Contact Us Search Paper

Passive User Authentication Utilizing Screen-Touch Trajectory for Unmanned Aerial Vehicle Systems

Guozhu Zhao1, Jiasheng He1,*, Yaxin Wang1, Zixian Du2, Xiaolan Liu3, Chenxi Yang1, Yichen Li1, and Renzhi Ji1

Corresponding Author:

Jiasheng He

Affiliation(s):

1School of Computer and Information Engineering, Chuzhou University, Chuzhou, Anhui, 239000, China

2School of Intelligent Engineering, Xi’an Jiaotong-Liverpool University, Suzhou, Jiangsu, 215123, China

3School of Basic Medicine, Shandong Second Medical University, Weifang, Shandong, 261053, China

*Corresponding author

Abstract:

User identity verification is of great significance for the secure operation of UAV systems. This article exploits the spatial-temporal features of user screen-touch trajectory (STT) to develop a passive user authentication framework for unmanned aerial vehicle (UAV) systems. We first design a multi-dimensional STT data structure to accurately record continuous touch interactions and extract 21 discriminative spatial-temporal features for behavioral characterization. We then construct a classifier based on Random Forest (RF) for robust nonlinear feature learning and also a classifier based on Radial Basis Function Neural Network (RBFNN) for modeling fine-grained touch behavior patterns. By combining the two classifiers and assigning each classifier an appropriate weight, we develop a fusion-based passive user authentication framework. The new framework has the potential to significantly enhance the security of UAV operation systems by offering a flexible, continuous, and non-intrusive authentication solution, and it also can serve as a complementary security layer or an enhancement to traditional authentication mechanisms in UAV ground control systems.

Keywords:

Unmanned Aerial Vehicle Security, Passive Authentication, Screen-touch Trajectory, Spatial-temporal Features, Machine Learning

Downloads: 1 Views: 3
Cite This Paper:

Guozhu Zhao, Jiasheng He, Yaxin Wang, Zixian Du, Xiaolan Liu, Chenxi Yang, Yichen Li, and Renzhi Ji (2025). Passive User Authentication Utilizing Screen-Touch Trajectory for Unmanned Aerial Vehicle Systems. Journal of Networking and Network Applications, Volume 5, Issue 4, pp. 165–175. https://doi.org/10.33969/J-NaNA.2025.050403.

References:

[1] Peter Aaby et al. An omnidirectional approach to touch-based continuous authentication. arXiv, 2023.

[2] Ritu Agrawal et al. A study of touch dynamics biomet-rics authentication. International Journal of Scientific Research in Engineering and Management (IJSREM), 6:181–185, 2022.

[3] Anonymous. A survey on uavs security issues: attack modelling, security requirements and future research directions. Computers and Communications, 2023.

[4] N. Bai et al. A survey on unmanned aerial systems cybersecurity. Computers & Electrical Engineering, 97:107544, 2024.

[5] R. Choudhary et al. Intrusion detection systems for networked unmanned aerial vehicles: A survey. In Proceedings of the 2018 International Conference on Ad-vances in Computing, Communication and Engineering, pages 14–20, 2018.

[6] O. L. Finnegan et al. The utility of behavioral biometrics in user authentication and screen-time measurement: a scoping review. Systematic Reviews, 13:68, 2024.

[7] Mario Frank et al. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for contin-uous authentication. IEEE Transactions on Information Forensics and Security, 8(1):136–148, 2013.

[8] S. M. Gilani et al. A robust internet of drones secu-rity surveillance communication network based on iota. Internet of Things, 19:101066, 2024.

[9] H. J. Hadi et al. A comprehensive survey on security, privacy issues and countermeasures for uavs. Computers & Security, 115:102511, 2023.

[10] S. Miri Kelaniki et al. A study on iot device authentica-tion using artificial intelligence. Sensors, 24:1060, 2024.

[11] H. Khan et al. Targeted mimicry attacks on touch input based implicit authentication systems. In Proceedings of the 2016 ACM on Interactive Smart Products and Services, pages 155–162, 2016.

[12] Yassine Mekdad et al. A survey on security and privacy issues of uavs. Computer Networks, 224:109626, 2023.

[13] V. Sihag et al. Cyber security and forensics for unmanned aerial vehicles: A survey. Sensors, 7:430, 2023.

[14] J. P. Yaacoub et al. Security analysis of drones systems: Attacks, limitations and recommendations. Computer Networks, 174:107243, 2020.

[15] D. Zhao et al. Security situation assessment in uav swarm networks. Computers & Security, 113:102498, 2024.

[16] Guozhu Zhao et al. Passive user authentication utilizing behavioral biometrics for iiot systems. IEEE Internet of Things Journal, 9(14):12783–12796, 2022.

[17] Guozhu Zhao et al. Passive user authentication utilizing two-dimensional features for iiot systems. IEEE Trans-actions on Cloud Computing, 11(3):2770–2783, 2023.

[18] Guozhu Zhao et al. Exploiting screen-touch trajectory for passive user authentication in industrial internet of things systems. IEEE Transactions on Industrial Informatics, 20(7):9098–9110, 2024.