Skip to main content

ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure Infrastructure

  • Conference paper
  • First Online:
Emerging Technologies for Authorization and Authentication (ETAA 2022)

Abstract

In this paper we propose a gesture-based user-friendly smartwatch-based user authentication scheme called ClapAuth to authenticate the users to gain physical access to a secure infrastructure. In ClapAuth users are authenticated by performing clapping actions, while wearing their smartwatch in one hand. ClapAuth, while users perform clapping gestures, profiles them by collecting data from their smartwatches’ built-in accelerometer and gyroscope sensors. We have evaluated the proposed scheme on a publicly available dataset by using state-of-the-art n-class machine learning classifiers, namely Random Forest (RF), Artificial Neural Network (ANN), and K-Nearest Neighbors (KNN). KNN outperformed other two classifiers and attained \(93.3\%\) TAR at the cost of \(0.22\%\) FAR. ClapAuth could be widely accepted as it utilizes users’ familiarity with a common action, such as clapping, and users are not required to remember any secret code or gesture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.iphoneness.com/home-automation-2/apple-watch-garage-door-opener/.

  2. 2.

    https://www.macworld.com/article/676033/bmw-to-use-iphones-u1-chip-for-digital-car-keys.html.

  3. 3.

    However, there are 50 ARFF files (ARFF file for class 1614 is missing) so, we used the available data of 50 users.

  4. 4.

    https://weka.sourceforge.io/doc.dev/weka/attributeSelection/CfsSubsetEval.html.

  5. 5.

    https://measuringu.com/sus/.

References

  1. Tavčar, J., Horvath, I.: A review of the principles of designing smart cyber-physical systems for run-time adaptation: learned lessons and open issues. IEEE Trans. Syst. Man Cybern. 49(1), 145–158 (2018)

    Article  Google Scholar 

  2. Krašovec, A., Pellarini, D., Geneiatakis, D., Baldini, G., Pejović, V.: Not quite yourself today: behaviour-based continuous authentication in IoT environments. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 4(4), 1–29 (2020)

    Google Scholar 

  3. Smart door locks. http://www.yalelock.it/en/yale/yale-italy/smart-living/smart-door-locks/. Accessed 22 Apr 2022

  4. Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., Wagner, D.: Smart locks: lessons for securing commodity internet of things devices. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 461–472. ACM (2016)

    Google Scholar 

  5. Katsini, C., Belk, M., Fidas, C., Avouris, N., Samaras, G.: Security and usability in knowledge-based user authentication: a review. In: Proceedings of the 20th Pan-Hellenic Conference on Informatics, pp. 1–6 (2016)

    Google Scholar 

  6. Ometov, A., Petrov, V., Bezzateev, S., Andreev, S., Koucheryavy, Y., Gerla, M.: Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Netw. 33(2), 82–88 (2019)

    Article  Google Scholar 

  7. Yobico: 2020 state of password and authentication security behaviors report. https://pages.yubico.com/2020-password-and-authentication-report. Accessed 22 Apr 2022

  8. Buriro, A.: Behavioral biometrics for smartphone user authentication. University of Trento, Italy (2017)

    Google Scholar 

  9. Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: NDSS, vol. 56, pp. 57–59 (2013)

    Google Scholar 

  10. Zhang, H., Patel, V.M., Fathy, M., Chellappa, R.: Touch gesture-based active user authentication using dictionaries. In: 2015 IEEE Winter Conference on Applications of Computer Vision, pp. 207–214. IEEE (2015)

    Google Scholar 

  11. Buriro, A., Crispo, B., Del Frari, F., Wrona, K.: Touchstroke: smartphone user authentication based on touch-typing biometrics. In: Murino, V., Puppo, E., Sona, D., Cristani, M., Sansone, C. (eds.) ICIAP 2015. LNCS, vol. 9281, pp. 27–34. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23222-5_4

    Chapter  Google Scholar 

  12. Buriro, A., Gupta, S., Yautsiukhin, A., Crispo, B.: Risk-driven behavioral biometric-based one-shot-cum-continuous user authentication scheme. J. Signal Process. Syst. 93, 989–1006 (2021)

    Article  Google Scholar 

  13. Primo, A., Phoha, V.V., Kumar, R., Serwadda, A.: Context-aware active authentication using smartphone accelerometer measurements. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 98–105. Springer, Heidelberg (2014)

    Google Scholar 

  14. Kumar, R., Phoha, V.V., Raina, R.: Authenticating users through their arm movement patterns, arXiv preprint arXiv:1603.02211 (2016)

  15. Nguyen, T., Memon, N.: Tap-based user authentication for smartwatches. Comput. Secur. 78, 174–186 (2018)

    Article  Google Scholar 

  16. Nguyen, T., Sae-Bae, N., Memon, N.: DRAW-A-PIN: authentication using finger-drawn PIN on touch devices. Comput. Secur. 66, 115–128 (2017)

    Article  Google Scholar 

  17. Shang, J., Wu, J.: A usable authentication system using wrist-worn photoplethysmography sensors on smartwatches. In: 2019 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. IEEE (2019)

    Google Scholar 

  18. Lewis, A., Li, Y., Xie, M.: Real time motion-based authentication for smartwatch. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 380–381. IEEE (2016)

    Google Scholar 

  19. Lu, C.X., Du, B., Kan, X., Wen, H., Markham, A., Trigoni, N.: VeriNet: user verification on smartwatches via behavior biometrics. In: Proceedings of the 1st ACM Workshop on Mobile Crowdsensing Systems and Applications, pp. 68–73 (2017)

    Google Scholar 

  20. Buriro, A., Crispo, B., Eskandri, M., Gupta, S., Mahboob, A., Van Acker, R.: SnapAuth: a gesture-based unobtrusive smartwatch user authentication scheme. In: Saracino, A., Mori, P. (eds.) ETAA 2018. LNCS, vol. 11263, pp. 30–37. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04372-8_3

    Chapter  Google Scholar 

  21. Buriro, A., Van Acker, R., Crispo, B., Mahboob, A.: Airsign: a gesture-based smartwatch user authentication. In: Proceedings of the 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1–5. IEEE (2018)

    Google Scholar 

  22. Liang, G.-C., Xu, X.-Y., Yu, J.-D.: User-authentication on wearable devices based on punch gesture biometrics. In: ITM Web of Conferences, vol. 11, p. 01003. EDP Sciences (2017)

    Google Scholar 

  23. Yu, X., Zhou, Z., Xu, M., You, X., Li, X.-Y.: Thumbup: identification and authentication by smartwatch using simple hand gestures. In: 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 1–10. IEEE Computer Society (2020)

    Google Scholar 

  24. Huang, C., Yang, Z., Chen, H., Zhang, Q.: Signing in the air W/O constraints: robust gesture-based authentication for wrist wearables. In: IEEE Global Communications Conference (Globecom-2017), pp. 1–6. IEEE (2017)

    Google Scholar 

  25. Baidya, J., Saha, T., Moyashir, R., Palit, R.: Design and implementation of a fingerprint based lock system for shared access. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–6. IEEE (2017)

    Google Scholar 

  26. Shi, W., Li, J., Ding, Y., Zhou, K.: Research on intelligent access control system based on interactive face liveness detection and machine vision. In: IOP Conference Series: Materials Science and Engineering, vol. 563, no. 5, p. 052094. IOP Publishing (2019)

    Google Scholar 

  27. Yu, L., Li, K., Zheng, J.: Application design of the iris recognition technology in the access control management system. In: IOP Conference Series: Materials Science and Engineering, vol. 719, no. 1, p. 012040. IOP Publishing (2020)

    Google Scholar 

  28. Gupta, S., Buriro, A., Crispo, B.: Smarthandle: a novel behavioral biometric-based authentication scheme for smart lock systems. In: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, pp. 15–22. ACM (2020)

    Google Scholar 

  29. Weiss, G.M.: Wisdm smartphone and smartwatch activity and biometrics dataset. In: UCI Machine Learning Repository: WISDM Smartphone and Smartwatch Activity and Biometrics Dataset Data Set, vol. 7, pp. 133190–133202 (2019)

    Google Scholar 

  30. Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer, New York (2007). https://doi.org/10.1007/978-0-387-71041-9

    Book  Google Scholar 

  31. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newslett. 11(1), 10–18 (2009)

    Article  Google Scholar 

  32. Hall, M.: Correlation-based feature subset selection for machine learning. University of Waikato, New Zealand (1998)

    Google Scholar 

  33. Raurale, S.A., McAllister, J., Del Rincón, J.M.: EMG biometric systems based on different wrist-hand movements. IEEE Access 9, 12256–12266 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Attaullah Buriro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Buriro, A., Ricci, F. (2023). ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure Infrastructure. In: Saracino, A., Mori, P. (eds) Emerging Technologies for Authorization and Authentication. ETAA 2022. Lecture Notes in Computer Science, vol 13782. Springer, Cham. https://doi.org/10.1007/978-3-031-25467-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25467-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25466-6

  • Online ISBN: 978-3-031-25467-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics