Show simple item record

dc.contributor.authorAl-Naffakh, N
dc.contributor.authorClarke, Nathan
dc.contributor.authorDowland, P
dc.contributor.authorFudong Li,
dc.date.accessioned2017-12-13T14:20:09Z
dc.date.available2017-12-13T14:20:09Z
dc.date.issued2016-12
dc.identifier.isbn9781908320735
dc.identifier.issn2164-7046
dc.identifier.urihttp://hdl.handle.net/10026.1/10426
dc.description.abstract

A secure, user-convenient approach to authenticate users on their mobile devices is required as current approaches (e.g., PIN or Password) suffer from security and usability issues. Transparent Authentication Systems (TAS) have been introduced to improve the level of security as well as offer continuous and unobtrusive authentication (i.e., user friendly) by using various behavioural biometric techniques. This paper presents the usefulness of using smartwatch motion sensors (i.e., accelerometer and gyroscope) to perform Activity Recognition for the use within a TAS. Whilst previous research in TAS has focused upon its application in computers and mobile devices, little attention is given to the use of wearable devices-which tend to be sensor-rich highly personal technologies. This paper presents a thorough analysis of the current state of the art in transparent and continuous authentication using acceleration and gyroscope sensors and a technology evaluation to determine the basis for such an approach. The best results are average Euclidean distance scores of 5.5 and 11.9 for users' intra acceleration and gyroscope signals respectively and 24.27 and 101.18 for users' inter acceleration and gyroscope activities accordingly. The findings demonstrate that the technology is sufficiently capable and the nature of the signals captured sufficiently discriminative to be useful in performing Activity Recognition.

dc.format.extent189-195
dc.language.isoen
dc.publisherIEEE
dc.subjectactivity recognition
dc.subjectmobile authentication
dc.subjectaccelerometer
dc.subjectsmartwatch authentication
dc.titleActivity Recognition using wearable computing
dc.typeconference
dc.typeConference Proceeding
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000406026800028&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.date-start2016-12-05
plymouth.date-finish2016-12-07
plymouth.publisher-urlhttps://ieeexplore.ieee.org/xpl/conhome/7847254/proceeding
plymouth.conference-name2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
plymouth.publication-statusPublished
plymouth.journal2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
dc.identifier.doi10.1109/icitst.2016.7856695
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1109/icitst.2016.7856695
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV