Abstract
User authentication has become an essential security element that enables a wide range of applications in P2P systems for higher security and safety requirements. In previous, many researchers worked on user authentication based on certificates, passwords, and feature-based authentication (e.g. face recognition, fingerprint detection, iris recognition, voice recognition). However, authentication using those technologies may fail because this information can be easily shared among users or synthesized. Also, there are several cyber and cryptography attacks. With the progress of the latest sensor technology, wearable as Microsoft Bands, Fitbit, and Garmin has provided for more information collecting opportunities. From those above point of views, this paper presents a novel user identification system based on the bio signal analysis of arm movement (3-axis accelerometer & 3-axis gyroscope) and electromyography (EMG) signal using Myo armband as a wearable user authentication system in P2P system that identifies users based on the bio-signal of movement of a person’s arm. In this study, the gesture and EMG signals are obtained from the sensor and denoised using wavelet denoising algorithm. The denoised signals are analyzed using the envelope and cepstrum analysis for extracting the potential feature vector. Finally, the feature vector is used to train and identify a user using multi-class support vector machine (MC-SVM) with different kernel function for user authentication. For validating the proposed authentication model, signals are obtained from the arm movements, i.e., directions and hand gesture data using acceleration, gyroscope and EMG sensors of several subjects. According to the experimental results, the proposed model shows satisfactory performance. To evaluate the efficiency of the proposed systems, we measure and compare its classification accuracy with state-of-the-art algorithms. And the proposed algorithm outperforms with others.
Similar content being viewed by others
References
Mun HJ, Han KH (2016) Blackhole attack: user identity and password seize attack using honeypot. J Comput Virol Hack Techn 12(3):185–190
Wayman J, A Jain, D Maltoni, D Maio (2005) An introduction to biometric authentication systems. In Biomet Syst 1–20
Madhusudhan R, and Shashidhara R (2019) Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET. Peer-to-Peer Network Appl 1–22
Milton JM, Ramakrishnan B (2017) Novel authentication procedures for preventing unauthorized access in social networks. Peer-to-Peer Network Appl 10(4):833–843
Shin J, Liu Z, Kim CM, Mun HJ (2018) Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems. Peer-to-Peer Network Appl 11(6):1166–1175
Gartner. Inc. (2017) Gartner Identifies Three Megatrends That Will Drive Digital Business Into the Next Decade
Aikawa T (2015) Creation of immersive in entertainment using VR technology. Jap Inst Reposit (Online) 1: (54)
Konno S, Nakamura Y, Shiraishi Y, Tkahasi O (2016) Improvement of accuracy based on multi-sample and multi-sensor in the gait-based authentication using trouser front pocket sensors. Int J Inform Soc 8(1):3–13
Derawi MO, C Nickel, P Bours, C Busch (2010) Unobtrusive user-authentication on mobile phones using biometric gait recognition. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), The Sixth International Conference on. 306–311. IEEE
Carlson C, T Chen, J Cruz, J Maghsoudi, H Zhao, V Monaco (2015) User Authentication with Android Accelerometer and Gyroscope Sensors. Proceedings of Student-Faculty Research Day, CSIS, Pace University
Guerra-Casanova J, Sanchez-Avila C, Bailador G, de Santos Sierra A (2012) Authentication in mobile devices through hand gesture recognition. Int J Inf Secur 11(2):65–83
Venugopalan S, F Juefei-Xu, B Cowly (2015) Electromyograph and keystroke dynamics for spoof-resistant biometric authentication. In Proceddings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 109–118
Maruyama K, J Shin, C Min Kim, CL Chen (2017) User Authentication using Leap Motion. In Proceedings of the International Conference on Research in Adaptive and Convergent Systems. 213–216. ACM
T. Inada, Y. Sodani, I. Nakanishi, and S. Li, Person authentication using intra-palm propagation signals. Proc Biometrics Workshop, IEICE, Vol. 83, pp. 19–24, 2012. (in Japanese)
Vhaduri S, C Poellabauer (2017) Wearable device user authentication using physiological and behavioral metrics. In Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE 28th Annual International Symposium on. 1–6
Benalcázar ME, AG Jaramillo, A Zea, A Páez, VH Andaluz (2017) Hand gesture recognition using machine learning and the Myo armband. In Signal Processing Conference (EUSIPCO), 25th European, IEEE. 1040–1044
He S, C Yang, M Wang, L Cheng, Z Hu (2017) Hand gesture recognition using MYO armband. In Chinese Automation Congress (CAC). 4850–4855
Ruikar SD, DD Doye (2011) Wavelet based image denoising technique. (IJACSA) Int J Adv Comput Sci Appl 2: (3)
Islam R, SA Khan, JM Kim (2016) Discriminant feature distribution analysis-based hybrid feature selection for online bearing fault diagnosis in induction motors. J Sensors
Nguyen H, Kim J, Kim JM (2018) Optimal sub-band analysis based on the envelope power Spectrum for effective fault detection in bearing under variable, low speeds. Sensors 18(5):1389
Kim J, S Mastnik, E André (2008) EMG-based hand gesture recognition for realtime biosignal interfacing. In Proceedings of the 13th international conference on Intelligent user interfaces. 30–39. ACM
Yoshikawa M, M Mikawa, K Tanaka (2006) Real-Time Hand Motion Classification Using EMG Signals with Support Vector Machines. SICE-ICASE International Joint Conference, IEEE. 593–598
Jan SU, Lee Y, Shin J, Koo I (2017) Sensor fault classification based on support vector machine and statistical time-domain feature. IEEE Access 5:8682–8690
Islam MR, UK Mitu, RA Bhuiyan, J Shin (2018) Hand Gesture Feature Extraction Using Deep Convolutional Neural Network for Recognizing American Sign Language. In 2018 4th International Conference on Frontiers of Signal Processing (ICFSP). 115–119. IEEE
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection: Special Issue on P2P Computing for Intelligence of Things
Guest Editors: Sunmoon Jo, Jieun Lee, Jungsoo Han, and Supratip Ghose
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shin, J., Islam, M.R., Rahim, M.A. et al. Arm movement activity based user authentication in P2P systems. Peer-to-Peer Netw. Appl. 13, 635–646 (2020). https://doi.org/10.1007/s12083-019-00775-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-00775-7