skip to main content
research-article

Not Quite Yourself Today: Behaviour-Based Continuous Authentication in IoT Environments

Published: 18 December 2020 Publication History

Abstract

The shortcomings of the traditional password-based authentication mechanism are becoming increasingly apparent as we transition from "one user - one device" to a richer "multiple users - multiple devices" computing paradigm. The currently dominant research direction focuses on on-device biometrics, which require sensitive information, such as images of a user's face, to be constantly streamed from a single recording source, often the device on which a user is getting authenticated. Instead, in this work we explore the possibilities offered by heterogeneous devices that opportunistically collect non-sensitive data in smart environments. We construct an IoT testbed in which we gather data pertaining to a person's movement in space, interaction with certain physical objects, PC terminal usage, and keyboard typing, and construct machine learning models capturing the person's behaviour traits. We commence our examination with models constructed from data sensed during a previously-completed task run and with such models we achieve up to 68% user identification accuracy (c.f. 7% baseline) among up to 20 individuals. Taking into account the limits of behaviour persistence we then revise our approach to continuously refine the model with the most recently sampled sensor data. This method allows us to achieve 99.3% user verification accuracy and successfully prevent a session takeover attack within 12 seconds with less than 1% of false attack detection.

References

[1]
Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, and Kemal Akkaya. 2018. WACA: Wearable-assisted continuous authentication. Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018, 264--269. https://doi.org/10.1109/SPW.2018.00042 arXiv:1802.10417
[2]
Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda Gürses, Frank Piessens, and Bart Preneel. 2013. FPDetective: Dusting the Web for Fingerprinters. In Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security (CCS '13). Association for Computing Machinery, New York, NY, USA, 1129--1140. https://doi.org/10.1145/2508859.2516674
[3]
Furkan Alaca and P. C. van Oorschot. 2016. Device Fingerprinting for Augmenting Web Authentication: Classification and Analysis of Methods. In Proceedings of the 32nd Annual Conference on Computer Security Applications (ACSAC '16). Association for Computing Machinery, New York, NY, USA, 289--301. https://doi.org/10.1145/2991079.2991091
[4]
Taqwa Ahmed Alhaj, Maheyzah Md Siraj, Anazida Zainal, Huwaida Tagelsir Elshoush, and Fatin Elhaj. 2016. Feature Selection Using Information Gain for Improved Structural-Based Alert Correlation. PLOS ONE 11, 11 (11 2016), 1--18. https://doi.org/10.1371/journal.pone.0166017
[5]
Christoph Anderson, Isabel Hübener, Ann-Kathrin Seipp, Sandra Ohly, Klaus David, and Veljko Pejovic. 2018. A survey of attention management systems in ubiquitous computing environments. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 2 (2018), 1--27.
[6]
Adam J. Aviv, Benjamin Sapp, Matt Blaze, and Jonathan M. Smith. 2012. Practicality of Accelerometer Side Channels on Smartphones. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12). Association for Computing Machinery, New York, NY, USA, 41--50. https://doi.org/10.1145/2420950.2420957
[7]
Peter Baumann, Stefan Katzenbeisser, Martin Stopczynski, and Erik Tews. 2016. Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection. In Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society (WPES '16). Association for Computing Machinery, New York, NY, USA, 37--46. https://doi.org/10.1145/2994620.2994621
[8]
Francesco Bergadano, Daniele Gunetti, and Claudia Picardi. 2002. User Authentication through Keystroke Dynamics. ACM Trans. Inf. Syst. Secur. 5, 4 (Nov. 2002), 367--397. https://doi.org/10.1145/581271.581272
[9]
Daniel Buschek, Alexander De Luca, and Florian Alt. 2015. Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). Association for Computing Machinery, New York, NY, USA, 1393--1402. https://doi.org/10.1145/2702123.2702252
[10]
Tadeusz Caliński and Harabasz JA. 1974. A Dendrite Method for Cluster Analysis. Communications in Statistics - Theory and Methods 3 (01 1974), 1--27. https://doi.org/10.1080/03610927408827101
[11]
Rasim Cekik and Alper Kursat Uysal. 2020. A Novel Filter Feature Selection Method Using Rough Set for Short Text Data. Expert Systems with Applications (2020), 113691. https://doi.org/10.1016/j.eswa.2020.113691
[12]
Mario Parreño Centeno, Yu Guan, and Aad van Moorsel. 2018. Mobile Based Continuous Authentication Using Deep Features. In Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning (EMDL'18). Association for Computing Machinery, New York, NY, USA, 19--24. https://doi.org/10.1145/3212725.3212732
[13]
Centrify. 2019. Privileged Access Management in the Modern Threatscape. https://www.centrify.com/resources/centrify-privileged-access-management-in-the-modern-threatscape-2019/
[14]
Nathan Clarke, Fudong Li, and Steven Furnell. 2017. A novel privacy preserving user identification approach for network traffic. Computers Security 70 (2017), 335 - 350. https://doi.org/10.1016/j.cose.2017.06.012
[15]
Klen Čopič Pucihar, Christian Sandor, Matjaž Kljun, Wolfgang Huerst, Alexander Plopski, Takafumi Taketomi, Hirokazu Kato, and Luis A Leiva. 2019. The missing interface: micro-gestures on augmented objects. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--6.
[16]
Heather Crawford, Karen Renaud, and Tim Storer. 2013. A framework for continuous, transparent mobile device authentication. Computers Security 39 (2013), 127 - 136. https://doi.org/10.1016/j.cose.2013.05.005
[17]
Ingo Deutschmann and Johan Lindholm. 2013. Behavioral biometrics for DARPA's Active Authentication program. IEEE International Conference of the Biometrics Special Interest Group (BIOSIG'13), 1--8.
[18]
Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, and David Wagner. 2014. Are You Ready to Lock?. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). Association for Computing Machinery, New York, NY, USA, 750--761. https://doi.org/10.1145/2660267.2660273
[19]
T. Feng, X. Zhao, B. Carbunar, and W. Shi. 2013. Continuous Mobile Authentication Using Virtual Key Typing Biometrics. In 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 1547--1552.
[20]
Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 8, 1 (2013), 136--148. https://doi.org/10.1109/TIFS.2012.2225048 arXiv:1207.6231
[21]
Yu Guan, Xingjie Wei, Chang Tsun Li, and Yosi Keller. 2014. People identification and tracking through fusion of facial and gait features. In Biometric Authentication (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)), Vol. 8897. Springer, United States, 209--221. https://doi.org/10.1007/978-3-319-13386-7_17
[22]
Marian Harbach, Emanuel Von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (SOUPS '14). USENIX Association, USA, 213--230.
[23]
Anna Huang, Dong Wang, Run Zhao, and Qian Zhang. 2019. Au-Id: Automatic User Identification and Authentication through the Motions Captured from Sequential Human Activities Using RFID. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1--26. https://doi.org/10.1145/3328919
[24]
Jiaju Huang, Daqing Hou, Stephanie Schuckers, Timothy Law, and Adam Sherwin. 2017. Benchmarking keystroke authentication algorithms. In 2017 IEEE Workshop on Information Forensics and Security (WIFS). IEEE, 1--6.
[25]
Felix Juefei-Xu, Chandrasekhar Bhagavatula, Aaron Jaech, Unni Prasad, and Marios Savvides. 2012. Gait-id on the move: Pace independent human identification using cell phone accelerometer dynamics. In 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS). IEEE, 8--15.
[26]
Christina Katsini, Marios Belk, Christos Fidas, Nikolaos Avouris, and George Samaras. 2016. Security and Usability in Knowledge-Based User Authentication: A Review. In Proceedings of the 20th Pan-Hellenic Conference on Informatics (PCI '16). Association for Computing Machinery, New York, NY, USA, Article 63, 6 pages. https://doi.org/10.1145/3003733.3003764
[27]
Hassan Khan, Aaron Atwater, and Urs Hengartner. 2014. A Comparative Evaluation of Implicit Authentication Schemes. In Research in Attacks, Intrusions and Defenses, Angelos Stavrou, Herbert Bos, and Georgios Portokalidis (Eds.). Springer International Publishing, Cham, 255--275.
[28]
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and other botnets. Computer 50, 7 (2017), 80--84.
[29]
Ross Koppel, Sean W Smith, Jim Blythe, and Vijay H Kothari. 2015. Workarounds to computer access in healthcare organizations: you want my password or a dead patient? ITCH 15, 4 (2015), 215--220.
[30]
Alexander Kraskov, Harald Stögbauer, and Peter Grassberger. 2004. Estimating mutual information. Phys. Rev. E 69 (Jun 2004), 066138. Issue 6. https://doi.org/10.1103/PhysRevE.69.066138
[31]
David M. Kristol. 2001. HTTP Cookies: Standards, Privacy, and Politics. ACM Trans. Internet Technol. 1, 2 (Nov. 2001), 151--198. https://doi.org/10.1145/502152.502153
[32]
Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Haskell-Dowland. 2013. Active authentication for mobile devices utilising behaviour profiling. International Journal of Information Security 13 (06 2013), 229--244. https://doi.org/10.1007/s10207-013-0209-6
[33]
Yantao Li, Hailong Hu, Gang Zhou, and Shaojiang Deng. 2018. Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6 (2018), 32554--32565.
[34]
Sicong Liu, Junzhao Du, Anshumali Shrivastava, and Lin Zhong. 2019. Privacy Adversarial Network: Representation Learning for Mobile Data Privacy. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 4 (2019), 1--18.
[35]
U. Mahbub, J. Komulainen, D. Ferreira, and R. Chellappa. 2019. Continuous Authentication of Smartphones Based on Application Usage. IEEE Transactions on Biometrics, Behavior, and Identity Science 1, 3 (July 2019), 165--180. https://doi.org/10.1109/TBIOM.2019.2918307
[36]
Apostolos Malatras, Dimitris Geneiatakis, and Ioannis Vakalis. 2017. On the efficiency of user identification: a system-based approach. International Journal of Information Security 16, 6 (Nov. 2017), 653--671. https://doi.org/10.1007/s10207-016-0340-2
[37]
A. M. Martinez and A. C. Kak. 2001. PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence 23, 2 (Feb 2001), 228--233. https://doi.org/10.1109/34.908974
[38]
Nicolai Meinshausen. 2006. Quantile Regression Forests. Journal of Machine Learning Research (2006), 983--999. http://www.jmlr.org/papers/volume7/meinshausen06a/meinshausen06a.pdf
[39]
Emiliano Miluzzo, Nicholas D Lane, Kristóf Fodor, Ronald Peterson, Hong Lu, Mirco Musolesi, Shane B Eisenman, Xiao Zheng, and Andrew T Campbell. 2008. Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In Proceedings of the 6th ACM conference on Embedded network sensor systems. 337--350.
[40]
Emiliano Miluzzo, Alexander Varshavsky, Suhrid Balakrishnan, and Romit Roy Choudhury. 2012. Tapprints: Your Finger Taps Have Fingerprints. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys '12). Association for Computing Machinery, New York, NY, USA, 323--336. https://doi.org/10.1145/2307636.2307666
[41]
Soumik Mondal and Patrick Bours. 2016. Combining keystroke and mouse dynamics for continuous user authentication and identification. In 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA). IEEE, 1--8.
[42]
Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 399--412.
[43]
Talha Ongun, Oliver Spohngellert, Alina Oprea, Cristina Nita-Rotaru, Mihai Christodorescu, and Negin Salajegheh. 2019. The House That Knows You: User Authentication Based on IoT Data. CoRR abs/1908.00592 (2019). arXiv:1908.00592 http://arxiv.org/abs/1908.00592
[44]
Vishal M. Patel, Rama Chellappa, Deepak Chandra, and Brandon Barbello. 2016. Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges. IEEE Signal Processing Magazine (2016), 49--61. https://doi.org/10.1109/MSP.2016.2555335
[45]
Soumen Roy, Utpal Roy, and DD Sinha. 2015. Distance Based Models of Keystroke Dynamics User Authentication. International Journal of Advanced Engineering Research and Science (IJAERS) (2015), 89--94.
[46]
Soumen Roy, Devadatta Sinha, and Utpal Roy. 2017. User authentication: keystroke dynamics with soft biometric features. Internet of Things (IoT): Technologies, Applications, Challenges and Solutions (2017), 99.
[47]
Jukka Ruohonen and Ville Leppänen. 2018. Invisible Pixels Are Dead, Long Live Invisible Pixels!. In Proceedings of the 2018 Workshop on Privacy in the Electronic Society (WPES'18). Association for Computing Machinery, New York, NY, USA, 28--32. https://doi.org/10.1145/3267323.3268950
[48]
Chao Shen, Shichao Pei, Zhenyu Yang, and Xiaohong Guan. 2015. Input extraction via motion-sensor behavior analysis on smartphones. Computers Security 53 (2015), 143 - 155. https://doi.org/10.1016/j.cose.2015.06.013
[49]
Elaine Shi, Yuan Niu, Markus Jakobsson, and Richard Chow. 2010. Implicit authentication through learning user behavior. In International Conference on Information Security. Springer, 99--113.
[50]
Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, and N. Asokan. 2014. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing. In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 349--364.
[51]
Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, and Kiran S. Balagani. 2015. HMOG: A New Biometric Modality for Continuous Authentication of Smartphone Users. CoRR abs/1501.01199 (2015). arXiv:1501.01199 http://arxiv.org/abs/1501.01199
[52]
Yingbo Song, Malek Ben Salem, Shlomo Hershkop, and Salvatore J. Stolfo. 2013. System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models. In 2013 IEEE Security and Privacy Workshops. 52--59. https://doi.org/10.1109/SPW.2013.33
[53]
Statista. 2019. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
[54]
Shridatt Sugrim, Can Liu, and Janne Lindqvist. 2019. Recruit Until It Fails: Exploring Performance Limits for Identification Systems. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 1--26.
[55]
Hoang Minh Thang, Vo Quang Viet, Nguyen Dinh Thuc, and Deokjai Choi. 2012. Gait identification using accelerometer on mobile phone. In 2012 International Conference on Control, Automation and Information Sciences (ICCAIS). IEEE, 344--348.
[56]
Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, and Depeng Jin. 2018. Your Apps Give You Away. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1--23. https://doi.org/10.1145/3264948
[57]
Dwi Ana Ratna Wati and Dika Abadianto. 2017. Design of face detection and recognition system for smart home security application. In 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE). 342--347. https://doi.org/10.1109/ICITISEE.2017.8285524
[58]
Flynn Wolf, Ravi Kuber, and Adam J. Aviv. 2019. "Pretty Close to a Must-Have": Balancing Usability Desire and Security Concern in Biometric Adoption. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19). Association for Computing Machinery, New York, NY, USA, Article Paper 151. https://doi.org/10.1145/3290605.3300381
[59]
Zhi Xu, Kun Bai, and Sencun Zhu. 2012. TapLogger: Inferring User Inputs on Smartphone Touchscreens Using on-Board Motion Sensors. In Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC '12). Association for Computing Machinery, New York, NY, USA, 113--124. https://doi.org/10.1145/2185448.2185465
[60]
Roman V Yampolskiy and Venu Govindaraju. 2008. Behavioural biometrics: a survey and classification. International Journal of Biometrics 1, 1 (2008), 81--113.
[61]
Yafang Yang, Bin Guo, Zhu Wang, Mingyang Li, Zhiwen Yu, and Xingshe Zhou. 2019. BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics. Ad Hoc Networks 84 (2019), 9 - 18. https://doi.org/10.1016/j.adhoc.2018.09.015
[62]
Yinghui (Catherine) Yang. 2010. Web user behavioral profiling for user identification. Decision Support Systems 49 (2010), 261 - 271. https://doi.org/10.1016/j.dss.2010.03.001
[63]
Xiang Zhang, Lina Yao, Kaixuan Chen, Xianzhi Wang, Quan Z. Sheng, and Tao Gu. 2017. DeepKey: An EEG and Gait Based Dual-Authentication System. CoRR abs/1706.01606 (2017). arXiv:1706.01606 http://arxiv.org/abs/1706.01606

Cited By

View all
  • (2024)PETRAS: a socio-technical framework for Internet of Things research and developmentFrontiers in the Internet of Things10.3389/friot.2024.13365643Online publication date: 9-May-2024
  • (2024)Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at DesksProceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3623509.3633360(1-15)Online publication date: 11-Feb-2024
  • (2024)SSPRA: A Robust Approach to Continuous Authentication Amidst Real-World Adversarial ChallengesIEEE Transactions on Biometrics, Behavior, and Identity Science10.1109/TBIOM.2024.33695906:2(245-260)Online publication date: Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 4, Issue 4
December 2020
1356 pages
EISSN:2474-9567
DOI:10.1145/3444864
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 December 2020
Published in IMWUT Volume 4, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Internet of Things (IoT)
  2. continuous authentication
  3. machine learning

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)70
  • Downloads (Last 6 weeks)5
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)PETRAS: a socio-technical framework for Internet of Things research and developmentFrontiers in the Internet of Things10.3389/friot.2024.13365643Online publication date: 9-May-2024
  • (2024)Act2Auth – A Novel Authentication Concept based on Embedded Tangible Interaction at DesksProceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3623509.3633360(1-15)Online publication date: 11-Feb-2024
  • (2024)SSPRA: A Robust Approach to Continuous Authentication Amidst Real-World Adversarial ChallengesIEEE Transactions on Biometrics, Behavior, and Identity Science10.1109/TBIOM.2024.33695906:2(245-260)Online publication date: Apr-2024
  • (2024)Multimodal Data for Behavioural Authentication in Internet of Things EnvironmentsData in Brief10.1016/j.dib.2024.110697(110697)Online publication date: Jul-2024
  • (2023)ClapAuth: A Gesture-Based User-Friendly Authentication Scheme to Access a Secure InfrastructureEmerging Technologies for Authorization and Authentication10.1007/978-3-031-25467-3_2(15-30)Online publication date: 31-Jan-2023
  • (2023)Usable Identity and Access Management Schemes for Smart CitiesCollaborative Approaches for Cyber Security in Cyber-Physical Systems10.1007/978-3-031-16088-2_3(47-61)Online publication date: 2-Jan-2023
  • (2022)Systematic Review of Authentication and Authorization Advancements for the Internet of ThingsSensors10.3390/s2204136122:4(1361)Online publication date: 10-Feb-2022
  • (2022)Practical Privacy-Preserving Behaviour-Based Authentication on the EdgeAdjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers10.1145/3544793.3560356(65-66)Online publication date: 11-Sep-2022
  • (2022)Stepping Into the Next Decade of Ubiquitous and Pervasive Computing: UbiComp and ISWC 2021IEEE Pervasive Computing10.1109/MPRV.2022.316006321:2(87-99)Online publication date: 1-Apr-2022
  • (2022) Step & turn—A novel bimodal behavioral biometric-based user verification scheme for physical access controlComputers and Security10.1016/j.cose.2022.102722118:COnline publication date: 1-Jul-2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media