Work place: Institute of Digital Arts and Science, Suranaree University of Technology, Nakhon Ratchasima, 30000, Thailand
E-mail: sirapat@g.sut.ac.th
Website:
Research Interests:
Biography
Sirapat Boonkrong was born in Nakhon Ratchasima, Thailand. He received the B.Sc. in Computer Science and Ph.D. in Computer Science from the University of Bath, UK. From 2006 - 2008, he was a full-time researcher at Thailand’s National Electronics and Computer Technology Centre before joining King Mongkut’s University of Technology North Bangkok at which he worked until the year 2017. Since 2017, he has been a full-time lecturer at the Institute of Digital Arts and Science, Suranaree University of Technology, Thailand. His main area of research is authentication and access control as well as cyber security in general. He is currently responsible for teaching both undergraduate and postgraduate students in the field of cyber security.
By Sirapat Boonkrong Wata Kanjanapruthipong
DOI: https://doi.org/10.5815/ijcnis.2025.03.01, Pub. Date: 8 Jun. 2025
Authentication, an identity verification and confirmation method, is a defense mechanism that reduces the risk of adversarial attacks, specifically to identity theft and impersonation in computer systems. Existing authentication methods exhibit vulnerabilities, such as password dictionary attack, credential stuffing, and identity spoofing. In this study, we examine the possibility of using a class of biometric data, namely step counts, to investigate their potential in person identification and verification. For this purpose, we collected step-count data from research volunteers over a period of 33 days or over 560 hours. Subsequently, we used these data to establish an appropriate threshold and tested their accuracy using a confusion matrix. Our evaluations showed that a suitable threshold range for step-count authentication is x ̅-1S.D.≤Range ≤ x ̅+1S.D., where S.D. represents standard deviation and x ̅ is the mean value of step counts of an individual. Moreover, we constructed a receiver operating characteristic curve and calculated the area under the curve, which showed that step counts have the potential to be used in behavioral biometric authentication methods. Thus, using the threshold range method, step counts can potentially become another behavioral biometric factor for authentication systems.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals