{"title":"多特征在工业物联网场景下持续认证中的适用性研究","authors":"Guozhu Zhao, Pinchang Zhang, Lisheng Ma","doi":"10.1109/NaNA53684.2021.00041","DOIUrl":null,"url":null,"abstract":"By exploiting characteristics from channel state information (CSI) profiles and the behavioral habits of users during their routine work processes in IIoT systems, this paper proposes a passive multi-characteristics user authentication framework for continuous user authentication. We first characterize user physical layer identities using a well-known eXtreme Gradient Boosting (XGBoost) machine learning algorithm, and then depict user behavioral characteristics by formulating the authentication decision process as a Hidden Markov Model (HMM) to further confirm user identities. Extensive experiments are performed to show the authentication performance of the proposed user authentication framework in terms of ROC curves and accuracy in various IIoT scenarios. We also investigate the performance of the proposed framework for resisting impersonation attacks in the IIoT scenario.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT Scenarios\",\"authors\":\"Guozhu Zhao, Pinchang Zhang, Lisheng Ma\",\"doi\":\"10.1109/NaNA53684.2021.00041\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"By exploiting characteristics from channel state information (CSI) profiles and the behavioral habits of users during their routine work processes in IIoT systems, this paper proposes a passive multi-characteristics user authentication framework for continuous user authentication. We first characterize user physical layer identities using a well-known eXtreme Gradient Boosting (XGBoost) machine learning algorithm, and then depict user behavioral characteristics by formulating the authentication decision process as a Hidden Markov Model (HMM) to further confirm user identities. Extensive experiments are performed to show the authentication performance of the proposed user authentication framework in terms of ROC curves and accuracy in various IIoT scenarios. We also investigate the performance of the proposed framework for resisting impersonation attacks in the IIoT scenario.\",\"PeriodicalId\":414672,\"journal\":{\"name\":\"2021 International Conference on Networking and Network Applications (NaNA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Networking and Network Applications (NaNA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NaNA53684.2021.00041\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA53684.2021.00041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT Scenarios
By exploiting characteristics from channel state information (CSI) profiles and the behavioral habits of users during their routine work processes in IIoT systems, this paper proposes a passive multi-characteristics user authentication framework for continuous user authentication. We first characterize user physical layer identities using a well-known eXtreme Gradient Boosting (XGBoost) machine learning algorithm, and then depict user behavioral characteristics by formulating the authentication decision process as a Hidden Markov Model (HMM) to further confirm user identities. Extensive experiments are performed to show the authentication performance of the proposed user authentication framework in terms of ROC curves and accuracy in various IIoT scenarios. We also investigate the performance of the proposed framework for resisting impersonation attacks in the IIoT scenario.