{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:25:13Z","timestamp":1776277513031,"version":"3.50.1"},"reference-count":174,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-1821775"],"award-info":[{"award-number":["DGE-1821775"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3254499","type":"journal-article","created":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T18:30:19Z","timestamp":1678300219000},"page":"26070-26085","source":"Crossref","is-referenced-by-count":13,"title":["A Survey of Wearable Devices Pairing Based on Biometric Signals"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1526-0249","authenticated-orcid":false,"given":"Jafar","family":"Pourbemany","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Cleveland State University, Cleveland, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6459-204X","authenticated-orcid":false,"given":"Ye","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Cleveland State University, Cleveland, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5877-6667","authenticated-orcid":false,"given":"Riccardo","family":"Bettati","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Texas A&#x0026;M University, College Station, TX, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/nano9060813"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911170"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2597768"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2731979"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1515\/itit-2016-0010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986329"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23983-1_10"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2032660"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICISC.2017.8068704"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1507465"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s19153284"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2645766"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96139-2_8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2651073"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s18072144"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1308-x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2871064"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MeMeA.2019.8802164"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554425"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT.2019.8869227"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSI.2018.8538210"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JTEHM.2018.2822681"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2019.8795317"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846359"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/jsan6040028"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2817841"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2873594"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2011.2160540"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.medengphy.2022.103876"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICRoM48714.2019.9071849"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2019.2919702"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2016.2571265"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2017.96"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2017.7936000"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053351"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2015.2430357"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2016.7844313"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2010.11"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620578"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.436"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3123024.3124443"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3123021.3123052"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/s22218273"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188692"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053102"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2009.27"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.BODYNETS2009.6035"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737633"},{"key":"ref49","article-title":"Smartwatches locking methods: A comparative study","volume-title":"Proc. SOUPS","author":"Nguyen"},{"key":"ref50","article-title":"Authenticating users through their arm movement patterns","author":"Kumar","year":"2016","journal-title":"arXiv:1603.02211"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2798591"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2012.6199844"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2019.2911602"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC.2017.8203488"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922708"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2016.083"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbiomech.2008.08.009"},{"issue":"12","key":"ref58","first-page":"1433","article-title":"A survey paper on drowsiness detection & alarm system for drivers","volume":"3","author":"Choudhary","year":"2016","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2018.2872162"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.04.132"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2018.8589848"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ATEE.2017.7905059"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TOH.2016.2619708"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TOH.2017.2691328"},{"key":"ref65","article-title":"Survey and systematization of secure device pairing","author":"Fomichev","year":"2017","journal-title":"arXiv:1709.02690"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.01.016"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2017.7974305"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2459691"},{"key":"ref69","first-page":"1","article-title":"A survey of distributed biometric authentication systems","volume-title":"BIOSIG: Biometrics and Electronic Signatures","author":"Sarier"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00007"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.121313.00064"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36169-2_6"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1642"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIECS.2015.7193088"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2016.7987943"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICPRIME.2013.6496441"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.08.003"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3020076"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2016.11.001"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3721234"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I44769.2018.9007303"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2873825"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090433"},{"key":"ref84","first-page":"342","article-title":"Comprehensive security for body area networks: A survey","volume":"21","author":"Morales","year":"2019","journal-title":"Int. J. Netw. Secur."},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.11.006"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00865-9_3"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1582869"},{"issue":"2","key":"ref88","first-page":"515","article-title":"Wireless body sensor network (WBSN) security and privacy issues: A survey","volume":"2","author":"Chaudhary","year":"2019","journal-title":"Int. J. Comput. Intell."},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101655"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22277-2_7"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101883"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0510-4"},{"issue":"2","key":"ref93","first-page":"87","article-title":"Biometric authentication methods on smartphones: A survey","volume":"14","author":"Spolaor","year":"2016","journal-title":"PsychNology J."},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.13176\/11.764"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.43"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2015.7181946"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2015.7389688"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2505626"},{"key":"ref99","first-page":"73","article-title":"Pervasive computing","volume-title":"Proc. Int. Conf. Pervasive Comput.","volume":"4480","author":"LaMarca"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_18"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2018.8444579"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904177"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2428955.2428989"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.316"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964151"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2900727"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221263"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3410992.3410995"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996246"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24646-6_3"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2017.7936042"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.03.006"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3023954"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.74195"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2897933"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05287-8"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.5120\/13494-1217"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2011.2165597"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON49338.2021.9696378"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3302506.3310406"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3264950"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2012.6347274"},{"key":"ref125","volume-title":"Biomedical Image Analysis and Mining Techniques for Improved Health Outcomes","author":"Karaa","year":"2015"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_17"},{"key":"ref127","first-page":"2274S","article-title":"Biometrics solutions in e-health security: A comprehensive literature review","volume":"19","author":"Okoh","year":"2015","journal-title":"Spine"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.7453\/gahmj.2014.073"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"ref130","first-page":"1099","article-title":"Authentication for implanted medical devices categories and subject descriptors","volume-title":"Proc. CCS","author":"Rostami"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.1982.tb02569.x"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528545"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1002\/9781119082934"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-3531-0"},{"key":"ref135","volume-title":"Myo Armband","author":"Labs","year":"2023"},{"key":"ref136","volume-title":"Athos Gear","year":"2023"},{"key":"ref137","volume-title":"Leo Smartband","year":"2023"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994556"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1117\/3.923354.ch5"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.042"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.3390\/s150818901"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.3390\/s19112466"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2008.05.099"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/481580"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/11825890_4"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1996.543290"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/10.554760"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2005.856863"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1088\/0967-3334\/35\/7\/1245"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.3390\/s17092043"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/1107548.1107591"},{"key":"ref153","volume-title":"Introduction to Data Compression","author":"Sayood","year":"2017"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2012.08.021"},{"key":"ref155","volume-title":"Error Correction Code, Wikipedia, the Free Encyclopedia"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(60)90287-4"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"issue":"5","key":"ref159","first-page":"657","article-title":"Notes on digital coding","volume":"37","author":"Golay","year":"1949","journal-title":"Proc. IEEE"},{"key":"ref160","volume-title":"Bch Code, Wikipedia, the Free Encyclopedia","year":"2023"},{"issue":"8","key":"ref161","first-page":"1","article-title":"Error detection and correction using Reed Solomon codes","volume":"3","author":"Shrivastava","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.11.018"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366823"},{"key":"ref166","first-page":"1","article-title":"Concatenated compressed sensing-based error correcting codes","volume-title":"Proc. 9th Int. ITG Conf. Syst., Commun. Coding (SCC)","author":"Zoerlein"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09863-0"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288535"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.21236\/ADA462295"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1201\/9780849379253-20"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/10005208\/10063953-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10063953.pdf?arnumber=10063953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T02:07:01Z","timestamp":1733882821000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10063953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":174,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3254499","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}