Privacy Enhanced Mobile User Authentication Method Using Motion Sensors  

在线阅读下载全文

作  者:Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma 

机构地区:[1]Shenzhen Institutes of Advanced Technology,Chinese Academy of Sciences,Shenzhen,518052,China [2]Sangfor Technologies Inc.,Shenzhen,518055,China [3]School of Data Science and Artificial Intelligence,Wenzhou University of Technology,Wenzhou,325035,China [4]College of Computer Science&Technology,Zhejiang University of Technology,Hangzhou,310023,China [5]Software Engineering Department,College of Computer and Information Sciences,King Saud University,Riyadh,12372,Saudi Arabia [6]Math&Computer Science Department,Faculty of Science,Menofia University,Shebin El-Kom,Egypt [7]Computing Science Department,University of Aberdeen,Aberdeen,UK

出  处:《Computer Modeling in Engineering & Sciences》2024年第3期3013-3032,共20页工程与科学中的计算机建模(英文)

基  金:Wenzhou Key Scientific and Technological Projects(No.ZG2020031);Wenzhou Polytechnic Research Projects(No.WZY2021002);Key R&D Projects in Zhejiang Province(No.2021C01117);Major Program of Natural Science Foundation of Zhejiang Province(LD22F020002);the Cloud Security Key Technology Research Laboratory;the Researchers Supporting Project Number(RSP2023R509),King Saud University,Riyadh,Saudi Arabia.

摘  要:With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication.

关 键 词:Mobile authentication blockchain federated learning smart contract certificateless encryption VMD LSTM 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象