信息网络安全 ›› 2019, Vol. 19 ›› Issue (3): 34-42.doi: 10.3969/j.issn.1671-1122.2019.03.005

• • 上一篇    下一篇

移动终端身份认证的深度信念网络模型

孙子文1,2(), 张义超1   

  1. 1. 江南大学物联网工程学院,江苏无锡 214122
    2. 物联网技术应用教育部工程研究中心,江苏无锡 214122
  • 收稿日期:2018-11-29 出版日期:2019-03-19 发布日期:2020-05-11
  • 作者简介:

    作者简介:孙子文(1968—),女,四川,教授,博士,主要研究方向为网络安全、模式识别、人工智能、无线传感网络理论与技术;张义超(1995—),男,山东,硕士研究生,主要研究方向为移动终端安全理论与技术。

  • 基金资助:
    国家自然科学基金[61373126];中央高校基本科研业务费专项资金[JUSRP51510];江苏省自然科学基金[BK20131107]

Deep Belief Network Model for Mobile Terminal Identity Authentication

Ziwen SUN1,2(), Yichao ZHANG1   

  1. 1. School of Internet of Things, Jiangnan University, Wuxi Jiangsu 214122, China
    2. Engineering Research Center of Internet of Things Technology Applications, Ministry of Education, Wuxi Jiangsu 214122, China
  • Received:2018-11-29 Online:2019-03-19 Published:2020-05-11

摘要:

文章针对移动终端面临的信息安全问题,建立了移动终端身份认证的深度信念网络模型。利用触摸屏传感器采集用户原始触摸手势数据序列,经数据预处理后提取手势特征并传入深度信念网络模型;选用逐层贪婪算法进行无监督的预训练,再经反向传播算法进行有监督微调后固定模型参数;将测试手势特征数据作为模型输入层数据,经模型计算后得到输出层数据,由Softmax分类器对输出数据分类,认证用户身份。仿真实验结果表明,与连续隐马尔可夫模型、反向传播算法相比,文中深度信念网络模型能达到较低的错误率,明显提高认证的准确性。

关键词: 深度信念网络模型, 逐层贪婪算法, 反向传播算法, Softmax分类器

Abstract:

Aiming at the information security problem faced by mobile terminal, a deep belief network model for mobile terminal identity authentication is established. The touch screen sensor is used to collect the user’s original touch gesture data sequence. After the data is pre-processed, the gesture features are extracted and passed into the deep belief network model. The layer-by-layer greedy algorithm is used for unsupervised pre-training, and then the back-propagation algorithm is used to supervise and fine-tune the fixed model parameters. The gesture feature data is used as the model input layer, and the output layer data is obtained after the model is calculated, and the output data is classified and authenticated by the Softmax classifier. Compared with the continuous hidden Markov model and back propagation algorithm, the simulation results show that the deep belief network method can achieve a lower error rate and significantly improve the accuracy of authentication.

Key words: deep belief network model, layer-by-layer greedy algorithm, back propagation algorithm, Softmax classifier

中图分类号: