مشخصات مقاله | |
انتشار | مقاله سال 2018 |
تعداد صفحات مقاله انگلیسی | 11 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
منتشر شده در | نشریه الزویر |
نوع مقاله | ISI |
عنوان انگلیسی مقاله | Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things |
ترجمه عنوان مقاله | تاثیر خصوصیات مهاجم در مکانیزم احراز هویت مستمر مبتنی بر ECG برای اینترنت چیزها |
فرمت مقاله انگلیسی | |
رشته های مرتبط | مهندسی کامپیوتر و IT |
گرایش های مرتبط | هوش مصنوعی و اینترنت و شبکه های گسترده |
مجله | نسل آینده سیستم های کامپیوتری – Future Generation Computer Systems |
دانشگاه | Computer Security Lab (COSEC) – Carlos III University of Madrid – Spain |
کلمات کلیدی | اینترنت اشیا، الکتروکاردیوگرام، تایید پیوسته، مدل مهاجم |
کد محصول | E5639 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
1. Introduction
Terms such as ‘‘wearable computing’’ and ‘‘body-area/bodysensor networks’’ have been much discussed since around 1995. They represent a wireless network of lightweight portable computers, sensors and actuators located in, on, and around the human body. This idea has traditionally been very well received in areas such as healthcare monitoring, where the possibility of instrumenting a patient with physiological sensors that provide information in almost real time, as well as implantable medical devices that can be remotely managed, is expected to be a significant breakthrough [1]. Internet-of-Things (IoT) devices allow the quick establishment and sharing of information through the Internet and it opens the door to new opportunities for medical devices with wireless connectivity as they facilitate data monitoring and management [2]. For this purpose, Pandey et al. have proposed a cloud-based architecture to remotely monitor and record patients data [3]. Beyond the pure medical usage, the emergence of the IoT paradigm enables using wearable devices for other purposes [4,5]. One of the fields that has received significant research attention is their application for authenticating the users — the so called biometric authentication. The term biometrics refers to the automatic identification of subjects using their physiological or behavioural patterns [6]. Accordingly, previous efforts have shown the effectiveness of body signals such as ElectroEncephaloGram (EEG) [7], ElectroCardioGram (ECG) [8] or PhotoPlethysmoGram (PPG) [9] signals for this purpose. One interesting aspect of IoT-based biometric authentication is that smart devices can provide continuous streams of subject data. These data streams can be used for security purposes by analysing them in real-time. In fact, this feature enables taking authentication to the next level — instead of identifying the user at a given point in time, it is possible to perform this verification in a continuous fashion. This security mechanism is widely referred to as Continuous Authentication (CA). |