|Table of Contents|

User behavioral authentication mechanism and analysis based on IOT

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2015年01期
Page:
70-77
Research Field:
Publishing date:

Info

Title:
User behavioral authentication mechanism and analysis based on IOT
Author(s):
Wang Xiaoju1Tian Liqin12Zhao Jingxiong1
1.Computer Department,North China Institute of Science and Technology,Beijing 101601,China; 2.School of Computer Science and Technology,Qinghai Normal University,Xining 810008,China
Keywords:
internet of things behavior authentication user re-authentication stochastic Petri net dynamic user behavior performance analysis false negative rate
PACS:
TP302
DOI:
-
Abstract:
In order to reduce the false negative rate of the user's identity under the environment of Internet of Things,this paper proposes a dynamic user behavior authentication mechanism based on the combination of authentication and behavior authentication.The paper presents the creation of the user behavior authentication set.The paper presents the realization process of the whole mechanism.The paper focuses on the determinate sufficient behavior authentication and the uncertain necessary behavior authentication.At the same time,the Stochastic Petri Net(SPN)model of each authentication is given to analyze the impact of performance and the false positive of the mechanism.Theoretical analysis shows that this mechanism is remarkable in improving the security of user authentication mechanism.

References:

[1] Shen Chao,Cai Zhongmin.User authentication through mouse dynamics[J].Information Forensics and Security,2013,8(1):16-30.
[2]Juola P,Noecker J I,Stolerman A,et al.Keyboard-behavior-based authentication[J].IT Professional,2013,15(4):8-11.
[3]Ahmed A,Nick S.Graphical authentication based on user behaviour[A].Proceedings of the 2010 International Conference on Security and Cryptography[C].Athens,Greece:IEEE,2010:1-4.
[4]沈海波,姜海涛,庄克琛,等.基于人工免疫的无线传感器网络信任监测方法[J].南京理工大学学报,2014,38(3):318-324.
Shen Haibo,Jiang Haitao,Zhuang Kechen,et al.Artificial immunity based trust detection method for wireless sensor networks[J].Journal of Nanjing University of Science and Technology,2014,38(3):318-324.
[5]刘刚,张宏,李千目.基于博弈模型的网络安全最优攻防决策方法[J].南京理工大学学报,2014,38(1):12-21.
Liu Gang,Zhang Hong,Li Qianmu.Network security optimal attack and defense decision-making method based on game model[J].Journal of Nanjing University of Science and Technology,2014,38(1):12-21.
[6]陈亚睿,田立勤,杨扬.云计算环境下动态用户行为认证的机制、模型与分析[J].系统仿真学报,2011,23(11):2302-2307.
Chen Yarui,Tian Liqin,Yang Yang.Modeling and analysis of dynamic user behavior authentication scheme in cloud computing[J].Journal of System Simulation,2011,23(11):2302-2307.
[7]Liu Wei,Huang Daoli,Zhang Leyuan.Analysis of network user behavior[A].Information Computing and Telecommunications(YC-ICT),2010 IEEE Youth Conference[C].Beijing,China:IEEE,2010:126-129.
[8]田立勤.网络用户行为的安全可信分析与控制[M].北京:清华大学出版社/北京交通大学出版社,2011:144-152.
[9]林闯,王元卓.基于随机博弈模型的网络安全分析与评价[M].北京:清华大学出版社,2011:65-77.
[10]林闯,田立勤,魏丫丫.工作流系统模型的性能等价分析[J].软件学报,2002,13(8),1472-1480.
Lin Chuang,Tian Linqin,Wei Yaya.Performance equivalent analysis of workflow system model[J].Journal of Software,2002,13(8):1472-1480.

Memo

Memo:
-
Last Update: 2015-02-28