Abstract
Digital therapeutics (DTx) can be used in conjunction with wearable devices to continuously collect, transmit, and analyze patients’ physiological data, achieving personalized precision medicine. In practice, security and privacy problems may arise when physiological data are improperly protected. For instance, any inaccuracies exist in the collected data (due to malicious attacks or mistakes) may affect the effectiveness of treatment. Additionally, physiological data are characterized by a small amount, resulting in decreased authentication accuracy of deep learning models. Inspired by these observations, this paper presents a continuous authentication scheme for digital therapeutics using variational autoencoder and convolutional neural network (VAECNN). Typically, in the training phase, to improve the stability of CNN model, the collected data are used for data augmentation using VAE. To train a one-class classifier, optimal features are selected by conducting principal component analysis (PCA). During the continuous authentication phase, the trained CNN is utilized for feature extraction. Subsequently, the trained one-class classifier is employed to authenticate the user as a legitimate user or an impostor. To assess the performance of VAECNN, we conduct extensive experiments to estimate its performance, the performance of VAE augmentation and the designed CNN, and compare it with several augmentation schemes and representative authentication schemes. Experimental results indicate that our VAECNN achieves the best performance with elliptic envelope (EE) classifier, i.e., it achieves the lowest equal error rate (EER) of 1.06% and the highest accuracy of 98.96%.






Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.Data availability
No datasets were generated or analyzed during the current study.
Notes
Until now, types of one-time authentication mechanisms have been developed and employed. Our scheme aims to develop a continuous authentication scheme, and any secure one-time authentication mechanism can be employed to achieve initial authentication. Thus, in initial login authentication of our scheme, a secure one-time authentication mechanism is employed without introducing the detailed processes.
According to [43], the average bitstrength of users chosen passwords is around 40.54 bits.
References
Dang A, Arora D, Rane P (2020) Role of digital therapeutics and the changing future of healthcare. J Family Med Primary Care 9(5):2207
Dang A, Dang D, Rane P (2021) The expanding role of digital therapeutics in the post-COVID-19 era. Open COVID J 1(1):32–37
Tang W, Zhang K, Ren J, Zhang Y, Shen X (2019) Flexible and efficient authenticated key agreement scheme for bans based on physiological features. IEEE Trans Mob Comput 18(4):845–856. https://doi.org/10.1109/TMC.2018.2848644
Seyedi M, Kibret B, Lai DTH, Faulkner M (2013) A survey on intrabody communications for body area network applications. IEEE Trans Biomed Eng 60(8):2067–2079. https://doi.org/10.1109/TBME.2013.2254714
Zhang J, Pan L, Han Q, Chen C, Wen S, Xiang Y (2022) Deep learning based attack detection for cyber-physical system cybersecurity: a survey. IEEE CAA J Automatica Sinica 9(3):377–391
Chen X, Li C, Wang D, Wen S, Zhang J, Nepal S, Xiang Y, Ren K (2020) Android HIV: a study of repackaging malware for evading machine-learning detection. IEEE Trans Inf Forensics Secur 15:987–1001
Pycroft L, Boccard SG, Owen SL, Stein JF, Fitzgerald JJ, Green AL, Aziz TZ (2016) Brainjacking: implant security issues in invasive neuromodulation. World Neurosurg 92:454–462
Sequeiros JB, Chimuco FT, Samaila MG, Freire MM, Inácio PR (2020) Attack and system modeling applied to Iot, cloud, and mobile ecosystems: embedding security by design. ACM Comput Surv (CSUR) 53(2):1–32
Imtiaz SI, Rehman S, Javed AR, Jalil Z, Liu X, Alnumay WS (2021) Deepamd: detection and identification of android malware using high-efficient deep artificial neural network. Futur Gener Comput Syst 115:844–856
Baig AF, Eskeland S (2021) Security, privacy, and usability in continuous authentication: a survey. Sensors 21(17):5967
Stylios I, Kokolakis S, Thanou O, Chatzis S (2021) Behavioral biometrics & continuous user authentication on mobile devices: a survey. Inf Fusion 66:76–99
Liang Y, Samtani S, Guo B, Yu Z (2020) Behavioral biometrics for continuous authentication in the internet-of-things era: an artificial intelligence perspective. IEEE Internet Things J 7(9):9128–9143
Gonzalez-Manzano L, Fuentes JMD, Ribagorda A (2019) Leveraging user-related internet of things for continuous authentication: a survey. ACM Comput Surv (CSUR) 52(3):1–38
Lin C, He J, Shen C, Li Q, Wang Q (2022) Crossbehaauth: cross-scenario behavioral biometrics authentication using keystroke dynamics. IEEE Trans Depend Secure Comput 20(3):2314–2327
Niinuma K, Park U, Jain AK (2010) Soft biometric traits for continuous user authentication. IEEE Trans Inf Forensics Secur 5(4):771–780
Liao R-F, Wen H, Chen S, Xie F, Pan F, Tang J, Song H (2019) Multiuser physical layer authentication in internet of things with data augmentation. IEEE Internet Things J 7(3):2077–2088
Li Y, Hu H, Zhou G (2018) Using data augmentation in continuous authentication on smartphones. IEEE Internet Things J 6(1):628–640
Li Y, Hu H, Zhou G, Deng S (2018) Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6:32554–32565
Li Y, Luo J, Deng S, Zhou G (2021) CNN-based continuous authentication on smartphones with conditional Wasserstein generative adversarial network. IEEE Internet Things J 9(7):5447–5460
Li Y, Liu L, Deng S, Qin H, El-Yacoubi MA, Zhou G (2024) Memory-augmented autoencoder based continuous authentication on smartphones with conditional transformer GANS. IEEE Trans Mob Comput 23(5):4467–4482
Fereidooni H, König J, Rieger P, Chilese M, Gökbakan B, Finke M, Dmitrienko A, Sadeghi A (2023) Authentisense: A scalable behavioral biometrics authentication scheme using few-shot learning for mobile platforms. In: 30th Annual Network and Distributed System Security Symposium, NDSS2023, San Diego, California, USA, February 27 - March 3, 2023
Yang Z, Li Y, Zhou G (2024) Unsupervised sensor-based continuous authentication with low-rank transformer using learning-to-rank algorithms. IEEE Trans Mob Comput 23(9):8839–8854. https://doi.org/10.1109/TMC.2024.3353209
Li Y, Liu L, Qin H, Deng S, El-Yacoubi MA, Zhou G (2023) Adaptive deep feature fusion for continuous authentication with data augmentation. IEEE Trans Mob Comput 22(10):5690–5705. https://doi.org/10.1109/TMC.2022.3186614
Hu M, Zhang K, You R, Tu B (2023) Multisensor-based continuous authentication of smartphone users with two-stage feature extraction. IEEE Internet Things J 10(6):4708–4724. https://doi.org/10.1109/JIOT.2022.3219135
Li Y, Luo J, Deng S, Zhou G (2023) Searchauth: neural architecture search-based continuous authentication using auto augmentation search. ACM Trans Sens Netw 19(4):92–19223
Deng S, Luo J, Li Y (2021) CNN-based continuous authentication on smartphones with auto augmentation search. In: Gao D, Li Q, Guan X, Liao X (eds) Information and Communications Security. Springer, Cham, pp 169–186
Wagata K, Teoh ABJ (2022) Few-shot continuous authentication for mobile-based biometrics. Appl Sci 12(20):10365
Yang Z, Li Y, Zhou G (2023) TS-GAN: time-series GAN for sensor-based health data augmentation. ACM Trans Comput Heal 4(2):12–11221
Vidya B, Sasikumar P (2022) Wearable multi-sensor data fusion approach for human activity recognition using machine learning algorithms. Sens Actuators, A 341:113557
Kashinath SA, Mostafa SA, Mustapha A, Mahdin H, Yang TJ (2021) Review of data fusion methods for real-time and multi-sensor traffic flow analysis. IEEE Access 99:1–1
Frank J, Mannor S, and Precup D Data sets: mobile phone gait recognition data, 2010. http://www.cs.mcgill.ca/~ifrank8/data/gait-dataset.html
Sztyler T, Stuckenschmidt H (2016) On-body localization of wearable devices: An investigation of position-aware activity recognition. In: 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 1–9. IEEE
Doersch C (2016) Tutorial on variational autoencoders. arXiv preprint arXiv:1606.05908
Atienza R (2018) Advanced deep learning with Keras: apply deep learning techniques, autoencoders, GANs, variational autoencoders. policy gradients, and more, deep reinforcement learning
Kingma DP, Welling M (2019) An introduction to variational autoencoders. Found Trends® Mach Learn 12(4):307–392
Breunig MM, Kriegel H-P, Ng RT, Sander (2000) Lof: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93–104
Liu FT, Ting KM, Zhou Z-H (2008) Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413–422. IEEE
EStimator D (1999) A fast algorithm for the minimum covariance. Technometrics 41(3):212
Schölkopf B, Williamson RC, Smola AJ, Shawe-Taylor J, Platt JC (1999) Support vector method for novelty detection. In: Solla, S.A., Leen, T.K., Müller, K. (eds.) Advances in Neural Information Processing Systems 12, [NIPS Conference, Denver, Colorado, USA, November 29 - December 4, 1999], pp 582–588
Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp 93–104
Liu FT, Ting KM, Zhou Z-H (2012) Isolation-based anomaly detection. ACM Trans Knowl Discov Data (TKDD) 6(1):1–39
Qin H, El-Yacoubi MA, Li Y, Liu C (2021) Multi-scale and multi-direction GAN for CNN-based single palm-vein identification. IEEE Trans Inf Forensics Secur 16:2652–2666. https://doi.org/10.1109/TIFS.2021.3059340
Florêncio DAF, Herley C (2007) A large-scale study of web password habits. In: Williamson, C.L., Zurko, M.E., Patel-Schneider, P.F., Shenoy, P.J. (eds.) Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 657–666
Acknowledgements
This work is supported by the National Natural Science Foundation of China (No. 61902289), the Natural Science Foundation of Fujian Province (No. 2023J01534, No. 2023J01323), and the University-Industry Cooperation Project of Fujian Provincial Department of Science and Technology (No. 2022H6025), Fujian Special Financial Project for Reseach (No. 22SCZZX009), and the Start-up funds for scientific research of highlevel talents, Fujian Medical University (No. XRCZX2022010).
Author information
Authors and Affiliations
Contributions
Wang Chengling was contributed conceptualization, methodology, validation and writing–original draft. Zhang Yuexin was involved in supervision, methodology and writing–review and editing. Ma Yunru was performed conceptualization and writing–review and editing. Chen Peng was done methodology. Yang Xiang did methodology and validation.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, C., Zhang, Y., Ma, Y. et al. CNN-based continuous authentication for digital therapeutics using variational autoencoder. J Supercomput 81, 5 (2025). https://doi.org/10.1007/s11227-024-06490-2
Accepted:
Published:
DOI: https://doi.org/10.1007/s11227-024-06490-2