Abstract
In this paper we propose a gesture-based user-friendly smartwatch-based user authentication scheme called ClapAuth to authenticate the users to gain physical access to a secure infrastructure. In ClapAuth users are authenticated by performing clapping actions, while wearing their smartwatch in one hand. ClapAuth, while users perform clapping gestures, profiles them by collecting data from their smartwatches’ built-in accelerometer and gyroscope sensors. We have evaluated the proposed scheme on a publicly available dataset by using state-of-the-art n-class machine learning classifiers, namely Random Forest (RF), Artificial Neural Network (ANN), and K-Nearest Neighbors (KNN). KNN outperformed other two classifiers and attained \(93.3\%\) TAR at the cost of \(0.22\%\) FAR. ClapAuth could be widely accepted as it utilizes users’ familiarity with a common action, such as clapping, and users are not required to remember any secret code or gesture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
However, there are 50 ARFF files (ARFF file for class 1614 is missing) so, we used the available data of 50 users.
- 4.
- 5.
References
Tavčar, J., Horvath, I.: A review of the principles of designing smart cyber-physical systems for run-time adaptation: learned lessons and open issues. IEEE Trans. Syst. Man Cybern. 49(1), 145–158 (2018)
Krašovec, A., Pellarini, D., Geneiatakis, D., Baldini, G., Pejović, V.: Not quite yourself today: behaviour-based continuous authentication in IoT environments. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 4(4), 1–29 (2020)
Smart door locks. http://www.yalelock.it/en/yale/yale-italy/smart-living/smart-door-locks/. Accessed 22 Apr 2022
Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., Wagner, D.: Smart locks: lessons for securing commodity internet of things devices. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 461–472. ACM (2016)
Katsini, C., Belk, M., Fidas, C., Avouris, N., Samaras, G.: Security and usability in knowledge-based user authentication: a review. In: Proceedings of the 20th Pan-Hellenic Conference on Informatics, pp. 1–6 (2016)
Ometov, A., Petrov, V., Bezzateev, S., Andreev, S., Koucheryavy, Y., Gerla, M.: Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Netw. 33(2), 82–88 (2019)
Yobico: 2020 state of password and authentication security behaviors report. https://pages.yubico.com/2020-password-and-authentication-report. Accessed 22 Apr 2022
Buriro, A.: Behavioral biometrics for smartphone user authentication. University of Trento, Italy (2017)
Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: NDSS, vol. 56, pp. 57–59 (2013)
Zhang, H., Patel, V.M., Fathy, M., Chellappa, R.: Touch gesture-based active user authentication using dictionaries. In: 2015 IEEE Winter Conference on Applications of Computer Vision, pp. 207–214. IEEE (2015)
Buriro, A., Crispo, B., Del Frari, F., Wrona, K.: Touchstroke: smartphone user authentication based on touch-typing biometrics. In: Murino, V., Puppo, E., Sona, D., Cristani, M., Sansone, C. (eds.) ICIAP 2015. LNCS, vol. 9281, pp. 27–34. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23222-5_4
Buriro, A., Gupta, S., Yautsiukhin, A., Crispo, B.: Risk-driven behavioral biometric-based one-shot-cum-continuous user authentication scheme. J. Signal Process. Syst. 93, 989–1006 (2021)
Primo, A., Phoha, V.V., Kumar, R., Serwadda, A.: Context-aware active authentication using smartphone accelerometer measurements. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 98–105. Springer, Heidelberg (2014)
Kumar, R., Phoha, V.V., Raina, R.: Authenticating users through their arm movement patterns, arXiv preprint arXiv:1603.02211 (2016)
Nguyen, T., Memon, N.: Tap-based user authentication for smartwatches. Comput. Secur. 78, 174–186 (2018)
Nguyen, T., Sae-Bae, N., Memon, N.: DRAW-A-PIN: authentication using finger-drawn PIN on touch devices. Comput. Secur. 66, 115–128 (2017)
Shang, J., Wu, J.: A usable authentication system using wrist-worn photoplethysmography sensors on smartwatches. In: 2019 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. IEEE (2019)
Lewis, A., Li, Y., Xie, M.: Real time motion-based authentication for smartwatch. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 380–381. IEEE (2016)
Lu, C.X., Du, B., Kan, X., Wen, H., Markham, A., Trigoni, N.: VeriNet: user verification on smartwatches via behavior biometrics. In: Proceedings of the 1st ACM Workshop on Mobile Crowdsensing Systems and Applications, pp. 68–73 (2017)
Buriro, A., Crispo, B., Eskandri, M., Gupta, S., Mahboob, A., Van Acker, R.: SnapAuth: a gesture-based unobtrusive smartwatch user authentication scheme. In: Saracino, A., Mori, P. (eds.) ETAA 2018. LNCS, vol. 11263, pp. 30–37. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04372-8_3
Buriro, A., Van Acker, R., Crispo, B., Mahboob, A.: Airsign: a gesture-based smartwatch user authentication. In: Proceedings of the 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1–5. IEEE (2018)
Liang, G.-C., Xu, X.-Y., Yu, J.-D.: User-authentication on wearable devices based on punch gesture biometrics. In: ITM Web of Conferences, vol. 11, p. 01003. EDP Sciences (2017)
Yu, X., Zhou, Z., Xu, M., You, X., Li, X.-Y.: Thumbup: identification and authentication by smartwatch using simple hand gestures. In: 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 1–10. IEEE Computer Society (2020)
Huang, C., Yang, Z., Chen, H., Zhang, Q.: Signing in the air W/O constraints: robust gesture-based authentication for wrist wearables. In: IEEE Global Communications Conference (Globecom-2017), pp. 1–6. IEEE (2017)
Baidya, J., Saha, T., Moyashir, R., Palit, R.: Design and implementation of a fingerprint based lock system for shared access. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–6. IEEE (2017)
Shi, W., Li, J., Ding, Y., Zhou, K.: Research on intelligent access control system based on interactive face liveness detection and machine vision. In: IOP Conference Series: Materials Science and Engineering, vol. 563, no. 5, p. 052094. IOP Publishing (2019)
Yu, L., Li, K., Zheng, J.: Application design of the iris recognition technology in the access control management system. In: IOP Conference Series: Materials Science and Engineering, vol. 719, no. 1, p. 012040. IOP Publishing (2020)
Gupta, S., Buriro, A., Crispo, B.: Smarthandle: a novel behavioral biometric-based authentication scheme for smart lock systems. In: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, pp. 15–22. ACM (2020)
Weiss, G.M.: Wisdm smartphone and smartwatch activity and biometrics dataset. In: UCI Machine Learning Repository: WISDM Smartphone and Smartwatch Activity and Biometrics Dataset Data Set, vol. 7, pp. 133190–133202 (2019)
Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer, New York (2007). https://doi.org/10.1007/978-0-387-71041-9
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newslett. 11(1), 10–18 (2009)
Hall, M.: Correlation-based feature subset selection for machine learning. University of Waikato, New Zealand (1998)
Raurale, S.A., McAllister, J., Del Rincón, J.M.: EMG biometric systems based on different wrist-hand movements. IEEE Access 9, 12256–12266 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 Springer Nature Switzerland AG
About this paper
Cite this paper
Buriro, A., Ricci, F. (2023). ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure Infrastructure. In: Saracino, A., Mori, P. (eds) Emerging Technologies for Authorization and Authentication. ETAA 2022. Lecture Notes in Computer Science, vol 13782. Springer, Cham. https://doi.org/10.1007/978-3-031-25467-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-25467-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25466-6
Online ISBN: 978-3-031-25467-3
eBook Packages: Computer ScienceComputer Science (R0)