Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

MTSFBet: A Hand-Gesture-Recognition-Based Identity Authentication Approach for Passive Keyless Entry Against Relay Attack

Published: 01 February 2024 Publication History

Abstract

The Passive Keyless Entry and Start system (PKES) has become an essential element of vehicle systems since it allows owners to lock or unlock their properties without having to take out the keys. However, the system suffers from a potential and serious security problem because of a relay attack. This paper introduces dynamic biometrics to resolve such potential problems. Precisely, it opts for hand-gesture and proposes a Multi-Task Siamese Feature-pyramid network with Bidirectional Gated Recurrent Units (MTSFBet) against relay attack. MTSFBet is made up of a Dynamic Biometrics Extraction Module (DBEM) and Multi-Task Operation Module (MTOM). DBEM extracts trajectory and kinematic features from the gesture data of owners, whereas MTOM performs gesture classification and identity authentication using these features. Moreover, we designed a loss function for the identity authentication part. Eventually, based on the dataset collected by mobile devices, we constructed comparative experiments and ablation studies to demonstrate the effectiveness of the method. Our comprehensive model achieves an accuracy of 0.86 in gesture classification and an accuracy of 0.73 in identity authentication. The results showed that our MTSFBet significantly outperforms other comparison methods. The MTSFBet can also be used in any scenario associated with identity authentication based on hand gestures.

References

[1]
A. Francillon, B. Danev, and S. Capkun, “Relay attacks on passive keyless entry and start systems in modern cars,” 2010, p. 332. [Online]. Available: http://eprint.iacr.org/2010/33
[2]
Y. Xie, H. J. Kim, S. Y. Chong, and T. L. Song, “Time-based countermeasures for relay attacks on PKES systems,” in Proc. 16th Int. Conf. Inform. Control Autom. Robot., 2019, pp. 795–801.
[3]
S. Rizvi, J. Imler, L. Ritchey, and M. Tokar, “Securing PKES against relay attacks using coordinate tracing and multi-factor authentication,” in Proc. IEEE 53rd Annu. Conf. Inf. Sci. Syst., 2019, pp. 1–6.
[4]
S. Rizvi, J. Imler, L. Ritchey, and M. Tokar, “Securing PKES: Integrating artificial intelligence into PKES forcefield for anomaly detection,” in Proc. IEEE Int. Conf. Softw. Secur. Assurance, 2019, pp. 10–15.
[5]
J. Li, Y. Dong, S. Fang, H. Zhang, and D. Xu, “User context detection for relay attack resistance in passive keyless entry and start system,” Sensors, vol. 20, no. 16, 2020, Art. no.
[6]
M. Abuhamad, A. Abusnaina, D. Nyang, and D. Mohaisen, “Sensor-based continuous authentication of smartphones’ users using behavioral biometrics: A contemporary survey,” IEEE Internet Things J., vol. 8, no. 1, pp. 65–84, Jan. 2021.
[7]
H. Liu, L. Dai, S. Hou, J. Han, and H. Liu, “Are mid-air dynamic gestures applicable to user identification?,” Pattern Recognit. Lett., vol. 117, pp. 179–185, 2019.
[8]
H. Zhu, J. Hu, S. Chang, and L. Lu, “ShakeIn: Secure user authentication of smartphones with single-handed shakes,” IEEE Trans. Mobile Comput., vol. 16, no. 10, pp. 2901–2912, Oct. 2017.
[9]
T. Li, C. Shi, P. Li, and P. Chen, “A novel gesture recognition system based on CSI extracted from a smartphone with nexmon firmware,” Sensors, vol. 21, no. 1, pp. 222, 2020.
[10]
Y. Zhang, “Behavioral biometrics dentification based on machine learning methods,” in Proc. IEEE Int. Conf. Mach. Learn. Knowl. Eng., 2022, pp. 67–71.
[11]
N. Karakaya, G. I. Alptekin, and Ö. D. İncel, “Using behavioral biometric sensors of mobile phones for user authentication,” Procedia Comput. Sci., vol. 159, pp. 475–484, 2019.
[12]
M. J. Cheok, Z. Omar, and M. H. Jaward, “A review of hand gesture and sign language recognition techniques,” Int. J. Mach. Learn. Cybern., vol. 10, no. 1, pp. 131–153, 2019.
[13]
J. Hu, J. Lu, and Y.-P. Tan, “Discriminative deep metric learning for face verification in the wild,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2014, pp. 1875–1882.
[14]
X. Hu, Y. Cao, T. Tang, and Y. Sun, “Data-driven technology of fault diagnosis in railway point machines: Review and challenges,” Transp. Saf. Environ., vol. 4, no. 4, 2022, Art. no.
[15]
G. P. Hancke, K. E. Mayes, and K. Markantonakis, “Confidence in smart token proximity: Relay attacks revisited,” Comput. Secur., vol. 28, no. 7, pp. 615–627, 2009.
[16]
S. Drimer et al., “Keep your enemies close: Distance bounding against smartcard relay attacks,” in Proc. 16th USENIX Secur. Symp., 2007, vol. 312, Art. no.
[17]
G. P. Hancke, “Practical attacks on proximity identification systems,” in Proc. IEEE Symp. Secur. Privacy, 2006, pp. 6–pp.
[18]
Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 370–380, Feb. 2006.
[19]
F. Stajano, F.-L. Wong, and B. Christianson, “Multichannel protocols to prevent relay attacks,” in Proc. Int. Conf. Financial Cryptogr. Data Secur., Springer, 2010, pp. 4–19.
[20]
S. Sedihpour, S. Capkun, S. Ganeriwal, and M. Srivastava, “Implementation of attacks on ultrasonic ranging systems,” in Proc. ACM Conf. Netw. Sensor Syst., 2005, vol. 10, pp. 1098918–1098977.
[21]
S. Capkun and J.-P. Hubaux, “Secure positioning in wireless networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 221–232, Feb. 2006.
[22]
M. Ehatisham-ul Haq, M. A. Azam, U. Naeem, Y. Amin, and J. Loo, “Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing,” J. Netw. Comput. Appl., vol. 109, pp. 24–35, 2018.
[23]
A. Buriro, B. Crispo, and M. Conti, “AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones,” J. Inf. Secur. Appl., vol. 44, pp. 89–103, 2019.
[24]
I. Stylios, A. Skalkos, S. Kokolakis, and M. Karyda, “BioPrivacy: Development of a keystroke dynamics continuous authentication system,” in Proc. Eur. Symp. Res. Comput. Secur., Springer, 2021, pp. 158–170.
[25]
S. Mekruksavanich and A. Jitpattanakul, “Biometric user identification based on human activity recognition using wearable sensors: An experiment using deep learning models,” Electronics, vol. 10, no. 3, pp. 308, 2021.
[26]
H. C. Volaka, G. Alptekin, O. E. Basar, M. Isbilen, and O. D. Incel, “Towards continuous authentication on mobile phones using deep learning models,” Procedia Comput. Sci., vol. 155, pp. 177–184, 2019.
[27]
C. Wang, Y. Xiao, X. Gao, L. Li, and J. Wang, “A framework for behavioral biometric authentication using deep metric learning on mobile devices,” IEEE Trans. Mobile Comput., vol. 22, no. 1, pp. 19–36, Jan. 2023.
[28]
G. M. Weiss, K. Yoneda, and T. Hayajneh, “Smartphone and smartwatch-based biometrics using activities of daily living,” IEEE Access, vol. 7, pp. 133190–133202, 2019.
[29]
G. Stragapede, R. Vera-Rodriguez, R. Tolosana, A. Morales, A. Acien, and G. Le Lan, “Mobile behavioral biometrics for passive authentication,” Pattern Recognit. Lett., vol. 157, pp. 35–41, 2022.
[30]
J. M. Espín López, A. Huertas Celdrán, J. G. Marín-Blázquez, F. Esquembre, and G. Martínez Pérez, “S3: An AI-enabled user continuous authentication for smartphones based on sensors, statistics and speaker information,” Sensors, vol. 21, no. 11, 2021, Art. no.
[31]
D. Reichinger, E. Sonnleitner, and M. Kurz, “Continuous mobile user authentication using combined biometric traits,” Appl. Sci., vol. 11, no. 24, 2021, Art. no.
[32]
S. R. V. Sudhakar, N. Kayastha, and K. Sha, “ActID: An efficient framework for activity sensor based user identification,” Comput. Secur., vol. 108, 2021, Art. no.
[33]
Z. Shen, S. Li, X. Zhao, and J. Zou, “MMAuth: A continuous authentication framework on smartphones using multiple modalities,” IEEE Trans. Inf. Forensics Secur., vol. 17, pp. 1450–1465, Mar. 2022.
[34]
W. Ding, M. Abdel-Basset, H. Hawash, and N. Moustafa, “Interval type-2 fuzzy temporal convolutional autoencoder for gait-based human identification and authentication,” Inf. Sci., vol. 597, pp. 144–165, 2022.
[35]
F. Schroff, D. Kalenichenko, and J. Philbin, “FaceNet: A unified embedding for face recognition and clustering,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2015, pp. 815–823.
[36]
H. Wang et al., “CosFace: Large margin cosine loss for deep face recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2018, pp. 5265–5274.

Cited By

View all
  • (2024)M2BIST-SPNet: RUL prediction for railway signaling electromechanical devicesThe Journal of Supercomputing10.1007/s11227-024-06111-y80:12(16744-16774)Online publication date: 1-Aug-2024

Index Terms

  1. MTSFBet: A Hand-Gesture-Recognition-Based Identity Authentication Approach for Passive Keyless Entry Against Relay Attack
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image IEEE Transactions on Mobile Computing
          IEEE Transactions on Mobile Computing  Volume 23, Issue 2
          Feb. 2024
          1002 pages

          Publisher

          IEEE Educational Activities Department

          United States

          Publication History

          Published: 01 February 2024

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 06 Feb 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)M2BIST-SPNet: RUL prediction for railway signaling electromechanical devicesThe Journal of Supercomputing10.1007/s11227-024-06111-y80:12(16744-16774)Online publication date: 1-Aug-2024

          View Options

          View options

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media