A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns

Yosef Ashibani, Q. Mahmoud
{"title":"A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns","authors":"Yosef Ashibani, Q. Mahmoud","doi":"10.1109/IECON.2018.8592761","DOIUrl":null,"url":null,"abstract":"Access to Internet of Things (IoT) devices is, in most cases, achieved remotely through end-user devices such as smartphones. However, these devices are susceptible to theft or loss, and their use by unauthorized users could lead to unauthorized access to IoT networks, consequently allowing access to user information. Due to the inherent weaknesses in many authentication approaches, such as knowledge-based authentication, as well as the complications involved in employing them for continuous and implicit authentication, focus has turned to a consideration of behavioral-based authentication. As most access to IoT devices is achieved through end-user devices, a variety of information can be extracted and utilized for continuous authentication without requiring further user intervention. As an example, the ability to continuously retrieve application usage profiles and sensor data on such devices strengthens the argument for employing behavioral-based mechanisms for continuous user authentication. Behavioral techniques that are user-friendly and non-intrusive can be utilized in the background to continuously and transparently verify users. This paper discusses behavioral-based authentication mechanisms with regard to security and usability. It then presents an authentication model that verifies users with an average F-measure of 96.5%. Overall, the preliminary results are promising and show the effectiveness and usability of the proposed model.","PeriodicalId":370319,"journal":{"name":"IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IECON.2018.8592761","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Access to Internet of Things (IoT) devices is, in most cases, achieved remotely through end-user devices such as smartphones. However, these devices are susceptible to theft or loss, and their use by unauthorized users could lead to unauthorized access to IoT networks, consequently allowing access to user information. Due to the inherent weaknesses in many authentication approaches, such as knowledge-based authentication, as well as the complications involved in employing them for continuous and implicit authentication, focus has turned to a consideration of behavioral-based authentication. As most access to IoT devices is achieved through end-user devices, a variety of information can be extracted and utilized for continuous authentication without requiring further user intervention. As an example, the ability to continuously retrieve application usage profiles and sensor data on such devices strengthens the argument for employing behavioral-based mechanisms for continuous user authentication. Behavioral techniques that are user-friendly and non-intrusive can be utilized in the background to continuously and transparently verify users. This paper discusses behavioral-based authentication mechanisms with regard to security and usability. It then presents an authentication model that verifies users with an average F-measure of 96.5%. Overall, the preliminary results are promising and show the effectiveness and usability of the proposed model.
基于应用使用模式的物联网网络用户认证行为分析模型
在大多数情况下,对物联网(IoT)设备的访问是通过智能手机等终端用户设备远程实现的。然而,这些设备容易被盗或丢失,未经授权的用户使用它们可能导致未经授权访问物联网网络,从而允许访问用户信息。由于许多身份验证方法(如基于知识的身份验证)存在固有的弱点,以及将其用于连续和隐式身份验证所涉及的复杂性,因此重点转向了对基于行为的身份验证的考虑。由于大多数对物联网设备的访问都是通过最终用户设备实现的,因此可以提取各种信息并利用这些信息进行持续认证,而无需用户进一步干预。例如,在这些设备上持续检索应用程序使用概况和传感器数据的能力加强了采用基于行为的机制进行持续用户身份验证的论点。可以在后台使用用户友好且非侵入性的行为技术来持续透明地验证用户。本文从安全性和可用性方面讨论了基于行为的身份验证机制。然后提出了一个验证模型,该模型对用户进行验证的平均f值为96.5%。总体而言,初步结果是有希望的,表明了所提出模型的有效性和可用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信