User authentication of industrial internet based on HHT transform of mouse behavior

The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was d...

Full description

Saved in:
Bibliographic Details
Main Authors: Yigong ZHANG, Qian YI, Jian LI, Congbo LI, Aijun YIN, Shuping YI
Format: Article
Language:zho
Published: China InfoCom Media Group 2022-06-01
Series:物联网学报
Subjects:
Online Access:http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2022.00268/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841531169066188800
author Yigong ZHANG
Qian YI
Jian LI
Congbo LI
Aijun YIN
Shuping YI
author_facet Yigong ZHANG
Qian YI
Jian LI
Congbo LI
Aijun YIN
Shuping YI
author_sort Yigong ZHANG
collection DOAJ
description The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.
format Article
id doaj-art-66f88ab66dd44623a9ac4f85f47e1477
institution Kabale University
issn 2096-3750
language zho
publishDate 2022-06-01
publisher China InfoCom Media Group
record_format Article
series 物联网学报
spelling doaj-art-66f88ab66dd44623a9ac4f85f47e14772025-01-15T02:53:26ZzhoChina InfoCom Media Group物联网学报2096-37502022-06-016778759648558User authentication of industrial internet based on HHT transform of mouse behaviorYigong ZHANGQian YIJian LICongbo LIAijun YINShuping YIThe rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2022.00268/industrial internetidentity authenticationmouse behaviorHilbert-Huang transformBagged tree
spellingShingle Yigong ZHANG
Qian YI
Jian LI
Congbo LI
Aijun YIN
Shuping YI
User authentication of industrial internet based on HHT transform of mouse behavior
物联网学报
industrial internet
identity authentication
mouse behavior
Hilbert-Huang transform
Bagged tree
title User authentication of industrial internet based on HHT transform of mouse behavior
title_full User authentication of industrial internet based on HHT transform of mouse behavior
title_fullStr User authentication of industrial internet based on HHT transform of mouse behavior
title_full_unstemmed User authentication of industrial internet based on HHT transform of mouse behavior
title_short User authentication of industrial internet based on HHT transform of mouse behavior
title_sort user authentication of industrial internet based on hht transform of mouse behavior
topic industrial internet
identity authentication
mouse behavior
Hilbert-Huang transform
Bagged tree
url http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2022.00268/
work_keys_str_mv AT yigongzhang userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior
AT qianyi userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior
AT jianli userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior
AT congboli userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior
AT aijunyin userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior
AT shupingyi userauthenticationofindustrialinternetbasedonhhttransformofmousebehavior