Jung-San Lee;Tzu-Hao Chen;Chit-Jie Chew;Po-Yao Wang;Yun-Yi Fan
{"title":"基于行为生物识别的零信任体系结构无意识连续认证协议","authors":"Jung-San Lee;Tzu-Hao Chen;Chit-Jie Chew;Po-Yao Wang;Yun-Yi Fan","doi":"10.1109/TR.2025.3541224","DOIUrl":null,"url":null,"abstract":"Zero-trust architecture has received massive attention globally and been a significant development in the field of cybersecurity. Within zero-trust architecture, the continuous authentication (CA) strategy has been proposed to counter the network security threats posed by traditional static authentication mechanisms. However, most studies have focused on either device-to-device authentication or user authentication. This limitation results in risks of identity spoofing or credential theft despite the implementation of the CA mechanism, thus concluding the parity in significance between authenticating users and devices. Furthermore, considering the CA of users, it is essential to face the issue posed by user authentication fatigue. In response to these challenges, this work aims to introduce an unconsciously CA protocol (UCAP) based on zero-trust concepts and behavior biometrics. UCAP utilizes the behavior of keystroke dynamics as a main factor in consistently evaluating the user trust level. This method enables the continual updating of communication keys to preserve robust authentication of both devices and users. The robustness of UCAP has been examined through formal tools, while the experimental outcomes have shown satisfactory performance.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 2","pages":"2591-2604"},"PeriodicalIF":5.7000,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Unconsciously Continuous Authentication Protocol in Zero-Trust Architecture Based on Behavioral Biometrics\",\"authors\":\"Jung-San Lee;Tzu-Hao Chen;Chit-Jie Chew;Po-Yao Wang;Yun-Yi Fan\",\"doi\":\"10.1109/TR.2025.3541224\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Zero-trust architecture has received massive attention globally and been a significant development in the field of cybersecurity. Within zero-trust architecture, the continuous authentication (CA) strategy has been proposed to counter the network security threats posed by traditional static authentication mechanisms. However, most studies have focused on either device-to-device authentication or user authentication. This limitation results in risks of identity spoofing or credential theft despite the implementation of the CA mechanism, thus concluding the parity in significance between authenticating users and devices. Furthermore, considering the CA of users, it is essential to face the issue posed by user authentication fatigue. In response to these challenges, this work aims to introduce an unconsciously CA protocol (UCAP) based on zero-trust concepts and behavior biometrics. UCAP utilizes the behavior of keystroke dynamics as a main factor in consistently evaluating the user trust level. This method enables the continual updating of communication keys to preserve robust authentication of both devices and users. The robustness of UCAP has been examined through formal tools, while the experimental outcomes have shown satisfactory performance.\",\"PeriodicalId\":56305,\"journal\":{\"name\":\"IEEE Transactions on Reliability\",\"volume\":\"74 2\",\"pages\":\"2591-2604\"},\"PeriodicalIF\":5.7000,\"publicationDate\":\"2025-03-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Reliability\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10937066/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Reliability","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10937066/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Unconsciously Continuous Authentication Protocol in Zero-Trust Architecture Based on Behavioral Biometrics
Zero-trust architecture has received massive attention globally and been a significant development in the field of cybersecurity. Within zero-trust architecture, the continuous authentication (CA) strategy has been proposed to counter the network security threats posed by traditional static authentication mechanisms. However, most studies have focused on either device-to-device authentication or user authentication. This limitation results in risks of identity spoofing or credential theft despite the implementation of the CA mechanism, thus concluding the parity in significance between authenticating users and devices. Furthermore, considering the CA of users, it is essential to face the issue posed by user authentication fatigue. In response to these challenges, this work aims to introduce an unconsciously CA protocol (UCAP) based on zero-trust concepts and behavior biometrics. UCAP utilizes the behavior of keystroke dynamics as a main factor in consistently evaluating the user trust level. This method enables the continual updating of communication keys to preserve robust authentication of both devices and users. The robustness of UCAP has been examined through formal tools, while the experimental outcomes have shown satisfactory performance.
期刊介绍:
IEEE Transactions on Reliability is a refereed journal for the reliability and allied disciplines including, but not limited to, maintainability, physics of failure, life testing, prognostics, design and manufacture for reliability, reliability for systems of systems, network availability, mission success, warranty, safety, and various measures of effectiveness. Topics eligible for publication range from hardware to software, from materials to systems, from consumer and industrial devices to manufacturing plants, from individual items to networks, from techniques for making things better to ways of predicting and measuring behavior in the field. As an engineering subject that supports new and existing technologies, we constantly expand into new areas of the assurance sciences.