TY - JOUR
T1 - Passive User Authentication Utilizing Two-Dimensional Features for IIoT Systems
AU - Zhao, Guozhu
AU - Zhang, Pinchang
AU - Shen, Yulong
AU - Peng, Limei
AU - Jiang, Xiaohong
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2023/7/1
Y1 - 2023/7/1
N2 - Passive user authentication is critical for the secure operation of Industrial Internet of Things (IIoT) systems. By jointly utilizing both the time-varying characteristics of the user sequential operation actions and spatial variation characteristics of channel state information (CSI) caused by these actions, this article proposes a novel two-dimensional passive authentication framework for IIoT systems. In particular, we construct the time-varying operation action sequences from the routine work process of a user and apply the Hidden Markov Model to characterize behavioral biometric characteristics of the user, and also employ the eXtreme Gradient Boosting model to depict the spatial variation characteristics of CSI related to the user. By designing two classifiers corresponding these two characteristics and assigning each classifier an appropriate weight, we propose a two-dimensional user authentication framework for continuous and non-intrusive user authentication in IIoT scenarios. Extensive experiments are conducted to illustrate the authentication performance of the proposed authentication framework in terms of false acceptance rate, false rejection rate and equal-error rate. We further investigate the related authentication efficiency issues like the sensitivity to the weights for classifiers, the sensitivity to authentication time and the capability of resisting against impersonation attacks.
AB - Passive user authentication is critical for the secure operation of Industrial Internet of Things (IIoT) systems. By jointly utilizing both the time-varying characteristics of the user sequential operation actions and spatial variation characteristics of channel state information (CSI) caused by these actions, this article proposes a novel two-dimensional passive authentication framework for IIoT systems. In particular, we construct the time-varying operation action sequences from the routine work process of a user and apply the Hidden Markov Model to characterize behavioral biometric characteristics of the user, and also employ the eXtreme Gradient Boosting model to depict the spatial variation characteristics of CSI related to the user. By designing two classifiers corresponding these two characteristics and assigning each classifier an appropriate weight, we propose a two-dimensional user authentication framework for continuous and non-intrusive user authentication in IIoT scenarios. Extensive experiments are conducted to illustrate the authentication performance of the proposed authentication framework in terms of false acceptance rate, false rejection rate and equal-error rate. We further investigate the related authentication efficiency issues like the sensitivity to the weights for classifiers, the sensitivity to authentication time and the capability of resisting against impersonation attacks.
KW - Behavioral biometrics
KW - channel state information (CSI)
KW - industrial Internet of Things (IIoT) security
KW - passive authentication
UR - http://www.scopus.com/inward/record.url?scp=85172199840&partnerID=8YFLogxK
U2 - 10.1109/TCC.2022.3227171
DO - 10.1109/TCC.2022.3227171
M3 - Article
AN - SCOPUS:85172199840
SN - 2168-7161
VL - 11
SP - 2770
EP - 2783
JO - IEEE Transactions on Cloud Computing
JF - IEEE Transactions on Cloud Computing
IS - 3
ER -