首页> 外文会议>Annual Conference of the IEEE Industrial Electronics Society >A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns
【24h】

A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns

机译:基于应用使用模式的物联网网络中用户认证行为分析模型

获取原文

摘要

Access to Internet of Things (IoT) devices is, in most cases, achieved remotely through end-user devices such as smartphones. However, these devices are susceptible to theft or loss, and their use by unauthorized users could lead to unauthorized access to IoT networks, consequently allowing access to user information. Due to the inherent weaknesses in many authentication approaches, such as knowledge-based authentication, as well as the complications involved in employing them for continuous and implicit authentication, focus has turned to a consideration of behavioral-based authentication. As most access to IoT devices is achieved through end-user devices, a variety of information can be extracted and utilized for continuous authentication without requiring further user intervention. As an example, the ability to continuously retrieve application usage profiles and sensor data on such devices strengthens the argument for employing behavioral-based mechanisms for continuous user authentication. Behavioral techniques that are user-friendly and non-intrusive can be utilized in the background to continuously and transparently verify users. This paper discusses behavioral-based authentication mechanisms with regard to security and usability. It then presents an authentication model that verifies users with an average F-measure of 96.5%. Overall, the preliminary results are promising and show the effectiveness and usability of the proposed model.
机译:在大多数情况下,可以通过智能手机等最终用户设备远程访问物联网(IoT)设备。但是,这些设备容易被盗或丢失,未经授权的用户使用它们可能导致未经授权的IoT网络访问,因此允许访问用户信息。由于许多身份验证方法的固有弱点,例如基于知识的身份验证,以及将它们用于连续和隐式身份验证所涉及的复杂性,因此焦点已转向考虑基于行为的身份验证。由于大多数IoT设备访问都是通过最终用户设备实现的,因此无需进一步的用户干预即可提取各种信息并将其用于连续身份验证。例如,在此类设备上连续检索应用程序使用情况配置文件和传感器数据的能力加强了采用基于行为的机制进行连续用户身份验证的论点。可以在后台利用用户友好和非侵入式的行为技术来连续透明地验证用户。本文讨论有关安全性和可用性的基于行为的身份验证机制。然后,它提供了一个验证模型,该模型以96.5%的平均F值验证用户。总体而言,初步结果令人鼓舞,并显示了所提出模型的有效性和可用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号