from a usability and performance perspective. ACM
Comput. Surv., 53(6).
Gofman, M., Sandico, N., Mitra, S., Suo, E., Muhi, S., and
Vu, T. (2018). Multimodal biometrics via discrimi-
nant correlation analysis on mobile devices. In Pro-
ceedings of the International Conference on Security
and Management (SAM), pages 174–181.
Han, J., Pan, S., Sinha, M. K., Noh, H. Y., Zhang, P., and
Tague, P. (2018). Smart home occupant identifica-
tion via sensor fusion across on-object devices. ACM
Transactions on Sensor Networks, 14(3-4):1–22.
Irvine, N., Nugent, C., Zhang, S., Wang, H., and NG, W.
W. Y. (2020). Neural network ensembles for sensor-
based human activity recognition within smart envi-
ronments. Sensors, 20(1).
Khan, H., Hengartner, U., and Vogel, D. (2018). Aug-
mented reality-based mimicry attacks on behaviour-
based smartphone authentication. In Proceedings of
the 16th Annual International Conference on Mobile
Systems, Applications, and Services, pages 41–53.
Kim, D.-S. and Hong, K.-S. (2008). Multimodal biometric
authentication using teeth image and voice in mobile
environment. IEEE Transactions on Consumer Elec-
tronics, 54(4):1790–1797.
Lee, W.-H., Liu, X., Shen, Y., Jin, H., and Lee, R. B. (2017).
Secure pick up: Implicit authentication when you start
using the smartphone. In Proceedings of the 22nd
ACM on Symposium on Access Control Models and
Technologies, pages 67–78.
Ma
ˇ
cek, N., Franc, I., Bogdanoski, M., and Mirkovi
´
c, A.
(2016). Multimodal biometric authentication in iot:
Single camera case study.
Meng, Y., Zhang, W., Zhu, H., and Shen, X. S. (2018).
Securing consumer iot in the smart home: Architec-
ture, challenges, and countermeasures. IEEE Wireless
Communications, 25(6):53–59.
Musale, P., Baek, D., and Choi, B. J. (2018). Lightweight
gait based authentication technique for iot using sub-
conscious level activities. In 2018 IEEE 4th World
Forum on Internet of Things (WF-IoT).
Musale, P., Baek, D., Werellagama, N., Woo, S. S., and
Choi, B. J. (2019). You walk, we authenticate:
Lightweight seamless authentication based on gait in
wearable iot systems. IEEE Access, 7:37883–37895.
Olazabal, O., Gofman, M., Bai, Y., Choi, Y., Sandico, N.,
Mitra, S., and Pham, K. (2019). Multimodal biomet-
rics for enhanced iot security. In 2019 IEEE 9th An-
nual Computing and Communication Workshop and
Conference (CCWC), pages 0886–0893. IEEE.
Rosati, S., Balestra, G., and Knaflitz, M. (2018). Com-
parison of different sets of features for human ac-
tivity recognition by wearable sensors. Sensors,
18(12):4189.
Saleema, A. and Thampi, S. M. (2018). Voice biometrics:
The promising future of authentication in the inter-
net of things. In Handbook of Research on Cloud
and Fog Computing Infrastructures for Data Science,
pages 360–389. IGI Global.
Shrestha, B., Mohamed, M., Tamrakar, S., and Saxena, N.
(2016). Theft-resilient mobile wallets: Transparently
authenticating nfc users with tapping gesture biomet-
rics. In Proceedings of the 32nd Annual Conference
on Computer Security Applications, ACSAC ’16, page
265–276, New York, NY, USA. Association for Com-
puting Machinery.
Sturgess, J., Eberz, S., Sluganovic, I., and Martinovic, I.
(2022). Watchauth: User authentication and intent
recognition in mobile payments using a smartwatch.
In 2022 IEEE 7th European Symposium on Security
and Privacy (EuroS&P), pages 377–391.
Sun, F., Mao, C., Fan, X., and Li, Y. (2018). Accelerometer-
based speed-adaptive gait authentication method for
wearable iot devices. IEEE Internet of Things Journal,
6(1):820–830.
Tafreshi, A. E. S., Tafreshi, S. C. S., and Tafreshi, A. S.
(2017). Tiltpass: using device tilts as an authentication
method. In Proceedings of the 2017 ACM Interna-
tional Conference on Interactive Surfaces and Spaces.
Teh, P. S., Zhang, N., Teoh, A. B. J., and Chen, K. (2016).
A survey on touch dynamics authentication in mobile
devices. Computers & Security, 59:210–235.
Verma, A., Moghaddam, V., and Anwar, A. (2022).
Data-driven behavioural biometrics for continuous
and adaptive user verification using smartphone and
smartwatch. Sustainability, 14(12).
Wolpert, D. H. (1992). Stacked generalization. Neural net-
works, 5(2):241–259.
Yampolskiy, R. V. (2008). Mimicry attack on strategy-based
behavioral biometric. In Fifth International Confer-
ence on Information Technology: New Generations
(itng 2008), pages 916–921. IEEE.
Yang, W., Wang, S., Sahri, N. M., Karie, N. M., Ahmed, M.,
and Valli, C. (2021). Biometrics for internet-of-things
security: A review. Sensors, 21(18).
Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., and Xu, W.
(2017). Dolphinattack: Inaudible voice commands. In
Proceedings of the 2017 ACM SIGSAC Conference on
Computer and Communications Security.
Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., and Qian,
F. (2018). Understanding and mitigating the security
risks of voice-controlled third-party skills on amazon
alexa and google home. arXiv:1805.01525.
A CLASSIFIER HYPER
PARAMETERS
Table 4: Search space for classifier hyperparameters. As
each base classifier choses their own parameters, the opti-
mal values given here are the most commonly chosen ones.
(a) Random Forest (RF).
Parameter Search space Optimal value
Number of estimators 10, 50, 100, 200 100
Tree depth 2, 4, 5, 6, 7, 8 7
Number of features
√
N
F
, logN
F
√
N
F
(b) Support-vector Machine (SVM).
Parameter Search space Optimal value
C 0.1, 1, 10, 100 0.1
γ 1., 0.1, 0.01, 0.001 0.01
Kernel function linear, polynomial, rbf, sigmoid rbf
SECRYPT 2023 - 20th International Conference on Security and Cryptography
146