By Topic

Continuous authentication by electrocardiogram data

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Guennoun, M. ; Univ. of Ontario Inst. of Technol., Oshawa, ON, Canada ; Abbad, N. ; Talom, J. ; Rahman, M.
more authors

Authentication is the process of verifying the claimed identity of a user. Traditional authentication systems suffer from vulnerabilities that can break the security of the system. An example of such vulnerabilities is Replay Attack: An attacker can use a pre-saved password or an authentication credential to log into the system. Another issue with existing authentication systems is that the authentication process is done only at the beginning of a session: once the user is authenticated in the system, her identity is assumed to remain the same during the lifetime of the session. In real world, an attacker can masquerade as a legitimate user by physically controlling an authenticated machine. Therefore, there is a need to continuously monitor the user to determine if the user who is using the computer is the same person that logged onto the system. In this paper, we present a framework for continuous authentication of the user based on the electrocardiogram data collected from the user's heart signal. The electrocardiogram (ECG) data is used as a soft biometric to continuously authenticate the identity of the user; Experimental results demonstrate that electrocardiogram biometric trait can guarantee the safety of the system from illegal access.

Published in:

Science and Technology for Humanity (TIC-STH), 2009 IEEE Toronto International Conference

Date of Conference:

26-27 Sept. 2009