Passive User Authentication Utilizing Two-Dimensional Features for IIoT Systems

Guozhu Zhao, Pinchang Zhang, Yulong Shen, Limei Peng, Xiaohong Jiang

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

Passive user authentication is critical for the secure operation of Industrial Internet of Things (IIoT) systems. By jointly utilizing both the time-varying characteristics of the user sequential operation actions and spatial variation characteristics of channel state information (CSI) caused by these actions, this article proposes a novel two-dimensional passive authentication framework for IIoT systems. In particular, we construct the time-varying operation action sequences from the routine work process of a user and apply the Hidden Markov Model to characterize behavioral biometric characteristics of the user, and also employ the eXtreme Gradient Boosting model to depict the spatial variation characteristics of CSI related to the user. By designing two classifiers corresponding these two characteristics and assigning each classifier an appropriate weight, we propose a two-dimensional user authentication framework for continuous and non-intrusive user authentication in IIoT scenarios. Extensive experiments are conducted to illustrate the authentication performance of the proposed authentication framework in terms of false acceptance rate, false rejection rate and equal-error rate. We further investigate the related authentication efficiency issues like the sensitivity to the weights for classifiers, the sensitivity to authentication time and the capability of resisting against impersonation attacks.

Original languageEnglish
Pages (from-to)2770-2783
Number of pages14
JournalIEEE Transactions on Cloud Computing
Volume11
Issue number3
DOIs
StatePublished - 1 Jul 2023

Keywords

  • Behavioral biometrics
  • channel state information (CSI)
  • industrial Internet of Things (IIoT) security
  • passive authentication

Fingerprint

Dive into the research topics of 'Passive User Authentication Utilizing Two-Dimensional Features for IIoT Systems'. Together they form a unique fingerprint.

Cite this