You are on page 1of 8

2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS)

G-PPG: A Gesture-related PPG-based Two-Factor


2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS) | 978-1-6654-7315-6/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICPADS56603.2022.00039

Authentication for Wearable Devices


Jiaqi Pan1 , Xinyan Zhou1,* , Zenan Zhang1 , Xiaoyu Ji2 , Haiming Chen1
1
Ningbo University, Ningbo, Zhejiang, China
2
Zhejiang University, Hangzhou, Zhejiang, China
zhouxinyan@nbu.edu.cn

Abstract—Verifying the user identity of wearable devices is To solve this problem, sensors that can extract users’
crucial for system security, especially before sensitive operations biometric features or behavior patterns are leveraged for
like making financial payments. A PPG-based two-factor authen- continuous authentication yet face challenges. To be specific,
tication can be a promising solution with widely deployed PPG
(Photoplethysmography) sensors within wearable devices. Our fingerprint sensors can be fooled by fake fingerprints [1],
observations find PPG readings reveal a significant relevance to and camera-based face recognition can be compromised by
the user’s hand motions, i.e., gestures, while the user’s heartbeat dedicated designed images [2]. To enhance the security of
characteristics and wearing habits are also implicitly related, biometric-based authentication, a physiological feature that is
which can be utilized for user authentication. In this paper, we hard to clone and observe should be applied. PPG (Photo-
design G-PPG, a gesture-related PPG-based two-factor authen-
tication mechanism that can non-intrusively validate the user’s plethysmography) sensor that captures the user’s heartbeat at
identity. In G-PPG, gesture detection and segmentation and a the wrist-side becomes a promising candidate.
specific feature set are proposed for accurate gesture-related PPG PPG is a non-intrusive optical biomonitoring technique that
characteristic extraction. Moreover, an adaptive update scheme is can measure the blood volume in vascular tissue under the
proposed for the high accuracy of long-term authentication. Our skin in the wrist or fingertip area by receiving the reflected
experiments among 15 participants demonstrate that G-PPG can
achieve a 90% accuracy in the long-term study. light rays. The received signal is related to the cardiac cycle’s
Index Terms—Wearable Security, Internet of Things, Two- systole and diastole, which can be utilized for heartbeat
factor Authentication, PPG sensors monitoring. Due to its reliable performance and low price,
almost all current smart bands and watches are equipped with
I. I NTRODUCTION PPG sensors for health monitoring and sport detection, which
makes it possible to use PPG for authentication.
In recent years, wearable devices have drawn great attention Previous research demonstrates that PPG readings reveal
in the IoT (Internet of Things) market and play essential roles unique and unclonable characteristics, and it is feasible to
in daily human life. With various embedded sensors, wearable use PPG readings for user authentication [3]–[6]. However,
devices like smartwatches reveal broad application scenarios PPG-based authentication still faces challenges. First, the PPG
for healthcare monitoring, navigation, fitness tracking, etc. measurements are susceptible to movements, such as walking
With the enhancement of functionality, wearable devices are and riding, which may impact the authentication accuracy
even utilized in sensitive scenarios (financial payment, etc.) and utility, and a motion artifacts removal algorithm is also
and regarded as a trustworthy party with advanced authority required. Besides, compared to fingertip-PPG, the wrist-PPG
that can access other smart devices, which are vulnerable in readings are typically weak and noisy. Therefore, existing
some unexpected cases. For example, an attacker can use the methods usually need users to wear the device tightly to collect
smartwatch to unlock the smart locker that has been pre- sufficient PPG signals for authentication. However, in practice,
paired directly without further authentication. Without further there is always a gap between the wristband and skin, and the
protection, users usually get anxious when their wearable gap even changes according to the user’s hand motion, which
devices are stolen or lost, and their sensitive data or application also reduces the accuracy and practicability of heartbeat-based
account could be leakages by attackers. PPG authentication.
In order to prevent the misuse of wearable devices, a Different from existing work, we propose G-PPG, which
continuous or two-factor authentication mechanism is neces- extracts gesture-related PPG readings for user authentication.
sary, especially when sensitive authorities are asked for it. Specifically, we find that PPG readings reveal unique and
A common solution to validate the user’s identity is asking strong patterns when a user performs a specific gesture.
the user to input a password or PIN, which usually lasts for Moreover, different users and gestures will show discrimi-
seconds. However, weak password problems and credential native differences. With a thorough analysis of the above
stuffing attacks make password-based authentication risky and observations, we conclude that the gesture brings rhythmic
user-unfriendly. changes to the gap between the PPG sensor and the skin, which
reflect the user’s behavior pattern and the wearing habits.
* Xinyan Zhou is the corresponding author. Furthermore, the heartbeat itself also introduces unique signals

978-1-6654-7315-6/23/$31.00 ©2023 IEEE 242


DOI 10.1109/ICPADS56603.2022.00039
Authorized licensed use limited to: Indian Institute of Information Technology Design & Manufacturing. Downloaded on August 16,2023 at 18:29:51 UTC from IEEE Xplore. Restrictions apply.
to the PPG measurements. As a joint result of the above two vibration, and light [13]–[15] are also utilized for proximity-
reasons, the gesture-related PPG shows great potential for user based authentication. However, the above methods usually
authentication. Besides common advantages of PPG-based involve multiple devices with various sensors, which show
authentications (non-intrusive, secure and etc.), G-PPG has more hardware requirements and system environments.
the following advantages: 1) Anti-movement interference: Device-fingerprint-based Authentications: With the
G-PPG derives features from gesture-related PPG signals, and recognition of the device hardware imperfections, devices
hand movements are not noises but crucial patterns that should can be authenticated with their embedded hardware
be carefully extracted. 2) High accuracy: both heartbeat modules, which have been studied theoretically and
characteristics and personal behavior habits are utilized for au- experimentally [16]. Due to the naturally uncountable and
thentication, and sufficient individual features make it possible unique characteristics, hardware modules like CPU [17],
for accurate authentication. 3) High robustness: our platform RF (radio frequency) front-ends [18], cameras [19],
enables reliable authentication during user movement. We microphones [20], accelerometers [21], and gyroscopes
validate the performance of G-PPG with a prototype among [22] are widely utilized for device authentication and paring.
15 candidates, and the results demonstrate that G-PPG can By validating the identity of the registered device, the above
provide reliable two-factor authentication with a PPG sensor methods show high authentication accuracy and consistency
only. The main contributions of G-PPG are summarized in the with the assumption that both the device and the device-holder
following: are legitimate parties. Unfortunately, this assumption makes
• We evaluate the feasibility of gesture-related PPG authen- such mechanisms insecure when the attacker physically
tication, and gesture-dependence, user-dependence, and compromises the device, i.e., the attacker may utilize a
PPG sensor sensitivity are validated. legitimate device fingerprint to pass the authentication
• We design G-PPG, which comprises a data acquisition mechanism and log in to the system illegally.
and preprocessing module, a feature extraction module, a Biometric-based Authentications: Compared to the above
training phase, and the authentication module. A specific two authentication mechanisms, biometric-based ones authen-
feature set is designed to extract gesture-related features. ticate users’ identities directly, which reveals natural reliability
Moreover, an adaptive update mechanism is proposed for and can guarantee the legitimacy of the access behavior. For
better user experience and long-term authentication. instance, human fingerprinting matching and face recognition
• We build a prototype using a commodity PPG sensor, have been used commercially (smartphones, smart lockers,
and we evaluate the performance of G-PPG with 15 etc.) due to their easy collection and long-term consistency
candidates (11 males and 4 females). Experimental results characteristics. However, replay attacks, spoofing attacks, and
prove the security and efficiency of our mechanism. synthesis attacks [23] that target on above mechanisms are re-
• We verify the performance of G-PPG with different daily ported frequently, and real-time or liveness user authentication
activities (sitting and walking), and the results demon- mechanisms have been studied in recent years. Yan et al. [24]
strate that G-PPG can keep a high precision even with propose CaFiled. This text-independent speaker verification
the interference of walking vibrations. method can detect voice-spoofing attacks by constructing a
“field print” with the acoustic biometrics embedded in the
II. R ELATED W ORK sound field.
Extensive research has been proposed for continuous au- Wearable-based Authentications: With the prevalence of
thentication or 2-factor authentication. According to the au- wearable devices, PPG (photoplethysmography) and ECG
thentication objects (network, device, and user), we can divide (electrocardiogram) -based authentication methods are also
authentication methods into proximity-based authentications, studied. CardicCam [25] extracts unique cardiac futures from
device-fingerprint-based authentications, and biometric-based the cardiac motion patterns in fingerprints by asking users to
authentications. press on a built-in camera, and Yang et al. [26] authenticate
Proximity-based Authentications: Such methods authen- users via ECG data while preserving sensitive healthy data
ticate devices by validating the device in a legitimate area or from being exposed to adversaries. As for the PPG sensors,
sharing common network connections. RSI (received signal Zhao et al. propose Trueheart [3], which is a continuous au-
indicator) [7]–[10] and CSI (channel state information) [11], thentication (CA) mechanism that collects users’ heartbeats via
[12] are two physical layer information that can be utilized PPG sensors. Cao et al. propose PPGPass [4], a non-intrusive
to extract proximity-based keys for device authentication. For and secure two-factor authentication system, and Bastos et al.
example, Xi et al. propose TDS (The Dancing Signals) which [5] combine PPG and ECG for identity authentication.
puts two devices into physical proximity and utilizes the com- Both Trueheart [3] and PPGPass [4] can achieve a high
mon radio environment as a proof of identity, and generates authentication accuracy. However, due to the sensitivity of
a common key for device authentication. However, RSI-based PPG sensors, motion artifacts removal algorithms are required
mechanisms suffer from coarse-grained signal measurement, to obtain clean heartbeat signals efficiently. Unlike the above
while CSI-based methods typically require dedicated hard- methods, G-PPG leverages such sensitivity for user authenti-
ware for signal measurements (an Intel 5300 Wi-Fi card). cation. Specifically, G-PPG requires users to perform gestures
Besides radio signals, other types of signals like acoustic, and extracts gesture-related PPG features for authentication

243

Authorized licensed use limited to: Indian Institute of Information Technology Design & Manufacturing. Downloaded on August 16,2023 at 18:29:51 UTC from IEEE Xplore. Restrictions apply.
(a) Gesture-related PPG readings re- (b) Gesture-related PPG readings re- (c) Gesture-related PPG readings re- (d) PPG readings during sitting and
veal consistency for each user. veal user dependence. veal gesture dependence. walking periods.

Fig. 1. The feasibility study of G-PPG.

with the observation that PPG readings reveal both gesture- for authentication requires an extra motion artifacts removal
dependency and user-dependency. algorithm, while the gesture-related PPG signals show a great
potential for a robust authentication performance.
III. G-PPG OVERVIEW
B. System Overview
A. Feasibility Study The basic idea of G-PPG is utilizing the PPG measure-
In G-PPG, we utilize the PPG measurements when users ments changes during the gestures to authenticate the user’s
are required to operate designated gestures for authentication, identity. The fundamental principle is that PPG measurements
based on the observations that different users reveal marked reveal unique characteristics when users conduct hand gestures
differences in PPG measurements with hand motions. We vali- derived from the user’s wrist physiological features and the
date the feasibility of G-PPG with coarse-grained experiments wearing habits of the wearable devices. Specifically, the gap
in a PPG data collection platform, and details of the platform between the wearable device and the user’s wrist skin is
are illustrated in Sec. V. irregular among users, and the gap changes significantly when
User Consistency and Dependence. We first examine the the user is conducting near-wrist gestures. By measuring the
user consistency and dependence of the PPG measurements light reflections, PPG measurements are hypersensitive to user
with different gestures, which are fundamental characteristics gestures, which can be utilized for authentication.
of G-PPG. We capture PPG measurements from 4 users with The architecture of our G-PPG is shown in Fig.2, G-PPG
the same gesture, and the sampling rate of the PPG is 100Hz. requires the user to follow a pre-defined gesture and collects
We plot 15 samples for each user directly in Fig. 1(a), which PPG data in real-time to authenticate the user’s identity.
reveals significant consistency among samples. To further Data Acquisition and Preprocessing. With a dedicated
evaluate the user dependence, as shown in Fig 1(b), we find gesture, we collect PPG measurements for further user authen-
samples from different users can be simply separated in a two- tication. Raw PPG sensor data inevitably contain disturbances
dimension plane (i.e., skewness as the X-axis and standard from heart rate and other movements. Therefore, a basic noise
deviation as the Y-axis). The above findings demonstrate that reduction mechanism and a low pass filtering are necessary
PPG measurements with gestures show great potential for user at the beginning of the data acquisition. Besides, gesture
authentication. detection and segmentation are applied to extract gesture
Gesture dependence. For better user experience during the segments from continuous PPG measurements.
authentication, we further explore the gesture dependence, Feature Extraction. We try to extract features that can
i.e., the PPG measurements could be distinguishable with efficiently classify user identities with segmented PPG mea-
different gestures. We utilize the same platform to collect PPG surements. Previous work provides fiducial features for PPG-
measurements from the same user with 3 different gestures, based authentication, which are critical landmarks in PPG
and 15 samples are collected for each gesture. Fig. 1(c) reveals pulse waveform [3]. However, our work is based on gesture-
the variance (X-axis) and skewness (Y-axis) of each sample, related PPG measurements, and previous features are not
and we find different gestures are clearly clustered, which applicable. In G-PPG, we propose a set of customized features
provides more choices for users and expands the data space related to user wearing habits and physiological characteristics.
for authentication. In addition, we also select general signal features in time,
Gesture Robustness. Users’ daily activities can impact the frequency, and time-frequency domains as a supplementary.
performance of PPG-based authentication [3], [4], and we vali- Training Module. The training module is operated in the
date the robustness of G-PPG in two different daily scenarios, enrollment phase, the initialization process of G-PPG. With
including sitting and walking cases. As shown in Fig.1(d), several labeled legitimate user training samples and pre-stored
gesture-related PPG signals can be clearly observed from PPG negative samples, we train a binary classifier for G-PPG. In the
readings, while the motion artifacts may cover the original design of G-PPG, we compare the performance of 5 classifiers,
cardiac signals. Therefore, utilizing cardiac PPG signals alone which include Random Forest (RF), Support Vector Machine

244

Authorized licensed use limited to: Indian Institute of Information Technology Design & Manufacturing. Downloaded on August 16,2023 at 18:29:51 UTC from IEEE Xplore. Restrictions apply.
IV. G-PPG SYSTEM DESIGN
In this section, we describe the four modules in G-PPG in
detail, which include data acquisition and preprocess module,
feature extraction module, training module and authentication
module.

A. Data Acquisition and Preprocessing


1) Noise Reduction and Filtering: PPG sensors measure
pulses continuously, and we try to extract gestures from PPG
measurements. Besides, due to the low accuracy of the PPG
sensor, the data collected by the PPG sensor may include
power drift and measurement noises. Considering that the
frequency of heartbeats is usually less than 3Hz, we utilized
a low-pass filter (LPF) to reduce signal noises with a cut-
off frequency of 20Hz, which can not only retain heart rate
information and gesture information but also remove high-
Fig. 2. The architecture of G-PPG. G-PPG includes four modules: 1) data
acquisition and preprocess, 2) feature extraction, 3) training module and 4)
frequency noises.
authentication module. 2) Gesture Detection and Segmentation: As shown in
Fig. 1(d), a series of PPG readings typically contains multiple
heartbeats, motion noises, and “gesture” signals. In order to
(SVM), Decision Tree (DT), Gradient Boosting (GB), and K- extract gesture-related PPG signals for user authentication, we
Nearest Neighbor(K-NN). With careful consideration of the need to determine the starting point and the segment length.
complexity and accuracy, we select a random forest in G-PPG. Segment Length: Our preliminary study of the duration of
In addition, the classifier is continuously updated with labeled gestures of 15 participants finds that the duration of a gesture
samples in the authentication module. is typically between 0.7s and 1s. Therefore, we empirically set
Authentication Module. This module utilizes the trained the length of the segment to 1 second to ensure that all gesture-
classifier to authenticate user’s identity. Attackers that cannot related data can be completely extracted. With a sampling
pass the G-PPG will be denied for further services. Moreover, rate of 100Hz, we have the number of sampling points in
the labelled samples will be pushed to the training module for a segment τ as 100 in a gesture-related PPG signal.
adaptive updates to the classifier. Starting Point: From the PPG data we collected in
Fig. 1(d), we find that gesture-related PPG signals typically
show a pronounced fluctuation when compared with heartbeats
C. Challenges
and noises. With the above observation, we can utilize the
To achieve an accurate authentication performance, G-PPG energy accumulation to detect the starting point of a segment.
faces the following challenges. Considering a discrete-time series of PPG readings x(t)
Re-using PPG sensors for gesture-related authentication. with T samples containing multiple gestures, we need to ex-
PPG sensors are designed to sense the pulse rate. Specifically, tract each gesture. We first calculate the energy accumulation
PPG sensors emit red or green light, and the blood will absorb Et that starts at x(t) with a sliding window with the length
the light. By measuring the reflected light changes, PPG can of τ :
t+τ
 −1
 
evaluate the user’s pulse conditions. In G-PPG, we re-use the Et = x(t) − X̄  (1)
PPG sensor to indirectly sense the gesture movement, which t
is out of the scope of the PPG applications.
Here, X̄is the average strength of the PPG signal that is
Accurate authentication with low-cost sensors. PPG
measured in a static state (with only heartbeat and noises),
sensors in wearable devices are typical low-cost commodity
which can be regarded as the noise floor of the gesture
modules with a low sampling rate and resolutions, which
extraction. The first starting point detection problem can be
makes accurate authentication difficult.
formulated as the following function:
Customized features for authentication. G-PPG authenti-
cates users with gesture-PPG, and universal pulse characteris- arg min Eg1 > θEmax (2)
g1
tics are not applicable. Selecting efficient features that imply
the user’s gesture characteristics should be carefully studied. Emax is the maximum energy accumulation segment in the
Limited training data size for better user experience. entire data set, and θ is a tolerance coefficient that shows
While providing more gesture choices for authentication, the deviation among gestures. Empirically, we select θ as 0.8.
overhead of the enrollment phase may reduce user experience. Considering there could be multiple gestures, we repeat Eq. 2
Therefore, to have a better user experience, the training data within the new data set [x(g1 + τ ), x(T )] to find the second
size should be reduced to a certain level. starting point, and so on.

245

Authorized licensed use limited to: Indian Institute of Information Technology Design & Manufacturing. Downloaded on August 16,2023 at 18:29:51 UTC from IEEE Xplore. Restrictions apply.
TABLE I
THE LIST OF THE SPECIFIC PPG GESTURE FEATURES.

Feature Name Feature Description


Related to the user’s wearing habits, i.e., the
Systolic Amplitude (h)
tighter the wearing, the smaller the value.
Related to the gesture releasing duration.
Crest Width (m) A slower releasing of the gesture will lead
to a greater crest width.
Gesture Holding The time duration of the user to hold the
Duration (t) gesture. Related to the user’s gesture habits.
Related to the gesture retraction duration.
Trough Width (n) A slower retraction of the gesture will lead
to a greater trough width.
Related to the overall duration of the user’s
Fig. 3. The illustration of 6 specific features. Half Gesture Time (l)
gesture.
Ratio of Amplitude of The ratio of gesture releasing and retraction.
A Related to the user’s gesture habits.
A-wave and B-wave ( B )
B. Feature Extraction Number of Crests
Related to the gesture type.
Different gestures reveal a different number
In G-PPG, we authenticate users with gesture-related PPG (N C)
of crests.
signals, which means traditional PPG features are not appli- Number of Troughs
Related to the gesture type.
cable [3], [4]. We design a specific feature set and a general Different gestures reveal a different number
(N T )
of crests.
feature set for further authentication to better extract features
with user gesture habits and wearing habits.
1) Specific Feature Set: Our observations of 15 partici- TABLE II
THE LIST OF THE GENERAL FEATURES.
pants’ different gesture-related PPG signals demonstrate that
over 80% of the gesture segment contains at least one pair of Category Features
peak and trough. To make G-PPG applicable for all gestures Mean, Std-Dev, Average Deviation, Skewness,
Time Domain Kurtosis, RMS Amplitude, Lowest Value,
and users, we elaborately design 6 features extracted from a Media
single pair of peak and trough and 2 global features related Frequency Domain
Spec. Std Dev, Spec. Centroid, Spectral Crest,
to the overall shape of the signals. Fig. 3 illustrates how the Flatness, Spec. Skewness, Spec. Kurtosis
Time-frequency Std-Dev, Average Deviation, peak-to-peak,
first 6 gesture-specific features are derived from the critical Domain Mean, RMS, Variance
landmarks in the PPG pulse waveform. It is worth mentioning
that all features are strongly related to users’ wearing habits
and gesture habits. means F (s)i , F (g)i  is a legitimate user, zi = 0 means
Taking the systolic amplitude (h) as an example, we define F (s)i , F (g)i  corresponds to an attacker).
the h as the distance between the peak and the trough, related We evaluate the performance of five binary classifiers (RF,
to the user wearing the wearable device’s habit. Specifically, if SVM, DT, GB, and K-NN) to find which can provide a better
the user wears the device tightly, the variable space between authentication accuracy in G-PPG. As a result, we select the
the PPG sensor and the skin will be limited, which means random forest (RF) classifier that performs the best with joint
lower amplitudes of both the peak and the trough. Another consideration of the accuracy and F1-score. The details will
feature, crest width (m), reveals the speed of the user to release be discussed in Sec. V.
the gesture, while the trough width n represents the duration
of the gesture retraction. The descriptions of 8 specific features D. Authentication Mechanism
and their physiological meanings are summarized in Tab. I.
2) General Feature Set: We also extract a set of general In the authentication stage, G-PPG randomly selects one
features from the gesture-related PPG signals in three domains: gesture for the user and requires him/ her to follow the
time domain, frequency domain, and time-frequency domain. gesture. We extract the gesture feature set F (s)i , F (g)i  from
In the time domain, we consider the mean value, standard the segmented PPG measurements and utilize the pre-trained
deviation, average deviation, skewness, etc. features, widely classifier to validate the user’s identity. If the sample can pass
used for data feature extraction. We perform Fast Fourier the classifier, G-PPG authenticates the sample as a legitimate
Transform and extract 6 frequency-domain features, and we user. Otherwise, G-PPG determines the sample as a stranger
perform Discrete Wavelet Transform with Harr wavelet to and denies further processes.
obtain the other 6 features in the time-frequency domain. We Adaptive Update: Due to the repeated wearing on-off,
also summarize the general feature set in Tab. II as reference. we find the user’s wearing habits and gesture habits may
change slightly over some time, and the corresponding gesture
C. Training Phase features may also change. Therefore, G-PPG collects the
Given a sample F (s)i , F (g)i , Zi , we have F (s)i , user-authenticated gesture segments and retrains the classifier
F (g)i  that represents gesture-related specific features and regularly. Specifically, G-PPG periodically adds users’ latest
general features, and Zi  indicates identity label (i.e. zi = 1 PPG gesture feature sets and removes old gesture feature sets

246

Authorized licensed use limited to: Indian Institute of Information Technology Design & Manufacturing. Downloaded on August 16,2023 at 18:29:51 UTC from IEEE Xplore. Restrictions apply.
(a) The average accuracy among 15 (b) The average accuracy and F1-
participants. score with 5 different gestures.

Fig. 4. Prototype of device with a PPG and an MPU-6050 sensor. Fig. 5. The overall performance of G-PPG.

to keep the classifier up to date. The long-term performance C. Overall Performances


of G-PPG will also be evaluated in Sec. V. We first evaluate the overall performance of G-PPG by
checking the authentication accuracy. Specifically, we collect
V. PERFORMANCE EVALUATION
samples from 15 participants with 5 gestures. In particular, we
A. Experiment Settings set that each participant acts as a legal user once, while the
1) Hardware design: We find commercial devices usually rest 14 participants act as attackers. To guarantee the balance
do not provide access permissions to the raw PPG data, and of the test samples, we randomly select 2 samples from each
only processed heart-beat results can be acquired. Based on participant (attacker) as negative samples for each gesture.
this, we build a data collection prototype with an off-the-shelf Fig. 5(a) shows that each participant can achieve an accuracy
PPG module and connect it to an Arduino UNO (REV3) board. that is higher than 90% (only one participant has an accuracy
It is worth mentioning that the motion sensor (MPU-6050) that of 89%), and males and females reveal similar results.
was utilized for the feasibility study is also connected to the Secondly, we also evaluate the authentication accuracy of
UNO board. To imitate the wearing process of a wearable each gesture, and Fig. 5(b) reveals the average results of 15
device, we fix the PPG sensor to a wristband and let users participants. Considering G-PPG will randomly require users
wear it as a wearable device. Fig 4 shows the prototype and to perform a designated gesture in practice scenarios, we
settings of the experiments. Considering the sampling rate of only use the same type of gestures from attackers as negative
commercial sensor modules can reach up to at least 100Hz, we samples in test samples. As shown in Fig. 5(b), the accuracy
set the sampling rate of PPG sensor as 100Hz in experiments. of five gestures can exceed 90%, while F1-score exceeds 88%.
All 5 gestures show good performance on authentication, and
2) Data Collection: We recruit 15 participants (11 males we also notice Gesture 3 may show a slightly lower accuracy
and 4 females) to collect gesture data with PPG sensor using when compared with the rest 4 gestures. In G-PPG, we can
our wearable prototype. For each participant, we collect 5 turn down the probability of Gesture 3 in real cases.
gestures that are shown in Fig. 2. Each gesture we collect The above two experiments demonstrate G-PPG as a
40 samples. For long-term evaluation, we keep tracking 6 promising authentication mechanism practical with a single
participants (5 males and 1 female) in one week to evaluate the wrist-PPG sensor. In the following, we conduct several ex-
performance of G-PPG in long-term authentication. Specifi- periments to further evaluate the micro-benchmark in G-PPG.
cally, we collect data from each participant 4 times a day, and
participants should take off the device after each sampling
round. Each gesture we collect 40 samples. D. The Impact of Classifiers
We compare the performance of G-PPG with different
B. Metrics classifiers, which include decision tree (DT), gradient boost
We evaluate the performance of G-PPG with the following (GB), K-nearest neighbor (K-NN), random forest (RF), and
metrics: support vector machine (SVM). These 5 models are widely
Accuracy: Accuracy is the ratio of correctly labeled used in binary classification problems, and we show the
samples (users and attackers) to the number of samples for average accuracy and F1-score of each gesture and participant
test. in Fig. 6. We find that RF reveals the best performance in both
Precision: Precision is the ratio of correctly labeled positive accuracy and F1-score compared with other classifiers. RF is
samples to the total predicted positive samples. adopted in G-PPG as the default classifier for further analysis
Recall: Recall is the ratio of correctly predicted positive in the following.
samples to the number of actual positive samples.
F1-score: F1-score is the harmonic average of the pre- E. Impact of Feature Selection
cision and recall, which can be represented as: F 1 = We elaborately design a specific feature set to extract the
2∗precision∗recall
precision+recall . F1-score can reveal the system’s overall gesture-related characteristic for authentication, and we evalu-
performance, even with unbalanced sample distribution cases. ate the impact of feature selection by utilizing different feature

247

Authorized licensed use limited to: Indian Institute of Information Technology Design & Manufacturing. Downloaded on August 16,2023 at 18:29:51 UTC from IEEE Xplore. Restrictions apply.
(a) Accuracy. (b) F1-sore.

Fig. 6. The impact of 5 different kinds of classifiers. Fig. 7. The impact of the feature selection.

Fig. 8. The impact of different training data sizes Fig. 9. The evaluation of the long-term authenti- Fig. 10. The impact of user daily movements for
for the authentication. cation. the authentication.

sets for authentication. Fig. 7 reveals the accuracy (Fig. 7(a)) phase of a user-fingerprint authentication may last for 30 s
and F1-score (Fig. 7(b)) of 5 gestures with the following three and Trueheart [3] requires a 2-minute-training to reach a 90%
feature sets: 1) only use the specific feature set with 8 features, accuracy, we consider the time duration of the training phase
2) only use the general feature set with 20 features, and 3) use in G-PPG is acceptable.
all 28 features. Results demonstrate that utilizing all features
shows the best authentication performance while using only 8 G. Practical Analysis
specific features reveals a remarkable performance. It is worth To further analyze the performance of G-PPG in practice,
mentioning that the specific feature set overcomes the general we evaluate the long-term performance of G-PPG and estimate
feature set with only 8 features. Therefore, we consider the the impact on the user’s daily activities. The user-defined
specific feature set can well extract the key characteristics from security level proposed in the authentication mechanism is also
samples and make contributions to the classification results. evaluated.
Long-term Authentication: One may argue that the
F. Impact of Training Data Size
gesture-related PPG samples may change when the user takes
The training data size reflects the user experience to some on/off the wearable devices. Therefore, we keep tracking the
extent. Specifically, more training data means the user should gesture data of 6 participants (5 males and 1 female) for a week
spend more time on the system initialization, which may and analyze the performance of G-PPG each day. Participants
discourage users willing to use G-PPG. On the other hand, will take off the wearable device after each sampling round to
the accuracy may not be high enough for authentication with simulate the user’s daily usage habits. It is worth mentioning
a few training samples. We take K samples from legitimate that we utilize the adaptive update mechanism after each
users and train the model with an additional 2K negative authentication round, and the model is updated each day. The
samples in the experiment. The negative samples can be results in Fig. 9 demonstrate that the accuracy and F1-score are
pre-stored in the system. We analyze the accuracy and F1- relatively stable, and the indicators (accuracy and F1-score)
score for the different number of positive training samples even increase a little bit after a few days with the adaptive
(K = 4, 8, 12, 16, 20, 24, 28, 32), and the results are shown update mechanism, which reveals a promising characteristic
in Fig. 8. We find that even with 4 positive samples, G-PPG for long-term authentication.
can reach an accuracy of 87.75%, and with 8 samples, the The Impact of Daily Activities: We also study the impact
accuracy can reach up to 90.23%. Recall that each sample of daily activities on G-PPG to validate the system robustness.
lasts for 1 second, G-PPG needs 8 s to train a gesture. Though In most wearable-based authentication methods [3]–[5], [25],
one gesture can also be utilized for authentication, we still [26], users are required to perform the authentication in a
suggest users train at least 2 gestures for authentication, which relatively stationary case, however, the moving scenario should
lasts 16 s for the initialization phase. Considering the training also be considered in the daily life. We collect samples from 6

248

Authorized licensed use limited to: Indian Institute of Information Technology Design & Manufacturing. Downloaded on August 16,2023 at 18:29:51 UTC from IEEE Xplore. Restrictions apply.
participants in two typical activities: sitting and walking, rep- [8] S. Mathur, R. D. Miller, A. Varshavsky, W. Trappe, and N. B.
Mandayam, “Proximate: proximity-based secure pairing using ambient
resenting static and moving scenarios accordingly. As shown wireless signals,” in Proceedings of the ACM MobiSys 2011, 2011, pp.
in Fig. 10, G-PPG demonstrates a similar precision in both 211–224.
cases, while the F1-score reaches up to 84.77% even in the [9] Y. Luo, L. Pu, Z. Peng, and Z. Shi, “Rss-based secret key generation in
underwater acoustic networks: advantages, challenges, and performance
walking scenario. We also notice the recall in the walking case improvements,” IEEE Communications Magazine, vol. 54, no. 2, pp.
is lower than the sitting case. In such cases, users can still pass 32–38, 2016.
the authentication by launching a second attempt. [10] T. Wang, Y. Liu, and A. V. Vasilakos, “Survey on channel reciprocity
based key establishment techniques for wireless systems,” Wireless
Networks, vol. 21, no. 6, pp. 1835–1846, 2015.
VI. C ONCLUSION [11] W. Xi, C. Qian, J. Han, K. Zhao, S. Zhong, X. Li, and J. Zhao, “Instant
and robust authentication and key agreement among mobile devices,” in
In this paper, we design G-PPG, a gesture-related PPG- Proceedings of the ACM SIGSAC CCS, 2016, pp. 616–627.
based two-factor authentication mechanism for wearable de- [12] F. Qiu, Z. He, L. Kong, and F. Wu, “MAGIK: an efficient key extraction
vices. With an embedded PPG sensor, G-PPG can authenticate mechanism based on dynamic geomagnetic field,” in Proceedings of the
IEEE INFOCOM 2017, 2017, pp. 1–9.
the user’s identity through dedicated gestures, which is based [13] N. Karapanos, C. Marforio, C. Soriente, and S. Capkun, “Sound-proof:
on the observation that gesture-related PPG readings can Usable two-factor authentication based on ambient sound,” in 24th
imply users’ heartbeat, wearing habits, and behavior habits. USENIX Security Symposium. USENIX Association, 2015, pp. 483–
498.
Specifically, we design a gesture detection and segmentation [14] X. Ji, C. Li, X. Zhou, J. Zhang, Y. Zhang, and W. Xu, “Authenticating
algorithm to extract gesture-related PPG measurements, and smart home devices via home limited channels,” ACM Trans. Internet
a specific feature set is proposed according to the empirical Things, vol. 1, no. 4, pp. 24:1–24:24, 2020.
[15] C. Li, X. Ji, B. Wang, K. Wang, and W. Xu, “Sencs: Enabling real-
observations. We validate the performance and security of G- time indoor proximity verification via contextual similarity,” ACM Trans.
PPG among 15 participants, and the results demonstrate that Sens. Networks, vol. 17, no. 2, pp. 19:1–19:22, 2021.
G-PPG can achieve high accuracy of over 90% in long-term [16] G. Baldini and G. Steri, “A survey of techniques for the identification
of mobile phones using the physical fingerprints of the built-in compo-
evaluations. nents,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp.
1761–1789, 2017.
ACKNOWLEDGMENT [17] Y. Cheng, X. Ji, J. Zhang, W. Xu, and Y. Chen, “Demicpu: Device
fingerprinting with magnetic signals radiated by CPU,” in Proceedings of
This work was supported in part by the following foun- the 2019 ACM SIGSAC Conference on Computer and Communications
dations: National Natural Science Foundation of China un- Security. ACM, 2019, pp. 1149–1170.
derGrant 62002183 , in part by Zhejiang ProvincialNatural [18] O. Gungor and C. E. Koksal, “On the basic limits of rf-fingerprint-based
authentication,” IEEE Transactions on Information Theory, vol. 62,
Science Foundation of China under Grant LQ20F020012, in no. 8, pp. 4523–4543, 2016.
partby the Natural Science Foundation of Ningbo under Grant [19] M. Pamplona Segundo, S. Sarkar, D. Goldgof, L. Silva, and O. Bellon,
202003N4087. The Natural Science Foundation of Ningbo “Continuous 3d face authentication using rgb-d cameras,” in Proceedings
of the IEEE Conference on Computer Vision and Pattern Recognition
City under Grant No. 2021J090 and Ningbo Manicipal Com- Workshops, 2013, pp. 64–69.
monweal S&T Project under Grant No. 2022S005. [20] G. Baldini and I. Amerini, “Smartphones identification through the built-
in microphones with convolutional neural network,” IEEE Access, vol. 7,
pp. 158 685–158 696, 2019.
R EFERENCES [21] S. Dey, N. Roy, W. Xu, R. R. Choudhury, and S. Nelakuditi, “Accelprint:
[1] C. Wu, K. He, J. Chen, Z. Zhao, and R. Du, “Liveness is not enough: Imperfections of accelerometers make smartphones trackable.” in NDSS,
Enhancing fingerprint authentication with behavioral biometrics to defeat vol. 14. Citeseer, 2014, pp. 23–26.
puppet attacks,” in 29th USENIX Security Symposium. USENIX [22] O. Willers, C. Huth, J. Guajardo, and H. Seidel, “Mems gyroscopes
Association, 2020, pp. 2219–2236. as physical unclonable functions,” in Proceedings of the 2016 ACM
[2] A. Pinto, W. R. Schwartz, H. Pedrini, and A. Rocha, “Using visual SIGSAC Conference on Computer and Communications Security, 2016,
rhythms for detecting video-based facial spoof attacks,” IEEE Transac- pp. 591–602.
tions on Information Forensics and Security, vol. 10, no. 5, pp. 1025– [23] M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter, “Accessorize to
1038, 2017. a crime: Real and stealthy attacks on state-of-the-art face recognition,”
[3] T. Zhao, Y. Wang, J. Liu, Y. Chen, J. Cheng, and J. Yu, “Trueheart: in Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Continuous authentication on wrist-worn wearables using ppg-based Communications Security. ACM, 2016, pp. 1528–1540.
biometrics,” in IEEE Conference on Computer Communications. IEEE, [24] C. Yan, Y. Long, X. Ji, and W. Xu, “The catcher in the field: A fieldprint
2020, pp. 30–39. based spoofing detection for text-independent speaker verification,” in
[4] Y. Cao, Q. Zhang, F. Li, S. Yang, and Y. Wang, “Ppgpass: Nonintrusive Proceedings of the 2019 ACM SIGSAC Conference on Computer and
and secure mobile two-factor authentication via wearables,” in IEEE IN- Communications Security. ACM, 2019, pp. 1215–1229.
FOCOM 2020-IEEE Conference on Computer Communications. IEEE, [25] J. Liu, C. Shi, Y. Chen, H. Liu, and M. Gruteser, “Cardiocam: Lever-
2020, pp. 1917–1926. aging camera on mobile devices to verify users while their heart is
[5] L. Bastos, T. Tavares, D. Rosário, E. Cerqueira, A. Santos, and pumping,” in Proceedings of the 17th Annual International Conference
M. Nogueira, “Double authentication model based on ppg and ecg on Mobile Systems, Applications, and Services, MobiSys 2019. ACM,
signals,” in 2020 International Wireless Communications and Mobile 2019, pp. 249–261.
Computing (IWCMC). IEEE, 2020, pp. 601–606. [26] W. Yang and S. Wang, “A privacy-preserving ecg-based authentication
system for securing wireless body sensor networks,” IEEE Internet
[6] N. Karimian, Z. Guo, M. M. Tehranipoor, and D. Forte, “Human
Things J., vol. 9, no. 8, pp. 6148–6158, 2022.
recognition from photoplethysmography (PPG) based on non-fiducial
features,” in IEEE International Conference on Acoustics, Speech and
Signal Processing, New Orleans, LA, USA, March 5-9, 2017. IEEE,
2017, pp. 4636–4640.
[7] S. Jana and S. K. Kasera, “On fast and accurate detection of unauthorized
wireless access points using clock skews,” IEEE Trans. Mob. Comput.,
vol. 9, no. 3, pp. 449–462, 2010.

249

Authorized licensed use limited to: Indian Institute of Information Technology Design & Manufacturing. Downloaded on August 16,2023 at 18:29:51 UTC from IEEE Xplore. Restrictions apply.

You might also like