Skip to Content
Future InternetFuture Internet
  • Article
  • Open Access

20 February 2026

Lightweight Authentication and Dynamic Key Generation for IMU-Based Canine Motion Recognition IoT Systems

,
,
and
1
Graduate School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate 041-8655, Hokkaido, Japan
2
College of Information Science and Engineering, Ritsumeikan University, 2-150 Iwakura-cho, Osaka 567-8570, Ibaraki, Japan
*
Author to whom correspondence should be addressed.

Abstract

The integration of wearable inertial measurement units (IMU) in animal welfare Internet of Things (IoT) systems has become crucial for monitoring animal behaviors and enhancing welfare management. However, the vulnerability of IoT devices to network and hardware attacks poses significant risks, potentially compromising data integrity and misleading caregivers, negatively impacting animal welfare. Additionally, current animal monitoring solutions often rely on intrusive tagging methods, such as Radio Frequency Identification (RFID) or ear tagging, which may cause unnecessary stress and discomfort to animals. In this study, we propose a lightweight integrity and provenance-oriented security stack that complements standard transport security, specifically tailored to IMU-based animal motion IoT systems. Our system utilizes a 1D-convolutional neural network (CNN) model, achieving 88% accuracy for precise motion recognition, alongside a lightweight behavioral fingerprinting CNN model attaining 83% accuracy, serving as an auxiliary consistency signal to support collar–animal association and reduce mis-attribution risks. We introduce a dynamically generated pre-shared key (PSK) mechanism based on SHA-256 hashes derived from motion features and timestamps, further securing communication channels via application-layer Hash-based Message Authentication Code (HMAC) combined with Message Queuing Telemetry Transport (MQTT)/Transport Layer Security (TLS) protocols. In our design, MQTT/TLS provides primary device authentication and channel protection, while behavioral fingerprinting and per-window dynamic–HMAC provide auxiliary provenance cues and tamper-evident integrity at the application layer. Experimental validation is conducted primarily via offline, dataset-driven experiments on a public canine IMU dataset; system-level overhead and sensor-to-edge latency are measured on a Raspberry Pi-based testbed by replaying windows through the MQTT/TLS pipeline. Overall, this work integrates motion recognition, behavioral fingerprinting, and dynamic key management into a cohesive, lightweight telemetry integrity/provenance stack and provides a foundation for future extensions to multi-species adaptive scenarios and federated learning applications.

1. Introduction

The Internet of Things (IoT) has rapidly expanded, connecting billions of devices from tiny sensors to cloud servers and enabling applications across smart homes, healthcare, industry, agriculture, and animal welfare monitoring. Yet the same scale and heterogeneity create acute security challenges: many devices are resource-constrained and lack mature protection, IoT environments are highly distributed and wireless, and devices frequently join/leave networks—together, these can open numerous attack vectors [1,2]. Ensuring confidentiality, integrity, and authenticity under such constraints remains difficult.
Major cloud platforms mandate strong transport security end-to-end, but constrained hardware often lacks hardware security modules or robust entropy sources, which undermines cryptographic protocols that depend on high-quality randomness [3]. Weak entropy can render keys/nonces more predictable. Thus, beyond standard Transport Layer Security (TLS), practical IoT stacks benefit from dynamic keying and lightweight integrity mechanisms that tolerate limited entropy and computation.
Two complementary strategies are therefore salient: (i) dynamic key management that frequently re-derives per-session or even per-window keys to narrow exposure upon compromise; and (ii) leveraging additional/behavioral entropy to strengthen keys and integrity tags on low-power nodes. This work adopts both, but—crucially—situates them in an animal-centric setting where security failures translate into welfare consequences rather than mere SLA violations.
Within the domain of animal welfare IoT, ensuring security and usability becomes particularly critical. Animal monitoring traditionally depends on methods such as Radio Frequency Identification (RFID) or ear-tagging [4], which are often invasive and stressful for animals, raising significant ethical concerns (shown in Figure 1). Moreover, these identification techniques necessitate frequent manual handling and can be prone to human error, which is especially problematic in settings such as zoos or livestock farms with numerous visually similar animals. Consequently, developing non-intrusive yet secure authentication methods tailored specifically to animals has become essential.
Figure 1. Example of invasive ear-tagging in livestock. Traditional identification methods such as RFID ear tags can be stressful and potentially harmful to animals, motivating non-invasive alternatives.
Compared to general IoT applications, animal-centered deployments have unique value: they directly affect welfare management, veterinary decision-making, and ethical standards of care. Unlike industrial IoT, here a forged or misattributed sensor stream may cause unnecessary veterinary intervention, misallocation of food or medication, or overlooked signs of illness. Therefore, security is not only a technical issue but also an ethical requirement in animal IoT.
Beyond welfare monitoring itself, secure identity management is critical. Behavioural biometrics have been recognized as a viable authentication factor in wearables [5,6], yet no study has validated such approaches for animals. Without secure identification, attackers could inject forged telemetry or impersonate devices, leading to false alarms and unnecessary veterinary interventions. Prior analyses of Message Queuing Telemetry Transport (MQTT) integrity vulnerabilities [7] underline how such risks are realistic in IoT deployments; in an animal context, their impact is amplified by welfare and ethical considerations.
In this study we focus on canines for three reasons. First, dogs are widely kept as companion animals and working partners (e.g., guide dogs, detection dogs), making their welfare monitoring socially relevant. Second, their diverse motion repertoire (e.g., running, shaking, sitting, lying) provides a rigorous testbed for activity recognition and behavioral fingerprinting. Third, an open canine inertial measurement units (IMU) dataset is publicly available, ensuring experimental reproducibility. While our experiments use dogs, they can be extended to other animals, such as cattle, horses, or zoo mammals, in future work.
Recent developments in animal-oriented IoT emphasize the need for secure and non-invasive identification. Studies on livestock monitoring and animal re-identification (Re-ID) demonstrate how biometric or visual-based identification supports welfare management, yet still lack embedded-layer authentication. For example, Alzahrani et al. (2024) proposed an edge-artificial intelligence (AI) framework for cattle pose recognition in farm IoT systems [8], while Ahmed et al. (2023) introduced an animal Re-ID model achieving over 90% accuracy across multi-camera settings [9]. However, these methods primarily address perception rather than cryptographic trust. Integrating behavioral biometrics into IoT-level security, therefore, fills an unaddressed gap between welfare analytics and secure communication.
Our research addresses these dual requirements by integrating behavioral fingerprinting derived from wearable IMUs with standard cryptographic primitives (MQTT/TLS and application-layer Hash-based Message Authentication Code (HMAC)) in a practical edge-IoT pipeline. This combined approach aims to provide lightweight, deployment-oriented telemetry integrity/provenance support while reducing operational burden and avoiding invasive identification tags.
Specifically, our prototype targets a zoo deployment scenario, where each wearable collar streams 100 Hz IMU windows to a central welfare dashboard via MQTT. A Raspberry Pi gateway at the edge performs on-device motion recognition. Behavioural fingerprinting is not used to grant trust independently; it triggers secondary checks when the signal is inconsistent or low-confidence, while reducing the need for manual collar–animal matching by zoo staff.
The remainder of this paper is organized as follows:

3. Algorithm

Our goal is to secure continuous canine activity monitoring in the field while adding zero dedicated cryptographic hardware on the collar side. Figure 2 summarises the three-layer stack we propose. Sensing nodes stream nine-axis IMU windows at 100 Hz via MQTT 3.1.1, an application-layer protocol widely deployed in resource-constrained IoT platforms [18]. A Raspberry Pi 4B at the edge performs on-device verification and inference: it verifies the per-window integrity seal and applies the activity and fingerprint CNNs before forwarding accepted telemetry to downstream storage/analytics.
Figure 2. Three-layer security stack deployed on the MQTT link.

3.1. Edge Deployment

For animal facilities, the edge node is intended to be installed off-animal in a secure, powered location within wireless range of the enclosures. For example, in a maintenance/equipment cabinet or a weatherproof service box in the zoo area. Collars connect to a local Wi-Fi access point (or an existing facility WLAN) and publish MQTT/TLS messages to the edge gateway. When multiple enclosures are geographically separated, one gateway per zone (or per building) can be used to keep collar-to-edge links short and to reduce dependence on wide-area backhaul during normal operation.

3.2. Data Acquisition and Windowing

We employ the public Canine-IMU dataset released by Marcato et al. [19]. Originally sampled at 100 Hz from three body positions (neck, chest, and back), each device contained three sensor types (accelerometer, gyroscope, magnetometer), with each measuring three axes (X, Y, Z), thus yielding 3 × 3 × 3 = 27 distinct streams in total. Given prior findings that neck-mounted sensors may produce less reliable data for certain behaviors [20], we focus on the chest-mounted subset, ensuring more stable signals for running, shaking, and other activities. Raw sequences are segmented by a fixed sliding window of W = 50 samples ( 0.5 s) and a stride of W, the setting commonly adopted in wearable human activity recognition (HAR) benchmarks [21].

3.3. Lightweight Activity Recognition

Each window X R W × 9 is fed to a 1-D-CNN (64 → 128 filters, ReLU, global pooling). The network contains 43,653 parameters (170 kB) and executes 430 windows s−1 on the Raspberry Pi. Table 1 lists the per-class metrics obtained after 20 training epochs (overall weighted accuracy 86%).
Table 1. Per-class metrics of the 1-D-CNN on the chest-mounted subset.

3.4. Individual Dog Finger-Printing

To support stream provenance and collar–animal association checks in routine operation, we train a second lightweight CNN of identical input shape, but with a soft-max over N = 42 subjects. A class-balanced focal-loss [22] reduces the impact of sample imbalance. On a held-out set, the model reaches 83.9% accuracy. Importantly, this fingerprinting component is not used as a standalone authentication mechanism; it is treated as an auxiliary signal whose mismatch (or low confidence) triggers secondary actions (e.g., re-pairing confirmation) rather than granting trust by itself.

3.5. Dynamic Per-Window PSK

For every window, we derive a 128-bit pre-shared key Let t ms denote the acquisition timestamp, presented as an integer number of milliseconds (Unix epoch). When the system clock is measured in seconds, we convert it to t ms = t · 1000 .
K t ms = SHA 256 E HF ( X ) t ms [ 0 : 16 ] ,
where E HF ( X ) is the sum of the last eight FFT bins and t ms the millisecond timestamp embedded in the packet. Entropy extracted from body dynamics has already been shown to support robust key generation on smart-wearables [6]. In this work, K t ms is treated as per-window keying material for lightweight tamper-evident sealing (not a cryptographic-grade long-term secret), under the threat model stated in Section 3.9. For MQTT links, we follow the dynamic-key design recently proposed in DLST-MQTT, which rotates short-lived session keys while adding only minimal overhead to constrained devices [23].

3.6. HMAC-SHA256 Integrity Seal

Payload P (raw IMU bytes) is concatenated with K t -derived HMAC:
M = t ms HMAC K t ms ( P ) P .
On the edge, the seal is recomputed; non-matching packets are discarded before CNN processing. Because K t ms is regenerated every 0.5 s, compromising one window does not automatically transfer to other windows (within the bounded threat model in Section 3.9).
We position this HMAC primarily as a tamper-evident integrity seal at the application layer: it detects accidental corruption and non-adaptive manipulation that modifies bytes without recomputing a valid tag.

3.7. Transport-Layer Configuration

We run Mosquitto 2.0.11 on the Raspberry Pi 4B with a single authenticated listener on port 8883 and enforce TLS 1.2 with the ECDHE_RSA_AES128_GCM_SHA256 suite. This setting complies with NIST SP 800-52 Rev. 2 guidelines for constrained clients [24]. Client credentials are salted SHA-512 hashes generated by mosquitto_passwd.

3.8. End-to-End Pipeline

Algorithm 1 summarises run-time steps executed on both ends, including windowing, message packing, integrity verification, and a practical replay/freshness filter; all costly operations (FFT, CNNs) remain at the edge.
Algorithm 1 Secure streaming pipeline (per window)
       Collar node
  1:  measure X ; t ms time ( ) · 1000                                                 ▹ Unix epoch in ms
  2:   K t ms Equation (1)
  3:   H HMAC K t ms ( X )
  4:   M t ms H X
  5:  publish M over MQTT/TLS
       Edge node
  6:  receive M ; parse ( t ms ,   H ,   X )
  7:   t now , ms time ( ) · 1000
  8:  Freshness/replay filter (A1 mitigation):
  9:  if  t now , ms t ms > _ a t t a c h D e l t a  then
10:         reject as stale; return
11:  end if
12:  if  t ms t last , ms  then
13:         reject as monot; return
14:  end if
15:  if  ( t ms ,   H ) S recent  then
16:         reject as dup; return
17:  end if
18:   K ^ t ms Equation (1)
19:  if  H HMAC K ^ t ms ( X )  then
20:       return discard                                                                   ▹ reject as hmac_fail
21:  end if
22:   y act CNN activity ( X )
23:   y id CNN id ( X )
Replay/freshness filter state. The edge maintains (i) the last accepted timestamp t last , ms for a monotonicity check and (ii) a small cache S recent of recently observed ( t ms , H ) pairs for duplicate suppression. A window is rejected if it is older than a freshness bound Δ (implementation parameter), non-monotonic, or duplicated; this provides a pragmatic mitigation for simple replay (A1) under the threat model in Section 3.9.

3.9. Threat Model and Security Scope

3.9.1. Assumed Adversary Capabilities

We consider a collar that publishes 0.5 s IMU windows to an edge node over MQTT with TLS enabled. The primary assets are (i) the integrity of per-window telemetry used for welfare monitoring and (ii) the provenance of the sensor stream. We assume standard TLS is correctly configured for transport confidentiality/integrity and that the collar and edge endpoints are not fully compromised. Within this setting, we consider: (A0) accidental corruption and non-adaptive tampering that modifies bytes in transit without recomputing the seal; (A1) simple replay of previously observed windows; and (A2) an adaptive forger that can inject or modify windows and generate a consistent ( t ,   P ,   HMAC ) tuple (e.g., by recomputing tags after observing traffic, leveraging partial motion knowledge, or replaying/imitating actions).

3.9.2. Coverage and Non-Goals

Dynamic-HMAC is designed to detect A0 and to make such modification observable at the application layer. The embedded timestamp can support a practical freshness check against A1 when combined with receiver-side filtering (e.g., rejecting duplicates). However, without an additional long-term secret, our mechanism is not intended to provide cryptographic message authentication against A2. Evaluating security against A2 (including replay/imitation with tag recomputation under side information) is therefore outside the scope of this paper. Specifically, our scope assumes a valid long-term trust anchor for the transport (e.g., correctly configured TLS) and no full compromise of the collar/edge endpoints. If this trust anchor is broken such that an adversary can observe plaintext windows and recompute per-window seals (or if endpoints are fully compromised), then integrity/provenance guarantees do not hold against a fully adaptive forger; addressing this requires additional mechanisms and is left as future work.

4. Evaluation

Our prototype targets a zoo deployment, where each collar streams 100 Hz IMU windows to a welfare dashboard. Because keepers are rarely IT specialists, password hygiene and key rotation are hard to enforce; leaked credentials could let an attacker forge “sick-animal” telemetry and trigger unnecessary veterinary interventions. The zoo also houses many visually similar animals, so re-assigning IMU collars after charging or cleaning is tedious, and RFID tags are either impractical (for small mammals) or risk invasive injury. Hence, our evaluation must answer two practical questions:
  • Can the telemetry pipeline provide practical, tamper-evident integrity with minimal key-management burden for non-expert operators? This is addressed by the three layers in Figure 2: TLS for transport protection, a per-window dynamic-HMAC seal to detect silent corruption and non-adaptive manipulation, and a fingerprint CNN to support stream provenance (origin) checks in routine operation.
  • Can individual animals be recognised automatically to spare keepers the collar–animal matching work? We therefore measure the false-accept rate (FAR) and false-reject rate (FRR) of the behavioural fingerprint in Secs.
Taken together, the experiments cover transport protection (TLS), application-layer tamper-evident integrity sealing (dynamic-HMAC), and stream provenance support via behavioural fingerprinting, spanning from the transport layer (OSI L4) to the application layer (L7).

4.1. Experimental Setting

4.1.1. Edge AI Hardware

Raspberry Pi 4B (4 GiB, Cortex-A72@1.5 GHz), Raspbian 11.

4.1.2. Software

Mosquitto 2.0.11, Python 3.10.11, TensorFlow 2.15. All metrics are averaged over three cold-start runs ( n = 3 ). Confidence intervals are the two-sided 95% interval μ ± 1.96 σ n , where σ is the run-to-run standard deviation. With n = 3 this slightly under-estimates the t 0.975 , 2 critical value (2.26), but keeps notation concise; the exact t-interval is reported in the artefact.

4.1.3. Training/Validation/Test Split

For both the activity-recognition CNN and the identity (fingerprinting) CNN, segmented IMU windows were split into 80% for training and 20% for testing. Within the training portion, 10% of the data were reserved for validation during model fitting. The test set was held out throughout training and model selection and was used only for final performance reporting.

4.1.4. Training Hyperparameters

Both CNN models were trained using the Adam optimizer (learning rate = 0.001 ) with mini-batch training (batch size = 64 ). The activity-recognition model uses sparse categorical cross-entropy loss, while the fingerprinting model uses the class-balanced focal loss described in Section 3.2. A validation split of 0.1 was used for model monitoring during training.
For every 0.5 s sensor window ( W = 50 samples at 100 Hz) we log
L = t edge , recv t imu , acq ,
T = windows s 1 ,
D ( t ) = 1 1 t i = 1 t 1 { H i H ^ i } ,
where H i is the HMAC transmitted by the collar and H ^ i the one recomputed at the edge.

4.2. Sensor-to-Edge Delay

We instrumented the full pipeline using a non-blocking MQTT loop loop(timeout=0) on the Raspberry Pi, with a fixed sampling window of W = 50 samples (0.5 s). The reported sensor-to-edge elapsed time L includes the fixed 0.5 s IMU acquisition window required to form each HAR window; we report the remaining network and edge-processing component separately below. Over n = 1506 consecutive windows, the per-window sensor-to-edge elapsed time L was
L median = 632 ms , μ L = 631 ± 15 ms , L min = 273 ms , L max = 646 ms .
Because L already includes the fixed 0.5 s IMU acquisition window required by the HAR task, the net communication and edge-processing component is on the order of 130 ms in steady state. As summarised in Figure 3a, the delay budget is dominated by the acquisition window, followed by WLAN/TLS transport and baseline edge processing, while the security stack contributes only a few milliseconds. The few unusually small values close to L min in Figure 3b occur during the TLS handshake and warm-up phase, and have negligible impact on the reported median.
Figure 3. Sensor-to-edge delay. (a) breakdown of the per-window delay into the 0.5 s IMU acquisition window, WLAN/TLS + MQTT transport, and edge processing (CNN + dynamic–HMAC). (b) distribution of the resulting sensor-to-edge elapsed time L (IMU acquisition to edge reception).

4.3. Sustained Throughput

Figure 4 shows the per-minute message rate for 20 concurrent collars. After a brief warm-up (TLS handshake + XLAJIT), the broker stabilises at
1180 ± 10 msgs / min ( 19.7 win / s , 98 % of the 20 × 1 win / s aggregate emission ) .
Figure 4. Sustained message rate (left axis) and CPU utilisation (right axis) for 20 concurrent collars over time.
CPU stays below 1.4% and RAM under 396 MB, leaving headroom for at least 50 collars.
To strengthen the scalability evidence beyond the 20-collar baseline, we conducted a stress test with 50 concurrent simulated collar clients publishing messages in the same format and at the same per-client rate. The aggregated results are summarised in Table 2. We logged the broker/edge resource usage and message ingress rate every 30 s over a ∼6 min run. The observed message rate stabilised around a median of 2414.5 msgs/min (range: 390–2466 msgs/min across the run), while CPU utilisation remained low (median 2.8%, max 11.2%) and memory usage stayed stable (median 1.58 GB).
Table 2. Stress test summary with 50 simulated collars (logged every 30 s over ∼6 min).

4.4. Network Variability Stress Test

To complement the controlled laboratory measurements, we evaluated the robustness of the end-to-end pipeline under network variability by injecting delay jitter and packet loss in the collar-to-edge path on the same Raspberry Pi testbed. Table 3 reports the receiver-side acceptance breakdown with the freshness bound Δ = 2000 ms and both monotonic and duplicate checks enabled. Across three runs, the pipeline maintained an acceptance rate of ≈99.3%, with no stale/monotonic/duplicate rejections observed in these settings.
Table 3. Network variability stress test results (freshness bound Δ = 2000 ms).

4.5. Dynamic–HMAC Tamper Detection

To stress-test the integrity layer, we corrupt each 0.5 s window by flipping one random byte (8 bits) with probability p = 0.20 . This setup follows prior MQTT integrity stress tests that inject random corruption into the payload (often described as bit/byte flipping) [7]. Algorithm 2 shows the verification. This setting reflects accidental corruption and opportunistic tampering that aims to alter data silently. Evaluating adaptive forgeries (e.g., replay or recomputation of tags under partial motion knowledge) requires an explicit threat model and additional experiments, which are discussed in Section 3.9.
Algorithm 2 Pseudo-code for PSK derivation and HMAC verification
Require: window w (50 samples), integer millisecond timestamp t ms
  1:   X rFFT ( w )
  2:  h   f k = | X | 8 | X | 1 X [ k ]
  3:  seed concat format ( h   f ,   3 ) ,   t ms
  4:   psk SHA 256 ( seed ) [ 0 : 16 ]
  5:   tag HMAC _ SHA 256 ( psk ,   w )
  6:  Transmit t ms , tag , w
Ensure: On receive:
          unpack t ms , tag , w
          derive psk from w and t ms as above
          if HMAC _ SHA 256 ( psk , w ) = tag then accept w else reject
The per-window PSK is derived by the following:
  • Performing an N-point real FFT on the 50-sample window.
  • Summing the magnitudes of the last eight frequency bins to obtain a coarse high-frequency energy h   f .
  • Concatenating h   f , t ms (where t ms is the 64-bit timestamp).
  • Hashing with SHA-256 and truncating to the first 16 bytes (128 bits).
The resulting PSK is then used as the HMAC key over the raw window bytes. Any window whose tag fails verification is rejected for 100% of the 1200 forged windows, consistent with the 1 2 128 forgery bound of HMAC-SHA-256 [25].
Random byte flips model accidental corruption and non-adaptive payload tampering (A0). To better reflect practical IoT threats within our stated scope, we further evaluate (i) replay attacks (A1) and (ii) motion-pattern spoofing by partial-window splicing without tag recomputation (A0). The aggregated outcomes are summarised in Table 4. Because a replayed packet is byte-identical, the integrity seal alone cannot detect replay; therefore, we pair it with a receiver-side freshness/replay filter using a freshness bound Δ = 2000 ms, a monotonic timestamp check, and duplicate suppression.
Table 4. Results of additional adversarial scenarios beyond random byte flips ( n = 600 windows each, Δ = 2000 ms).
In the replay experiments, delayed packets are rejected as either stale (when t now , ms t ms > Δ ) or monot (when timestamps violate monotonicity), consistent with the intended role of the filter for mitigating simple replay (A1). In the injection/splicing experiments, the adversary replaces 10–50% of the payload samples using segments from other windows while keeping the original timestamp and HMAC tag unchanged; these packets are rejected as HMAC fail, illustrating that the integrity seal detects non-adaptive payload modification without recomputing a valid tag (A0).

4.6. Entropy Analysis of Dynamic PSK

Let X i be the random variable for byte i of the 128-bit PSK. The Shannon entropy per byte is defined as [26]
H ( X i ) = v = 0 255 p i ( v ) log 2 p i ( v ) , 0 H ( X i ) 8 .
The min-entropy is
H ( X i ) = log 2 max v p i ( v ) , 0 H ( X i ) 8 ,
which bounds an adversary’s single-guess success probability by 2 H ( X i ) .
To assess the unpredictability of our motion-derived PSK, we harvested 1000 windows of chest IMU data (fixed timestamp) and computed H ( X i ) and H ( X i ) for i = 1 16 . The results are as follows:
  • Byte-level entropy (6): ranges from 7.76 to 7.84 bits (mean = 7.80 bits), close to the maximum of 8 bits.
  • Bit-level entropy: exactly 1.0 bit per bit position, indicating an unbiased Bernoulli (0.5) distribution.
  • Min-entropy (7): 6.06 bits per byte(worst case), hence the adversary’s best-guess success per byte is 2 6.06 1 / 67 .
According to NIST SP 800-90B [27], H ( X i ) 6 bits per byte suffices for cryptographic randomness in embedded systems. Extrapolating to the full 128-bit PSK yields a maximum single-guess success rate of 2 6.06 × 16 2 97 , Under a pure guessing model (i.e., without side information), this corresponds to a negligible success probability for randomly guessing a matching 16-byte value; we report it as an empirical indicator of variability rather than a security proof under active attack.
These results suggest that the motion-derived value exhibits substantial variability in our benign data-collection setting. In this paper, we therefore use it as a lightweight per-window keying material for integrity binding.
To verify the robustness of motion-derived entropy, we compared dynamic (walking/running) and near-static (lying down) IMU windows. The analysis showed that even during resting periods, the derived keys retained high randomness, with average byte-level entropy around 7 bits and minimum entropy above 6 bits. This indicates that entropy remains virtually undiminished under low-motion conditions and continues to exceed the 6 bits/byte lower bound recommended by NIST SP 800-90B.
As an additional feasibility check beyond the canine dataset, we repeated the same entropy computation on a goat IMU dataset [28]. The derived per-window keying material exhibited similar variability (average byte-level Shannon entropy around 7.8 bits and minimum entropy above 6 bits per byte in this benign setting), suggesting that the empirical entropy behaviour is not limited to one species. This result is reported as a preliminary indicator rather than a security proof or a generalisation guarantee.

4.7. Behavioural Finger-Printing

Single -Window Performance: The re-balanced TCN yields 83.9% accuracy on subjects held out for testing. When genuine legit and imposter fake streams are interleaved, we obtain on-the-fly decision rates of FAR = 0.16 % and FRR = 5.97 % over 2180 windows (Figure 5).
Figure 5. Cumulative false acceptance rate (FAR) and false rejection rate (FRR) of the behavioural fingerprint CNN over 2180 windows.
Operational Ramifications and Mitigation: The fingerprinting network outputs a softmax probability vector over subjects. While we report closed-set identification accuracy and FAR/FRR for comparability, practical deployments typically require a verification-style decision with a configurable operating point. Given an expected identity s * for a collar stream, we accept the auxiliary fingerprinting signal only if p ( s * x ) τ , where τ is a confidence threshold. Varying τ yields a FAR/FRR trade-off, so acceptable error targets must be specified at the operating point relevant to the application (e.g., prioritizing a low FAR when the consequence of mis-attribution is high, while tolerating a higher FRR as operational friction). Under our auxiliary usage, a false accept (FAR) corresponds to attributing a window to an incorrect subject, which can contaminate downstream welfare analytics or mask collar–animal mis-association; a false reject (FRR) corresponds to failing to confirm the expected subject and mainly increases operational overhead by triggering re-checks. To limit the impact of occasional misclassifications, conservative decision logic can be applied at the edge (e.g., majority voting or K-consecutive agreement over a short horizon, and treating low-confidence outputs as “uncertain” rather than switching identity immediately), with an operator-in-the-loop confirmation during re-pairing events. Fingerprinting is applied continuously on streaming windows, so practical decisions need not rely on a single window. For illustration, if per-window correctness is 83.9%, then under a simple independence assumption, a majority vote over K = 5 consecutive windows yields an expected correct majority of ≈96.8% (and ≈98.4% for K = 7 ). This illustrates why conservative temporal aggregation can substantially reduce the impact of occasional window-level misclassifications; the concrete choice of K and threshold τ should be set based on the acceptable FAR/FRR trade-off in the target workflow.
Cross-Species Feasibility Check (Goat Dataset): To avoid over-claiming species-agnostic performance while still assessing whether the pipeline is inherently tied to canines, we conducted a small pilot on a separate internal goat IMU dataset (five subjects). Using the same windowing procedure and the same fingerprinting pipeline, we obtained an overall identification accuracy of 86% on 56,814 windows (macro-F1: 0.87; weighted-F1: 0.86). We present this result as a feasibility sanity check rather than a comprehensive generalisation study; systematic validation across species, sensor hardware, and mounting conditions remains future work.

4.8. Edge-Side Computation Overhead

To isolate pure processing cost, we replayed N = 100 cached windows (≈50 s of sensor data) on the Raspberry Pi and enabled each security layer in turn. Figure 6 reports the median processing time per window on the edge node:
Figure 6. Median edge processing time per window on the Raspberry Pi for 100 replayed windows (three warm-up runs).
  • Inference only 203.9 ms.
  • dynamic-HMAC 204.6 ms ( +0.7 ms, +0.3%).
  • MQTT publish 207.4 ms ( +2.8 ms vs. baseline).
Because these ≈200 ms are additive to the 0.5 s acquisition window and ≈0.27 s WLAN/TLS transport, the full sensor-to-edge delay L in Figure 3 is close to 1 s. Importantly, the security stack itself contributes less than 3 ms (≈1–2%) on top of the application-driven sensing and transport time.
Generality: While our main evaluation uses a public canine dataset, the proposed pipeline is not conceptually tied to a single species. Our pilot goat-dataset results provide preliminary evidence of feasibility across species; however, comprehensive validation across sensor hardware, mounting conditions, and additional species remains an important direction for future work.

5. Discussion

5.1. Validation Results Summary

The Evaluation section presented quantitative results for sensor-to-edge delay, throughput, and authentication accuracy. In this Discussion, we interpret these results in terms of practical usability and potential improvements.

5.1.1. Latency Bottlenecks

The 632 ms median sensor-to-edge delay in Figure 3 is dominated by (i) the 500 ms IMU acquisition window required by the HAR task, and (ii) a delay of ≈130 ms for WLAN/TLS transport and edge-side processing.
Of the latter, the security stack (dynamic-HMAC and fingerprint CNN) accounts for less than 3 ms per window (Figure 6), i.e., under 2% of the total delay.
We additionally compare the MQTT client loop modes. Using a blocking MQTT loop introduces additional queuing/servicing delay in our pipeline, yielding a noticeably larger per-window sensor-to-edge delay distribution (Figure 7). For the main results reported in Figure 3, we therefore adopt a non-blocking MQTT loop loop(timeout=0) to avoid this implementation-induced latency inflation.
Figure 7. Per-window sensor-to-edge delay when using a blocking MQTT loop.

5.1.2. Throughput Head-Room

During the test, CPU utilization never exceeds 1.4% and memory usage remains under 396 MB. In contrast, our micro-benchmarks show that Mosquitto 2.0 on a Pi 4B can sustain over 50,000 msgs/min without degradation. Therefore, the measured workload of approximately 2360 msgs/min (20 collars) corresponds to less than 5% of the broker’s measured capacity, indicating substantial throughput headroom for larger deployments.
This indicates ample scalability for medium-scale deployments (hundreds of collars), but further stress tests in heterogeneous multi-broker settings are left for future work.

5.1.3. Security Payoff Versus Cost

Dynamic-HMAC and fingerprint-CNN add merely 0.7 ms (0.3%) and 2.8 ms (1.4%) of local processing time, respectively, while providing deployment-oriented integrity/provenance benefits within our stated threat model: the per-window seal detects accidental corruption and non-adaptive manipulation (A0), the timestamp-based freshness filter mitigates simple replay (A1), and fingerprinting supports stream provenance checks to reduce operational mis-association. These mechanisms are not intended to provide cryptographic-grade guarantees against fully adaptive forgers who can recompute valid tags (A2). This demonstrates that lightweight motion-derived keys can meaningfully improve security with negligible performance trade-off.

5.1.4. Formal Security Verification

To strengthen and contextualize our security claims, we conducted an automated symbolic analysis of the message-level sealing mechanism using the Tamarin prover. We emphasize that this verification targets the application-layer construction (dynamic PSK derivation + HMAC + timestamped delivery), rather than proving the correctness of TLS itself. Consistent with common protocol-analysis practice, the model considers a Dolev–Yao adversary that can intercept, replay, and inject messages on an untrusted network.
Baseline Finding Under a Strong Attacker Model
In our deployed stack, MQTT/TLS is intended to provide transport confidentiality and integrity; thus, a purely passive network attacker should not observe plaintext IMU windows. However, when transport confidentiality is not assumed in the symbolic model (e.g., to evaluate the intrinsic robustness of the application-layer construction if the secure channel is abstracted away or compromised), the baseline key derivation K t m s = SHA 256 ( E H F ( X ) t m s ) [ 0 : 16 ] becomes computable from observable message components. Tamarin produces a counterexample trace showing that authenticity-style properties are not satisfied against an adaptive forger in this stronger model. This result aligns with our stated scope: the dynamic-HMAC seal is positioned as a tamper-evident integrity binding against accidental corruption and non-adaptive manipulation (A0), and the timestamp-based filter mitigates simple replay (A1), while cryptographic message authentication against a fully adaptive forger (A2) is explicitly not claimed (Section 3.9).
Optional Seeded Hardening and Its Assumptions
We additionally modeled an optional hardening variant in which the per-window key derivation incorporates an extra long-term per-device secret S (“seed”), e.g., K t m s = SHA 256 ( S E H F ( X ) t m s ) [ 0 : 16 ] . Under the same Dolev–Yao setting (without assuming a secure channel), Tamarin verifies the corresponding authenticity properties for this seeded variant, indicating that adding a single device secret can restore cryptographic message authentication at the application layer.
Discussion: Seed Provisioning Risk and Deployment Trade-Offs
The seeded variant introduces a new requirement: securely provisioning and protecting S. In practice, S could be pre-provisioned (e.g., manufacturer or offline enrollment) or established during an initial pairing phase over a trusted channel. If the trust anchor used during provisioning (e.g., CA/certificate validation) is compromised, S may be exposed, which is a generic risk shared by any credential distributed over the same channel. Therefore, we treat the seeded variant as an optional hardening direction rather than a mandatory component of our current deployment, which primarily relies on correctly configured MQTT/TLS for transport confidentiality/integrity and uses dynamic–HMAC as a lightweight tamper-evident seal within the scoped threat model.

5.1.5. Recognition Accuracy and Misclassification

Our fingerprint CNN achieved 83.9% recognition accuracy across dogs. While encouraging, single-window identity classification is not reliable enough to serve as an independent authentication mechanism. In our design, fingerprinting is treated as an auxiliary consistency/provenance signal to reduce the likelihood of persistent mis-attribution in long-running streams. Operationally, its impact can be moderated by selecting an application-appropriate operating point (confidence threshold τ ) and by applying temporal aggregation (e.g., majority voting or K-consecutive agreement) so that occasional misclassifications do not immediately translate into identity changes. For example, a simple K = 5 majority vote yields an expected correct majority of ≈96.8% under an independence assumption. In addition, low-confidence outputs can be handled conservatively (“uncertain” state) to trigger secondary checks during collar re-pairing rather than granting trust by itself.

5.2. Animal–Computer Interaction

In animal-welfare IoT deployments, Animal–Computer Interaction (ACI) plays a pivotal role beyond simply monitoring physiological or behavioral data. Effective ACI requires seamlessly integrating security measures into daily animal care workflows, ensuring that systems remain secure without burdening caregivers, who typically have minimal technical training.
Our proposed behavioural fingerprinting approach contributes to this vision by providing an auxiliary stream-level consistency cue for collar–animal association through subtle differences in motion patterns. Traditionally, assigning wearable sensors or RFID tags to animals demands careful manual record-keeping and frequent interventions—tasks that quickly become impractical in large zoological facilities. Moreover, intrusive tagging methods can be uncomfortable or even harmful, particularly to smaller animals.
By leveraging behavioural biometrics from wearable IMUs, our framework can help reduce the manual burden associated with collar assignment and re-assignment. In practice, the fingerprinting signal should be used conservatively (e.g., with confidence thresholding and short-horizon temporal smoothing) and can trigger a re-pairing confirmation step when the signal is inconsistent, rather than replacing record-keeping entirely. This advantage reduces staff workload, decreases handling stress on animals, and helps reduce human errors common in manual identity assignment, improving operational efficiency.
Furthermore, under our scoped threat model, fingerprinting is not relied upon as a primary security barrier against adaptive impersonation. Instead, it provides an additional provenance cue that can make silent collar–animal mis-association less likely to persist and can prompt secondary checks when abnormal inconsistencies occur.
This integrated ACI approach thus not only addresses IoT security concerns but also actively supports the practical, humane, and efficient management of animal welfare systems. Future extensions could explore federated learning to continuously enhance model accuracy while maintaining privacy, or adaptive models capable of recognizing and authenticating multiple species simultaneously.

5.3. Limitations and Future Work

Although our study demonstrates strong practical value, several limitations remain to be addressed. First, the current deployment uses only a single IMU sensor, lacking contextual information that could significantly enhance the interpretation of animal behaviors, such as heart rate variability, GPS location, or environmental conditions. Incorporating multimodal data could further improve activity recognition accuracy and animal welfare assessment reliability. Energy efficiency is critical for collar wearables. In practice, the collar-side duty cycle can be reduced by leveraging an IMU with FIFO batching and a low-power microcontroller that remains in deep sleep for most of the time and periodically wakes to burst-read buffered samples and transmit aggregated updates. A detailed, hardware-specific power measurement campaign is left as future deployment work.
Second, while most activity classes achieved stable performance, Body shake showed a noticeably lower recall in our current dataset. This is largely attributable to severe class imbalance and the short, sporadic duration of shake events, which makes fixed-length window classification prone to missed detections. In our current prototype, shake recognition is treated as an auxiliary cue rather than a primary welfare indicator. Future work will collect more shake instances and explore edge-friendly remedies such as re-sampling, focal loss, or a lightweight event-centric detector specialized in rare behaviours. Third, our behavioural fingerprint model currently exhibits a relatively high false rejection rate (FRR > 5%) for dogs with limited or sparsely collected motion data. Future work should explore metric-learning strategies such as ArcFace or triplet loss methods, which could significantly reduce the FRR. However, these approaches typically demand greater computational resources; thus, careful optimization or edge-friendly adaptations, like quantization-aware training or federated learning, will be necessary.
Fourth, although our architecture is designed to be adaptable to different sensors and species, the transferability and robustness of our behavioural fingerprint approach to other animal species (e.g., horses, cattle, or smaller mammals) have not been comprehensively validated. Different species may exhibit diverse behavioral repertoires and motion characteristics, which could necessitate model adjustments or dedicated training datasets.
Lastly, large-scale deployments involving multiple brokers, heterogeneous network conditions, or cross-domain trust management were beyond the scope of this study. Future research should include stress-testing under realistic multi-node network environments to validate scalability and identify potential bottlenecks or vulnerabilities. Additionally, our approach relies on a long-term trust anchor for transport confidentiality/integrity and does not aim to provide cryptographic-grade authentication if an attacker can observe plaintext windows and recompute seals or if endpoints are fully compromised.

6. Conclusions

This study set out to design and experimentally evaluate a lightweight security architecture deployable on IMU-based animal collars and Raspberry Pi gateways without specialised cryptographic hardware. By integrating standard TLS 1.2 encryption, dynamic-HMAC integrity seals based on motion-derived entropy, and a behavioural fingerprint classifier, our work makes three significant contributions to the fields of IoT security and Animal–Computer Interaction:
  • Lightweight integrity and provenance framework. We present a practical, multi-layer telemetry protection pipeline for animal-wearable sensing: TLS protects the transport channel, a per-window dynamic–HMAC provides tamper-evident integrity sealing against silent corruption and non-adaptive manipulation, and behavioural fingerprinting supports stream provenance checks to mitigate operational mis-association in zoo deployments.
  • Efficient and sustainable performance. Comprehensive evaluation demonstrated that sensor-to-edge delay remained under 1 s (median 632 ms), sufficient for timely welfare alerts, and sustained a throughput of 1180 ± 10 windows, fully matching 20 IMU collar streaming rates. The computational overhead from the security layers amounted to less than 3 ms, underscoring the practicality of our entirely software-based protection on widely available single-board computers.
  • Enhanced operational usability for animal care. The automatic animal authentication capability removes the necessity of manual collar–animal reassignment, substantially reducing caregiver workload and animal handling stress. This practical advancement not only ensures accurate data attribution but also makes casual tampering or misattribution of “sick-animal” telemetry harder to carry out unnoticed, thereby reducing unnecessary veterinary interventions and enhancing overall welfare monitoring efficiency in resource-constrained zoo environments.
These findings can guide animal facility managers toward implementing secure and efficient welfare-monitoring networks without extensive hardware modifications or specialized IT expertise. The zero-state collar design further simplifies deployment, maintenance, and key management, significantly reducing operational overhead. Concretely, beyond a standard IMU collar, the required extensions are lightweight and off-the-shelf, e.g., (i) an edge gateway (a Raspberry Pi-class device) running an MQTT broker/client and the verification/inference pipeline, (ii) a stable WLAN access point (or an existing facility network) for collar-to-edge connectivity, and (iii) basic credential provisioning (e.g., a broker username/password and CA certificate) for TLS-enabled MQTT. No additional invasive tags (e.g., RFID/ear tags) are required.
Looking ahead, the framework’s versatility and robustness could be further enhanced by incorporating multimodal sensor data, advanced metric-learning strategies to decrease FRR, systematic battery optimization tests under extended use, and rigorous validation in diverse, multi-species scenarios. Overall, our investigation confirms that a carefully designed, software-centric IoT security stack effectively balances cyber-resilience and practical usability, setting a foundation for safer and more effective animal-welfare management systems.

Author Contributions

Conceptualization, G.C., Y.T. and H.W.; Methodology, G.C.; Software, G.C.; Validation, K.M. and Y.T.; Formal analysis, G.C.; Investigation, G.C.; Resources, Y.T.; Data curation, G.C.; Writing—original draft preparation, G.C.; Writing—review and editing, G.C., H.W., K.M. and Y.T.; Visualization, H.W.; Supervision, Y.T.; Project administration, Y.T. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The raw IMU datasets used in this study were obtained from publicly available third-party sources: (i) the PLOS ONE dataset (https://doi.org/10.1371/journal.pone.0286311) and (ii) the DANS Data Station Life Sciences dataset (https://doi.org/10.17026/DANS-XHN-BSFB). Due to third-party data ownership, the original raw datasets cannot be redistributed by the authors. Derived data, experimental configurations in this study are available from the corresponding author upon reasonable request.

Acknowledgments

During the preparation of this work, the authors used ChatGPT (GPT-5, OpenAI) and Grammarly (version 1.152.2) in order to improve the readability of the paper. After using this tool/service, the authors reviewed and edited the content as needed and take full responsibility for the content of the publication.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Dritsas, E.; Trigka, M. A Survey on Cybersecurity in IoT. Future Internet 2025, 17, 30. [Google Scholar] [CrossRef]
  2. Fortino, G.; Savaglio, C.; Spezzano, G.; Zhou, M. Internet of Things as System of Systems: A Review of Methodologies, Frameworks, Platforms, and Tools. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 223–236. [Google Scholar] [CrossRef]
  3. Hughes, J.P.; Diffie, W. The Challenges of IoT, TLS, and Random Number Generators in the Real World: Bad random numbers are still with us and are proliferating in modern systems. Queue 2022, 20, 18–40. [Google Scholar] [CrossRef]
  4. Ito, H. Edge-AI Based Cattle Behavior Estimation System for Grazing. In 2020 International Symposium on VLSI Design, Automation and Test (VLSI-DAT); IEEE: Hsinchu, Taiwan, 2020; p. 1. [Google Scholar] [CrossRef]
  5. Sharma, M.; Elmiligi, H. Behavioral Biometrics: Past, Present and Future. In Recent Advances in Biometrics; Sarfraz, M., Ed.; IntechOpen: London, UK, 2022; Chapter 4. [Google Scholar] [CrossRef]
  6. Revadigar, G.; Javali, C.; Xu, W.; Vasilakos, A.V.; Hu, W.; Jha, S. Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2467–2482. [Google Scholar] [CrossRef]
  7. Dinculeană, D.; Cheng, X. Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices. Appl. Sci. 2019, 9, 848. [Google Scholar] [CrossRef]
  8. Shin, M.; Hwang, S.; Kim, B. AI-Based Smart Monitoring Framework for Livestock Farms. Appl. Sci. 2025, 15, 5638. [Google Scholar] [CrossRef]
  9. Ahmed, M.; Li, S.; Wang, J.; Zhao, H. Animal Re-Identification Using Cross-View Metric Learning for Wildlife Monitoring. Ecol. Inform. 2023, 77, 102238. [Google Scholar] [CrossRef]
  10. Ray-Dowling, A.; Hou, D.; Schuckers, S. Stationary Mobile Behavioral Biometrics: A Survey. Comput. Secur. 2023, 128, 103184. [Google Scholar] [CrossRef]
  11. Mekruksavanich, S.; Jitpattanakul, A. Wearable Sensor-Based Behavioral User Authentication Using a Hybrid Deep Learning Approach with Squeeze-and-Excitation Mechanism. Computers 2024, 13, 337. [Google Scholar] [CrossRef]
  12. Tan, A.; Dong, C.; Wang, Y.; Wang, C.; Xia, C. Intelligent and Secure Cloud–Edge Collaborative Industrial Information Encryption Strategy Based on Credibility Assessment. Appl. Sci. 2024, 14, 8812. [Google Scholar] [CrossRef]
  13. Zhu, W.; Zhou, C.; Jiang, L. A Trusted Internet of Things Access Scheme for Cloud Edge Collaboration. Electronics 2024, 13, 1026. [Google Scholar] [CrossRef]
  14. DeMedeiros, K.; Hendawi, A.; Alvarez, M. A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks. Sensors 2023, 23, 1352. [Google Scholar] [CrossRef] [PubMed]
  15. Dong, S.; Wang, P.; Abbas, K. A survey on deep learning and its applications. Comput. Sci. Rev. 2021, 40, 100379. [Google Scholar] [CrossRef]
  16. Deshmukh, A.; Ravulakollu, K. An Efficient CNN-Based Intrusion Detection System for IoT: Use Case Towards Cybersecurity. Technologies 2024, 12, 203. [Google Scholar] [CrossRef]
  17. Sinha, P.; Sahu, D.; Prakash, S.; Yang, T.; Rathore, R.S.; Pandey, V.K. A high performance hybrid LSTM CNN secure architecture for IoT environments using deep learning. Sci. Rep. 2025, 15, 9684. [Google Scholar] [CrossRef] [PubMed]
  18. Lakshminarayana, S.; Praseed, A.; Thilagam, P.S. Securing the IoT Application Layer From an MQTT Protocol Perspective: Challenges and Research Prospects. IEEE Commun. Surv. Tutor. 2024, 26, 2510–2546. [Google Scholar] [CrossRef]
  19. Marcato, M.; Tedesco, S.; O’Mahony, C.; O’Flynn, B.; Galvin, P. Machine learning based canine posture estimation using inertial data. PLoS ONE 2023, 18, e0286311. [Google Scholar] [CrossRef] [PubMed]
  20. Goodall, W.; Wallace, F.; Jackson, M. KitBit: An Instrumented Collar for Indoor Pets. In ACI ’23: Proceedings of the Tenth International Conference on Animal-Computer Interaction, Raleigh, NC, USA; ACM: New York, NY, USA, 2024. [Google Scholar] [CrossRef]
  21. Hammerla, N.Y.; Halloran, S.; Plötz, T. Deep, convolutional, and recurrent models for human activity recognition using wearables. In IJCAI’16: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence; AAAI Press: New York, NY, USA, 2016; pp. 1533–1540. Available online: https://dl.acm.org/doi/10.5555/3060832.3060835 (accessed on 10 February 2026).
  22. Lin, T.Y.; Goyal, P.; Girshick, R.; He, K.; Dollár, P. Focal Loss for Dense Object Detection. IEEE Trans. Pattern Anal. Mach. Intell. 2020, 42, 318–327. [Google Scholar] [CrossRef] [PubMed]
  23. Rango, F.D.; Spina, M.G.; Iera, A. DLST-MQTT: Dynamic and Lightweight Security over Topics MQTT. Future Gener. Comput. Syst. 2025, 166, 107625. [Google Scholar] [CrossRef]
  24. McKay, K.A.; Cooper, D.A.; Barker, E.; Smid, M. Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations; NIST Special Publication SP 800-52 Rev. 2; NIST: Gaithersburg, MD, USA, 2019. [Google Scholar] [CrossRef]
  25. Frankel, S.; Kelly, S.G. Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec; RFC 4868; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2007. [Google Scholar] [CrossRef]
  26. Cover, T.M. Elements of Information Theory, 2nd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2005. [Google Scholar] [CrossRef]
  27. Turan, M.S.; Barker, E.; Kelsey, J.; McKay, K.; Baish, M.; Boyle, M. Recommendation for the Entropy Sources Used for Random Bit Generation; Special Publication (NIST SP) 800-90B 800-90B; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018. [Google Scholar] [CrossRef]
  28. Kamminga, J. Multi Sensor-Orientation Movement Data of Goats; DATA Archiving and Networked Services (DANS): The Hague, The Netherlands, 2018; Version V1. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.