Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks.
Jagmohan ChauhanSuranga SeneviratneYining HuArchan MisraAruna SeneviratneYoungki LeePublished in: Computer (2018)
Keyphrases
- resource constrained
- recurrent neural networks
- security mechanisms
- key management
- embedded systems
- sensor networks
- resource constraints
- wireless sensor networks
- neural network
- feed forward
- recurrent networks
- echo state networks
- neural model
- reservoir computing
- resource limitations
- multipath
- rfid tags
- mobile devices
- artificial neural networks
- nonlinear dynamic systems
- data sets
- low cost
- sensor nodes
- back propagation
- cloud computing
- cascade correlation
- real time
- end to end
- spatial information
- context aware