Preliminary Study of Step-Count Authentication using Wearable Device

PDF (1162KB), PP.1-17

Views: 0 Downloads: 0

Author(s)

Sirapat Boonkrong 1,* Wata Kanjanapruthipong 1

1. Institute of Digital Arts and Science, Suranaree University of Technology, Nakhon Ratchasima, 30000, Thailand

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2025.03.01

Received: 26 Feb. 2024 / Revised: 20 Sep. 2024 / Accepted: 28 Mar. 2025 / Published: 8 Jun. 2025

Index Terms

Access Control, Authentication, Biometrics, Computer Security, Wearable Device

Abstract

Authentication, an identity verification and confirmation method, is a defense mechanism that reduces the risk of adversarial attacks, specifically to identity theft and impersonation in computer systems. Existing authentication methods exhibit vulnerabilities, such as password dictionary attack, credential stuffing, and identity spoofing. In this study, we examine the possibility of using a class of biometric data, namely step counts, to investigate their potential in person identification and verification. For this purpose, we collected step-count data from research volunteers over a period of 33 days or over 560 hours. Subsequently, we used these data to establish an appropriate threshold and tested their accuracy using a confusion matrix. Our evaluations showed that a suitable threshold range for step-count authentication is x ̅-1S.D.≤Range ≤ x ̅+1S.D., where S.D. represents standard deviation and x ̅ is the mean value of step counts of an individual. Moreover, we constructed a receiver operating characteristic curve and calculated the area under the curve, which showed that step counts have the potential to be used in behavioral biometric authentication methods. Thus, using the threshold range method, step counts can potentially become another behavioral biometric factor for authentication systems.

Cite This Paper

Sirapat Boonkrong, Wata Kanjanapruthipong, "Preliminary Study of Step-Count Authentication using Wearable Device", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.3, pp.1-17, 2025. DOI:10.5815/ijcnis.2025.03.01

Reference

[1]S. Boonkrong, “Authentication and Access Control: Practical Cryptography Methods and Tools” Berkeley, CA, USA: Apress, December 2020.
[2]A. Lula and M. Micucci, “Multimodal biometric recognition based on 3D ultrasound palmprint-hand geometry fusion,” IEEE Acccess, vol. 10, pp. 7914–7925, January 2022. doi:10.1109/ACCESS.2022.3143433
[3]P. Kasprowski, Z. Borowska and K. Harezlak, “Biometric identification based on keystroke dynamics,” Sensors, vol. 22, no. 9, pp. 3158, March 2022. doi:10.3390/s22093158
[4]K. Dharavath, F. A. Talukdar and R. H. Laskar, “Study on biometric authentication systems, challenges and future trends: A review,” in Proc. IEEE ICCIC, Madurai, India, 2013, pp. 1–7.
[5]J. Pourbemany, Y. Zhu and R. Bettati, “A survey of wearable devices pairing based on biometric signals,” IEEE Acccess, vol. 11, pp. 26070–26085, 2023. doi: 10.1109/ACCESS.2023.3254499
[6]H. S. Bıc¸akcı, M. Santopietro and R. Guest, “Activity-based electrocardiogram biometric verification using wearable devices,” IET Biometrics, vol. 12, no. 1, pp. 38–51, July 2020. doi:10.1049/bme2.12105
[7]S. Khan, S. Parkinson, L. Grant, N. Liu and S. Mcguire, “Biometric systems utilising health data from wearable devices: applications and future challenges in computer security,” ACM Comput. Surv., vol. 53, no. 4, pp. 1–29, July 2020. doi:10.1145/3400030
[8]S. Vhaduri and C. Poellabauer, “Multi-modal biometric-based implicit authentication of wearable device users,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 12, pp 3116–3125, December 2019. doi:10.1109/TIFS.2019.2911170
[9]J. J. Jeong, Y. Zolotavkin and R. Doss, “Examining the current status and emerging trends in continuous authentication technologies through citation network analysis,” ACM Comput. Surv., vol. 55, no. 6, pp. 1–31, December 2022. doi:10.1145/3533705
[10]A. F. Baig and S. Eskeland, “Security, privacy, and usability in continuous authentication: a survey,” Sensors, vol. 21, no. 17, p. 5967, September 2021. doi:10.3390/s21175967
[11]S. Vhaduri and C. Poellabauer, “Wearable device user authentication using physiological and behavioral metrics,” in Proceedings of the 2017 IEEE PIMRC Montreal, Canada, 2017, pp. 1–6. doi:10.1109/PIMRC.2017.8292272
[12]B. Ballad, T. Ballad and E. Banks, “Access control, authentication, and public key infrastructure” Ontario, Canada: Jones & Bartlett Publishers, October 2010.
[13]K. Revette, “Behavioral Biometrics: A Remote Access Approach” Wiley Publishing, November 2008.
[14]K. Saeed, “New Directions in Behavioral Biometrics” CRC Press, Inc., October 2016.
[15]A. Jain, A. Ross and S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4–20, January 2004. doi:10.1109/TCSVT.2003.818349
[16]D. Palma and P. L. Montessoro, “Biometric-based human recognition systems: an overview,” in Recent Advances in Biometrics London, UK: IntechOpen, 2022, ch. 2, pp. 23–40.
[17]S. Eberz, K. B. Rasmussen, V. Lenders and I. Martinovic, “Evaluating behavioral biometrics for continuous authentication: Challenges and metrics,” in Proc. of 2017 ACM ASIACCS, Dubai, UAE, 2017, pp. 386–399.
[18]M. El-Abed and C. Charrier, “Evaluation of biometric systems,” in New Trends and Developments in Biometrics London, UK: IntechOpen, 2020, ch. 7, pp. 149–169.
[19]F. Cherifi, B. Hemery, R. Giot, M. Pasquet and C. Rosenberger, “Performance evaluation of behavioral biometric systems,” in Behavioral biometrics for human identification: Intelligent applications PA, USA: IGI Global, 2010, ch. 3, pp. 57–74.
[20]N. Siddiqui, L. Pryor and R. Dave, “User Authentication Schemes Using Machine Learning Methods - A Review,” in Proc. of 2021 ICCCT, Algorithms for Intelligent Systems. Springer, Singapore, 2021, pp. 703–723.
[21]N. K. Ratha, J. H. Connell and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems,” IBM Systems Journal, vol. 40, no. 3, pp. 614–634, 2001. doi: 10.1147/sj.403.0614
[22]L. Hallal, J. Rhinelander and R. Venkat, “Recent Trends of Authentication Methods in Extended Reality: A Survey,” Appl. Syst. Innov., vol. 7, no. 3, May 2024. doi:10.3390/asi7030045
[23]M. L. Shuwandy, A. S. Jouda, M. A. Ahmed, M. M. Salih, Z. T. Al-qaysi, A.H. Alamoodi, S. Garfan, O.S. Albahri, B.B. Zaidan and A.S. Albahri, “Sensor-based authentication in smartphone: A systematic review,” J. Eng. Res., 2004. doi:10.1016/j.jer.2024.02.003
[24]R. Alrawili, A. A. S. AlQahtani and M. M. Khan, “Comprehensive survey: Biometric user authentication application, evaluation, and discussion,” Comput. Electr. Eng., vol. 119, October 2024. doi:10.1016/j.compeleceng.2024.109485
[25]C. Vivaracho-Pascual, A. Simon-Hurtado, E. Manso-Martinez and J. M. Pascual-Gaspar, “Client threshold prediction in biometric signature recognition by means of Multiple Linear Regression and its use for score normalization,” Pattern Recognit., vol. 55, pp. 1–13, June 2016. doi:10.1016/j.patcog.2016.02.007
[26]V. B. Joshi and M. S. Raval, “Adaptive threshold for fingerprint recognition system based on threat level and system load,” Procedia Comput. Sci., vol. 171, pp. 498–507, June 2020. doi:10.1016/j.procs.2020.04.053
[27]Jyoti Malik,Dhiraj Girdhar,Ratna Dahiya,G. Sainarayanan,"Reference Threshold Calculation for Biometric Authentication", IJIGSP, vol.6, no.2, pp.46-53, 2014.
[28]N. Nimnual, “Evaluation of the Vein Patterns of the Upper Extremity in Person Identification,” M.S. thesis, Allied Health Science, TU, BKK, TH, 2018.
[29]N. Wankeeree and S. Boonkrong, “Finding a suitable threshold value for an iris-based authentication system,” Int. J. Electr. Comput. Eng., vol. 9, no. 5, pp. 3558–3568, October 2019. doi:10.11591/ijece.v9i5
[30]R. Cockell and B. Halak, “On the design and analysis of a biometric authentication system using keystroke dynamics,” Cryptography, vol. 4, no. 2, pp. 1–14, April 2020. doi:10.3390/cryptography4020012
[31]S. A. Julious, “Sample size of 12 per group rule of thumb for a pilot study,” Pharm. Stat., vol. 4, no. 4, pp. 287–291, November 2005. doi:10.1002/pst.185
[32]J. In, “Introduction of a pilot study,” Korean J. Anesthesiol, vol. 70, no. 6, pp. 601–605, November 2017. doi:10.4097/kjae.2017.70.6.601
[33]T. Chen, Y. J. Hsu, X. Liu and W. Zhang, “Principal component analysis and its variants for biometrics,” in Proc. of 2002 IEEE ICIP, Rochester, NY, USA, 2002.
[34]F. W. Olufade and A. J. Kolawole, “Biometric Authentication with Face Recognition using Principal Compo- nent Analysis and Feature based Technique,” Int. J. Comput. Appl., vol. 41, no. 1, pp. 13–20, March 2012. doi:0.5120/5504-7518
[35]S. Furui, “Speaker Recognition in Smart Environments,” in Human-Centric Interfaces for Ambient Intelligence MA, USA: Academic Press, Elsevier, 2010, ch. 7, pp. 163–184.
[36]J. N. Mandrekar, “Receiver Operating Characteristic Curve in Diagnostic Test Assessment,” J Thorac Oncol., vol. 5, no. 9, pp. 1315–1316, September 2010. doi:10.1097/JTO.0b013e3181ec173d
[37]R. M. Devi, P. Keerthika, P. Suresh, P. P. Sarangi, M. Sangeetha, C. Sagana and K. Devendran, “Retina biometrics for personal authentication,” in Machine Learning for Biometrics: Machine Learning for Biometrics MA, USA: Academic Press, Elsevier, 2022, ch. 5, pp. 87–104.
[38]A. Roy, T. Halevi and N. Memon, “An HMM-based behavior modeling approach for continuous mobile authentication,” in Proc. of 2014 IEEE ICASSP, Florence, IT, 2014, pp. 3789–3793.
[39]P. D. Deshpande, P. Mukherji and A. S. Tavildar, “Accuracy enhancement of biometric recognition using iterative weights optimization algorithm,” Eurasip J. Inf. Secur., vol. 6, pp. 1–16, April 2019. doi:10.1186/s13635-019-0089-z
[40]S. Habib, H. Khan, A. Hamilton-Wright and U. Hengartner, “Revisiting the Security of Biometric Authenti- cation Systems Against Statistical Attacks,” ACM Trans. Priv. Secur., vol. 26, no. 2, pp. 1–30, April 2023. doi:10.1145/3571743
[41]B. DeCann and A. Ross, “Relating roc and cmc curves via the biometric menagerie,” in Proc. of 2013 IEEE BTAS, Washington DC, USA, 2013, pp. 1–8.
[42]A. D’Amelio, S. Patania, S. Bursic, V. Cuculo and G. Boccignone, “Using Gaze for Behavioural Biometrics,” Sensors, vol. 23, no. 3, pp. 1–30, January 2023. doi:10.3390/s23031262
[43]J. Liebers, U. Gruenefeld, D. Buschek, F. Alt and S. Schneegass, “Introduction to Authentication using Behavioral Biometrics,” in Proc. of the 2023 CHI EA, Hamburg, Germany, 23 - 28 April 2023, pp. 1–4.
[44]P. Alinia, C. Cain, R. Fallahzadeh, A. Shahrokni, D. Cook and H. Ghasemzadeh, “How Accurate Is Your Activity Tracker? A Comparative Study of Step Counts in Low-Intensity Physical Activities,” JMIR Mhealth Uhealth, vol. 5, no. 8, 2017. doi:10.2196/mhealth.6321