Inertial sensor-based gait recognition: A review

S Sprager, MB Juric - Sensors, 2015 - mdpi.com
With the recent development of microelectromechanical systems (MEMS), inertial sensors
have become widely used in the research of wearable gait analysis due to several factors …

Sensor-based mHealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review

ML Shuwandy, BB Zaidan, AA Zaidan… - Journal of medical …, 2019 - Springer
The new and groundbreaking real-time remote healthcare monitoring system on sensor-
based mobile health (mHealth) authentication in telemedicine has considerably bounded …

Behavioral biometrics & continuous user authentication on mobile devices: A survey

I Stylios, S Kokolakis, O Thanou, S Chatzis - Information Fusion, 2021 - Elsevier
This paper offers an up-to-date, comprehensive, extensive and targeted survey on
Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our …

Smartphone-based gait recognition: From authentication to imitation

M Muaaz, R Mayrhofer - IEEE Transactions on Mobile …, 2017 - ieeexplore.ieee.org
This work evaluates the security strength of a smartphone-based gait recognition system
against zero-effort and live minimal-effort impersonation attacks under realistic scenarios …

[HTML][HTML] Gait-based identification for elderly users in wearable healthcare systems

F Sun, W Zang, R Gravina, G Fortino, Y Li - Information fusion, 2020 - Elsevier
The increasing scope of sensitive personal information that is collected and stored in
wearable healthcare devices includes physical, physiological, and daily activities, which …

Accelerometer-based speed-adaptive gait authentication method for wearable IoT devices

F Sun, C Mao, X Fan, Y Li - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
With the rapid development of wearable Internet of Things (WIoT) devices, a significant
amount of sensitive/private information collected by them poses a considerable challenge to …

Task-driven biometric authentication of users in virtual reality (VR) environments

A Kupin, B Moeller, Y Jiang, NK Banerjee… - … Conference, MMM 2019 …, 2019 - Springer
In this paper, we provide an approach for authenticating users in virtual reality (VR)
environments by tracking the behavior of users as they perform goal-oriented tasks, such as …

A continuous smartphone authentication method based on gait patterns and keystroke dynamics

I Lamiche, G Bin, Y **g, Z Yu, A Hadid - Journal of Ambient Intelligence …, 2019 - Springer
Behavioral biometrics, such as gait patterns and keystroke dynamics, have been becoming
increasingly used in human identity recognition research for enhancing the smartphone …

BANDANA—Body area network device-to-device authentication using natural gAit

D Schürmann, A Brüsch, S Sigg… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Secure spontaneous authentication between devices worn at arbitrary locations on the
same body is a challenging, yet unsolved problem. We propose BANDANA, the first-ever …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …