Skip to main content

Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems

  • Conference paper
  • First Online:
Science of Cyber Security (SciSec 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13580))

Included in the following conference series:

  • 899 Accesses

Abstract

We propose a continuous and non-intrusive passive authentication method for the Industrial Internet of Things (IIoT) systems, based on user consecutive touch screen actions during routine work processes. In particular, utilizing both the temporal-variation characteristics of the user sequential touch screen actions and the constructed features from cumulative touch screen action trajectory images (CTTIs), we propose a novel touch-interaction based passive authentication method for IIoT systems. We use the Hidden Markov Model to characterize temporal-variation characteristics of user sequential touch screen actions, and also employ the PatternNet to depict the features of cumulative touch screen action trajectory images. Extensive experiments are conducted to illustrate the authentication performance in terms of equal-error rate and accuracy for resisting against impersonation attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gilchrist, A.: Industry 4.0: the Industrial Internet of Things. Apress, Berkeley, CA (2016). https://doi.org/10.1007/978-1-4842-2047-4

  2. Qiu, T., Chi, J., Zhou, X., Ning, Z., Atiquzzaman, M., Wu, D.O.: Edge computing in Industrial Internet of Things: architecture, advances and challenges. IEEE Commun. Surveys Tutorials 22(4), 2462–2488 (2020)

    Article  Google Scholar 

  3. Mumtaz, S., Bo, A., Al-Dulaimi, A., Tsang, K.: Guest editorial 5G and beyond mobile technologies and applications for Industrial IoT (IIoT). IEEE Trans. Industr. Inf. 14(6), 2588–2591 (2018)

    Article  Google Scholar 

  4. Shahzad, M., Singh, M.P.: Continuous authentication and authorization for the Internet of Things. IEEE Internet Comput. 21(2), 86–90 (2017)

    Article  Google Scholar 

  5. Abuhamad, M., Abuhmed, T., Mohaisen, D., Nyang, D.: AUToSen: deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J. 7(6), 5008–5020 (2020)

    Article  Google Scholar 

  6. Qin, Z., et al.: Learning-aided user identification using smartphone sensors for smart homes. IEEE Internet Things J. 6(5), 7760–7772 (2019)

    Google Scholar 

  7. Zhao, G., Zhang, P., Shen, Y., Jiang, X.: Passive user authentication utilizing behavioral biometrics for IIoT systems. IEEE Internet Things J. 9(14), 12783–12798 (2022). https://ieeexplore.ieee.org/document/9663152

  8. Shen, C., Li, Y., Chen, Y., Guan, X., Maxion, R.A.: Performance analysis of multi-motion sensor behavior for active smartphone authentication. IEEE Trans. Inf. Forensics Secur. 13(1), 48–62 (2018)

    Article  Google Scholar 

  9. Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2013)

    Article  Google Scholar 

  10. Hartigan, J.A., Wong, M.A.: A k-means clustering algorithm. J. Royal Stat. Soc. Ser. c (Appl. Stat.) 28(1), 100–108 (1979)

    Google Scholar 

  11. Baggenstoss, P.: A modified Baum-Welch algorithm for hidden Markov models with multiple observation spaces. IEEE Trans. Speech Audio Process. 9(4), 411–416 (2001)

    Google Scholar 

  12. Rabiner, L., Juang, B.: An introduction to hidden Markov models. IEEE ASSP Mag. 3(1), 4–16 (1986)

    Article  Google Scholar 

  13. Bay, H., Tuytelaars, T., Van Gool, L.: SURF: speeded up robust features. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol. 3951, pp. 404–417. Springer, Heidelberg (2006). https://doi.org/10.1007/11744023_32

    Chapter  Google Scholar 

  14. He, R., Hu, B.-G., Zheng, W.-S., Kong, X.-W.: Robust principal component analysis based on maximum correntropy criterion. IEEE Trans. Image Process. 20(6), 1485–1494 (2011)

    Article  MathSciNet  Google Scholar 

  15. Li, H., Ellis, J.G., Zhang, L., Chang, S.-F.: PatternNet: visual pattern mining with deep neural network. In: Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, pp. 291–299 (2018)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by the Academic Funding Project for Top Talents of Disciplines (Majors) in Universities of Anhui Province of China (No. gxbjZD2021080), the Key Project of Science Research in Universities of Anhui Province of China (No. KJ2021A1066, KJ2021A1067), the National Key R &D Program of China (No. 2018YFE0207600, 2018YFB2100403), the National Natural Science Foundation of China (No. U1736216, 61972308) and the Natural Science Basic Research Program of Shaanxi (No. 2019JC-17).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Pinchang Zhang or Yulong Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, G., Zhang, P., Shen, Y., Jiang, X. (2022). Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems. In: Su, C., Sakurai, K., Liu, F. (eds) Science of Cyber Security. SciSec 2022. Lecture Notes in Computer Science, vol 13580. Springer, Cham. https://doi.org/10.1007/978-3-031-17551-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-17551-0_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-17550-3

  • Online ISBN: 978-3-031-17551-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics