Contact Us Search Paper

Instruction Sender Authentication Utilizing Touch Screen Operation Action Fingerprint for UAV Systems

Guozhu Zhao1,*, Pinchang Zhang2

Corresponding Author:

Guozhu Zhao

Affiliation(s):

1 School of Systems Information Science, Future University Hakodate, 116-2 Kamedanakano-cho, Hakodate, Hokkaido, 041-8655, Japan

2 School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, 210023, China

*Corresponding author

Abstract:

Instruction sender authentication of UAV (Unmanned Aerial Vehicle) control is critical for the secure operation of UAV systems. By exploring user touch action characteristics of the user interaction with the UAV control mobile terminal, this paper proposes a novel instruction sender continuous authentication framework for UAV control systems. In particular, we first obtain the touch screen data in real time from the interaction with the mobile device screen of a user when he controls the UAV. Then we create a polynomial to fit the touch trajectory on the screen of the user, and use the least square method to obtain the optimal estimate of the polynomial coefficients. Finally, we mark the grid area covered by the polynomial to extract the user’s touch screen operation action fingerprint(OAF), and employ the fuzzy extractor method to realize the identity authentication of the sender with certain error tolerance. Extensive experiments are conducted to illustrate the authentication performance of the proposed authentication framework in terms of false acceptance rate, false rejection rate and equal-error rate.

Keywords:

Continuous authentication, UAV, fuzzy extractor, behavioral biometric, operation action fingerprint

Downloads: 83 Views: 740
Cite This Paper:

Guozhu Zhao, Pinchang Zhang (2021). Instruction Sender Authentication Utilizing Touch Screen Operation Action Fingerprint for UAV Systems. Journal of Networking and Network Applications, Volume 1, Issue 4, pp. 187–192. https://doi.org/10.33969/J-NaNA.2021.010406.

References:

[1] A. Roy, N. Memon, and A. Ross, “Masterprint: Exploring the vul-nerability of partial fingerprint-based authentication systems,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2013–2025, Sep. 2017.

[2] S. Li and A. C. Kot, “Fingerprint combination for privacy protection,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 2, pp. 350–360, Feb. 2013.

[3] D. F. Smith, A. Wiliem, and B. C. Lovell, “Face recognition on consumer devices: Reflections on replay attacks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 4, pp. 736–745, Apr. 2015.

[4] S. Thavalengal, I. Andorko, A. Drimbarean, P. Bigioi, and P. Corcoran, “Proof-of-concept and evaluation of a dual function visible/nir camera for iris authentication in smartphones,” IEEE Transactions on Consumer Electronics, vol. 61, no. 2, pp. 137–143, May. 2015.

[5] A. Shoufan, “Continuous authentication of uav flight command data using behaviometrics,” in 2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), 2017, pp. 1–6.

[6] C. Pu and Y. Li, “Lightweight authentication protocol for unmanned aerial vehicles using physical unclonable function and chaotic system,” in 2020 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN, 2020, pp. 1–6.

[7] H. Liu, Y. Wang, J. Liu, J. Yang, Y. Chen, and H. V. Poor, “Authenticat-ing users through fine-grained channel information,” IEEE Transactions on Mobile Computing, vol. 17, no. 2, pp. 251–264, Feb. 2018.

[8] R. Alazrai, A. Awad, B. Alsaify, M. Hababeh, and M. I. Daoud, “A dataset for Wi-Fi-based human-to-human interaction recognition,” Data in Brief, vol. 31, p. 105668, Aug. 2020.

[9] E. Zainulina and I. Matveev, “Methods of using fuzzy extractors on the iris data *,” in Situation, Language, Speech, 2019At: Rome, Italy, 2019, pp. 1–15.

[10] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” SIAM Journal on Computing, vol. 38, no. 1, pp. 97–139, 2008.

[11] N. Li, F. Guo, Y. Mu, W. Susilo, and S. Nepal, “Fuzzy extractors for biometric identification,” in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, pp. 667–677.

[12] F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biomet-rics effectively,” IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081–1088, 2006.

[13] B. Fuller, L. Reyzin, and A. Smith, “When are fuzzy extractors pos-sible?” IEEE Transactions on Information Theory, vol. 66, no. 8, pp. 5282–5298, 2020.

[14] C. Shen, Y. Li, Y. Chen, X. Guan, and R. A. Maxion, “Performance analysis of multi-motion sensor behavior for active smartphone authen-tication,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 1, pp. 48–62, Jan. 2018.