论文标题
使用隐藏的Markov模型的连续操作员身份验证用于遥控系统
Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models
论文作者
论文摘要
在本文中,我们提出了一种基于隐藏的马尔可夫模型(HMM)的遥控机器人过程中连续操作员身份验证的新方法。尽管HMM最初是在语音识别中开发并广泛使用的,但它们在人类运动和活动建模方面表现出色。我们在人类语言和遥控机器人过程之间进行了类比(即单词类似于远程传播者的手势,句子类似于整个远程执行任务或过程),并实现HMMS来对Teletererated任务进行建模。为了测试所提出方法的连续身份验证性能,我们进行了两组分析。我们使用商品VR耳机(HTC VIVE)和触觉反馈启用控制器(Sectable Phantom Omni)构建了虚拟现实(VR)实验环境,以模拟真实的远程执行任务。然后对10个受试者进行了一项实验研究。我们还使用JHU-ISI手势和技能评估工作集(Jigsaws)进行了模拟连续操作员身份验证。基于连续(实时)操作员身份验证精度以及对模拟的模拟模拟攻击的阻力评估模型的性能。结果表明,所提出的方法能够实现70%(VR实验)和81%(拼图数据集)连续分类精度,其短期与1秒的样本窗口一样短。它还能够实时检测模仿攻击。
In this paper, we present a novel approach for continuous operator authentication in teleoperated robotic processes based on Hidden Markov Models (HMM). While HMMs were originally developed and widely used in speech recognition, they have shown great performance in human motion and activity modeling. We make an analogy between human language and teleoperated robotic processes (i.e. words are analogous to a teleoperator's gestures, sentences are analogous to the entire teleoperated task or process) and implement HMMs to model the teleoperated task. To test the continuous authentication performance of the proposed method, we conducted two sets of analyses. We built a virtual reality (VR) experimental environment using a commodity VR headset (HTC Vive) and haptic feedback enabled controller (Sensable PHANToM Omni) to simulate a real teleoperated task. An experimental study with 10 subjects was then conducted. We also performed simulated continuous operator authentication by using the JHU-ISI Gesture and Skill Assessment Working Set (JIGSAWS). The performance of the model was evaluated based on the continuous (real-time) operator authentication accuracy as well as resistance to a simulated impersonation attack. The results suggest that the proposed method is able to achieve 70% (VR experiment) and 81% (JIGSAW dataset) continuous classification accuracy with as short as a 1-second sample window. It is also capable of detecting the impersonation attack in real-time.