Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/98330
標題: 基於物聯網之ECG身分辨識系統
Application of ECG Authentication in IoT-Based Systems
作者: 陳泱億
Yang-Yi Chen
關鍵字: ECG;心電圖;物聯網;身分認證;ECG;Electrocardiogram (EKG/ECG);Internet of Things (IoT);Identity Authentication
引用: [1] A. Zanella, N. Bui, A. Castellani, L. Vangelista and M. Zorzi,'Internet of Things for Smart Cities," IEEE Internet of Things Journal, vol. 1, no. 1, Feb. 2014, pp. 22-32. [2] S. Chatterjee et al.,'Internet of Things and Body area network-an integrated future,' 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York, NY, 2017, pp. 396-400. [3] P. Neumann, J. Montavont and T. Noël,'Indoor deployment of low-power wide area networks (LPWAN): A LoRaWAN case study,' 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), New York, 2016, pp. 1-8. [4] F. Ye, Y. Sun and A. Rettig,'Authentication and Access Control for an IoT Green Roof Monitoring System, "2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, USA, 2017, pp. 251-256. [5] B. Chanv, S. Bakhru and V. Mehta,'Structural health monitoring system using IoT and wireless technologies," 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT), Jaipur, India, 2017, pp. 151-157. [6] W. Zhou, Y. Jia, A. Peng, Y. Zhang and P. Liu,'The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved, " IEEE Internet of Things Journal. 2018, pp. 1-11. [7] I. Brass, L. Tanczer, M. Carr, M. Elsden and J. Blackstock,'Standardising a moving target: The development and evolution of IoT security standards,"Living in the Internet of Things: Cybersecurity of the IoT - 2018, London, 2018, pp. 1-9. [8] L. Zhou, L. Wang, Y. Sun and P. Lv,'BeeKeeper: A Blockchain-based IoT System with Secure Storage and Homomorphic Computation,"in IEEE Access. [9] I. Poyner and R. S. Sherratt,'Privacy and security of consumer IoT devices for the pervasive monitoring of vulnerable people,"Living in the Internet of Things: Cybersecurity of the IoT - 2018, London, 2018, pp. 1-5. [10] K. Reeves and C. Maple,'IoT interoperability: Security considerations and challenges in implementation,"Living in the Internet of Things: Cybersecurity of the IoT - 2018, London, 2018, pp. 1-7. [11] J. M. Blythe and S. D. Johnson,'The consumer security index for IoT: A protocol for developing an index to improve consumer decision making and to incentivize greater security provision in IoT devices,"Living in the Internet of Things: Cybersecurity of the IoT - 2018, London, 2018, pp. 1-7. [12] C. Ye, M. T. Coimbra and B. V. K. Vijaya Kumar,'Arrhythmia detection and classification using morphological and dynamic features of ECG signals,"2010 Annual International Conference of the IEEE Engineering in Medicine and Biology, Buenos Aires, 2010, pp. 1918-1921. [13] C. K. Chen, C. L. Lin and Y. M. Chiu,'Data Encryption Using ECG Signals with Chaotic Henon Map,"2010 International Conference on Information Science and Applications, Seoul, 2010, pp. 1-5. [14] Y. H. Hsu, C. L. Lin, C. K. Chen, C. T. Chiang and W. T. Yang,'Health care platform based on acquisition of ECG for HRV analysis,"IEEE 10th International Conference on Industrial Informatics, Beijing, 2012, pp. 464-469. [15] M. H. Wang and Z. Y. Lee,'Application of extension method and chaos theory in ECG identity recognition system,"2016 IEEE 14th International Conference on Industrial Informatics (INDIN), Poitiers, 2016, pp. 1247-1251 [16] M. H. Wang and Z. Y. Lee,'Application of extension method and chaos theory in ECG identity recognition system,"2016 IEEE 14th International Conference on Industrial Informatics (INDIN), Poitiers, 2016, pp. 1247-1251. [17] S. Pathoumvanh, S. Airphaiboon, B. Prapochanung and T. Leauhatong,'ECG analysis for person identification,"The 6th 2013 Biomedical Engineering International Conference, Amphur Muang, 2013, pp. 1-4. [18] F. Zeng, K. K. Tseng, H. N. Huang, S. Y. Tu and J. S. Pan,'A New Statistical-based Algorithm for ECG Identification, "2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus, 2012, pp. 301-304. [19] M. Hejazi, S. A. R. Al-Haddad, S. J. Hashim, A. F. A. Aziz and Y. P. Singh, 'Feature level fusion for biometric verification with two-lead ECG signals,"2016 IEEE 12th International Colloquium on Signal Processing & Its Applications (CSPA), Malacca City, 2016, pp. 54-59. [20] M. Hejazi, S. A. R. Al-Haddad, S. J. Hashim, A. F. A. Aziz and Y. P. Singh, 'Non-fiducial based ECG biometric authentication using one-class Support Vector Machine,"2017 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), Poznan, 2017, pp. 190-194. [21] Q. Zhang, D. Zhou and X. Zeng,'PulsePrint: Single-arm-ECG biometric human identification using deep learning,"2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), New York, NY, 2017, pp. 452-456. [22] I. Chamatidis, A. Katsika and G. Spathoulas,'Using deep learning neural networks for ECG based authentication,"2017 International Carnahan Conference on Security Technology (ICCST), Madrid, 2017, pp. 1-6. [23] P. R. Muduli, R. R. Gunukula and A. Mukherjee,'A deep learning approach to fetal-ECG signal reconstruction,"2016 Twenty Second National Conference on Communication (NCC), Guwahati, 2016, pp. 1-6. [24] J. F. Wu, Y. L. Bao, S. C. Chan, H. C. Wu, L. Zhang and X. G. Wei,'Myocardial infarction detection and classification — A new multi-scale deep feature learning approach,"2016 IEEE International Conference on Digital Signal Processing (DSP), Beijing, 2016, pp. 309-313. [25] Y. Yan, X. Qin, Y. Wu, N. Zhang, J. Fan and L. Wang,'A restricted Boltzmann machine based two-lead electrocardiography classification,"2015 IEEE 12th International Conference on Wearable and Implantable Body Sensor Networks (BSN), Cambridge, MA, 2015, pp. 1-9.
摘要: 
隨著物聯網的發展,許多行業也逐漸展露新的趨勢,如:無人工廠、無人商店、智慧醫療、智慧農業等等各行各業。而當人們獲得便利之時卻也須同時面臨到一個問題,而這個問題就是所謂的安全,它包含個人隱私、公司機密、商業交易、人身安全等等各方面,因此本研究在實驗室團隊所開發之物聯網系統上架構ECG身分認證系統,以提升整個系統的安全性。
ECG身分認證系統採用動態ECG信號為辨識依據,它具有證明使用者為活體及動態辨識等優點,而因為它是動態辨識使得不易被複製及盜取,因此它具有高安全性。而本研究是以一導程ECG量測儀器來量測ECG信號,雖然準確性較差於其他多導程量測儀器,但在量測便利上卻有絕對優勢。而本研究以多篇論文之ECG身分認證有所不同,講究的是即時量測即時辨識,甚至在理論上已有如同指紋一樣,量測中即可開始辨識他人身分。

With the development of the Internet of Things (IoT), many industries have gradually emerged new trends, including various trades and industries such as unmanned factories, unmanned stores, smart healthcare, and smart agriculture. When people gain the benefit of convenience, they must also face a problem at the same time. This problem is the so-called 'security', which includes various aspects such as personal privacy, corporate secrets, business transactions, and personal safety. Therefore, this study aims to build an ECG identity authentication system on the Internet of Things (IoT) system developed by the lab team to improve the overall system security.
The ECG identity authentication system uses dynamic ECG signals as the basis for identification. It has the advantage of proving that a user is a living body and capable of dynamic identification. The system is highly secure because it uses dynamic identification, making it difficult for others to copy and steal. This study uses a single-lead ECG measuring instrument to measure ECG signals. Although the accuracy is not as good as that of other multi-lead measuring instruments, it has an absolute advantage in measuring convenience. Different from the ECG identity authentications of many other published papers, this study focuses on instant measurement and instant recognition. In theory, this system has even reached the same level of fingerprint recognition by gradually recognizing the identity of a person during the measurement process.
URI: http://hdl.handle.net/11455/98330
Rights: 不同意授權瀏覽/列印電子全文服務
Appears in Collections:電機工程學系所

Files in This Item:
File SizeFormat Existing users please Login
nchu-107-8100064201-1.pdf3.65 MBAdobe PDFThis file is only available in the university internal network    Request a copy
Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.