TY - JOUR
T1 - Exploiting Screen-Touch Trajectory for Passive User Authentication in Industrial Internet of Things Systems
AU - Zhao, Guozhu
AU - Zhang, Pinchang
AU - Shen, Yulong
AU - Peng, Limei
AU - Jiang, Xiaohong
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - —This article exploits the spatial–temporal features of user screen-touch trajectory (STT) to develop a user authentication framework for Industrial Internet of Things (IIoT) systems. We first model the STT as a trajectory image and apply the speeded-up robust features (SURF) algorithm for STT spatial feature characterization. We then model the STT as a time series and employ the hidden Markov model (HMM) for the STT temporal feature extraction. We further design a classifier based on HMM for the above temporal feature and also a classifier based on eXtreme Gradient Boosting for the spatial feature. By combining the two classifiers and assigning each classifier an appropriate weight, we develop a passive user authentication framework. The new framework has the potential to significantly impact the IIoT security practices by offering a flexible and efficient authentication method for IIoT systems, and it also can serve as a complementary solution or an enhancement for the traditional authentication mechanism of such systems.
AB - —This article exploits the spatial–temporal features of user screen-touch trajectory (STT) to develop a user authentication framework for Industrial Internet of Things (IIoT) systems. We first model the STT as a trajectory image and apply the speeded-up robust features (SURF) algorithm for STT spatial feature characterization. We then model the STT as a time series and employ the hidden Markov model (HMM) for the STT temporal feature extraction. We further design a classifier based on HMM for the above temporal feature and also a classifier based on eXtreme Gradient Boosting for the spatial feature. By combining the two classifiers and assigning each classifier an appropriate weight, we develop a passive user authentication framework. The new framework has the potential to significantly impact the IIoT security practices by offering a flexible and efficient authentication method for IIoT systems, and it also can serve as a complementary solution or an enhancement for the traditional authentication mechanism of such systems.
KW - Industrial Internet of Things (IIoT) security
KW - passive authentication
KW - screen-touch trajectory (STT)
KW - spatial–temporal features
UR - http://www.scopus.com/inward/record.url?scp=85190167639&partnerID=8YFLogxK
U2 - 10.1109/TII.2024.3379643
DO - 10.1109/TII.2024.3379643
M3 - Article
AN - SCOPUS:85190167639
SN - 1551-3203
VL - 20
SP - 9098
EP - 9108
JO - IEEE Transactions on Industrial Informatics
JF - IEEE Transactions on Industrial Informatics
IS - 7
ER -