|Table of Contents|

User behavioral authentication mechanism and analysis based on IOT


Research Field:
Publishing date:


User behavioral authentication mechanism and analysis based on IOT
Wang Xiaoju1Tian Liqin12Zhao Jingxiong1
1.Computer Department,North China Institute of Science and Technology,Beijing 101601,China; 2.School of Computer Science and Technology,Qinghai Normal University,Xining 810008,China
internet of things behavior authentication user re-authentication stochastic Petri net dynamic user behavior performance analysis false negative rate
In order to reduce the false negative rate of the user's identity under the environment of Internet of Things,this paper proposes a dynamic user behavior authentication mechanism based on the combination of authentication and behavior authentication.The paper presents the creation of the user behavior authentication set.The paper presents the realization process of the whole mechanism.The paper focuses on the determinate sufficient behavior authentication and the uncertain necessary behavior authentication.At the same time,the Stochastic Petri Net(SPN)model of each authentication is given to analyze the impact of performance and the false positive of the mechanism.Theoretical analysis shows that this mechanism is remarkable in improving the security of user authentication mechanism.


[1] Shen Chao,Cai Zhongmin.User authentication through mouse dynamics[J].Information Forensics and Security,2013,8(1):16-30.
[2]Juola P,Noecker J I,Stolerman A,et al.Keyboard-behavior-based authentication[J].IT Professional,2013,15(4):8-11.
[3]Ahmed A,Nick S.Graphical authentication based on user behaviour[A].Proceedings of the 2010 International Conference on Security and Cryptography[C].Athens,Greece:IEEE,2010:1-4.
Shen Haibo,Jiang Haitao,Zhuang Kechen,et al.Artificial immunity based trust detection method for wireless sensor networks[J].Journal of Nanjing University of Science and Technology,2014,38(3):318-324.
Liu Gang,Zhang Hong,Li Qianmu.Network security optimal attack and defense decision-making method based on game model[J].Journal of Nanjing University of Science and Technology,2014,38(1):12-21.
Chen Yarui,Tian Liqin,Yang Yang.Modeling and analysis of dynamic user behavior authentication scheme in cloud computing[J].Journal of System Simulation,2011,23(11):2302-2307.
[7]Liu Wei,Huang Daoli,Zhang Leyuan.Analysis of network user behavior[A].Information Computing and Telecommunications(YC-ICT),2010 IEEE Youth Conference[C].Beijing,China:IEEE,2010:126-129.
Lin Chuang,Tian Linqin,Wei Yaya.Performance equivalent analysis of workflow system model[J].Journal of Software,2002,13(8):1472-1480.


Last Update: 2015-02-28