Electromagnetic radiation based continuous authentication in edge computing enabled internet of things

Abstract With the rapid proliferation of Internet of Things, the centralized cloud faces the performance problems caused by remote network access and real-time services. To ensure good performance, edge computing paradigm emerges, and requires a secure authentication between edge host and cloud server to safeguard resources against any illegitimate access. Securing edge host authentication is an effective method and cornerstone to protect the information security in edge computing. Existing methods most recognize an entity's identity by password only once at the time of initial stage, which may lead to security problem. Continuous authentication as a novel authentication modality has the ability to alleviate this issue. Unlike the authentication operating merely at point-of-entry, a continuous edge host authentication method is proposed on the basis of electromagnetic radiation which reflects the behavioral characteristics of edge host with heterogeneous hardware. We demonstrate the feasibility of the proposed method through analysis of success rate from ten thousand waterfall spectrograms, and experimental results show that the average success rate of 95% has been achieved by support vector machine combining multiple features.

[1]  Jianli Pan,et al.  Future Edge Cloud and Edge Computing for Internet of Things Applications , 2018, IEEE Internet of Things Journal.

[2]  Lu Zhou,et al.  I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics , 2018, IEEE Communications Magazine.

[3]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[4]  Laurence T. Yang,et al.  System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems , 2017, ACM Trans. Embed. Comput. Syst..

[5]  Xin Zhou,et al.  Infrared small-target detection using multiscale gray difference weighted image entropy , 2016, IEEE Transactions on Aerospace and Electronic Systems.

[6]  Qingquan Li,et al.  Local Binary Pattern-Based Hyperspectral Image Classification With Superpixel Guidance , 2018, IEEE Transactions on Geoscience and Remote Sensing.

[7]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[8]  Ingo Stengel,et al.  A survey of continuous and transparent multibiometric authentication systems , 2015 .

[9]  S. Haller,et al.  Individual Detection of Patients with Parkinson Disease using Support Vector Machine Analysis of Diffusion Tensor Imaging Data: Initial Results , 2012, American Journal of Neuroradiology.

[10]  Lifeng Lai,et al.  Keyless Authentication and Authenticated Capacity , 2018, IEEE Transactions on Information Theory.

[11]  SeongHan Shin,et al.  A secure anonymous password-based authentication protocol with control of authentication numbers , 2016, 2016 International Symposium on Information Theory and Its Applications (ISITA).

[12]  Song Guo,et al.  Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City , 2017, IEEE Communications Magazine.

[13]  Tao Feng,et al.  Continuous mobile authentication using a novel Graphic Touch Gesture Feature , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[14]  Shaohua Wan,et al.  NTRU Implementation of Efficient Privacy-Preserving Location-Based Querying in VANET , 2018, Wirel. Commun. Mob. Comput..

[15]  Soumik Mondal,et al.  A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.

[16]  Tao Feng,et al.  Multi resolution touch panel with built-in fingerprint sensing support , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[17]  Juan E. Tapiador,et al.  Real-time electrocardiogram streams for continuous authentication , 2017, Appl. Soft Comput..

[18]  Lei Shu,et al.  Challenges and Research Issues of Data Management in IoT for Large-Scale Petrochemical Plants , 2018, IEEE Systems Journal.

[19]  Bo Zhao,et al.  Powermitter: Data exfiltration from air-gapped computer through switching power supply , 2018, China Communications.

[20]  Paul Rad,et al.  A Privacy-Aware Architecture at the Edge for Autonomous Real-Time Identity Reidentification in Crowds , 2018, IEEE Internet of Things Journal.

[21]  Bing Chen,et al.  Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.

[22]  Susmita Sur-Kolay,et al.  CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.

[23]  Mohsen Guizani,et al.  Security in the Internet of Things Supported by Mobile Edge Computing , 2018, IEEE Communications Magazine.

[24]  Vanga Odelu,et al.  A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.

[25]  Xiuping Jia,et al.  Effective Sequential Classifier Training for SVM-Based Multitemporal Remote Sensing Image Classification , 2017, IEEE Transactions on Image Processing.

[26]  Suhardi,et al.  Smart campus features, technologies, and applications: A systematic literature review , 2017, 2017 International Conference on Information Technology Systems and Innovation (ICITSI).

[27]  David Hutchison,et al.  The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective , 2017, IEEE Journal on Selected Areas in Communications.

[28]  Ivana Podnar Žarko,et al.  Edge Computing Architecture for Mobile Crowdsensing , 2018, IEEE Access.

[29]  Shang-Ho Tsai,et al.  On Performance of Sparse Fast Fourier Transform and Enhancement Algorithm , 2017, IEEE Transactions on Signal Processing.

[30]  Lei Ma,et al.  A kind of mouse behavior authentication method on dynamic soft keyboard , 2016, 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[31]  Xiangyu Wang,et al.  RF Sensing in the Internet of Things: A General Deep Learning Framework , 2018, IEEE Communications Magazine.

[32]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[33]  Xiang Chen,et al.  Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.

[34]  Shreyasi Das,et al.  Methodology for partial fingerprint enrollment and authentication on mobile devices , 2016, 2016 International Conference on Biometrics (ICB).

[35]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[36]  Yi Mu,et al.  Constructing an Authentication Token to Access External Services in Service Aggregation , 2010, 2010 IEEE International Conference on Services Computing.

[37]  Puneet Gupta,et al.  Multibiometric Authentication System Using Slap Fingerprints, Palm Dorsal Vein, and Hand Geometry , 2018, IEEE Transactions on Industrial Electronics.

[38]  John A. Richards,et al.  Remote Sensing Digital Image Analysis: An Introduction , 1999 .

[39]  Xiaoming Liu,et al.  On Continuous User Authentication via Typing Behavior , 2014, IEEE Transactions on Image Processing.

[40]  Vishal M. Patel,et al.  Efficient and Low Latency Detection of Intruders in Mobile Active Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[41]  Muttukrishnan Rajarajan,et al.  Continuous face authentication scheme for mobile devices with tracking and liveness detection , 2018, Microprocess. Microsystems.

[42]  Kim-Kwang Raymond Choo,et al.  Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things , 2019, Future Gener. Comput. Syst..

[43]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[44]  Mary M. Conte,et al.  Local image statistics: maximum-entropy constructions and perceptual salience. , 2012, Journal of the Optical Society of America. A, Optics, image science, and vision.

[45]  Jie Xu,et al.  Computation Peer Offloading for Energy-Constrained Mobile Edge Computing in Small-Cell Networks , 2017, IEEE/ACM Transactions on Networking.

[46]  Peter Corcoran,et al.  Mobile-Edge Computing and the Internet of Things for Consumers: Extending cloud computing and services to the edge of the network , 2016, IEEE Consumer Electronics Magazine.

[47]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[48]  Maode Ma,et al.  Secure Group Mobility Support for 6LoWPAN Networks , 2018, IEEE Internet of Things Journal.

[49]  Sheikh Iqbal Ahamed,et al.  Your Phone Knows You: Almost Transparent Authentication for Smartphones , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.

[50]  Ting He,et al.  Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach , 2017, IEEE Journal on Selected Areas in Communications.

[51]  Xiaoyan Wang,et al.  Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things , 2018, IEEE Communications Magazine.