1 |
G. Revadigar, C. Javali, H.J. Asghar, K.B. Rasmussen, and S. Jha, "Mobility independent secret key generation for wearable health-care devices," Proceedings of the 10th EAI International Conference on Body Area Networks, pp. 294-300, Sep. 2015.
|
2 |
C.L. Hsu, T.H. Chuang, and T.W. Lin, "End-to-end authenticated key exchange agreement for wearable devices in IoT environments." 2017 IEEE Great Lakes Biomedical Conference, pp. 1-1, Apr. 2017.
|
3 |
Y. Zeng, A. Pande, J. Zhu, and P. Mohapatra, "WearIA: Wearable device implicit authentication based on activity information", 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks, pp. 1-9, Jun. 2017.
|
4 |
S.Y. Chun, J.H. Kang, H. Kim, C. Lee, I. Oakley, and S.P. Kim, "ECG based user authentication for wearable devices using short time Fourier transform," 2016 39th International Conference on Telecommunications and Signal Processing, pp. 656-659, Jun. 2016.
|
5 |
R. Liu, C. Cornelius, R. Rawassizadeh, R. Peterson, and D. Kotz, "Poster: Vocal Resonance as a Passive Biometric," Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, pp. 160-160, Jun. 2017.
|
6 |
P. Meharia and D.P. Agrawal, "The human key: Identification and authentication in wearable devices using gait," Journal of Information Privacy and Security, vol. 11, no. 2, pp. 80-96, Apr. 2015.
DOI
|
7 |
S. Eberz, N. Paoletti, M. Roeschlin, M. Kwiatkowska, I. Martinovic, and A. Patane, "Broken hearted: How to attack ECG biometrics," Network and Distributed System Security Symposium 2017, Feb. 2017
|
8 |
S. Sprager, R. Trobec, and M.B. Juric, "Feasibility of biometric authentication using wearable ECG body sensor based on higher-order statistics," 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, pp. 264-269, May. 2017.
|
9 |
M. Rostami, A. Juels, and F. Koushanfar, "Heart-to-heart (H2H): authentication for implanted medical devices," Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securitym, pp. 1099-1112, Nov. 2013.
|
10 |
F. Xu, Z. Qin, C.C. Tan, B. Wang, and Q. Li, "IMDGuard: Securing implantable medical devices with the external wearable guardian," IEEE INFOCOM 2011, pp. 1862-1870, Apr. 2011.
|
11 |
M. Rushanan, A.D. Rubin, D.F. Kune, and C.M. Swanson, "SoK: Security and privacy in implantable medical devices and body area networks," 2014 IEEE Symposium on Security and Privacy, pp. 524-539, May. 2014.
|
12 |
Quang Do, Ben Martini, and K.K.R. Choo, "Is the data on your wearable device secure? An Android Wear smartwatch case study," Software: Practice and Experience, vol. 47, no. 3, pp. 391-403, Mar. 2017.
DOI
|
13 |
Gafurov Davrondzhon, Einar Snekkenes, and Tor Erik Buvarp, "Robustness of biometric gait authentication against impersonation attack," OTM Workshops 2006, LNCS 4277, pp. 479-488, 2006.
|
14 |
Gartner, Forecast: Wearable Electronic Devices, Worldwide, 2017, Aug. 2017.
|
15 |
F.P. Wieringa, N. Broers, J.P. Kooman, F.M. Van Der Sande, and C. Van Hoof, "Wearable sensors: Can they benefit patients with chronic kidney disease?," Expert Review of Medical Devices, vol. 14, no. 7, pp. 505-519, Jun. 2017.
DOI
|
16 |
A. Bianchi and I. Oakley, "Wearable authentication: Trends and opportunities," it-Information Technology, vol. 58, no. 5, pp. 255-262, Oct. 2016.
DOI
|
17 |
Gafurov Davrondzhon, Einar Snekkenes, and Patrick Bours, "Spoof attacks on gait authentication system," IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 491-502, Sept. 2007.
DOI
|
18 |
Gafurov Davrondzhon, Kirsi Helkala, and Torkjel Sondrol, "Biometric Gait Authentication Using Accelerometer Sensor," JORNAL OF COMPUTERS, vol. 1, no. 7, pp. 51-59, Oct. 2006.
|
19 |
M. Poh, D.J. McDuff, and R.W. Picard, "Advancements in noncontact, multiparameter physiological measurements using a webcam," IEEE Transactions on Biomedical Engineering, vol. 58, no. 1, pp. 7-11, Jan. 2011.
DOI
|
20 |
L. Zhang, K. Xing, Z. Xu, J. Wang, S. Zhang, and J. Xu, "Human recognizer: an ECG based live biometric fingerprint," Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing 2016, pp. 21-27, Jul. 2016.
|
21 |
S. Kwon, H. Kim, and K.S. Park, "Validation of heart rate extraction using video imaging on a built-in camera system of a smartphone," 34th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 2174-2177, Aug. 2012,
|
22 |
H. Wu, M. Rubinstein, E. Shih, J. Guttag, F. Durand, and W. Freeman, "Eulerian video magnification for revealing subtle changes in the world," ACM Transaction on Graphics, vol. 31, no. 4, Jul. 2012.
|
23 |
A. Hadid, M. Ghahramani, V. Kellokumpu, M. Pietikainen, J. Bustard, and M. Nixon, "Can gait biometrics be spoofed?," 2012 21st International Conference on Pattern Recognition, pp. 3280-3283, Nov. 2012.
|
24 |
S.J. Kang, S.Y. Lee, H.I. Cho, and H. Park, "ECG Authentication System Design Based on Signal Analysis in Mobile and Wearable Devices," IEEE Signal Processing Letters, vol. 23, no. 6, pp. 805-808, Jun. 2016.
DOI
|
25 |
W. Xu, G. Lan, Q. Lin, S. Khalifa, N. Bergmann, M. Hassan, and W. Hu, "KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting," NDSS Symposium 2017, Feb. 2017.
|
26 |
W. Xu, C. Javali, G. Revadigar, C. Luo, N. Bergmann, and W. Hu, "Gait-Key: A Gait-Based Shared Secret Key Generation Protocol for Wearable Devices," ACM Transactions on Sensor Networks, vol. 13, no. 1, Jan. 2017.
|
27 |
W. Xu, Y. Shen, Y. Zhang, N. Bergmann, and W. Hu, "Gait-watch: A context-aware authentication system for smart watch based on gait recognition," 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation, pp. 59-70, Apr. 2017.
|
28 |
B.B. Mjaaland, P. Bours, and D. Gligoroski, "Walk the Walk: attacking gait biometrics by imitation," 13th international conference on Information security, pp. 361-380, Oct. 2010.
|
29 |
T.T. Ngo, Y. Makihara, H. Nagahara, Y. Mukaigawa, and Y. Yagi, "The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication," Pattern Recognition, vol. 47, no. 1, pp. 228-237, Jan. 2014.
DOI
|
30 |
R. Kumar, V.V. Phoha, and A. Jain, "Treadmill attack on gait-based authentication systems," 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, pp. 1-7, Sep. 2015.
|
31 |
M. Muaaz and R. Mayrhofer, "Smartphone-based Gait Recognition: From Authentication to Imitation," IEEE Transactions on Mobile Computing, vol. 16, no. 11, Nov. 2017.
|
32 |
T. Hoang, T.D. Nguyen, C. Luong, S. Do, and D. Choi, "Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer," Journal of Information Processing Systems, vol. 9, no. 2, pp. 333-348, Jun. 2013.
DOI
|
33 |
C.L. Vaughan, B.L. Davis, and C.O. Jeremy, Dynamics of Human Gait, Volume 2, Human Kinetics Publishers, 1992.
|
34 |
Minhang Bao, Analysis and design principles of MEMS devices, 1st Ed., Elsevier, Apr. 2005.
|
35 |
R.C. Hibbeler, Engineering Mechanics: Statics & Dynamics, 13th Ed., Pearson Education, Apr. 2001.
|
36 |
A.H. Johnston and G.M. Weiss, "Smartwatch-based biometric gait recognition," 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, pp. 1-6, Sep. 2015.
|
37 |
Z. Sitova, J. Sedenka, Q. Yang, G. Peng, G. Zhou, P. Gasti, and K.S. Balagani, "HMOG: New behavioral biometric features for continuous authentication of smartphone users," IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 877-892, May. 2016.
DOI
|
38 |
N. Al-Naffakh, N. Clarke, P. Haskell-Dowland, and F. Li, "A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches," International Journal for Information Security Research, vol. 6, no. 3. pp. 691-700, Sep. 2016.
|
39 |
G.M. Weiss, J.L. Timko, C.M. Gallagher, K. Yoneda, and A.J. Schreiber, "Smartwatch-based activity recognition: A machine learning approach," 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics, pp. 426-429, Feb. 2016.
|
40 |
https://www.fitbit.com/kr/home
|
41 |
D. Schurmann, A. Brusch, S. Sigg, and L. Wolf, "BANDANA-Body area network device-to-device authentication using natural gAit," 2017 IEEE International Conference on Pervasive Computing and Communications, pp. 190-196, Mar. 2017.
|