{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:49Z","timestamp":1750309489134,"version":"3.41.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T00:00:00Z","timestamp":1732233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62202150, 62302162"],"award-info":[{"award-number":["62202150, 62302162"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Excellent Youth Fund","award":["U20A20174, U22A2030, 62372166"],"award-info":[{"award-number":["U20A20174, U22A2030, 62372166"]}]},{"name":"National Key Research and Development Projects","award":["2022YFB3103500"],"award-info":[{"award-number":["2022YFB3103500"]}]},{"name":"China Postdoctoral Science Foundation General Funding","award":["2023M741123"],"award-info":[{"award-number":["2023M741123"]}]},{"name":"Hunan Provincial Key Research and Development Program","award":["2024AQ2041"],"award-info":[{"award-number":["2024AQ2041"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:p>\n            The popularity of IoT devices has penetrated our daily life while posing new challenges in user authentication. Today\u2019s solutions, e.g., passwords, fingerprints, and FaceIDs, primarily rely on specialized sensors or user interfaces to collect user\u2019s identification information, which may not universally exist on heterogeneous IoT devices. In this paper, we propose a novel user authentication method that exploits the Electromagnetic (EM) emanations radiated from IoT devices. Our design is motivated by the observation that human touches on the IoT device can lead to time-varying coupling between these two. Consequently, it impacts the device\u2019s EM emanations that can be picked up by its inertial ADC (analog-to-digital converter) interfaces. We ask the user to tap on the device rhythmically following a self-determined melody, such that the human-coupled EM emanations vary accordingly. We thus extract the rhythm pattern as the user\u2019s secure password named\n            <jats:italic>EM-Rhythm<\/jats:italic>\n            . To examine its effectiveness, EM-Rhythm is implemented on a wide range of IoT devices. We show that our scheme achieves authentication accuracy as high as 98.67% with less than three login attempts. Besides, it is robust against various types of attacks and maintains stable performances under various settings. EM-Rhythm also exhibits satisfactory usability in terms of memorability and time consumption.\n          <\/jats:p>","DOI":"10.1145\/3700441","type":"journal-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T11:14:31Z","timestamp":1729077271000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["EM-Rhythm: An Authentication Method for Heterogeneous IoT Devices"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0038-019X","authenticated-orcid":false,"given":"Zejun","family":"Xu","sequence":"first","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7610-3677","authenticated-orcid":false,"given":"Wenqiang","family":"Jin","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3531-8922","authenticated-orcid":false,"given":"Changwei","family":"Yao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1532-6627","authenticated-orcid":false,"given":"Xinyi","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9870-5492","authenticated-orcid":false,"given":"Shuang","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4538-8462","authenticated-orcid":false,"given":"Yu","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-3887","authenticated-orcid":false,"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3015-2518","authenticated-orcid":false,"given":"Iman","family":"Vakilinia","sequence":"additional","affiliation":[{"name":"University of North Florida, Jacksonville, United States"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8268-2951","authenticated-orcid":false,"given":"Daibo","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,11,22]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Apple. 2020. How to Unlock your Mac with your Apple Watch. https:\/\/support.apple.com\/en-us\/HT206995"},{"key":"e_1_3_1_3_2","unstructured":"Arduino. 2022. Nano. https:\/\/docs.arduino.cc\/hardware\/nano"},{"key":"e_1_3_1_4_2","volume-title":"ACM International Conference on Mobile Systems, Applications, and Services (ACM MobiSys\u201917)","author":"Chauhan Jagmohan","year":"2017","unstructured":"Jagmohan Chauhan, Yining Hu, Suranga Seneviratne, Archan Misra, Aruna Seneviratne, and Youngki Lee. 2017. BreathPrint: Breathing acoustics-based user authentication. In ACM International Conference on Mobile Systems, Applications, and Services (ACM MobiSys\u201917)."},{"key":"e_1_3_1_5_2","volume-title":"IEEE Conference on Computer Communications (IEEE INFOCOM\u201915)","author":"Chen Yimin","year":"2015","unstructured":"Yimin Chen, Jingchao Sun, Rui Zhang, and Yanchao Zhang. 2015. Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices. In IEEE Conference on Computer Communications (IEEE INFOCOM\u201915)."},{"key":"e_1_3_1_6_2","volume-title":"International Conference on Mobile Computing and Networking (ACM MobiCom\u201902)","author":"Corner Mark D.","year":"2002","unstructured":"Mark D. Corner and Brian D. Noble. 2002. Zero-interaction authentication. In International Conference on Mobile Computing and Networking (ACM MobiCom\u201902)."},{"issue":"9","key":"e_1_3_1_7_2","doi-asserted-by":"crossref","first-page":"1338","DOI":"10.1109\/TC.2020.3008851","article-title":"Harnessing CPU electromagnetic emanations for resonance-induced voltage-noise characterization","volume":"70","author":"Hadjilambrou Zacharias","year":"2020","unstructured":"Zacharias Hadjilambrou, Shidhartha Das, Marco A. Antoniades, and Yiannakis Sazeides. 2020. Harnessing CPU electromagnetic emanations for resonance-induced voltage-noise characterization. IEEE Trans. Comput. 70, 9 (2020), 1338\u20131349.","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_1_8_2","volume-title":"ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201923)","author":"Hu Jingyang","year":"2023","unstructured":"Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, and Jun Luo. 2023. Password-stealing without hacking: Wi-Fi enabled practical keystroke eavesdropping. In ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201923)."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3328919"},{"key":"e_1_3_1_10_2","volume-title":"Asia Conference on Computer and Communications Security (ACM ASIACCS\u201918)","author":"Hutchins Ben","year":"2018","unstructured":"Ben Hutchins, Anudeep Reddy, Wenqiang Jin, Michael Zhou, Ming Li, and Lei Yang. 2018. Beat-PIN: A user authentication mechanism for wearable devices through secret beats. In Asia Conference on Computer and Communications Security (ACM ASIACCS\u201918)."},{"key":"e_1_3_1_11_2","volume-title":"ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201921)","author":"Jin Wenqiang","year":"2021","unstructured":"Wenqiang Jin, Srinivasan Murali, Huadi Zhu, and Ming Li. 2021. Periscope: A keystroke inference attack using human coupled electromagnetic emanations. In ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201921)."},{"key":"e_1_3_1_12_2","unstructured":"Jin Au Kong. 1975. Theory of Electromagnetic Waves. Wiley."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3214275"},{"key":"e_1_3_1_14_2","volume-title":"Asia Conference on Computer and Communications Security (ACM ASIACCS\u201922)","author":"Li Ang","year":"2022","unstructured":"Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, and Yanchao Zhang. 2022. WearRF-CLA: Continuous location authentication with wrist wearables and UHF RFID. In Asia Conference on Computer and Communications Security (ACM ASIACCS\u201922)."},{"key":"e_1_3_1_15_2","volume-title":"ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201919)","author":"Li Jingjie","year":"2019","unstructured":"Jingjie Li, Kassem Fawaz, and Younghyun Kim. 2019. Velody: Nonlinear vibration challenge-response for resilient user authentication. In ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201919)."},{"key":"e_1_3_1_16_2","volume-title":"IEEE Conference on Computer Communications (IEEE INFOCOM\u201920)","author":"Li Jiawei","year":"2020","unstructured":"Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, and Yanchao Zhang. 2020. RF-Rhythm: Secure and usable two-factor RFID authentication. In IEEE Conference on Computer Communications (IEEE INFOCOM\u201920)."},{"key":"e_1_3_1_17_2","volume-title":"International Conference on Mobile Computing and Networking (ACM MobiCom\u201919)","author":"Li Xiaopeng","year":"2019","unstructured":"Xiaopeng Li, Fengyao Yan, Fei Zuo, Qiang Zeng, and Lannan Luo. 2019. Touch well before use: Intuitive and secure authentication for IoT devices. In International Conference on Mobile Computing and Networking (ACM MobiCom\u201919)."},{"key":"e_1_3_1_18_2","article-title":"A technique for the measurement of attitudes.","author":"Likert Rensis","year":"1932","unstructured":"Rensis Likert. 1932. A technique for the measurement of attitudes. Archives of Psychology (1932).","journal-title":"Archives of Psychology"},{"key":"e_1_3_1_19_2","volume-title":"ACM International Conference on Mobile Systems, Applications, and Services (ACM MobiSys\u201918)","author":"Lin Feng","year":"2018","unstructured":"Feng Lin, Kun Woo Cho, Chen Song, Wenyao Xu, and Zhanpeng Jin. 2018. Brain password: A secure and truly cancelable brain biometrics for smart headwear. In ACM International Conference on Mobile Systems, Applications, and Services (ACM MobiSys\u201918)."},{"key":"e_1_3_1_20_2","volume-title":"International Conference on Mobile Computing and Networking (ACM MobiCom\u201917)","author":"Lin Feng","year":"2017","unstructured":"Feng Lin, Chen Song, Yan Zhuang, Wenyao Xu, Changzhi Li, and Kui Ren. 2017. Cardiac scan: A non-contact and continuous heart-based user authentication system. In International Conference on Mobile Computing and Networking (ACM MobiCom\u201917)."},{"key":"e_1_3_1_21_2","volume-title":"Annual Computer Security Applications Conference (ACSAC\u201921)","author":"Lu Duo","year":"2021","unstructured":"Duo Lu, Yuli Deng, and Dijiang Huang. 2021. Global feature analysis and comparative evaluation of freestyle in-air-handwriting passcode for user authentication. In Annual Computer Security Applications Conference (ACSAC\u201921)."},{"key":"e_1_3_1_22_2","unstructured":"M5stack. 2021. M5StickC Plus. https:\/\/m5stack.com\/"},{"key":"e_1_3_1_23_2","unstructured":"MATLAB. 2023. findpeaks. https:\/\/ww2.mathworks.cn\/help\/signal\/ref\/findpeaks.html#bufbbs1-2"},{"key":"e_1_3_1_24_2","volume-title":"ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201923)","author":"Ni Tao","year":"2023","unstructured":"Tao Ni, Xiaokuan Zhang, and Qingchuan Zhao. 2023. Recovering fingerprints from in-display fingerprint sensors via electromagnetic side channel. In ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201923)."},{"key":"e_1_3_1_25_2","volume-title":"IEEE Symposium on Security and Privacy (SP\u201923)","author":"Ni Tao","year":"2023","unstructured":"Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, and Qingchuan Zhao. 2023. Uncovering user interactions on smartphones via contactless wireless charging side channels. In IEEE Symposium on Security and Privacy (SP\u201923)."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.5555\/1628948"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0878-8"},{"key":"e_1_3_1_28_2","volume-title":"ACM Symposium on User Interface Software and Technology (ACM UIST\u201910)","author":"Roth Volker","year":"2010","unstructured":"Volker Roth, Philipp Schmidt, and Benjamin G\u00fcldenring. 2010. The IR ring: Authenticating users\u2019 touches on a multi-touch display. In ACM Symposium on User Interface Software and Technology (ACM UIST\u201910)."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"e_1_3_1_30_2","volume-title":"ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc\u201917)","author":"Shi Cong","year":"2017","unstructured":"Cong Shi, Jian Liu, Hongbo Liu, and Yingying Chen. 2017. Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In ACM International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc\u201917)."},{"key":"e_1_3_1_31_2","volume-title":"ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201916)","author":"Sluganovic Ivo","year":"2016","unstructured":"Ivo Sluganovic, Marc Roeschlin, Kasper B. Rasmussen, and Ivan Martinovic. 2016. Using reflexive eye movements for fast challenge-response authentication. In ACM SIGSAC Conference on Computer and Communications Security (ACM CCS\u201916)."},{"key":"e_1_3_1_32_2","volume-title":"IEEE Symposium on Security and Privacy (IEEE S&P\u201917)","author":"Song Yunpeng","year":"2017","unstructured":"Yunpeng Song, Zhongmin Cai, and Zhi-Li Zhang. 2017. Multi-touch authentication using hand geometry and behavioral information. In IEEE Symposium on Security and Privacy (IEEE S&P\u201917)."},{"key":"e_1_3_1_33_2","unstructured":"Statista. 2016. Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025. https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/"},{"key":"e_1_3_1_34_2","volume-title":"IEEE Conference on Communications and Network Security (IEEE CNS\u201914)","author":"Sun Jingchao","year":"2014","unstructured":"Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang. 2014. TouchIn: Sightless two-factor authentication on multi-touch mobile devices. In IEEE Conference on Communications and Network Security (IEEE CNS\u201914)."},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.216"},{"issue":"3","key":"e_1_3_1_36_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3264950","article-title":"Unlock with your heart: Heartbeat-based authentication on commercial mobile phones","volume":"2","author":"Wang Lei","year":"2018","unstructured":"Lei Wang, Kang Huang, Ke Sun, Wei Wang, Chen Tian, Lei Xie, and Qing Gu. 2018. Unlock with your heart: Heartbeat-based authentication on commercial mobile phones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 3 (2018), 1\u201322.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_1_37_2","volume-title":"ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM UbiComp\u201916)","author":"Wang Wei","year":"2016","unstructured":"Wei Wang, Alex X. Liu, and Muhammad Shahzad. 2016. Gait recognition using WiFi signals. In ACM International Joint Conference on Pervasive and Ubiquitous Computing (ACM UbiComp\u201916)."},{"key":"e_1_3_1_38_2","volume-title":"IEEE Conference on Computer Communications (IEEE INFOCOM\u201922)","author":"Xie Yadong","year":"2022","unstructured":"Yadong Xie, Fan Li, Yue Wu, Huijie Chen, Zhiyuan Zhao, and Yu Wang. 2022. TeethPass: Dental occlusion-based user authentication via in-ear acoustic sensing. In IEEE Conference on Computer Communications (IEEE INFOCOM\u201922)."},{"key":"e_1_3_1_39_2","volume-title":"International Conference on Mobile Computing and Networking (ACM MobiCom\u201920)","author":"Xu Xiangyu","year":"2020","unstructured":"Xiangyu Xu, Jiadi Yu, Yingying Chen, Qin Hua, Yanmin Zhu, Yi-Chao Chen, and Minglu Li. 2020. TouchPass: Towards behavior-irrelevant on-touch user authentication on smartphones leveraging vibrations. In International Conference on Mobile Computing and Networking (ACM MobiCom\u201920)."},{"key":"e_1_3_1_40_2","volume-title":"International Conference on Mobile Computing and Networking (ACM MobiCom\u201919)","author":"Yan Zhenyu","year":"2019","unstructured":"Zhenyu Yan, Qun Song, Rui Tan, Yang Li, and Adams Wai Kin Kong. 2019. Towards touch-to-access device authentication using induced body electric potentials. In International Conference on Mobile Computing and Networking (ACM MobiCom\u201919)."},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-009-9130-7"},{"issue":"3","key":"e_1_3_1_42_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3264959","article-title":"MindID: Person identification from brain waves through attention-based recurrent neural network","volume":"2","author":"Zhang Xiang","year":"2018","unstructured":"Xiang Zhang, Lina Yao, Salil S. Kanhere, Yunhao Liu, Tao Gu, and Kaixuan Chen. 2018. MindID: Person identification from brain waves through attention-based recurrent neural network. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 3 (2018), 1\u201323.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3072598"},{"key":"e_1_3_1_44_2","volume-title":"International Conference on Mobile Computing and Networking (ACM MobiCom\u201918)","author":"Zhou Bing","year":"2018","unstructured":"Bing Zhou, Jay Lohokare, Ruipeng Gao, and Fan Ye. 2018. EchoPrint: Two-factor authentication using acoustics and vision on smartphones. In International Conference on Mobile Computing and Networking (ACM MobiCom\u201918)."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2651820"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3432217"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3264962"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700441","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:38Z","timestamp":1750295858000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700441"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,22]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1145\/3700441"],"URL":"https:\/\/doi.org\/10.1145\/3700441","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2024,11,22]]},"assertion":[{"value":"2023-06-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}