Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3286978.3287001acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobiquitousConference Proceedingsconference-collections
research-article

Continuous Identification in Smart Environments Using Wrist-Worn Inertial Sensors

Published: 05 November 2018 Publication History

Abstract

In this paper, we propose a new approach capable of performing continuous identification of users in home and office environments based on hand and arm motion patterns obtained from a wrist-worn inertial measurement unit (IMU). Different from state-of-the-art methods, our approach is not constrained to particular types of movements, gestures, or activities, thus allowing users to perform freely and unconstrained their daily routines while the identification takes place. We evaluate our approach by conducting an in the lab study and two in-situ studies, one in home environment and one in office environment. Our studies involved a total of 29 different participants and the data collected corresponds to approximately 256 hours. The results obtained in the studies indicate that our approach is able to perform continuous user identification with an accuracy of 0.88 for office environments and 0.71 for the average size of a household.

References

[1]
Heba Abdelnasser, Moustafa Youssef, and Khaled A Harras. 2015. Wigest: A ubiquitous wifi-based gesture recognition system. In Computer Communications (INFOCOM), 2015 IEEE Conference on. IEEE, 1472--1480.
[2]
Christopher Ackad, Andrew Clayphan, Roberto Martinez Maldonado, and Judy Kay. 2012. Seamless and continuous user identification for interactive table-tops using personal device handshaking and body tracking. In CHI'12 Extended Abstracts on Human Factors in Computing Systems. ACM, 1775--1780.
[3]
Alaa Alhamoud, Arun Asokan Nair, Christian Gottron, Doreen Böhnstedt, and Ralf Steinmetz. 2014. Presence detection, identification and tracking in smart homes utilizing bluetooth enabled smartphones. In Local Computer Networks Workshops (LCN Workshops), 2014 IEEE 39th Conference on. IEEE, 784--789.
[4]
Stacy J Morris Bamberg, Ari Y Benbasat, Donna Moxley Scarborough, David E Krebs, and Joseph A Paradiso. 2008. Gait analysis using a shoe-integrated wireless sensor system. IEEE transactions on information technology in biomedicine 12, 4 (2008), 413--423.
[5]
Mary Ellen Berglund, Julia Duvall, and Lucy E Dunne. 2016. A survey of the historical scope and current trends of wearable technology applications. In Proceedings of the 2016 ACM International Symposium on Wearable Computers. ACM, 40--43.
[6]
Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiang-Yang Li, and Yu Wang. 2014. Continuous user identification via touch and movement behavioral biometrics. In Performance Computing and Communications Conference (IPCCC), 2014 IEEE International. IEEE, 1--8.
[7]
Alan Bränzel, Christian Holz, Daniel Hoffmann, Dominik Schmidt, Marius Knaust, Patrick Lühne, René Meusel, Stephan Richter, and Patrick Baudisch. 2013. GravitySpace: tracking users and their poses in a smart room using a pressure-sensing floor. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 725--734.
[8]
Anthony Brown, Richard Mortier, and Tom Rodden. 2014. An exploration of user recognition on domestic networks using NetFlow records. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 903--910.
[9]
Guglielmo Cola, Marco Avvenuti, Fabio Musso, and Alessio Vecchio. 2016. Gait-based authentication using a wrist-worn device. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, 208--217.
[10]
Abir Das, Rameswar Panda, and Amit K Roy-Chowdhury. 2017. Continuous adaptation of multi-camera person identification models through sparse non-redundant representative selection. Computer Vision and Image Understanding 156 (2017), 66--78.
[11]
Matteo Ferrara, Annalisa Franco, and Dario Maio. 2014. On the use of the Kinect sensor for human identification in smart environments. Journal of Ambient Intelligence and Smart Environments 6, 4 (2014), 435--446.
[12]
Jordan Frank, Shie Mannor, and Doina Precup. 2010. Activity and gait recognition with time-delay embeddings. In AAAI.
[13]
Davrondzhon Gafurov, Patrick Bours, and Einar Snekkenes. 2011. User authentication based on foot motion. Signal, Image and Video Processing 5, 4 (2011), 457.
[14]
Daniel Garnier-Moiroux, Fernando Silveira, and Anmol Sheth. 2013. Towards user identification in the home from appliance usage patterns. In Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. ACM, 861--868.
[15]
William Rowan Hamilton. 1844. On quaternions; or on a new system of imaginaries in algebra. Philosophical Magazine Series 3 25, 163 (1844), 10--13.
[16]
Eiji Hayashi, Manuel Maas, and Jason I Hong. 2014. Wave to me: user identification using body lengths and natural gestures. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3453--3462.
[17]
Martin Reese Hestbek, Claudia Nickel, and Christoph Busch. 2012. Biometric gait recognition for mobile devices using wavelet transform and support vector machines. In Systems, Signals and Image Processing (IWSSIP), 2012 19th International Conference on. IEEE, 205--210.
[18]
Christian Holz and Marius Knaust. 2015. Biometric touch sensing: Seamlessly augmenting each touch with continuous authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. ACM, 303--312.
[19]
Alexandros Iosifidis, Anastasios Tefas, and Ioannis Pitas. 2012. Activity-based person identification using fuzzy representation and discriminant learning. IEEE Transactions on Information Forensics and Security 7, 2 (2012), 530--542.
[20]
Akane Ishida, Kazuya Murao, Tsutomu Terada, and Masahiko Tsukamoto. 2017. A user identification method based on features of opening/closing a refrigerator door. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on. IEEE, 533--538.
[21]
Felix Juefei-Xu, Chandrasekhar Bhagavatula, Aaron Jaech, Unni Prasad, and Marios Savvides. 2012. Gait-id on the move: Pace independent human identification using cell phone accelerometer dynamics. In Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE, 8--15.
[22]
Ludmila I Kuncheva. 2004. Combining pattern classifiers: methods and algorithms. John Wiley & Sons.
[23]
Jennifer R Kwapisz, Gary M Weiss, and Samuel A Moore. 2010. Cell phone-based biometric identification. In 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS). IEEE, 1--7.
[24]
Sugang Li, Ashwin Ashok, Yanyong Zhang, Chenren Xu, Janne Lindqvist, and Macro Gruteser. 2016. Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. In IEEE International Conference on Pervasive Computing and Communications (PerCom),. IEEE, 1--9.
[25]
Daniel J Liebling and Sören Preibusch. 2014. Privacy considerations for a pervasive eye tracking world. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 1169--1177.
[26]
Takuya Maekawa, Akira Masuda, and Yasuo Namioka. 2016. Identification from ceiling: unconstrained person identification for tabletops using multiview learning. In Proceedings of the 15th International Conference on Mobile and Ubiquitous Multimedia. ACM, 273--284.
[27]
Apostolos Malatras, Dimitris Geneiatakis, and Ioannis Vakalis. 2017. On the efficiency of user identification: a system-based approach. International Journal of Information Security 16, 6 (2017), 653--671.
[28]
Sebastien Marcel and José del R Millán. 2007. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE transactions on pattern analysis and machine intelligence 29, 4 (2007).
[29]
Eric Martinson, W Lawson, and J Greg Trafton. 2010. Person identification through perceptual fusion. In 10th IEEE-RAS International Conference on Humanoid Robots (Humanoids), 2010. IEEE, 358--364.
[30]
Darko S Matovski, Mark S Nixon, Sasan Mahmoodi, and John N Carter. 2012. The effect of time on gait recognition performance. IEEE transactions on information forensics and security 7, 2 (2012), 543--552.
[31]
Soumik Mondal and Patrick Bours. 2016. Combining keystroke and mouse dynamics for continuous user authentication and identification. In Proceedings of the IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), 2016. IEEE, 1--8.
[32]
Natalia Neverova, Christian Wolf, Griffin Lacey, Lex Fridman, Deepak Chandra, Brandon Barbello, and Graham Taylor. 2016. Learning human identity from motion patterns. IEEE Access 4 (2016), 1810--1820.
[33]
Organisation for Economic Co-operation and Development (OECD). 2016. Five family facts. (2016). https://www.oecd.org/els/family/47710686.pdf
[34]
Henning Pohl, Markus Krause, and Michael Rohs. 2015. One-button recognizer: exploiting button pressing behavior for user differentiation. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 403--407.
[35]
Juhi Ranjan. 2015. Object user recognition in multi-person homes. In Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, 477--482.
[36]
Olivier Rioul and Pierre Duhamel. 1992. Fast algorithms for discrete and continuous wavelet transforms. IEEE transactions on information theory 38, 2 (1992), 569--586.
[37]
Joseph Roth, Xiaoming Liu, and Dimitris Metaxas. 2014. On continuous user authentication via typing behavior. IEEE Transactions on Image Processing 23, 10 (2014), 4611--4624.
[38]
Yiran Shen, Hongkai Wen, Chengwen Luo, Weitao Xu, Tao Zhang, Wen Hu, and Daniela Rus. 2018. GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait. IEEE Transactions on Dependable and Secure Computing (2018).
[39]
Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 5.
[40]
Shimmer sensing. 2016. Shimmer3 wireless sensor platform. http://www.shimmersensing.com/images/uploads/docs/Shimmer3_Spec_Sheet_V1.6.pdf. (2016). {Online; last-accessed October 2018}.
[41]
David MJ Tax and Robert PW Duin. 2002. Using two-class classifiers for multi-class classification. In Proceedings of the 16th International Conference on Pattern Recognition, 2002., Vol. 2. IEEE, 124--127.
[42]
United Nations (UN). 2017. Household Size and Composition Around the World 2017. (2017). http://www.un.org/en/development/desa/population/publications/pdf/ageing/household_size_and_composition_around_the_world_2017_data_booklet.pdf
[43]
Wei Wang, Alex X Liu, and Muhammad Shahzad. 2016. Gait recognition using wifi signals. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 363--373.
[44]
Gary M Weiss and Haym Hirsh. 1998. Learning to predict rare events in event sequences. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining. AAAI Press, 359--363.
[45]
Weitao Xu, Yiran Shen, Yongtuo Zhang, Neil Bergmann, and Wen Hu. 2017. Gait-watch: A context-aware authentication system for smart watch based on gait recognition. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. ACM, 59--70.
[46]
Roman V Yampolskiy. 2007. Motor-skill based biometrics. In 6th Annual Security Conference, Las Vegas, NV.
[47]
Zheng Yang, Chenshu Wu, Zimu Zhou, Xinglin Zhang, Xu Wang, and Yunhao Liu. 2015. Mobility increases localizability: A survey on wireless indoor localization using inertial sensors. ACM Computing Surveys (Csur) 47, 3 (2015), 54.
[48]
U Zabit, OD Bernal, and T Bosch. 2011. A self-mixing displacement sensor compensating parasitic vibration with a MEMs accelerometer. In Sensors, 2011. IEEE, 1386--1389.

Cited By

View all
  • (2022)Activity-Free User Identification Using Wearables Based on Vision TechniquesSensors10.3390/s2219736822:19(7368)Online publication date: 28-Sep-2022
  • (2022)Combating False Data Injection Attacks on Human-Centric Sensing ApplicationsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35345776:2(1-22)Online publication date: 7-Jul-2022
  • (2022)Formalizing Digital Proprioception for Devices, Environments, and UsersAmbient Intelligence – Software and Applications – 12th International Symposium on Ambient Intelligence10.1007/978-3-031-06894-2_1(1-10)Online publication date: 1-Sep-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MobiQuitous '18: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
November 2018
490 pages
ISBN:9781450360937
DOI:10.1145/3286978
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • EAI: The European Alliance for Innovation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 November 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Continuous user identification
  2. IMU
  3. Smart home
  4. Smart office
  5. Wrist-worn sensors

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

MobiQuitous '18
MobiQuitous '18: Computing, Networking and Services
November 5 - 7, 2018
NY, New York, USA

Acceptance Rates

Overall Acceptance Rate 26 of 87 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Activity-Free User Identification Using Wearables Based on Vision TechniquesSensors10.3390/s2219736822:19(7368)Online publication date: 28-Sep-2022
  • (2022)Combating False Data Injection Attacks on Human-Centric Sensing ApplicationsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35345776:2(1-22)Online publication date: 7-Jul-2022
  • (2022)Formalizing Digital Proprioception for Devices, Environments, and UsersAmbient Intelligence – Software and Applications – 12th International Symposium on Ambient Intelligence10.1007/978-3-031-06894-2_1(1-10)Online publication date: 1-Sep-2022
  • (2020)Echo-ID: Smart User Identification Leveraging Inaudible Sound SignalsIEEE Access10.1109/ACCESS.2020.30318998(194508-194522)Online publication date: 2020
  • (2019)PatientSenseProceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services10.1145/3360774.3360796(143-152)Online publication date: 12-Nov-2019
  • (2019)Au-IdProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33289193:2(1-26)Online publication date: 21-Jun-2019
  • (2019)IoT Based Longitudinal Monitoring of Activity and Posture Transitions in Smart Homes2019 SoutheastCon10.1109/SoutheastCon42311.2019.9020328(1-4)Online publication date: Apr-2019
  • (2019)Recent Trends in User Authentication – A SurveyIEEE Access10.1109/ACCESS.2019.29324007(112505-112519)Online publication date: 2019

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media