检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma
机构地区:[1]Shenzhen Institutes of Advanced Technology,Chinese Academy of Sciences,Shenzhen,518052,China [2]Sangfor Technologies Inc.,Shenzhen,518055,China [3]School of Data Science and Artificial Intelligence,Wenzhou University of Technology,Wenzhou,325035,China [4]College of Computer Science&Technology,Zhejiang University of Technology,Hangzhou,310023,China [5]Software Engineering Department,College of Computer and Information Sciences,King Saud University,Riyadh,12372,Saudi Arabia [6]Math&Computer Science Department,Faculty of Science,Menofia University,Shebin El-Kom,Egypt [7]Computing Science Department,University of Aberdeen,Aberdeen,UK
出 处:《Computer Modeling in Engineering & Sciences》2024年第3期3013-3032,共20页工程与科学中的计算机建模(英文)
基 金:Wenzhou Key Scientific and Technological Projects(No.ZG2020031);Wenzhou Polytechnic Research Projects(No.WZY2021002);Key R&D Projects in Zhejiang Province(No.2021C01117);Major Program of Natural Science Foundation of Zhejiang Province(LD22F020002);the Cloud Security Key Technology Research Laboratory;the Researchers Supporting Project Number(RSP2023R509),King Saud University,Riyadh,Saudi Arabia.
摘 要:With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication.
关 键 词:Mobile authentication blockchain federated learning smart contract certificateless encryption VMD LSTM
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.143.247.141