Skip to main content
Log in

Arm movement activity based user authentication in P2P systems

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

User authentication has become an essential security element that enables a wide range of applications in P2P systems for higher security and safety requirements. In previous, many researchers worked on user authentication based on certificates, passwords, and feature-based authentication (e.g. face recognition, fingerprint detection, iris recognition, voice recognition). However, authentication using those technologies may fail because this information can be easily shared among users or synthesized. Also, there are several cyber and cryptography attacks. With the progress of the latest sensor technology, wearable as Microsoft Bands, Fitbit, and Garmin has provided for more information collecting opportunities. From those above point of views, this paper presents a novel user identification system based on the bio signal analysis of arm movement (3-axis accelerometer & 3-axis gyroscope) and electromyography (EMG) signal using Myo armband as a wearable user authentication system in P2P system that identifies users based on the bio-signal of movement of a person’s arm. In this study, the gesture and EMG signals are obtained from the sensor and denoised using wavelet denoising algorithm. The denoised signals are analyzed using the envelope and cepstrum analysis for extracting the potential feature vector. Finally, the feature vector is used to train and identify a user using multi-class support vector machine (MC-SVM) with different kernel function for user authentication. For validating the proposed authentication model, signals are obtained from the arm movements, i.e., directions and hand gesture data using acceleration, gyroscope and EMG sensors of several subjects. According to the experimental results, the proposed model shows satisfactory performance. To evaluate the efficiency of the proposed systems, we measure and compare its classification accuracy with state-of-the-art algorithms. And the proposed algorithm outperforms with others.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Mun HJ, Han KH (2016) Blackhole attack: user identity and password seize attack using honeypot. J Comput Virol Hack Techn 12(3):185–190

    Article  Google Scholar 

  2. Wayman J, A Jain, D Maltoni, D Maio (2005) An introduction to biometric authentication systems. In Biomet Syst 1–20

  3. Madhusudhan R, and Shashidhara R (2019) Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET. Peer-to-Peer Network Appl 1–22

  4. Milton JM, Ramakrishnan B (2017) Novel authentication procedures for preventing unauthorized access in social networks. Peer-to-Peer Network Appl 10(4):833–843

    Article  Google Scholar 

  5. Shin J, Liu Z, Kim CM, Mun HJ (2018) Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems. Peer-to-Peer Network Appl 11(6):1166–1175

    Article  Google Scholar 

  6. Gartner. Inc. (2017) Gartner Identifies Three Megatrends That Will Drive Digital Business Into the Next Decade

  7. Aikawa T (2015) Creation of immersive in entertainment using VR technology. Jap Inst Reposit (Online) 1: (54)

  8. Konno S, Nakamura Y, Shiraishi Y, Tkahasi O (2016) Improvement of accuracy based on multi-sample and multi-sensor in the gait-based authentication using trouser front pocket sensors. Int J Inform Soc 8(1):3–13

    Google Scholar 

  9. Derawi MO, C Nickel, P Bours, C Busch (2010) Unobtrusive user-authentication on mobile phones using biometric gait recognition. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), The Sixth International Conference on. 306–311. IEEE

  10. Carlson C, T Chen, J Cruz, J Maghsoudi, H Zhao, V Monaco (2015) User Authentication with Android Accelerometer and Gyroscope Sensors. Proceedings of Student-Faculty Research Day, CSIS, Pace University

  11. Guerra-Casanova J, Sanchez-Avila C, Bailador G, de Santos Sierra A (2012) Authentication in mobile devices through hand gesture recognition. Int J Inf Secur 11(2):65–83

    Article  Google Scholar 

  12. Venugopalan S, F Juefei-Xu, B Cowly (2015) Electromyograph and keystroke dynamics for spoof-resistant biometric authentication. In Proceddings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 109–118

  13. Maruyama K, J Shin, C Min Kim, CL Chen (2017) User Authentication using Leap Motion. In Proceedings of the International Conference on Research in Adaptive and Convergent Systems. 213–216. ACM

  14. T. Inada, Y. Sodani, I. Nakanishi, and S. Li, Person authentication using intra-palm propagation signals. Proc Biometrics Workshop, IEICE, Vol. 83, pp. 19–24, 2012. (in Japanese)

  15. Vhaduri S, C Poellabauer (2017) Wearable device user authentication using physiological and behavioral metrics. In Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE 28th Annual International Symposium on. 1–6

  16. Benalcázar ME, AG Jaramillo, A Zea, A Páez, VH Andaluz (2017) Hand gesture recognition using machine learning and the Myo armband. In Signal Processing Conference (EUSIPCO), 25th European, IEEE. 1040–1044

  17. He S, C Yang, M Wang, L Cheng, Z Hu (2017) Hand gesture recognition using MYO armband. In Chinese Automation Congress (CAC). 4850–4855

  18. Ruikar SD, DD Doye (2011) Wavelet based image denoising technique. (IJACSA) Int J Adv Comput Sci Appl 2: (3)

  19. Islam R, SA Khan, JM Kim (2016) Discriminant feature distribution analysis-based hybrid feature selection for online bearing fault diagnosis in induction motors. J Sensors

  20. Nguyen H, Kim J, Kim JM (2018) Optimal sub-band analysis based on the envelope power Spectrum for effective fault detection in bearing under variable, low speeds. Sensors 18(5):1389

    Article  Google Scholar 

  21. Kim J, S Mastnik, E André (2008) EMG-based hand gesture recognition for realtime biosignal interfacing. In Proceedings of the 13th international conference on Intelligent user interfaces. 30–39. ACM

  22. Yoshikawa M, M Mikawa, K Tanaka (2006) Real-Time Hand Motion Classification Using EMG Signals with Support Vector Machines. SICE-ICASE International Joint Conference, IEEE. 593–598

  23. Jan SU, Lee Y, Shin J, Koo I (2017) Sensor fault classification based on support vector machine and statistical time-domain feature. IEEE Access 5:8682–8690

    Article  Google Scholar 

  24. Islam MR, UK Mitu, RA Bhuiyan, J Shin (2018) Hand Gesture Feature Extraction Using Deep Convolutional Neural Network for Recognizing American Sign Language. In 2018 4th International Conference on Frontiers of Signal Processing (ICFSP). 115–119. IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyung-Jin Mun.

Additional information

This article is part of the Topical Collection: Special Issue on P2P Computing for Intelligence of Things

Guest Editors: Sunmoon Jo, Jieun Lee, Jungsoo Han, and Supratip Ghose

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shin, J., Islam, M.R., Rahim, M.A. et al. Arm movement activity based user authentication in P2P systems. Peer-to-Peer Netw. Appl. 13, 635–646 (2020). https://doi.org/10.1007/s12083-019-00775-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00775-7

Keywords

Navigation