An Associated Behavior Sequence Based User Authentication Approach in M2M Mobile Terminals

被引:0
|
作者
Shi, Congcong [1 ,2 ]
Du, Miao [3 ]
Lu, Weidong [3 ]
Lu, Sanglu [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210023, Peoples R China
[2] Global Energy Interconnect Res Inst Co Ltd, State Grid Key Lab Informat & Network Secur, Beijing 102211, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Nanjing 210003, Peoples R China
基金
中国国家自然科学基金;
关键词
Machine-to-Machine Mobile Terminals; Terminals Identity Authentication; Association Behavior; Behavioral Analysis; SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of machine-to-machine (M2M) mobile smart terminals, M2M services can be used in a wide range of industries, including such as telemedicine, remote meter reading and public security. Since different industries and enterprise users have different requirements for M2M specific applications, the security identity authentication of M2M mobile terminals is particularly worthy of attention. Existing methods can effectively solve the unsustainable problem of one-time verification, however they cannot address the dynamic relevance characteristics of user behavior sufficiently. Thus, the accuracy of user identity authentication needs to be further improved. In this paper, we propose a terminal identity authentication technology based on user association behavior analysis. In order to identify the abnormal login during each behavior process of authenticated user, we take largest coincident part of the user behavior sequence and short coincide into consideration. In addition, we propose a Similarity-based Behavior Sequence Similarity Algorithm (BCS-SSA) based on the traditional sequence pattern of Behavior Common Subsequence. The experimental results demonstrate that the proposed method can effectively improve the accuracy of user's behavioral sequence, and prove the uniqueness of different sequences on the other hand.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Advances on Elastic Traffic via M2M Satellite User Terminals
    Bacco, Manlio
    De Cola, Tomaso
    Giambene, Giovanni
    Gotta, Alberto
    [J]. 2015 12TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS), 2015,
  • [2] Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security
    Doh, Inshil
    Chae, Kijoon
    Lim, Jiyoung
    Chung, Min Young
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (04): : 543 - 558
  • [3] The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment
    Hu, Liang
    Chi, Ling
    Li, Hong-tu
    Yuan, Wei
    Sun, Yuyu
    Chu, Jian-feng
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 131 - 146
  • [4] A M2M Network-Based Realistic Mobile User Movement Prediction in Emergencies
    Surobhi, Nusrat Ahmed
    Jamalipour, Abbas
    [J]. 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012), 2012,
  • [5] Token-based authentication method for M2M platforms
    Polat, Huseyin
    Oyucu, Saadin
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (04) : 2956 - 2967
  • [6] A Distributed Authentication and Key Exchange Approach for Secure M2M Communications
    Murthy, B. Satyanarayana
    Sumalatha, L.
    [J]. PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 277 - 280
  • [7] Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices
    Kosciug, Bartosz
    Bilski, Piotr
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2023, 69 (02) : 253 - 259
  • [8] A study of privacy problem solving using device and user authentication for M2M environments
    Kim, Jin-Mook
    Jeong, Hwa-Young
    Hong, Bong-Hwa
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1528 - 1535
  • [9] Experimental Evaluation of Mobile Core Networks on Simultaneous Access from M2M/IoT Terminals
    Ueno, Masaki
    Hasegawa, Go
    Murata, Masayuki
    [J]. 33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), 2019, : 13 - 18
  • [10] A trust-based offloading for mobile M2M communications
    Boustanifar, Fariba
    Movahedi, Zeinab
    [J]. 2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), 2016, : 1139 - 1143