期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Behavioral Authentication Method for Mobile Based on Browsing Behaviors
1
作者 Dongxiang Chen Zhijun Ding +1 位作者 Chungang Yan Mimi Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第6期1528-1541,共14页
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security problems.An important research direction of identity authentication is to establish user... The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security problems.An important research direction of identity authentication is to establish user behavior models to authenticate users.In this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is designed.This architecture is suitable for users using the mobile terminal APP in the daily life.The architecture includes data acquisition,data processing,feature extraction,and sub model training.We can use this architecture for continuous authentication when the user uses APP at the mobile terminal. 展开更多
关键词 behavioral authentication browsing behaviors mobile device multiple factors
在线阅读 下载PDF
IoT Devices Authentication Using Artificial Neural Network
2
作者 Syed Shabih Ul Hasan Anwar Ghani +2 位作者 Ikram Ud Din Ahmad Almogren Ayman Altameem 《Computers, Materials & Continua》 SCIE EI 2022年第2期3701-3716,共16页
User authentication is one of the critical concerns of information security.Users tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in... User authentication is one of the critical concerns of information security.Users tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobile phones.Textual passwords are slightly unprotected and are easily attackable.The attacks include dictionary,shoulder surfing,and brute force.Graphical passwords overcome the shortcomings of textual passwords and are designed to aid memorability and ease of use.This paper proposes a Process-based Pattern Authentication(PPA)system for Internet of Things(IoT)devices that does not require a server to maintain a static password of the login user.The server stores user’s information,which they provide at the time of registration,i.e.,the R-code and the symbol,but the P-code,i.e.,the actual password,will change with every login attempt of users.In this scheme,users may draw a pattern on the basis of calculation from the P-code and Rcode in the PPA pattern,and can authenticate themselves using their touch dynamic behaviors through Artificial Neural Network(ANN).The ANN is trained on touch behaviors of legitimate users reporting superior performance over the existing methods.For experimental purposes,PPA is implemented as a prototype on a computer system to carry out experiments for the evaluation in terms of memorability and usability.The experiments show that the system has an effect of 5.03%of the False Rejection Rate(FRR)and 4.36%of the False Acceptance Rate(FAR),respectively. 展开更多
关键词 Implicit authentication behavioral authentication artificial neural network processed pattern authentication
在线阅读 下载PDF
Behavioral authentication for security and safety
3
作者 Cheng Wang Hao Tang +2 位作者 Hangyu Zhu Junhan Zheng Changjun Jiang 《Security and Safety》 2024年第3期50-85,共36页
The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain a... The issues of both system security and safety can be dissected integrally from the perspective of behavioral appropriateness. That is, a system that is secure or safe can be judged by whether the behavior of certain agent(s) is appropriate or not. Specifically, a so-called appropriate behavior involves the right agent performing the right actions at the right time under certain conditions. Then, according to different levels of appropriateness and degrees of custodies, behavioral authentication can be graded into three levels, i.e., the authentication of behavioral Identity, Conformity, and Benignity. In a broad sense, for the security and safety issue, behavioral authentication is not only an innovative and promising method due to its inherent advantages but also a critical and fundamental problem due to the ubiquity of behavior generation and the necessity of behavior regulation in any system. By this classification, this review provides a comprehensive examination of the background and preliminaries of behavioral authentication. It further summarizes existing research based on their respective focus areas and characteristics. The challenges confronted by current behavioral authentication methods are analyzed, and potential research directions are discussed to promote the diversified and integrated development of behavioral authentication. 展开更多
关键词 behavioral authentication security and safety behavior modeling anomaly detection machine learning artificial intelligence
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部