User authentication of industrial internet based on HHT transform of mouse behavior
The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was d...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
China InfoCom Media Group
2022-06-01
|
Series: | 物联网学报 |
Subjects: | |
Online Access: | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2022.00268/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841531169066188800 |
---|---|
author | Yigong ZHANG Qian YI Jian LI Congbo LI Aijun YIN Shuping YI |
author_facet | Yigong ZHANG Qian YI Jian LI Congbo LI Aijun YIN Shuping YI |
author_sort | Yigong ZHANG |
collection | DOAJ |
description | The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet. |
format | Article |
id | doaj-art-66f88ab66dd44623a9ac4f85f47e1477 |
institution | Kabale University |
issn | 2096-3750 |
language | zho |
publishDate | 2022-06-01 |
publisher | China InfoCom Media Group |
record_format | Article |
series | 物联网学报 |
spelling | doaj-art-66f88ab66dd44623a9ac4f85f47e14772025-01-15T02:53:26ZzhoChina InfoCom Media Group物联网学报2096-37502022-06-016778759648558User authentication of industrial internet based on HHT transform of mouse behaviorYigong ZHANGQian YIJian LICongbo LIAijun YINShuping YIThe rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2022.00268/industrial internetidentity authenticationmouse behaviorHilbert-Huang transformBagged tree |
spellingShingle | Yigong ZHANG Qian YI Jian LI Congbo LI Aijun YIN Shuping YI User authentication of industrial internet based on HHT transform of mouse behavior 物联网学报 industrial internet identity authentication mouse behavior Hilbert-Huang transform Bagged tree |
title | User authentication of industrial internet based on HHT transform of mouse behavior |
title_full | User authentication of industrial internet based on HHT transform of mouse behavior |
title_fullStr | User authentication of industrial internet based on HHT transform of mouse behavior |
title_full_unstemmed | User authentication of industrial internet based on HHT transform of mouse behavior |
title_short | User authentication of industrial internet based on HHT transform of mouse behavior |
title_sort | user authentication of industrial internet based on hht transform of mouse behavior |
topic | industrial internet identity authentication mouse behavior Hilbert-Huang transform Bagged tree |
url | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2022.00268/ |
work_keys_str_mv | AT yigongzhang userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior AT qianyi userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior AT jianli userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior AT congboli userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior AT aijunyin userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior AT shupingyi userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior |