their walking detection
biometric-based authentication is also vulnerable to security algorithm (e.g., a user needs to walk more than 15 seconds
breaches. Fingerprint-based authentication can be deceived on average for authentication) [16], [17], [19]. Consequently,
by high quality fingerprint images or counterfeit fingers they require a relatively large volume of data, which can be
created using a 3D printer [9]. Even commercial iris-based burdensome to wearable IoT devices with limited computing
authentication systems were breached by high-quality iris resources and energy capacity.
images [10]. Therefore, to bridge the gaps in the existing works, we pro-
To tackle the aforementioned security limitations in wear- pose a lightweight seamless authentication framework based
able IoT devices, we propose an authentication framework on gait (LiSA-G) that securely authenticates users on com-
that addresses the following questions: mercial smartwatch in a light manner. Unlike the existing
• How can we design an authentication framework that is works that extract only the statistical features from sensor
both reliable and user-friendly so that users do not need data, LiSA-G additionally considers mechanical traits that
to remember their passwords? are bound by the physical attribute of individuals. In addi-
• How can we design an authentication framework that is tion, LiSA-G requires only one sampling period of sensor
laborious for attackers to hack or reproduce? data which is much less than those of the existing works
• How can we design an authentication framework that is (i.e., 8-20 sampling periods) [14], [16], [17]. The experimen-
easily deployable? tal results show that our work achieves an Equal Error Rate
To address those questions, we utilize subconscious activi- (EER) of 8.2% on 51 participants, while using less number of
ties to authenticate wearable IoT device users. In interactions features extracted from much shorter periods of sensor data.
with users, wearable IoT devices generate various sensor data Our contributions are summarized as follows:
such as accelerometer or gyroscope data. And the pattern in • Increased the authentication accuracy by using human-
such sensor data can be distinct as each user performs sub- action-related features as well as statistical ones.
conscious activities in their own way, which is not required • Reduced the number of features used for authentication.
to remember as well as difficult to hack or copy. • Reduced the time required for gait authentication by
Among various subconscious activities, we consider gait, eliminating the gait cycle detection.
which is the pattern of limb movements during locomotion as The rest of this paper is organized as follows. In Section II,
it satisfies the goal of our authentication framework to pro- we review related works. In Section III, we propose a
vide a reliable and user-friendly authentication. Specifically, lightweight seamless authentication framework based on gait
gait is shown to provide unique patterns even between people (LiSA-G). In Section IV, we compare our experimental
having similar physical attributes [11], and walking is one of results to the existing techniques. Additionally, we present
the most rudimentary and mundane activities that requiring the potential application scenario of our work in Section V,
significant effort to copy or mimic. followed by some discussion and limitations in Section VI.
In the literature, gait-based authentication frameworks can We finally conclude our paper in Section VII.
be classified into two categories based on the type of data
used: 1) vision-based authentication, and 2) sensor-based II. RELATED WORK
authentication. The former can be spoofed by impersonating A. GAIT AND GESTURE BASED AUTHENTICATION USING
a person with a similar appearance and/or clothes [12]. SMARTPHONES
Therefore, we focus on gait authentication utilizing sensors Muaaz and Mayrhofer [17] presented a gait-based authen-
in commercial wearable devices which are easily deployable. tication method on a smartphone, where a user keeps
To record the human gait sensor data, we can use various his/her phone in his/her pocket. They developed an Android
application to measure the accelerometer data from the smart- auto-correlation. Reduction of noise in the acceleration data
phone. A pedometer sensor on a smartphone is used to detect along the 3 axes was done by using a Butterworth filter.
if the person is walking or not. If the condition was true, then For authentication, semi-supervised anomaly detection was
the accelerometer data would be recorded for 15 seconds. used. For this, the Euclidean distance and the nearest neighbor
Both sensors were operated at 200 Hz. The collected data analysis were used to determine the anomaly score, and the
was further processed using linear interpolation and Savitzky- authentication accuracy achieved was 7.8% of EER.
Golay filter. Gait cycles were detected using local maxima Zhao et al. [8] presented a touch-based authentication
and DTW (Dynamic Time Wrapping). To check the actual scheme on a smartwatch. A user can design his/her own user
performance of the system, impersonation attacks were per- interface on the screen, and hence the user can interact and
formed. They achieved an EER of 13% with 35 volunteers. enter his/her own PIN pattern. They measured authentica-
Shahzad et al. [18] presented a gesture-based authentica- tion accuracy, authentication speed, and security level. The
tion. Here, users input their own user-specific gestures on authentication was measured by the average accuracy rate
the mobile touchscreen. They extracted some unique user of the input password/pattern. The authentication speed was
features from the way passwords were inputted to devices. measured by the average completion of the input, and the
To record the data, they developed an Android application security level was estimated by the rate of correctly replicated
and Windows platform. They recorded the data of each touch passwords/patterns by shoulder surfing. They concluded that
point on the screen, accelerometer, and time-stamps. They the Square PIN was most secure.
found that various gestures result in different average clas- Terada et al. [15] used Hitachi wireless-T (ankle wearable
sification accuracies. For classification, they used Support sensor) to record the accelerometer data and angular velocity
Vector Distribution Estimation (SVDE) with Radial Basis data at 100 Hz. To evaluate the data, they used a scoring
Function (RBF) kernel and achieved a false positive rate for system that uses the sum of differences between registered
each gesture under 5%. data and input data for the rolling angular velocity in the
Mahfouz et al. [19] presented a behavior based authenti- swing phase. The score and threshold decided the legitimacy
cation for smartphones. They developed an Android appli- of the user. An EER of 20% was obtained by using this
cation that can authenticate users based on the authentica- method. Slightly different from the aforementioned studies
tion scores which were calculated using gesture modality where the smartphone was kept in the waist pocket, this work
extracted from certain features. They recorded events related involved more movements from the legs than arms, which can
to unlocking touchscreen from 52 volunteers. For each touch, give more details of gait.
they recorded the time-stamp, coordinates, pressure, size, and
action code. For evaluation purpose, they used a classification C. ALTERNATIVE AUTHENTICATION USING WEARABLES
model which was trained on data from both a legitimate Yoon et al. [22] utilized the ambient light sensor for users to
user and impostors and anomaly detection model which was type PIN code in user authentication. Based on the ambient
trained on data from the legitimate user only. light value measured, they defined two states of the sensor:
1) Non-Zero Lux (NZL), and 2) Zero Lux (ZL). By combin-
B. GAIT AND GESTURE BASED AUTHENTICATION USING ing the states, this work identified the user actions such as
WEARABLES DEVICES single click (NZL → ZL), double click (NZL → ZL → NZL
Johnston and Weiss [16] developed an Android application → ZL), and hold (ZL → ZL), and utilized such actions as
to collect the time-stamped accelerometer and gyroscope PIN code for user authentication. However, the experiment
data from a commercial smartwatch. The data was recorded was conducted in the indoor environment where lighting con-
at 20 Hz, the process of authentication required minimum ditions are constant. Thus, in the outdoor environment where
10 seconds of data (i.e., 200 samples). They extracted the fol- light changes drastically, the light-sensor based authentica-
lowing features from the data set: average, standard deviation, tion may not work.
average absolute difference, the time between peaks, binned Vhaduri and Poellabauer [23] designed a continuous user
distribution, and average resultant acceleration. WEKA [21] authentication using commercially available smartbands,
data mining suite is used for classification, and the highest and smartwatches. Using their own developed Android and
identification and authentication EER achieved was 8.1%. iOS applications, they collected physical activity data such
Cola et al. [14] presented a gait based authentication sys- as step counts and physiological activity data such as heart
tem that has only one user’s gait pattern but no knowledge rate, calorie burn. In the experiment, they recruited 500 vol-
to patterns of other users, just like the commercial smart- unteers for 2 years. From the collected data, they extracted
phone that stores only the fingerprints of its owner. For 45 features for user classification. Using the Support Vector
their manual implementation of the smartwatch, they used Machine (SVM), they achieved the maximum user authenti-
a Shimmer 3, an embedded TI MSP430 micro-controller cation accuracy of 93%. However, one of the major bottle-
(up to 24 MHz clock, 16 kB RAM, 256 kB flash), and an necks in this work is to continuously authenticate uses in the
ST Micro LSM303DLHC accelerometer operating at 50 Hz. wearable devices that have limited computation power and
Walking detection was done by using a peak detection, battery. Moreover, only statistical features were considered
and irregular patterns in the data were reduced by using in user authentication.
TABLE 1. Summary of limitations of existing gait and gesture based authentication models.
FIGURE 4. Effect of spike removal. (a) Before spike removal. (b) After
spike removal.
1) Detect all the peaks in a given data sequence. FIGURE 5. Accelerometer data after noise removal.
2) Compute the average of the peaks and remove the peaks
that are λ times higher than the average. TABLE 2. Notations and symbols.
2) INTERPOLATION
As mentioned in the data collection process, the sensors in
the smartwatch operate at 100 Hz. However, the Android
API does not output sensor values at fixed time intervals.
This is due to the mechanism of OnSensorChanged method
in Android systems that outputs a sensor value only when
the value differs from its previous value [26]. As a result,
even at 100 Hz sampling rate, the sensor may not gener-
ate 100 samples in one second. That is, the data from the concentrated their gaze on the smartwatch while walking in
sensor may not be at equidistant time-intervals. In order to the beginning. After some brief moment, they started walking
remedy such inconsistency, we apply linear interpolation to normally. Similarly, they consciously gazed on the smart-
approximate the correlation between a time sequence and its watch at the end of their walk. When analyzing the sensor
corresponding sensor values as data sequences, we observed that most of such noises are
distributed at both ends of the data sequence. Hence, we apply
(A1 − A0 )(t 0 − t0 )
A0 = A0 + , (1) a band-pass filter to the data in order to remove the noises
(t1 − t0 ) at both ends. Figure 5 shows the refined data after the noise
where A0 and A1 denote previous and current sensor data removal process.
values, respectively. t0 and t1 are the time values for A0 and
A1 , respectively. t 0 denotes the time value or series between D. USER AUTHENTICATION
t0 and t1 . In the user authentication process, LiSA-G first extracts a
set of features from the preprocessed data. In the existing
3) NOISE REMOVAL research, various statistical features have been considered in
In addition to spikes, sensor noises are inevitably generated the feature extraction process. Cola et al. [14] considered
during the recording of sensor data. The main sources of interquartile range (IQR), kurtosis, max, min, mean, mean
noise is the electronic noise generated from the circuitry that crossing rate (MCR), median, median absolute deviation
converts the motion into an electric signal and the mechanical (MAD), peak to peak amplitude, root mean square (RMS),
noise from the sensor itself. Thus, to remove such random skewness, and standard deviation. On the other hand, John-
noises, we apply the Savitzky-Golay smoothing filter (also ston and Weiss [16] used average absolute difference (AAD),
known as the least square smoothing filter) [27]. Specifically, binned distribution, and average resultant acceleration (ARA)
it applies the least square fit to a high degree polynomial on top of mean, standard deviation, peak to peak amplitude
with an odd size window while the data point is at the center. as features.
We choose the least square smoothing filter as it preserves However, with an increase in the number of participants,
the original features of a waveform (e.g., relative maxima, the accuracy of user authentication can degrade when only the
minima, and width), while effectively reducing the noise. statistical features are taken into account. Therefore, we addi-
Moreover, we remove the noise incurred from the human tionally consider physical or mechanical features which can
factor. During our experiments, some volunteers consciously better represent each user’s unique attributes in physical
FIGURE 6. Features extracted from the data. (a) Mean (Accx ). (b) Standard Deviation (σAccx ). (c) Skew (γAccx ).
(d) Kurtosis (KAccx ). (e) Correlation (ρ(Accx ,Gx ) ). (f) Roll. (g) Pitch. (h) Yaw. (i) Force.
the accelerometer and the gyroscope. Additionally, we have algorithm to minimize the classification error. Once the train-
13 behavioral features: 9 correlations, yaw, pitch, roll, and ing is completed, we can predict the class of test feature
force. In total, we extract 37 features from one period of data matrix.
sequence for each user. Consequently, a feature matrix with
37 columns is constructed. Here, the number of rows in the IV. EXPERIMENT
feature matrix varies depending on the number of periods in In this section, we provide the experiment results and evaluate
each user’s data sequence. Accordingly, a class label vector is the performance of LiSA-G.
constructed whose size is the same as the number of rows in
the feature matrix. In the vector, all the elements indicate an id A. EXPERIMENT SETTING
of the user corresponding to the feature matrix. The distribu- In the experiment, we used Motorola 360 Sport 2nd Gen
tions of features are shown in Figure 6. Note that we show the (smartwatch) and Motorola G4 plus (smartphone) to collect
distribution of 9 selected features for the first 10 users (i.e., the sensor data from 51 volunteers. Considering the number
U1-U10) due to the readability: 1) mean, standard deviation, of volunteers, the number of classes for classification is 51.
skewness, kurtosis of accelerometer on x-axis, 2) roll, pitch, Since the choice of classifier influences the classification
yaw, force, and 3) correlation between accelerometer and result, we first tested three well-known machine learning
gyroscope on x-axis. In the figure, the difference among users classifiers: 1) random forest classifier, 2) K-nearest neighbors
are evidently shown. classifier, 3) and multi-layer perceptron. Based on our empir-
After the feature extraction process, LiSA-G authenticates ical study where the random forest classifier worked best
users by applying supervised machine learning algorithm for our dataset, we chose to use the random forest classifier.
to the extracted feature dataset. Note that the authentica- In addition, our empirical study showed that the classifier
tion system in LiSA-G is not a simple binary classification showed higher weights to correlation, yaw, pitch, roll features
(i.e., whether a user is one of the legitimate users or not), which characterize the actual physical traits of each user,
but a multi-class classification (i.e., whether a user is the as well as standard deviation.
corresponding user or not). Given the feature matrix and Our experiment consists of two phases: 1) training phase
the label vector, we train the supervised machine learning and 2) testing phase. Before creating two separate phases,
B. PERFORMANCE EVALUATION
With the test label vector and the prediction result, a confu-
sion matrix of order (m, n) is created, where m = n and m is
the number of classes. For better readability, the confusion
matrix shown in Table 3 contains only the first 10 users.
Using the confusion matrix, we can calculate the values
for True Positive (TPi ), True Negative (TNi ), False Positive
(FPi ), and False Negative (FNi ) for user i. In the confusion
matrix, TPi is where both row and column index are i in the
diagonal elements marked in boldface. TNi can be calculated FIGURE 7. Effect of number of estimators using random forest classifier.
by summing all the diagonal elements in bold font except TP
for user i. FPi can be calculated by adding all the elements in
i-th column except for the diagonal element in the column. number of participants in the experiment, our work achieves
FNi is calculated by adding all the elements for i-th row superior authentication accuracy to [16]. Moreover, our work
except for the diagonal element in the row. Based on these shows a comparable performance to [14] notwithstanding
values, the authentication accuracy for user i is calculated its larger scale of system (more than three times), while
as using less number of features. For an unbiased comparison,
TPi + TNi we additionally implemented the other methods and tested
accuracyi = . (9) their performance on our dataset. Table 5 shows that our
TPi + TNi + FPi + FNi
method can achieve the lowest EER using the least number
For example, TP6 , TN6 , FP6 , and FN6 in Table 3 can be of features. Furthermore, LiSA-G requires only one period of
calculated as follows: TP6 = 41, TN6 = 61 + 39 + 29 + data (i.e. it requires only one period of sensor data, 100 data
54 + 42 + 50 + 35 + 50 + 48 = 408, FP6 = 1, FN6 = 2. samples in our case) from each user for authentication and
As a result, the authentication accuracy for user 6 in Table 3 identification in the system, whereas 8-20 periods are needed
is calculated to be 99.34%. in other works. Consequently, it reduces the volume of data
Considering all the participants in the experiment, an EER and the time required for authentication.
of 8.2% is achieved on average. In Table 4, we compare In addition, we varied the period size to analyze its effect
our work to the existing works [14], [16] in terms of the on the authentication performance of our approach. As shown
average EER, the number of features used, and the number of in Table 6, the authentication performance generally degrades
participants in the experiment. Note that in this comparison, as the period size increases. We can trace the source of such
each work is evaluated on its own dataset. Considering the performance degradation to 2 main changes: 1) reduction of
FIGURE 8. Failure cases. (a) Inconsistency in Accy and Accy . (b) Inconsistency in Accx , Accy , Gyrox , Gyroy , and Gyroz .
feature matrix, and 2) increased generality in each feature. C. AUTHENTICATION FAILURE CASE ANALYSIS
Interestingly, this result shows that setting the period size to As mentioned in the performance evaluation, LiSA-G
the data size sampled in 1 second (100 Hz in smartwatches) achieves an EER of 8.2%. Although LiSA-G shows high
achieves the best authentication accuracy. accuracy of authentication, there exist some authentication
To test the feasibility of LiSA-G in practical deploy- failure cases. Here, we present a few failure cases in Figure 8
ment, we show the computation time for LiSA-G when and discuss the underlying causes of them. To compare the
implemented using Python 3.5 in Ubuntu 16.04 LTS 64 bit failure cases to the success (accurate authentication) cases,
equipped with Intel Xeon(R) CPU E5-1650 v4 @ 3.60GHz we visualize the failure cases located at the center of the
x 12, NVIDIA TITAN Xp, and 32GB RAM. In the test, figure, i.e., the data sequence between 200 and 300.
we range the number of estimators in the random forest classi- In LiSA-G, the essence of authentication process is to
fier from 10 to 3000 in an increment of 10 since the number of learn and utilize the distinct and consistent pattern in the
estimators affects the computation time. In Figure 7, we show data sequences from each user, concurrently considering all
the training time, prediction time, and accuracy of LiSA-G. the 6 types of data sequences: Accx,y,z and Gx,y,z . However,
Specifically, the training time represents the computation in terms of the consistency in data patterns, failure cases show
time required to train the classifier given all the training data the most inconsistent data patterns over all. In Figure 8a,
sequences, while the prediction time represents the computa- accelerometer data on both x and y axes (i.e Accx and Accy )
tion time required to predict or authenticate a user given a data in the failure case shows different patterns from those in the
period. Despite the linear increase in both training and predic- accurate authentication cases. Figure 8b shows more incon-
tion time in proportion to the number of estimators, LiSA-G sistent data patterns across gyroscope and accelerometer data
completes its training process in significantly short period of on x and y axes.
time regardless of the number of estimators. Moreover, LiSA- The underlying causes of such failure cases can
G predicts or authenticates a user almost in real time (less than be attributed to: 1) sensor fault, and 2) temporarily
a second). abrupt or inconsistent physical movement. Considering the
While the computation time shows the linearity, the accu- imperfection of sensor hardware, there can exist sensor fault
racy of LiSA-G shows drastic increase at the certain number values incurred from various processes while recording sen-
of estimators (approximately 400), and remains almost con- sor values. Even though we conducted the data preprocessing
stant. Considering the relatively static accuracy after the dras- to remove the undesired fault or noise values, there can still
tic increase, we can estimate the minimum computation time exist fault values. On top of the sensor fault, users’ temporar-
for LiSA-G to achieve reliable user authentication results. ily inconsistent physical movement in the data collection pro-
In our test, LiSA-G achieved 91.8% of accuracy with 400 esti- cess can incur the failure cases. Since we requested each user
mators, which required approximately 3 seconds of train- to walk in the realistic environment where some people but
ing time. Overall, such prompt responsiveness of LiSA-G, him/her were present concurrently, some interaction between
while achieving reliable authentication accuracy, can enable the users and the others could happen, which could incur
to authenticate users in real time, incurring no authentica- temporarily inconsistent physical movement.
tion delay. Moreover, considering the specification of the
machine in our test (only one desktop or even Raspberry-pi), V. APPLICATION SCENARIO
LiSA-G can be deployed in cost-effective way, without To better illustrate the potential of our framework, we suppose
requiring additional devices. two application scenarios where a user wearing a smartwatch
[4] K. Rawlinson. (Jul. 2015). Hp Study Reveals Smartwatches Vulnerable [22] H. Yoon, S.-H. Park, and K.-T. Lee, ‘‘Exploiting ambient light sen-
to Attack. [Online]. Available: http://www8.hp.com/us/en/hp-news/press- sor for authentication on wearable devices,’’ in Proc. 4th Int. Conf.
release.html?id=2037386 Cyber Secur., Cyber Warfare, Digit. Forensic (CyberSec), Oct. 2015,
[5] S. Faris. (Jul. 2016). Do You Suffer From Password Rage?. [Online]. pp. 95–100.
Available: http://theweek.com/articles/637588/suffer-from-password-rage [23] S. Vhaduri and C. Poellabauer, ‘‘Wearable device user authentication
using physiological and behavioral metrics,’’ in Proc. IEEE 28th Annu.
[6] J. Chatzky. (May 2017). Password Rage, it’s a Thing. [Online]. Available: Int. Symp. Pers., Indoor, Mobile Radio Commun. (PIMRC), Oct. 2017,
https://lifelockunlocked.com/tips/password-rage-thing/ pp. 1–6.
[7] A. Hanamsagar, S. S. Woo, C. Kanich, and J. Mirkovic, ‘‘Leverag- [24] T. S. Enamamu, N. Clarke, P. Haskell-Dowland, and F. Li, ‘‘Transpar-
ing semantic transformation to investigate password habits and their ent authentication: Utilising heart rate for user authentication,’’ in Proc.
causes,’’ in Proc. CHI Conf. Hum. Factors Comput. Syst., 2018, 12th Int. Conf. Internet Technol. Secured Trans. (ICITST), Dec. 2017,
p. 570. pp. 283–289.
[25] A. Voit and S. Schneegass, ‘‘FabricID: Using smart textiles to access
[8] Y. Zhao, Z. Qiu, Y. Yang, W. Li, and M. Fan, ‘‘An empirical study
wearable devices,’’ in Proc. 16th Int. Conf. Mobile Ubiquitous Multimedia
of touch-based authentication methods on smartwatches,’’ in Proc.
(MUM) New York, NY, USA, 2017, pp. 379–385. [Online]. Available:
ACM Int. Symp. Wearable Comput. (ISWC), New York, NY, USA,
http://doi.acm.org/10.1145/3152832.3156622
2017, pp. 122–125. [Online]. Available: http://doi.acm.org.proxy.library.
[26] A. Developer. (Jun. 2018). Sensoreventlistener. Accessed: Jun. 6, 2018.
stonybrook.edu/10.1145/3123021.3123049
[Online]. Available: https://developer.android.com/reference/android/
[9] J. Myerson. (Mar. 2017). How to Fool a Fingerprint Sensor. [Online]. hardware/SensorEventListener
Available: https://www.electronicproducts.com/Mobile/Devices/How_ [27] A. Savitzky and M. J. E. Golay, ‘‘Smoothing and differentiation of data
to_fool_a_fingerprint_sensor.aspx by simplified least squares procedures,’’ Anal. Chem., vol. 36, no. 8,
[10] S. Khandelwal. (Mar. 2015). Hacker Finds a Simple Way pp. 1627–1639, 1964.
to Fool Iris Biometric Security Systems. [Online]. Available:
https://thehackernews.com/2015/03/iris-biometric-security-bypass.html
[11] D. Gafurov, E. Snekkenes, and P. Bours, ‘‘Spoof attacks on gait authen-
tication system,’’ IEEE Trans. Inf. Forensics Security, vol. 2, no. 3,
pp. 491–502, Sep. 2007.
[12] A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietikäinen,
J. Bustard, and M. Nixon, ‘‘Can gait biometrics be spoofed?’’ PRATIK MUSALE received the B.E. degree in
in Proc. 21st Int. Conf. Pattern Recognit. (ICPR), Nov. 2012, electronics and telecommunication from Savitribai
pp. 3280–3283. Phule Pune University, Pune, India, and the M.S.
degree from the Department of Computer Science,
[13] (Sep. 2018). It’s the Era of the Smartwatch: Idc Says Device to Rule Nearly
Half of Wearables by 2022. Accessed: Mar. 1, 2018. [Online]. Available: Stony Brook University, South Korea. He was with
https://economictimes.indiatimes.com/magazines/panache/its-the-era- Nokia Networks as an Operation and Maintenance
of-the-smartwatch-idc-says-device-to-rule-nearly-half-of-wearables-by- of Radio Engineer. He was also a member of the
2022/articleshow/65810524.cms Smart Energy Laboratory, The State University
of New York Korea, from 2016 to 2018. He is
[14] G. Cola, M. Avvenuti, F. Musso, and A. Vecchio, ‘‘Gait-based authentica-
currently with Navigate Consulting as a Security
tion using a wrist-worn device,’’ in Proc. 13th Int. Conf. Mobile Ubiquitous
Syst., Comput., Netw. Services (MOBIQUITOUS), New York, NY, USA, Researcher.
Nov. 2016, pp. 208–217.
[15] S. Terada, Y. Enomoto, D. Hanawa, and K. Oguchi, ‘‘Performance
of gait authentication using an acceleration sensor,’’ in Proc.
34th Int. Conf. Telecommun. Signal Process. (TSP), Aug. 2011,
pp. 34–36.
[16] A. H. Johnston and G. M. Weiss, ‘‘Smartwatch-based biometric gait recog- DUIN BAEK received the B.Sc. degree in electri-
nition,’’ in Proc. IEEE 7th Int. Conf. Biometrics Theory, Appl. Syst. (BTAS), cal and electronics engineering from Yonsei Uni-
Sep. 2015, pp. 1–6.
versity, Seoul. He is currently pursuing the Ph.D.
[17] M. Muaaz and R. Mayrhofer, ‘‘Smartphone-based gait recognition: From degree with the Department of Computer Sci-
authentication to imitation,’’ IEEE Trans. Mobile Comput., vol. 16, no. 11, ence, The State University of New York Korea,
pp. 3209–3221, Nov. 2017. and Stony Brook University. His current research
[18] M. Shahzad, A. X. Liu, and A. Samuel, ‘‘Secure unlocking of mobile interests include designing mechanisms for crowd-
touch screen devices by simple gestures: You can see it but you can sourcing service, distributed computing via the IoT
not do it,’’ in Proc. 19th Annu. Int. Conf. Mobile Comput. Netw. systems, and computer vision for VR/AR.
(MobiCom), New York, NY, USA, 2013, pp. 39–50. [Online]. Available:
http://doi.acm.org.proxy.library.stonybrook.edu/10.1145/2500423.
2500434
[19] A. Mahfouz, T. M. Mahmoud, and A. S. Eldin, ‘‘Poster:
A behavioral biometric authentication framework on smartphones,’’
in Proc. ACM Asia Conf. Comput. Commun. Secur. (ASIA CCS),
New York, NY, USA, Apr. 2017, pp. 923–925. [Online]. Available:
http://doi.acm.org.proxy.library.stonybrook.edu/10.1145/3052973. NUWAN WERELLAGAMA is currently pursu-
3055160 ing the bachelor’s degree from the Department
[20] S. M. Bruijn, O. G. Meijer, P. J. Beek, and J. H. van Dieën, of Computer Science, The State University of
‘‘The effects of arm swing on human gait stability,’’ J. Exp. Biol., vol. 213, New York Korea. He has also been a Software
no. 23, pp. 3945–3952, 2010. [Online]. Available: http://jeb.biologists. Developer Intern at a Singaporean fin-tech startup.
org/content/213/23/3945
[21] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and
I. H. Witten, ‘‘The WEKA data mining software: An update,’’ ACM
SIGKDD Explorations Newslett., vol. 11, no. 1, pp. 10–18, Nov. 2009.
[Online]. Available: http://doi.acm.org/10.1145/1656274.1656278
SIMON S. WOO received the B.S. degree in elec- BONG JUN CHOI received the B.Sc. and M.Sc.
trical engineering from the University of Washing- degrees in electrical and electronics engineering
ton (UW), Seattle, the M.S. degree in electrical from Yonsei University, South Korea, and the
and computer engineering from the University of Ph.D. degree in electrical and computer engineer-
California at San Diego (UCSD), and the M.S. ing from the University of Waterloo, Canada. He
and Ph.D. degrees in computer science from the was an Assistant Professor with the Department
University of Southern California (USC), Los of Computer Science, The State University of
Angeles. He was a Member of Technical Staff New York Korea, South Korea, and concurrently a
(technologist) with the NASA’s Jet Propulsion Research Assistant Professor with the Department
Laboratory (JPL), Pasadena, CA, USA, for nine of Computer Science, Stony Brook University,
years, conducting research in satellite communications, networking, and USA. He is currently an Assistant Professor with the School of Computer
cybersecurity areas. He was also with Intel Corporation and the Verisign Science and Engineering and jointly with the School of Electronic Engineer-
Research Laboratory. Since 2017, he has been a tenured-track Assistant ing, Soongsil University, Seoul, South Korea. His current research interests
Professor with The State University of New York Korea, South Korea, and a include energy-efficient networks, distributed mobile wireless networks,
Research Assistant Professor with Stony Brook University. He is currently a smart grid communications, and network security. He is a member of the
tenured-track Assistant Professor with the SKKU Institute for Convergence IEEE and the ACM.
and the Department of Software, Sungkyunkwan University, Suwon, South
Korea.