Chinese Journal on Internet of Things ›› 2022, Vol. 6 ›› Issue (2): 77-87.doi: 10.11959/j.issn.2096-3750.2022.00268

• Theory and Technology • Previous Articles     Next Articles

User authentication of industrial internet based on HHT transform of mouse behavior

Yigong ZHANG1,2, Qian YI1, Jian LI2, Congbo LI1, Aijun YIN1, Shuping YI1   

  1. 1 State Key Laboratory of Mechanical Transmission, Chongqing University, Chongqing 400044, China
    2 State Key Laboratory of Power Transmission Equipment and System Security and New Technology, Chongqing University, Chongqing 400044, China
  • Revised:2022-04-24 Online:2022-06-30 Published:2022-06-01
  • Supported by:
    The National Natural Science Foundation of China(71671020);The Fundamental Research Funds for the Central Universities(2021CDJKYJH022)

Abstract:

The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.

Key words: industrial internet, identity authentication, mouse behavior, Hilbert-Huang transform, Bagged tree

CLC Number: 

No Suggested Reading articles found!