1,899 research outputs found

    A Wearable System that Knows Who Wears It

    Get PDF
    Body-area networks of pervasive wearable devices are increasingly used for health monitoring, personal assistance, entertainment, and home automation. In an ideal world, a user would simply wear their desired set of devices with no configuration necessary: the devices would discover each other, recognize that they are on the same person, construct a secure communications channel, and recognize the user to which they are attached. In this paper we address a portion of this vision by offering a wearable system that unobtrusively recognizes the person wearing it. Because it can recognize the user, our system can properly label sensor data or personalize interactions. \par Our recognition method uses bioimpedance, a measurement of how tissue responds when exposed to an electrical current. By collecting bioimpedance samples using a small wearable device we designed, our system can determine that (a)the wearer is indeed the expected person and (b) the device is physically on the wearer\u27s body. Our recognition method works with 98% balanced-accuracy under a cross-validation of a day\u27s worth of bioimpedance samples from a cohort of 8 volunteer subjects. We also demonstrate that our system continues to recognize a subset of these subjects even several months later. Finally, we measure the energy requirements of our system as implemented on a Nexus S smart phone and custom-designed module for the Shimmer sensing platform

    Who Wears Me? Bioimpedance as a Passive Biometric

    Get PDF
    Mobile and wearable systems for monitoring health are becoming common. If such an mHealth system knows the identity of its wearer, the system can properly label and store data collected by the system. Existing recognition schemes for such mobile applications and pervasive devices are not particularly usable – they require ıt active engagement with the person (e.g., the input of passwords), or they are too easy to fool (e.g., they depend on the presence of a device that is easily stolen or lost). \par We present a wearable sensor to passively recognize people. Our sensor uses the unique electrical properties of a person\u27s body to recognize their identity. More specifically, the sensor uses ıt bioimpedance – a measure of how the body\u27s tissues oppose a tiny applied alternating current – and learns how a person\u27s body uniquely responds to alternating current of different frequencies. In this paper we demonstrate the feasibility of our system by showing its effectiveness at accurately recognizing people in a household 90% of the time

    Measuring Baseball’s Heartbeat: The Hidden Harms of Wearable Technology to Professional Ballplayers

    Get PDF
    Föreliggande examensarbete undersöker möjligheterna att effektivisera order- och lagerhanteringen av surfplattor hos företaget Företag A. Arbetet Ă€r avgrĂ€nsat till företagets varuhus i Barkarby och till de tvĂ„ största mĂ€rkena pĂ„ marknaden just nu; Apple och Samsung. Detta Ă€r ett Ă€mne som Ă€r relativt nytt eftersom det Ă€r en relativt ny marknad runt hela vĂ€rlden som har exploderat sedan Apples första lansering av surfplattan. Eftersom Företag A sĂ€ljer samtliga mĂ€rkens surfplattor vilka har helt olika efterfrĂ„gan, sĂ„ kan deras order- och lagerhantering bli svĂ„rhanterlig. De uppstĂ€llda frĂ„gestĂ€llningarna som ligger till grund för arbetet Ă€r: Vilken/vilka teoretiska modeller om orderhantering kan bĂ€st tillĂ€mpas pĂ„ fallet Företag A Barkarby? Vilka Ă„tgĂ€rder skulle kunna genomföras för att effektivisera det nuvarande arbetssĂ€ttet? UtifrĂ„n dessa frĂ„gor har en del modeller undersöks huruvida de passar in i bĂ„de teori och praktik pĂ„ Företag As sĂ€tt att hantera de mest sĂ„lda surfplattorna pĂ„ sitt lager. Genom att studera deras arbetssĂ€tt nĂ€r det gĂ€ller ordrar och förvaring pĂ„ lagret kan sedan passande modeller appliceras. Fallstudien har till stor del genomförts genom att utifrĂ„n studielitteratur diskutera Ă€mnet med personal frĂ„n Företag A; bĂ„de frĂ„n huvudkontoret och frĂ„n Barkarbyvaruhuset.Resultatet frĂ„n uppsatsen Ă€r att det inte finns nĂ„gon befintlig modell som passar in till 100% pĂ„ Företag As arbetssĂ€tt, dĂ€remot finns det andra faktorer som kan Ă€ndras pĂ„ för att fĂ„ en mer kontinuerlig och överseende orderhantering. Marknaden för surfplattor Ă€r otroligt oförutsĂ€gbar och fluktuerar ofta utan nĂ„got utstuderat mönster. Det enda som har visat sig vara sĂ€kert Ă€r Ă„tgĂ„ngen av de tvĂ„ mest populĂ€ra mĂ€rkena nĂ€r de slĂ€pper en ny modell.Marknaden för elektronikkedjor Ă€r otroligt konkurrensstyrd, inte bara i Sverige utan i hela Europa, vilket gör det Ă€n viktigare att ha rĂ€tt kvantitet pĂ„ lager. Finns inte det kunderna vill ha sĂ„ gĂ„r de nĂ„gon annanstans, eftersom priserna pĂ„ surfplattor Ă€r densamma överallt.This paper examines the possibilities to make the handling of orders and storage for tablets more efficient for Företag As warehouse in Barkarby. The work is limited to the company’s warehouse in Barkarby and to the two largest manufacturers for tablets; Apple and Samsung. This is a relatively new subject because it is a relatively new market around the world, which has exploded since Apple released their first tablet. Because Företag A sells every manufacturer’s tablet, all with different demands, it makes the organisation of orders and storage quite difficult.The formulated questions which this paper is based on are: Which of the theoretical models about orderhandeling can best be applied on the case of Företag A Barkarby? What measures can be used to make the current way of working more efficient? With these questions as a starting point some models have been studied whether they fit in theory and practice in the way Företag A works when it comes to handling the most sold tablets in their storage. Through studying their way of working suiting models can be applied. The case study has mainly been implemented by after reading student literature discussing the problems with people who works at Företag A; both at the head quarters and in the warehouse in Barkarby.The result from this essay is that there isn’t any model which fits 100 % on Företag A’s way of work, but there are other factors that can be changed to get a more continuous and overseeing order process. The market for tablets is very unpredictable and fluctuates often without a worked out pattern. The only sure thing is the demand with the two most popular manufacturers when they release a new model.The market for electronic chains is extremely competition controlled, not only in Sweden but in all of Europe, which makes it even more important to have the right quantity in storage. If the product that the customers want isn’t available they simply go somewhere else, since the prices are the same everywhere

    Continuous Authentication for Voice Assistants

    Full text link
    Voice has become an increasingly popular User Interaction (UI) channel, mainly contributing to the ongoing trend of wearables, smart vehicles, and home automation systems. Voice assistants such as Siri, Google Now and Cortana, have become our everyday fixtures, especially in scenarios where touch interfaces are inconvenient or even dangerous to use, such as driving or exercising. Nevertheless, the open nature of the voice channel makes voice assistants difficult to secure and exposed to various attacks as demonstrated by security researchers. In this paper, we present VAuth, the first system that provides continuous and usable authentication for voice assistants. We design VAuth to fit in various widely-adopted wearable devices, such as eyeglasses, earphones/buds and necklaces, where it collects the body-surface vibrations of the user and matches it with the speech signal received by the voice assistant's microphone. VAuth guarantees that the voice assistant executes only the commands that originate from the voice of the owner. We have evaluated VAuth with 18 users and 30 voice commands and find it to achieve an almost perfect matching accuracy with less than 0.1% false positive rate, regardless of VAuth's position on the body and the user's language, accent or mobility. VAuth successfully thwarts different practical attacks, such as replayed attacks, mangled voice attacks, or impersonation attacks. It also has low energy and latency overheads and is compatible with most existing voice assistants
    • 

    corecore