4.8 Article

Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 7, 期 9, 页码 9128-9143

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3004077

关键词

Authentication; Biometrics (access control); Internet of Things; Sensors; Knowledge based systems; Physiology; Smart phones; Artificial intelligence (AI); behavioral biometric; body area networks; constrained devices; continuous authentication (CA); cyber-physical systems data mining; Internet of Things (IoT)

资金

  1. National Key Research and Development Program of China [2019YFB2102200]
  2. Ministry of Health of China [2017ZX10303401002, 2017YFC1200302]
  3. Natural Science Foundation of China [61902320, 71472175, 71602184, 71621002]
  4. National Science Foundation [CNS-1850362, OAC-1917117]
  5. Fundamental Research Funds for the Central Universities [31020180QD140]

向作者/读者索取更多资源

In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of connected devices and the customization of passive services. However, conventional knowledge-based and physiological biometric-based authentication systems (e.g., password, face recognition, and fingerprints) are susceptible to shoulder surfing attacks, smudge attacks, and heat attacks. The powerful sensing capabilities of IoT devices, including smartphones, wearables, robots, and autonomous vehicles enable continuous authentication (CA) based on behavioral biometrics. The artificial intelligence (AI) approaches hold significant promise in sifting through large volumes of heterogeneous biometrics data to offer unprecedented user authentication and user identification capabilities. In this survey article, we outline the nature of CA in IoT applications, highlight the key behavioral signals, and summarize the extant solutions from an AI perspective. Based on our systematic and comprehensive analysis, we discuss the challenges and promising future directions to guide the next generation of AI-based CA research.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

A framework based on sparse representation model for time series prediction in smart city

Zhiyong Yu, Xiangping Zheng, Fangwan Huang, Wenzhong Guo, Lin Sun, Zhiwen Yu

Summary: This study proposes a framework for time series prediction based on sparse representation model (SRM) in smart cities, which can flexibly and effectively handle the challenge of event alert based on time series prediction.

FRONTIERS OF COMPUTER SCIENCE (2021)

Article Computer Science, Information Systems

App Popularity Prediction by Incorporating Time-Varying Hierarchical Interactions

Yixuan Zhang, Jiaqi Liu, Bin Guo, Zhu Wang, Yunji Liang, Zhiwen Yu

Summary: App popularity prediction is a significant task in mobile service development. This paper proposes DeePOP, a popularity prediction model that leverages time-varying hierarchical interactions. By integrating internal factors and time-varying hierarchical interactions, DeePOP achieves higher prediction accuracy compared to existing methods.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Editorial Material Computer Science, Hardware & Architecture

Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)

Sagar Samtani, Hsinchun Chen, Murat Kantarcioglu, Bhavani Thuraisingham

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Artificial Intelligence

MetaDetector: Meta Event Knowledge Transfer for Fake News Detection

Yasan Ding, Bin Guo, Yan Liu, Yunji Liang, Haocheng Shen, Zhiwen Yu

Summary: The proliferation of fake news on social networks has had devastating impacts on society, the economy, and public security. Existing studies in automatic fake news detection primarily use deep neural networks to learn event-specific features, resulting in limited applicability to upcoming events due to distribution discrepancies. This paper proposes an end-to-end adversarial adaptation network, called MetaDetector, to transfer meta knowledge between different events for fake news detection. Experimental results on real-world datasets show that MetaDetector outperforms state-of-the-art methods, especially in scenarios with significant distribution discrepancies.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2022)

Article Computer Science, Hardware & Architecture

An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals

Yunji Liang, Yuchen Qin, Qi Li, Xiaokai Yan, Luwen Huangfu, Sagar Samtani, Bin Guo, Zhiwen Yu

Summary: With the increasing prevalence of mobile devices, concerns about privacy breaches and data leakage are growing. Previous studies have shown that motion sensors can cause confidential information to be leaked, but the possibility of synthesizing intelligible speech waveforms from low-resolution motion sensors has not yet been thoroughly studied.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Learning Dynamic App Usage Graph for Next Mobile App Recommendation

Yi Ouyang, Bin Guo, Qianru Wang, Yunji Liang, Zhiwen Yu

Summary: We propose a novel model called dynamic usage graph network (DUGN) to recommend the next app that a user is most likely to use based on their app usage behaviors. By explicitly modeling the complex correlations between apps using a dynamic graph structure, we can learn the dynamics of user interests over time. Experimental results show that our model outperforms existing recommendation methods.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

A deep interpretable representation learning method for speech emotion recognition

Erkang Jing, Yezheng Liu, Yidong Chai, Jianshan Sun, Sagar Samtani, Yuanchun Jiang, Yang Qian

Summary: This paper proposes a deep learning-based speech emotion recognition model that achieves active interpretation of the model results by introducing interpretability and uncorrelation constraints. The model outperforms baselines in experiments and can also learn human perception patterns of speech emotion and provide explanations for recognition results.

INFORMATION PROCESSING & MANAGEMENT (2023)

Proceedings Paper Computer Science, Interdisciplinary Applications

Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data

Aijia Yuan, Michael Xu, Hongyi Zhu, Sagar Samtani, Edlin Garcia

Summary: This study explores the performance of machine learning models for depression detection using sensors that do not release Personally Identifiable Information (PII). The findings suggest that Decision Tree, Gradient Boosting, and Logistic Regression show higher predictive power even with limited non-PII-releasing sensor data. Certain combinations of non-PII releasing sensors can help achieve almost perfect performance for ML classifiers.

2023 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH, ICDH (2023)

Proceedings Paper Computer Science, Theory & Methods

Designing a Vulnerability Management Dashboard to Enhance Security Analysts' Decision Making Processes

Dalyapraz Manatova, Inna Kouper, Sagar Samtani

Summary: This paper presents the development of a vulnerability management dashboard that assists security analysts in addressing challenges posed by network threats. Through interviews and real-world data, the typical workflow of security analysts is incorporated into the design, with vulnerability prioritization based on age, persistence, and impact. Future work includes user studies to evaluate the functionality and utility of the dashboard.

PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2022 (2022)

Proceedings Paper Computer Science, Interdisciplinary Applications

Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains

Dalyapraz Manatova, Dewesha Sharma, Sagar Samtani, L. Jean Camp

Summary: Underground markets provide a platform for merchants and buyers to trade assets using various digital currencies, payments providers, and wallets, which supports e-crime. Underground forums serve as critical intermediaries for marketplaces, enabling new entrants to establish trust and facilitating interactions between different markets. An empirical analysis of an underground forum helps understand online crime and reveals the network structure and interactions within different types of crimes.

2022 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH, ECRIME (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach

Agrim Sachdeva, Ben Lazarine, Ruchik Dama, Sagar Samtani, Hongyi Zhu

Summary: This research utilizes source code from GitHub to identify vulnerabilities in foundational repositories commonly used in modern AI development and AI repositories that depend on these foundational repositories. By using unsupervised graph embedding techniques, the study generates embeddings that capture vulnerability information and relationships between repositories, allowing for clustering of similarly vulnerable repositories. This research identifies patterns and similarities between repositories, which can aid in the development of effective vulnerability mitigation strategies for foundational AI repositories.

2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW (2022)

Proceedings Paper Computer Science, Information Systems

Enforcement of Laws and Privacy Preferences in Modern Computing Systems

Murat Kantarcioglu, Barbara Carminati, Sagar Samtani, Sudip Mittal, Maanak Gupta

Summary: Modern civilization relies heavily on computing systems, which affect various aspects of business, government, and individual life. With the increasing emphasis on privacy and regulations, computing systems are expected to comply with these requirements, incorporating privacy and legal compliance into their design and being adaptable to changes.

CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (2022)

Article Computer Science, Information Systems

LINKING EXPLOITS FROM THE DARK WEB TO KNOWN VULNERABILITIES FOR PROACTIVE CYBER THREAT INTELLIGENCE: AN ATTENTION-BASED DEEP STRUCTURED SEMANTIC MODEL

Sagar Samtani, Yidong Chai, Hsinchun Chen

Summary: Black hat hackers cause significant economic losses worldwide, and cyber threat intelligence (CTI) helps organizations prioritize vulnerabilities. This study proposes a novel deep learning-based model (EVA-DSSM) and a device vulnerability severity metric (DVSM) to enhance CTI by analyzing the Dark Web. Evaluation results show that EVA-DSSM outperforms other methods in short text matching, and the CTI case studies demonstrate the utility of EVA-DSSM and DVSM for cybersecurity professionals.

MIS QUARTERLY (2022)

Article Computer Science, Information Systems

CROSS-LINGUAL CYBERSECURITY ANALYTICS IN THE INTERNATIONAL DARK WEB WITH ADVERSARIAL DEEP REPRESENTATION LEARNING

Mohammadreza Ebrahimi, Yidong Chai, Sagar Samtani, Hsinchun Chen

Summary: International dark web platforms contain a large amount of hacker assets, but analyzing them becomes challenging due to the lack of foreign-language training data. To address this issue, researchers have developed a novel technique for cross-lingual hacker asset detection, which leverages knowledge learned from English content to detect hacker assets in non-English dark web platforms. The study suggests that cybersecurity managers can benefit from focusing on Russian to identify sophisticated hacking assets, while financial hacker assets are scattered among several dominant dark web languages.

MIS QUARTERLY (2022)

Article Computer Science, Hardware & Architecture

Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning

Yunji Liang, Qiushi Wang, Kang Xiong, Xiaolong Zheng, Zhiwen Yu, Daniel Zeng

Summary: In this paper, a deep learning-based system called CyberLen is proposed for detecting malicious URLs effectively. The system utilizes factorization machine (FM) and position embedding to enhance the learning of interaction among URL features and reduce the ambiguity of URL tokens. Experimental results demonstrate the superior performance of the proposed method in terms of F1 score and convergence speed.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

暂无数据