Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models

被引:2
作者
Yan, Junjie [1 ]
Huang, Kevin [2 ]
Lindgren, Kyle [3 ]
Bonaci, Tamara [4 ]
Chizeck, Howard J. [3 ]
机构
[1] Univ Washington, 18550 NE 53rd Ct, Redmond, WA 98052 USA
[2] Trinity Coll, Engn Dept, 300 Summit St, Hartford, CT 06106 USA
[3] Univ Washington, Dept Elect & Comp Engn, 185 E Stevens Way NE AE100R, Seattle, WA 98195 USA
[4] Northeastern Univ, Khoury Coll Comp Sci, 401 Terry Ave N, Seattle, WA 98109 USA
基金
美国国家科学基金会;
关键词
Authentication; hidden Markov models; telerobotics; MINIMALLY INVASIVE SURGERY; SEGMENTATION; RECOGNITION;
D O I
10.1145/3488901
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this article, we present a novel approach for continuous operator authentication in teleoperated robotic processes based on Hidden Markov Models (HMM). While HMMs were originally developed and widely used in speech recognition, they have shown great performance in human motion and activity modeling. We make an analogy between human language and teleoperated robotic processes (i.e., words are analogous to a teleoperator's gestures, sentences are analogous to the entire teleoperated task or process) and implement HMMs to model the teleoperated task. To test the continuous authentication performance of the proposed method, we conducted two sets of analyses. We built a virtual reality (VR) experimental environment using a commodity VR headset (HTC Vive) and haptic feedback enabled controller (Sensable PHANToM Omni) to simulate a real teleoperated task. An experimental study with 10 subjects was then conducted. We also performed simulated continuous operator authentication by using the JHU-ISI Gesture and Skill Assessment Working Set ( JIGSAWS). The performance of the model was evaluated based on the continuous (real-time) operator authentication accuracy as well as resistance to a simulated impersonation attack. The results suggest that the proposed method is able to achieve 70% (VR experiment) and 81% ( JIGSAWS dataset) continuous classification accuracy with as short as a 1-second sample window. It is also capable of detecting an impersonation attack in real-time.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] K-SVD: An algorithm for designing overcomplete dictionaries for sparse representation
    Aharon, Michal
    Elad, Michael
    Bruckstein, Alfred
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (11) : 4311 - 4322
  • [2] A Dataset and Benchmarks for Segmentation and Recognition of Gestures in Robotic Surgery
    Ahmidi, Narges
    Tao, Lingling
    Sefati, Shahin
    Gao, Yixin
    Lea, Colin
    Haro, Benjamin Bejar
    Zappella, Luca
    Khudanpur, Sanjeev
    Vidal, Rene
    Hager, Gregory D.
    [J]. IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 2017, 64 (09) : 2025 - 2041
  • [3] Alemzadeh Homa, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P395, DOI 10.1109/DSN.2016.43
  • [4] [Anonymous], 1997, The HTK book
  • [5] [Anonymous], 2021, FORM 8 K SOLARWINDS
  • [6] User authentication through typing biometrics features
    Araújo, LCF
    Sucupira, LHR
    Lizárraga, MG
    Ling, LL
    Yabu-Uti, JBT
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) : 851 - 855
  • [7] Bo L., 2013, Proceedings of the 19th Annual International Conference on Mobile Computing Networking-MobiCom, P187, DOI [10.1145/2500423.2504572, DOI 10.1145/2500423.2504572]
  • [8] Bonaci T., 2015, PROC ACMIEEE 6 INT C, P11, DOI [10.1145/2735960.2735980, DOI 10.1145/2735960.2735980]
  • [9] Bonaci T, 2015, Arxiv, DOI [arXiv:1504.04339, DOI 10.48550/ARXIV.1504.04339]
  • [10] Falliere Nicolas, 2011, Security Response, V5, P29