TY - JOUR
T1 - One Cycle Attack
T2 - Fool Sensor-Based Personal Gait Authentication with Clustering
AU - Zhu, Tiantian
AU - Fu, Lei
AU - Liu, Qiang
AU - Lin, Zi
AU - Chen, Yan
AU - Chen, Tieming
N1 - Funding Information:
Manuscript received February 21, 2020; revised June 18, 2020 and July 16, 2020; accepted August 11, 2020. Date of publication August 14, 2020; date of current version September 3, 2020. This work was supported in part by the National Natural Science Foundation of China under Grant U1936215 and Grant 61772026, in part by the Ministry of Industry and Information Technology of China under Grant TC190H3WN, and in part by the State Grid Corporation of China under Grant 5211XT19006B. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Andrew Beng Jin Teoh. (Corresponding authors: Lei Fu; Yan Chen.) Tiantian Zhu and Tieming Chen are with the College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, China (e-mail: ttzhu@zjut.edu.cn; tmchen@zjut.edu.cn).
Publisher Copyright:
© 2005-2012 IEEE.
PY - 2021
Y1 - 2021
N2 - Gait authentication, especially sensor-based patterns, has been studied by researchers for decades. Nowadays, gait authentication has become an important facet of biometric systems due to the so-called unique characteristics of each user. With the development of various technologies (i.e., hardware, data processing, features extraction, and learning algorithms), the performance of sensor-based authentication methods is gradually improving. But we have found that the vulnerability of most existing methods can be compromised easily. In this paper, we propose a novel attack model, called one cycle attack, to bypass existing gait authentication methods. Firstly, the gait sequence is divided into multiple gait cycles. By adopting the K-mean algorithm, we get the average distance of each feature sample (extracted from the gait cycle) to its closest cluster center, and its result confirms that independent individuals may have similar gait cycles. Secondly, using six state-of-the-art models it was found that the adversarial gait cycle found with the clustering method can bypass the victim's model rapidly. Furthermore, to improve the accuracy of sensor-based gait authentication methods to fight against attacks, we present a WPD-LSTM (Wavelet Packet Decomposition and Long Short-Term Memory) multi-cycle defense model which considers the contextual contents of the neighboring gait cycles in the gait sequence. Experimental results on two datasets (the largest public sensor-based gait database OU-ISIR and new dataset from our laboratory) show that our attack model can bypass most of the victims' models within a limited number of attempts. Specifically, we can compromise 20%-80% of users within 5 attempts by utilizing imitation. On the contrary, the success rate of attackers has been greatly mitigated by deploying our multi-cycle defense model.
AB - Gait authentication, especially sensor-based patterns, has been studied by researchers for decades. Nowadays, gait authentication has become an important facet of biometric systems due to the so-called unique characteristics of each user. With the development of various technologies (i.e., hardware, data processing, features extraction, and learning algorithms), the performance of sensor-based authentication methods is gradually improving. But we have found that the vulnerability of most existing methods can be compromised easily. In this paper, we propose a novel attack model, called one cycle attack, to bypass existing gait authentication methods. Firstly, the gait sequence is divided into multiple gait cycles. By adopting the K-mean algorithm, we get the average distance of each feature sample (extracted from the gait cycle) to its closest cluster center, and its result confirms that independent individuals may have similar gait cycles. Secondly, using six state-of-the-art models it was found that the adversarial gait cycle found with the clustering method can bypass the victim's model rapidly. Furthermore, to improve the accuracy of sensor-based gait authentication methods to fight against attacks, we present a WPD-LSTM (Wavelet Packet Decomposition and Long Short-Term Memory) multi-cycle defense model which considers the contextual contents of the neighboring gait cycles in the gait sequence. Experimental results on two datasets (the largest public sensor-based gait database OU-ISIR and new dataset from our laboratory) show that our attack model can bypass most of the victims' models within a limited number of attempts. Specifically, we can compromise 20%-80% of users within 5 attempts by utilizing imitation. On the contrary, the success rate of attackers has been greatly mitigated by deploying our multi-cycle defense model.
KW - Gait authentication
KW - adversarial gait cycle
KW - attack and defense
KW - deep learning
KW - motion sensor
UR - http://www.scopus.com/inward/record.url?scp=85091116943&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85091116943&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2020.3016819
DO - 10.1109/TIFS.2020.3016819
M3 - Article
AN - SCOPUS:85091116943
SN - 1556-6013
VL - 16
SP - 553
EP - 568
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
M1 - 9167280
ER -