Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Auto-Key: Using Autoencoder to Speed Up Gait-based Key Generation in Body Area Networks

Published: 18 March 2020 Publication History

Abstract

With the rising popularity of wearable devices and sensors, shielding Body Area Networks (BANs) from eavesdroppers has become an urgent problem to solve. Since the conventional key distribution systems are too onerous for resource-constrained wearable sensors, researchers are pursuing a new light-weight key generation approach that enables two wearable devices attached at different locations of the user body to generate an identical key simultaneously simply from their independent observations of user gait. A key challenge for such gait-based key generation lies in matching the bits of the keys generated by independent devices despite the noisy sensor measurements, especially when the devices are located far apart on the body affected by different sources of noise. To address the challenge, we propose a novel machine learning framework, called Auto-Key, that uses an autoencoder to help one device predict the gait observations at another distant device attached to the same body and generate the key using the predicted sensor data. We prototype the proposed method and evaluate it using a public acceleration dataset collected from 15 real subjects wearing accelerometers attached to seven different locations of the body. Our results show that, on average, Auto-Key increases the matching rate of independently generated bits from two sensors attached at two different locations by 16.5%, which speeds up the successful generation of fully-matching symmetric keys at independent wearable sensors by a factor of 1.9. In the proposed framework, a subject-specific model can be trained with 50% fewer data and 88% less time by retraining a pre-trained general model when compared to training a new model from scratch. The reduced training complexity makes Auto-Key more practical for edge computing, which provides better privacy protection to biometric and behavioral data compared to cloud-based training.

References

[1]
Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016. Tensorflow: A system for large-scale machine learning. In 12th [USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 265--283.
[2]
Abebe Abeshu and Naveen Chilamkurti. 2018. Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Communications Magazine 56, 2 (2018), 169--175.
[3]
Tim Althoff, Jennifer L Hicks, Abby C King, Scott L Delp, Jure Leskovec, et al. 2017. Large-scale physical activity data reveal worldwide activity inequality. Nature 547, 7663 (2017), 336.
[4]
Sarath Chandar AP, Stanislas Lauly, Hugo Larochelle, Mitesh Khapra, Balaraman Ravindran, Vikas C Raykar, and Amrita Saha. 2014. An autoencoder approach to learning bilingual word representations. In Advances in Neural Information Processing Systems. 1853--1861.
[5]
Jacob Benesty, Jingdong Chen, Yiteng Huang, and Israel Cohen. 2009. Pearson correlation coefficient. In Noise reduction in speech processing. Springer, 1--4.
[6]
A. Bruesch, L. Nguyen, D. Schürmann, S. Sigg, and L. C. Wolf. 2019. Security Properties of Gait for Mobile Device Pairing. IEEE Transactions on Mobile Computing (2019), 1--1. https://doi.org/10.1109/TMC.2019.2897933
[7]
Cory Cornelius and David Kotz. 2011. Recognizing whether sensors are on the same body. In International Conference on Pervasive Computing. Springer, 332--349.
[8]
Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http://www.deeplearningbook.org.
[9]
Antonio Gulli and Sujit Pal. 2017. Deep Learning with Keras. Packt Publishing Ltd.
[10]
Chaoqun Hong, Jun Yu, Jian Wan, Dacheng Tao, and Meng Wang. 2015. Multimodal deep autoencoder for human pose recovery. IEEE Transactions on Image Processing 24, 12 (2015), 5659--5670.
[11]
Chunqiang Hu, Xiuzhen Cheng, Fan Zhang, Dengyuan Wu, Xiaofeng Liao, and Dechang Chen. 2013. OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In INFOCOM, 2013 Proceedings IEEE. IEEE, 2274--2282.
[12]
Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K Kasera, Neal Patwari, and Srikanth V Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th annual international conference on Mobile computing and networking. ACM, 321--332.
[13]
Ari Juels and Madhu Sudan. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38, 2 (2006), 237--257.
[14]
Darko Kirovski, Mike Sinclair, and David Wilson. 2007. The martini synch. Technical Report MSR-TR-2007-123, Microsoft Research (2007).
[15]
H. Li, K. Ota, and M. Dong. 2018. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing. IEEE Network 32, 1 (Jan 2018), 96--101. https://doi.org/10.1109/MNET.2018.1700202
[16]
Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-Ming Yiu, and Kai Chen. 2017. Multi-key privacy-preserving deep learning in cloud computing. Future Generation Computer Systems 74 (2017), 76--85.
[17]
Qi Lin, Weitao Xu, Jun Liu, Abdelwahed Khamis, Wen Hu, Mahbub Hassan, and Aruna Seneviratne. 2019. H2B: Heartbeat-based Secret Key Generation Using Piezo Vibration Sensors. In Proceedings of the 18th International Conference on Information Processing in Sensor Networks (IPSN '19). ACM, New York, NY, USA, 265--276. https://doi.org/10.1145/3302506.3310406
[18]
Yanpei Liu, Stark C Draper, and Akbar M Sayeed. 2012. Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Transactions on information forensics and security 7, 5 (2012), 1484--1497.
[19]
Xugang Lu, Yu Tsao, Shigeki Matsuda, and Chiori Hori. 2013. Speech enhancement based on deep denoising autoencoder. In Interspeech. 436--440.
[20]
S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith, and A. Jamalipour. 2014. Wireless Body Area Networks: A Survey. IEEE Communications Surveys Tutorials 16, 3 (Third 2014), 1658--1686. https://doi.org/10.1109/SURV.2013.121313.00064
[21]
M. Muaaz and R. Mayrhofer. 2017. Smartphone-Based Gait Recognition: From Authentication to Imitation. IEEE Transactions on Mobile Computing 16, 11 (Nov 2017), 3209--3221. https://doi.org/10.1109/TMC.2017.2686855
[22]
M Pat Murray. 1967. Gait as a total pattern of movement: Including a bibliography on gait. American Journal of Physical Medicine & Rehabilitation 46, 1 (1967), 290--333.
[23]
Sinno Jialin Pan and Qiang Yang. 2010. A Survey on Transfer Learning. IEEE Transactions on Knowledge and Data Engineering 22 (2010), 1345--1359.
[24]
Masoud Rostami, Ari Juels, and Farinaz Koushanfar. 2013. Heart-to-heart (H2H): authentication for implanted medical devices. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 1099--1112.
[25]
D. Schürmann, A. Brüsch, S. Sigg, and L. Wolf. 2017. BANDANA-Body area network device-to-device authentication using natural gAit. In 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom). 190--196. https://doi.org/10.1109/PERCOM.2017.7917865
[26]
S. Seneviratne, Y. Hu, T. Nguyen, G. Lan, S. Khalifa, K. Thilakarathna, M. Hassan, and A. Seneviratne. 2017. A Survey of Wearable Devices and Challenges. IEEE Communications Surveys Tutorials 19, 4 (Fourthquarter 2017), 2573--2620. https://doi.org/10.1109/COMST.2017.2731979
[27]
Youssef El Hajj Shehadeh and Dieter Hogrefe. 2015. A survey on secret key generation mechanisms on the physical layer in wireless networks. Security and Communication Networks 8, 2 (2015), 332--341.
[28]
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu. 2016. Edge Computing: Vision and Challenges. IEEE Internet of Things Journal 3, 5 (Oct 2016), 637--646. https://doi.org/10.1109/JIOT.2016.2579198
[29]
Y. Sun, C. Wong, G. Yang, and B. Lo. 2017. Secure key generation using gait features for Body Sensor Networks. In 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN). 206--210. https://doi.org/10.1109/BSN.2017.7936042
[30]
T. Sztyler and H. Stuckenschmidt. 2016. On-body localization of wearable devices: An investigation of position-aware activity recognition. In 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). 1--9. https://doi.org/10.1109/PERCOM.2016.7456521
[31]
Lisa Torrey and Jude Shavlik. 2010. Transfer learning. In Handbook of research on machine learning applications and trends: algorithms, methods, and techniques. IGI Global, 242--264.
[32]
Pascal Vincent, Hugo Larochelle, Yoshua Bengio, and Pierre-Antoine Manzagol. 2008. Extracting and Composing Robust Features with Denoising Autoencoders. In Proceedings of the 25th International Conference on Machine Learning (ICML '08). ACM, New York, NY, USA, 1096--1103. https://doi.org/10.1145/1390156.1390294
[33]
Pascal Vincent, Hugo Larochelle, Isabelle Lajoie, Yoshua Bengio, and Pierre-Antoine Manzagol. 2010. Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion. J. Mach. Learn. Res. 11 (Dec. 2010), 3371--3408. http://dl.acm.org/citation.cfm?id=1756006.1953039
[34]
Yunchuan Wei, Kai Zeng, and Prasant Mohapatra. 2013. Adaptive wireless channel probing for shared key generation based on PID controller. IEEE Transactions on Mobile Computing 12, 9 (2013), 1842--1852.
[35]
W. Xu, G. Revadigar, C. Luo, N. Bergmann, and W. Hu. 2016. Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication. In 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). 1--12. https://doi.org/10.1109/IPSN.2016.7460726
[36]
Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. 2014. How transferable are features in deep neural networks? In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 3320--3328. http://papers.nips.cc/paper/5347-how-transferable-are-features-in-deep-neural-networks.pdf
[37]
Junqing Zhang, Trung Q Duong, Alan Marshall, and Roger Woods. 2016. Key generation from wireless channels: A review. IEEE Access 4 (2016), 614--626.
[38]
Junxing Zhang, Sneha K Kasera, and Neal Patwari. 2010. Mobility assisted secret key generation using wireless link signatures. In Infocom, 2010 Proceedings IEEE. IEEE, 1--5.
[39]
Kaihua Zhang, Lei Zhang, and Ming-Hsuan Yang. 2012. Real-Time Compressive Tracking. In Computer Vision - ECCV 2012, Andrew Fitzgibbon, Svetlana Lazebnik, Pietro Perona, Yoichi Sato, and Cordelia Schmid (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 864--877.
[40]
Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C Tan, Qun Li, and Guihai Chen. 2013. Extracting secret key from wireless link dynamics in vehicular environments. In INFOCOM, 2013 Proceedings IEEE. IEEE, 2283--2291.

Cited By

View all
  • (2024)UniFiProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314297:4(1-29)Online publication date: 12-Jan-2024
  • (2024)WiFi2Radar: Orientation-Independent Single-Receiver WiFi Sensing via WiFi to Radar TranslationIEEE Internet of Things Journal10.1109/JIOT.2023.334937811:9(15750-15766)Online publication date: 1-May-2024
  • (2023)Construct 3D Hand Skeleton with Commercial WiFiProceedings of the 21st ACM Conference on Embedded Networked Sensor Systems10.1145/3625687.3625812(322-334)Online publication date: 12-Nov-2023
  • Show More Cited By

Index Terms

  1. Auto-Key: Using Autoencoder to Speed Up Gait-based Key Generation in Body Area Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
      Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 4, Issue 1
      March 2020
      1006 pages
      EISSN:2474-9567
      DOI:10.1145/3388993
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 March 2020
      Published in IMWUT Volume 4, Issue 1

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Autoencoder
      2. Autonomic Symmetric Key Generation
      3. Biometric Key Generation
      4. Body Area Networks
      5. Body Sensor Networks
      6. Device Pairing
      7. Machine Learning
      8. Transfer learning
      9. Wearable Communications

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)55
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 30 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)UniFiProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314297:4(1-29)Online publication date: 12-Jan-2024
      • (2024)WiFi2Radar: Orientation-Independent Single-Receiver WiFi Sensing via WiFi to Radar TranslationIEEE Internet of Things Journal10.1109/JIOT.2023.334937811:9(15750-15766)Online publication date: 1-May-2024
      • (2023)Construct 3D Hand Skeleton with Commercial WiFiProceedings of the 21st ACM Conference on Embedded Networked Sensor Systems10.1145/3625687.3625812(322-334)Online publication date: 12-Nov-2023
      • (2023)Wi-FlexProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36109307:3(1-27)Online publication date: 27-Sep-2023
      • (2023)Ubiquitous, Secure, and Efficient Mobile Sensing SystemsProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3597511(629-630)Online publication date: 18-Jun-2023
      • (2023)RF-CMProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35808597:1(1-28)Online publication date: 28-Mar-2023
      • (2023)PackquIDProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35694696:4(1-27)Online publication date: 11-Jan-2023
      • (2023)Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual TrackingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329049518(3991-4005)Online publication date: 2023
      • (2023)SST-HAR: Simultaneous Spatial-temporal Information Encoding Network for Radar-based Human Activity Recognition2023 IEEE Smart World Congress (SWC)10.1109/SWC57546.2023.10448583(1-8)Online publication date: 28-Aug-2023
      • (2022)DiverSenseProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35363936:2(1-28)Online publication date: 7-Jul-2022
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media