Dictionary Attack on IMU-based Gait Authentication

09/21/2023
by   Rajesh Kumar, et al.
0

We present a novel adversarial model for authentication systems that use gait patterns recorded by the inertial measurement unit (IMU) built into smartphones. The attack idea is inspired by and named after the concept of a dictionary attack on knowledge (PIN or password) based authentication systems. In particular, this work investigates whether it is possible to build a dictionary of IMUGait patterns and use it to launch an attack or find an imitator who can actively reproduce IMUGait patterns that match the target's IMUGait pattern. Nine physically and demographically diverse individuals walked at various levels of four predefined controllable and adaptable gait factors (speed, step length, step width, and thigh-lift), producing 178 unique IMUGait patterns. Each pattern attacked a wide variety of user authentication models. The deeper analysis of error rates (before and after the attack) challenges the belief that authentication systems based on IMUGait patterns are the most difficult to spoof; further research is needed on adversarial models and associated countermeasures.

READ FULL TEXT

page 4

page 6

page 8

page 9

research
10/02/2022

iCTGAN–An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems

A recent study showed that commonly (vanilla) studied implementations of...
research
05/14/2022

Formalizing PQRST Complex in Accelerometer-based Gait Cycle for Authentication

Accelerometer signals generated through gait present a new frontier of h...
research
02/22/2020

Temporal Sparse Adversarial Attack on Gait Recognition

Gait recognition has a broad application in social security due to its a...
research
08/05/2021

Security and Privacy Enhanced Gait Authentication with Random Representation Learning and Digital Lockers

Gait data captured by inertial sensors have demonstrated promising resul...
research
02/02/2021

PatternMonitor: a whole pipeline with a much higher level of automation for guessing Android lock pattern based on videos

Pattern lock is a general technique used to realize identity authenticat...
research
01/04/2023

Optical fiber-based key for remote authentication of users and optical fiber line

We have shown the opportunity to use the unique inhomogeneities of the i...
research
06/15/2021

Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns

Face authentication usually utilizes deep learning models to verify user...

Please sign up or login with your details

Forgot password? Click here to reset