{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T11:51:14Z","timestamp":1726401074858},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"name":"MINECO","award":["TIN2013-46469-R"]},{"name":"CAM","award":["S2013\/ICE-3095"]},{"name":"MINECO","award":["TIN2016-79095-C2-2-R"]},{"name":"Programa de Ayudas para la Movilidad of Carlos III University of Madrid, Spain","award":["MPP2017\/MI-MA"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1016\/j.future.2017.11.037","type":"journal-article","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T01:09:00Z","timestamp":1512522540000},"page":"67-77","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":28,"special_numbering":"C","title":["Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things"],"prefix":"10.1016","volume":"81","author":[{"given":"Pedro","family":"Peris-Lopez","sequence":"first","affiliation":[]},{"given":"Lorena","family":"Gonz\u00e1lez-Manzano","sequence":"additional","affiliation":[]},{"given":"Carmen","family":"Camara","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Mar\u00eda","family":"de Fuentes","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.future.2017.11.037_b1","first-page":"797","article-title":"A review of wireless body area networks for medical applications","volume":"2","author":"Ullah","year":"2009","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"key":"10.1016\/j.future.2017.11.037_b2","unstructured":"Cognizant, The internet of things: An excellent prognosis for medical device makers, Cognizant 20\u201320 Insights."},{"issue":"1","key":"10.1016\/j.future.2017.11.037_b3","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.future.2011.04.022","article-title":"An autonomic cloud environment for hosting ECG data analysis services","volume":"28","author":"Pandey","year":"2012","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2017.11.037_b4","article-title":"A unified face identification and resolution scheme using cloud computing in internet of things","author":"Hu","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2017.11.037_b5","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.future.2016.10.004","article-title":"Design of a provably secure biometrics-based multi-cloud-server authentication scheme","volume":"68","author":"Kumari","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.future.2017.11.037_b6","series-title":"Biometrics: Personal Identification in Networked Society, Vol. 479","author":"Jain","year":"2006"},{"key":"10.1016\/j.future.2017.11.037_b7","series-title":"Brain-Computer Interfaces","first-page":"295","article-title":"Web-based intelligent EEG signal authentication and tamper detection system for secure telemonitoring","author":"Mukherjee","year":"2015"},{"issue":"11","key":"10.1016\/j.future.2017.11.037_b8","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/s10916-015-0323-2","article-title":"Human identification using compressed ECG signals","volume":"39","author":"Camara","year":"2015","journal-title":"J. Med. Syst."},{"key":"10.1016\/j.future.2017.11.037_b9","doi-asserted-by":"crossref","unstructured":"N. Karimian, M. Tehranipoor, D. Forte, Non-fiducial ppg-based authentication for healthcare application, in: IEEE EMBS International Conference on Biomedical Health Informatics (BHI), 2017, pp. 429\u2013432.","DOI":"10.1109\/BHI.2017.7897297"},{"key":"10.1016\/j.future.2017.11.037_b10","unstructured":"A. Riera, S. Dunne, I. Cester, G. Ruffini, Starfast: a wireless wearable EEG\/ECG biometric system based on the enobio sensor, in: International Workshop on Wearable Micro and Nanosystems for Personalised Health, 2008."},{"key":"10.1016\/j.future.2017.11.037_b11","series-title":"26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vol. 2","first-page":"3318","article-title":"Design of a wearable device for ECG continuous monitoring using wireless technology","author":"Led","year":"2004"},{"issue":"6","key":"10.1016\/j.future.2017.11.037_b12","first-page":"48","article-title":"Robust R peak and QRS detection in electrocardiogram using wavelet transform","volume":"1","author":"Sasikala","year":"2010","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"1","key":"10.1016\/j.future.2017.11.037_b13","first-page":"39","article-title":"Evaluation of electrocardiogram for biometric authentication","volume":"3","author":"Singh","year":"2012","journal-title":"J. Inf. Secur."},{"key":"10.1016\/j.future.2017.11.037_b14","series-title":"Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices","first-page":"57","article-title":"Fingerprint attack against touch-enabled devices","author":"Zhang","year":"2012"},{"key":"10.1016\/j.future.2017.11.037_b15","unstructured":"R. Amin, N. Kumar, G. Biswas, R. Iqbal, V. Chang, A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment, Future Gener. Comput. Syst."},{"issue":"6","key":"10.1016\/j.future.2017.11.037_b16","doi-asserted-by":"crossref","first-page":"1812","DOI":"10.1109\/TIFS.2012.2215324","article-title":"ECG biometric recognition: A comparative analysis","volume":"7","author":"Odinaka","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"10.1016\/j.future.2017.11.037_b17","doi-asserted-by":"crossref","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","article-title":"Bsn-care: A secure iot-based modern healthcare system using body sensor network","volume":"16","author":"Gope","year":"2016","journal-title":"IEEE Sens. J."},{"issue":"4","key":"10.1016\/j.future.2017.11.037_b18","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/JSYST.2009.2038957","article-title":"Leveraging biometrics for user authentication in online learning: a systems perspective","volume":"3","author":"Moini","year":"2009","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.future.2017.11.037_b19","unstructured":"H. Xu, Y. Zhou, M.R. Lyu, Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones, in: Symposium On Usable Privacy and Security, SOUPS, Vol.\u00a014, 2014, pp. 187\u2013198."},{"key":"10.1016\/j.future.2017.11.037_b20","series-title":"Proceedings of the 21st USENIX Conference on Security Symposium","article-title":"On the feasibility of side- channel attacks with brain- computer interfaces","author":"Martinovic","year":"2012"},{"key":"10.1016\/j.future.2017.11.037_b21","unstructured":"H.G. Kayacik, M. Just, L. Baillie, D. Aspinall, N. Micallef, Data driven authentication: On the effectiveness of user behaviour modelling with mobile device sensors. arXiv preprint arXiv:1410.7743."},{"key":"10.1016\/j.future.2017.11.037_b22","unstructured":"O. Riva, C. Qin, K. Strauss, D. Lymberopoulos, Progressive authentication: Deciding when to authenticate on mobile phones, in: USENIX Security Symposium, 2012. pp. 301\u2013316."},{"issue":"12","key":"10.1016\/j.future.2017.11.037_b23","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MCOM.2016.1600553CM","article-title":"Smart attacks against intelligent wearables in people-centric internet of things","volume":"54","author":"Liu","year":"2016","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"10.1016\/j.future.2017.11.037_b24","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1108\/09593849410076799","article-title":"Human identification in information systems: Management challenges and public policy issues","volume":"7","author":"Clarke","year":"1994","journal-title":"Inf. Technol. People"},{"key":"10.1016\/j.future.2017.11.037_b25","doi-asserted-by":"crossref","unstructured":"Y. Gahi, M. Lamrani, A. Zoglat, M. Guennoun, B. Kapralos, K. El-Khatib, Biometric identification system based on electrocardiogram data, in: Int. Conference on New Technologies, Mobility and Security (NTMS), 2008, pp. 1\u20135.","DOI":"10.1109\/NTMS.2008.ECP.29"},{"key":"10.1016\/j.future.2017.11.037_b26","series-title":"IEEE International Workshop on Information Forensics and Security (WIFS)","first-page":"31","article-title":"ECG biometric recognition: Permanence analysis of QRS signals for 24\u00a0hours continuous authentication","author":"Labati","year":"2013"},{"key":"10.1016\/j.future.2017.11.037_b27","doi-asserted-by":"crossref","unstructured":"F. Agrafioti, D. Hatzinakos, ECG based recognition using second order statistics, in: 6th Annual Conference on Communication Networks and Services Research (CNSR), 2008, pp. 82\u201387.","DOI":"10.1109\/CNSR.2008.38"},{"key":"10.1016\/j.future.2017.11.037_b28","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.dsp.2016.02.008","article-title":"ECG biometric authentication based on non-fiducial approach using kernel methods","volume":"52","author":"Hejazi","year":"2016","journal-title":"Digit. Signal Process."},{"issue":"5","key":"10.1016\/j.future.2017.11.037_b29","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1119\/1.12714","article-title":"Walsh transforms","volume":"49","author":"Beer","year":"1981","journal-title":"Amer. J. Phys."},{"issue":"4","key":"10.1016\/j.future.2017.11.037_b30","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/BF02442635","article-title":"Fast walsh transform data-compression algorithm: E.C.G. applications","volume":"21","author":"Kuklinski","year":"1983","journal-title":"Med. Biol. Eng. Comput."},{"issue":"2","key":"10.1016\/j.future.2017.11.037_b31","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1016\/j.ijleo.2015.10.154","article-title":"An efficient block based lossless compression of medical images, optik","volume":"127","author":"Venugopal","year":"2016","journal-title":"Int. J. Light Electron Opt."},{"issue":"23","key":"10.1016\/j.future.2017.11.037_b32","doi-asserted-by":"crossref","first-page":"e215","DOI":"10.1161\/01.CIR.101.23.e215","article-title":"PhysioBank, PhysioToolkit, and PhysioNet: Components of a new research resource for complex physiologic signals","volume":"101","author":"Goldberger","year":"2000","journal-title":"Circulation"},{"issue":"1","key":"10.1016\/j.future.2017.11.037_b33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0169-7439(99)00047-7","article-title":"The mahalanobis distance","volume":"50","author":"Maesschalck","year":"2000","journal-title":"Chemometr. Intell. Lab. Syst."},{"issue":"2","key":"10.1016\/j.future.2017.11.037_b34","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s13042-013-0152-x","article-title":"Bayesian citation-knn with distance weighting","volume":"5","author":"Jiang","year":"2014","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"10.1016\/j.future.2017.11.037_b35","series-title":"Pattern Classification","author":"Duda","year":"2000"},{"issue":"3","key":"10.1016\/j.future.2017.11.037_b36","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/0146-664X(80)90054-4","article-title":"Euclidean distance mapping","volume":"14","author":"Danielsson","year":"1980","journal-title":"Comput. Graph. Image process."},{"key":"10.1016\/j.future.2017.11.037_b37","series-title":"Multiple Correspondence Analysis and Related Methods","year":"2006"},{"key":"10.1016\/j.future.2017.11.037_b38","series-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten","year":"2011"},{"key":"10.1016\/j.future.2017.11.037_b39","series-title":"Second International Conference on Image Information Processing","first-page":"635","article-title":"Hand shape based biometric authentication system using radon transform and collaborative representation based classification","author":"Gangopadhyay","year":"2013"},{"key":"10.1016\/j.future.2017.11.037_b40","series-title":"28th Annual Computer Security Applications Conference","first-page":"159","article-title":"Biometric authentication on a mobile device: a study of user effort, error and task disruption","author":"Trewin","year":"2012"},{"key":"10.1016\/j.future.2017.11.037_b41","series-title":"International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS)","first-page":"31","article-title":"A flick biometric authentication mechanism on mobile devices","author":"Shih","year":"2015"},{"key":"10.1016\/j.future.2017.11.037_b42","series-title":"SENSORS","first-page":"1","article-title":"Photoplethysmography as a form of biometric authentication","author":"Lee","year":"2015"},{"key":"10.1016\/j.future.2017.11.037_b43","series-title":"International Symposium on Security in Computing and Communication","first-page":"168","article-title":"Heart rate variability for biometric authentication using time-domain features","author":"Akhter","year":"2015"},{"issue":"6","key":"10.1016\/j.future.2017.11.037_b44","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/LSP.2016.2531996","article-title":"ECG authentication system design based on signal analysis in mobile and wearable devices","volume":"23","author":"Kang","year":"2016","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"10.1016\/j.future.2017.11.037_b45","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1109\/TIM.2015.2503863","article-title":"ECG authentication for mobile devices","volume":"65","author":"Arteaga-Falconi","year":"2016","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"6","key":"10.1016\/j.future.2017.11.037_b46","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1007\/s40846-015-0089-5","article-title":"Non-invasive multi-modal human identification system combining ECG, GSR, and airflow biosignals","volume":"35","author":"Camara","year":"2015","journal-title":"J. Med. Biol. Eng."},{"issue":"4","key":"10.1016\/j.future.2017.11.037_b47","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1109\/TIFS.2010.2075927","article-title":"Soft biometric traits for continuous user authentication","volume":"5","author":"Niinuma","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2017.11.037_b48","unstructured":"U. Mahbub, V.M. Patel, D. Chandra, B. Barbello, R. Chellappa, Partial face detection for continuous authentication. arXiv preprint arXiv:1603.09364."},{"key":"10.1016\/j.future.2017.11.037_b49","series-title":"International Conference on Biometrics","first-page":"135","article-title":"Continuous authentication of mobile user: Fusion of face image and inertial measurement unit data","author":"Crouse","year":"2015"},{"issue":"1","key":"10.1016\/j.future.2017.11.037_b50","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","article-title":"Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication","volume":"8","author":"Frank","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2017.11.037_b51","series-title":"Sicherheit","first-page":"1","article-title":"Continuous authentication on mobile devices by analysis of typing motion behavior","author":"Gascon","year":"2014"},{"key":"10.1016\/j.future.2017.11.037_b52","series-title":"Conference on Technologies for Homeland Security","first-page":"451","article-title":"Continuous mobile authentication using touchscreen gestures","author":"Feng","year":"2012"},{"key":"10.1016\/j.future.2017.11.037_b53","doi-asserted-by":"crossref","unstructured":"A. Bonissi, R.D. Labati, L. Perico, R. Sassi, F. Scotti, L. Sparagino, A preliminary study on continuous authentication methods for photoplethysmographic biometrics, in: Workshop on Biometric Measurements and Systems for Security and Medical Applications, 2013, pp. 28\u201333.","DOI":"10.1109\/BIOMS.2013.6656145"},{"key":"10.1016\/j.future.2017.11.037_b54","unstructured":"J. da\u00a0Silv\u00a0Dias, I. Traore, V.G. Ferreira, J. David, Exploratory use of PPG signal in continuous authentication, in: Brazilian Symposium on Information and Computational Systems Security, pp. 1\u201314."},{"key":"10.1016\/j.future.2017.11.037_b55","series-title":"Toronto International Conference on Science and Technology for Humanity","first-page":"40","article-title":"Continuous authentication by electrocardiogram data","author":"Guennoun","year":"2009"},{"key":"10.1016\/j.future.2017.11.037_b56","series-title":"24th Canadian Conference on Electrical and Computer Engineering","first-page":"001313","article-title":"Real-time continuous identification system using ECG signals","author":"Matta","year":"2011"},{"key":"10.1016\/j.future.2017.11.037_b57","series-title":"BIOSIGNALS","first-page":"354","article-title":"ECG-based continuous authentication system using adaptive string matching","author":"Coutinho","year":"2011"},{"key":"10.1016\/j.future.2017.11.037_b58","series-title":"ECG-based Continuous Authentication System using Adaptive String Matching","year":"2011"},{"key":"10.1016\/j.future.2017.11.037_b59","series-title":"Wireless Chest-Based ECG Biometrics","author":"Derawi","year":"2015"},{"issue":"4","key":"10.1016\/j.future.2017.11.037_b60","doi-asserted-by":"crossref","first-page":"1315","DOI":"10.1109\/TIFS.2011.2162408","article-title":"Electrocardiogram (ECG) biometric authentication using Pulse Active Ratio (PAR)","volume":"6","author":"Safie","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2017.11.037_b61","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.jnca.2014.04.008","article-title":"Data mining in mobile ECG based biometric identification","volume":"44","author":"Sidek","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.future.2017.11.037_b62","doi-asserted-by":"crossref","unstructured":"E. E\u00a0Pasero, C.F. Balzanelli, Intruder recognition using ECG signal, in: International Joint Conference on Neural Networks (IJCNN), 2015, pp. 1\u20138.","DOI":"10.1109\/IJCNN.2015.7280740"},{"key":"10.1016\/j.future.2017.11.037_b63","series-title":"4th International Symposium on Applied Sciences in Biomedical and Communication Technologies","first-page":"25:1","article-title":"Human identification based on ECG signals from wearable health monitoring devices","author":"Ye","year":"2011"},{"key":"10.1016\/j.future.2017.11.037_b64","series-title":"Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)","first-page":"1","article-title":"Finger ECG signal for user authentication: Usability and performance","author":"Da Silva","year":"2013"},{"key":"10.1016\/j.future.2017.11.037_b65","doi-asserted-by":"crossref","unstructured":"S.Z. Fatemian, F. Agrafioti, D. Hatzinakos, Heartid: Cardiac biometric recognition, in: Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2010, pp. 1\u20135.","DOI":"10.1109\/BTAS.2010.5634493"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X17300407?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X17300407?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T13:15:15Z","timestamp":1589807715000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X17300407"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":65,"alternative-id":["S0167739X17300407"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2017.11.037","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2018,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2017.11.037","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}