[1]王晓菊,田立勤,赵竞雄.基于物联网的用户行为认证机制与分析[J].南京理工大学学报(自然科学版),2015,39(01):70-77.
 Wang Xiaoju,Tian Liqin,Zhao Jingxiong.User behavioral authentication mechanism and analysis based on IOT[J].Journal of Nanjing University of Science and Technology,2015,39(01):70-77.
点击复制

基于物联网的用户行为认证机制与分析
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
39卷
期数:
2015年01期
页码:
70-77
栏目:
出版日期:
2015-02-28

文章信息/Info

Title:
User behavioral authentication mechanism and analysis based on IOT
作者:
王晓菊1田立勤12赵竞雄1
1.华北科技学院 计算机学院,北京 101601; 2.青海师范大学 计算机学院,青海 西宁 810008
Author(s):
Wang Xiaoju1Tian Liqin12Zhao Jingxiong1
1.Computer Department,North China Institute of Science and Technology,Beijing 101601,China; 2.School of Computer Science and Technology,Qinghai Normal University,Xining 810008,China
关键词:
物联网 行为认证 身份再认证 随机Petri网 动态用户行为 性能分析 漏报率
Keywords:
internet of things behavior authentication user re-authentication stochastic Petri net dynamic user behavior performance analysis false negative rate
分类号:
TP302
摘要:
为了减少物联网环境中对用户身份的漏报率,该文将传统的身份认证和行为认证相结合,提出了一种基于物联网的动态用户行为认证机制。建立了用户行为认证集,论述了整个机制的实现过程。论述了确定的充分行为认证和不确定的必要行为认证,同时给出了每个认证过程的随机Petri网(Stochastic Petri Net,SPN)模型,并用Petri网量化分析了该机制对性能的影响和认证漏报率。理论分析表明:该机制在提高用户认证机制的安全性方面具有显著效果,同时性能良好。
Abstract:
In order to reduce the false negative rate of the user's identity under the environment of Internet of Things,this paper proposes a dynamic user behavior authentication mechanism based on the combination of authentication and behavior authentication.The paper presents the creation of the user behavior authentication set.The paper presents the realization process of the whole mechanism.The paper focuses on the determinate sufficient behavior authentication and the uncertain necessary behavior authentication.At the same time,the Stochastic Petri Net(SPN)model of each authentication is given to analyze the impact of performance and the false positive of the mechanism.Theoretical analysis shows that this mechanism is remarkable in improving the security of user authentication mechanism.

参考文献/References:

[1] Shen Chao,Cai Zhongmin.User authentication through mouse dynamics[J].Information Forensics and Security,2013,8(1):16-30.
[2]Juola P,Noecker J I,Stolerman A,et al.Keyboard-behavior-based authentication[J].IT Professional,2013,15(4):8-11.
[3]Ahmed A,Nick S.Graphical authentication based on user behaviour[A].Proceedings of the 2010 International Conference on Security and Cryptography[C].Athens,Greece:IEEE,2010:1-4.
[4]沈海波,姜海涛,庄克琛,等.基于人工免疫的无线传感器网络信任监测方法[J].南京理工大学学报,2014,38(3):318-324.
Shen Haibo,Jiang Haitao,Zhuang Kechen,et al.Artificial immunity based trust detection method for wireless sensor networks[J].Journal of Nanjing University of Science and Technology,2014,38(3):318-324.
[5]刘刚,张宏,李千目.基于博弈模型的网络安全最优攻防决策方法[J].南京理工大学学报,2014,38(1):12-21.
Liu Gang,Zhang Hong,Li Qianmu.Network security optimal attack and defense decision-making method based on game model[J].Journal of Nanjing University of Science and Technology,2014,38(1):12-21.
[6]陈亚睿,田立勤,杨扬.云计算环境下动态用户行为认证的机制、模型与分析[J].系统仿真学报,2011,23(11):2302-2307.
Chen Yarui,Tian Liqin,Yang Yang.Modeling and analysis of dynamic user behavior authentication scheme in cloud computing[J].Journal of System Simulation,2011,23(11):2302-2307.
[7]Liu Wei,Huang Daoli,Zhang Leyuan.Analysis of network user behavior[A].Information Computing and Telecommunications(YC-ICT),2010 IEEE Youth Conference[C].Beijing,China:IEEE,2010:126-129.
[8]田立勤.网络用户行为的安全可信分析与控制[M].北京:清华大学出版社/北京交通大学出版社,2011:144-152.
[9]林闯,王元卓.基于随机博弈模型的网络安全分析与评价[M].北京:清华大学出版社,2011:65-77.
[10]林闯,田立勤,魏丫丫.工作流系统模型的性能等价分析[J].软件学报,2002,13(8),1472-1480.
Lin Chuang,Tian Linqin,Wei Yaya.Performance equivalent analysis of workflow system model[J].Journal of Software,2002,13(8):1472-1480.

相似文献/References:

[1]汪峥,钱焕延,汪婧雅,等.基于速度分治的车载物联网良性蠕虫模型[J].南京理工大学学报(自然科学版),2012,36(01):43.
 WANG Zheng,QIAN Huan-yan,WANG Jing-ya,et al.New Anti-worm Model in Vehicular Internet of Things Based on Divide-and-conquer with Velocity[J].Journal of Nanjing University of Science and Technology,2012,36(01):43.
[2]周彩秋,杨余旺,刘建利,等.基于可信度的物联网门限证明方案[J].南京理工大学学报(自然科学版),2018,42(03):317.[doi:10.14177/j.cnki.32-1397n.2018.42.03.009]
 Zhou Caiqiu,Yang Yuwang,Liu Jianli,et al.Threshold attestation scheme for internet of thingsbased on trust value[J].Journal of Nanjing University of Science and Technology,2018,42(01):317.[doi:10.14177/j.cnki.32-1397n.2018.42.03.009]

备注/Memo

备注/Memo:
收稿日期:2014-07-30 修回日期:2014-11-22
基金项目:国家自然科学基金(61163050,61472137); 新世纪优秀人才(NCET-10-0101); 青海省农业成果转化与推广项目(2012-N-525); 青海省自然科学基金(2012-Z-935Q); 中央高校基本科研业务项目(3142013098,3142014125,3142014069,2011B028,HKJYZD201224)
作者简介:王晓菊(1981-),女,讲师,主要研究方向:计算机网络、网络安全,E-mail:26091755@qq.com。
引文格式:王晓菊,田立勤,赵竞雄.基于物联网的用户行为认证机制与分析[J].南京理工大学学报,2015,39(1):70-77.
投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2015-02-28