Guozhu Zhao1, Jiasheng He1,*, Yaxin Wang1, Zixian Du2, Xiaolan Liu3, Chenxi Yang1, Yichen Li1, and Renzhi Ji1
Jiasheng He
1School of Computer and Information Engineering, Chuzhou University, Chuzhou, Anhui, 239000, China
2School of Intelligent Engineering, Xi’an Jiaotong-Liverpool University, Suzhou, Jiangsu, 215123, China
3School of Basic Medicine, Shandong Second Medical University, Weifang, Shandong, 261053, China
*Corresponding author
User identity verification is of great significance for the secure operation of UAV systems. This article exploits the spatial-temporal features of user screen-touch trajectory (STT) to develop a passive user authentication framework for unmanned aerial vehicle (UAV) systems. We first design a multi-dimensional STT data structure to accurately record continuous touch interactions and extract 21 discriminative spatial-temporal features for behavioral characterization. We then construct a classifier based on Random Forest (RF) for robust nonlinear feature learning and also a classifier based on Radial Basis Function Neural Network (RBFNN) for modeling fine-grained touch behavior patterns. By combining the two classifiers and assigning each classifier an appropriate weight, we develop a fusion-based passive user authentication framework. The new framework has the potential to significantly enhance the security of UAV operation systems by offering a flexible, continuous, and non-intrusive authentication solution, and it also can serve as a complementary security layer or an enhancement to traditional authentication mechanisms in UAV ground control systems.
Unmanned Aerial Vehicle Security, Passive Authentication, Screen-touch Trajectory, Spatial-temporal Features, Machine Learning
Guozhu Zhao, Jiasheng He, Yaxin Wang, Zixian Du, Xiaolan Liu, Chenxi Yang, Yichen Li, and Renzhi Ji (2025). Passive User Authentication Utilizing Screen-Touch Trajectory for Unmanned Aerial Vehicle Systems. Journal of Networking and Network Applications, Volume 5, Issue 4, pp. 165–175. https://doi.org/10.33969/J-NaNA.2025.050403.
[1] Peter Aaby et al. An omnidirectional approach to touch-based continuous authentication. arXiv, 2023.
[2] Ritu Agrawal et al. A study of touch dynamics biomet-rics authentication. International Journal of Scientific Research in Engineering and Management (IJSREM), 6:181–185, 2022.
[3] Anonymous. A survey on uavs security issues: attack modelling, security requirements and future research directions. Computers and Communications, 2023.
[4] N. Bai et al. A survey on unmanned aerial systems cybersecurity. Computers & Electrical Engineering, 97:107544, 2024.
[5] R. Choudhary et al. Intrusion detection systems for networked unmanned aerial vehicles: A survey. In Proceedings of the 2018 International Conference on Ad-vances in Computing, Communication and Engineering, pages 14–20, 2018.
[6] O. L. Finnegan et al. The utility of behavioral biometrics in user authentication and screen-time measurement: a scoping review. Systematic Reviews, 13:68, 2024.
[7] Mario Frank et al. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for contin-uous authentication. IEEE Transactions on Information Forensics and Security, 8(1):136–148, 2013.
[8] S. M. Gilani et al. A robust internet of drones secu-rity surveillance communication network based on iota. Internet of Things, 19:101066, 2024.
[9] H. J. Hadi et al. A comprehensive survey on security, privacy issues and countermeasures for uavs. Computers & Security, 115:102511, 2023.
[10] S. Miri Kelaniki et al. A study on iot device authentica-tion using artificial intelligence. Sensors, 24:1060, 2024.
[11] H. Khan et al. Targeted mimicry attacks on touch input based implicit authentication systems. In Proceedings of the 2016 ACM on Interactive Smart Products and Services, pages 155–162, 2016.
[12] Yassine Mekdad et al. A survey on security and privacy issues of uavs. Computer Networks, 224:109626, 2023.
[13] V. Sihag et al. Cyber security and forensics for unmanned aerial vehicles: A survey. Sensors, 7:430, 2023.
[14] J. P. Yaacoub et al. Security analysis of drones systems: Attacks, limitations and recommendations. Computer Networks, 174:107243, 2020.
[15] D. Zhao et al. Security situation assessment in uav swarm networks. Computers & Security, 113:102498, 2024.
[16] Guozhu Zhao et al. Passive user authentication utilizing behavioral biometrics for iiot systems. IEEE Internet of Things Journal, 9(14):12783–12796, 2022.
[17] Guozhu Zhao et al. Passive user authentication utilizing two-dimensional features for iiot systems. IEEE Trans-actions on Cloud Computing, 11(3):2770–2783, 2023.
[18] Guozhu Zhao et al. Exploiting screen-touch trajectory for passive user authentication in industrial internet of things systems. IEEE Transactions on Industrial Informatics, 20(7):9098–9110, 2024.