Sending a password or secret code over airborne radio waves like WiFi or Bluetooth means anyone can eavesdrop, making those transmissions vulnerable to hackers who can attempt to break the encrypted code.
Now, University of Washington computer scientists and electrical engineers have devised a way to send secure passwords through the human body — using benign, low-frequency transmissions generated by fingerprint sensors and touchpads on consumer devices.
“Fingerprint sensors have so far been used as an input device. What is cool is that we’ve shown for the first time that fingerprint sensors can be re-purposed to send out information that is confined to the body,” said senior author Shyam Gollakota, UW assistant professor of computer science and engineering.
These “on-body” transmissions offer a more secure way to transmit authenticating information between devices that touch parts of your body — such as a smart door lock or wearable medical device — and a phone or device that confirms your identity by asking you to type in a password.
This new technique, which leverages the signals already generated by fingerprint sensors on smartphones and laptop touchpads to transmit data in new ways, is described in a paper presented in September at the2016 Association for Computing Machinery’s International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016) in Germany.
“Let’s say I want to open a door using an electronic smart lock,” said co-lead author Merhdad Hessar, a UW electrical engineering doctoral student. “I can touch the doorknob and touch the fingerprint sensor on my phone and transmit my secret credentials through my body to open the door, without leaking that personal information over the air.”
The research team tested the technique on iPhone and other fingerprint sensors, as well as Lenovo laptop trackpads and the Adafruit capacitive touchpad. In tests with 10 different subjects, they were able to generate usable on-body transmissions on people of different heights, weights and body types. The system also worked when subjects were in motion — including while they walked and moved their arms.
“We showed that it works in different postures like standing, sitting and sleeping,” said co-lead author Vikram Iyer, a UW electrical engineering doctoral student. “We can also get a strong signal throughout your body. The receivers can be anywhere — on your leg, chest, hands — and still work.”
The research team from the UW’s Networks and Mobile Systems Labsystematically analyzed smartphone sensors to understand which of them generates low-frequency transmissions below 30 megahertz that travel well through the human body but don’t propagate over the air.
The researchers found that fingerprint sensors and touchpads generate signals in the 2 to 10 megahertz range and employ capacitive coupling to sense where your finger is in space, and to identify the ridges and valleys that form unique fingerprint patterns.
Normally, sensors use these signals to receive input about your finger. But the UW engineers devised a way to use these signals as output that corresponds to data contained in a password or access code. When entered on a smartphone, data that authenticates your identity can travel securely through your body to a receiver embedded in a device that needs to confirm who you are.
Their process employs a sequence of finger scans to encode and transmit data. Performing a finger scan correlates to a 1-bit of digital data and not performing the scan correlates to a 0-bit.
The technology could also be useful for secure key transmissions to medical devices such as glucose monitors or insulin pumps, which seek to confirm someone’s identity before sending or sharing data.
The team achieved bit rates of 50 bits per second on laptop touchpads and 25 bits per second with fingerprint sensors — fast enough to send a simple password or numerical code through the body and to a receiver within seconds.
This represents only a first step, the researchers say. Data can be transmitted through the body even faster if fingerprint sensor manufacturers provide more access to their software.
The Latest on: Secure passwords
via Google News
The Latest on: Secure passwords
- Hardware Security Keys: A Seatbelt for the Internet?—Cyber Saturdayon September 7, 2019 at 10:11 am
... keys come highly recommended by security experts. They offer an additional layer of protection—a second-factor, in the parlance—over passwords alone. They’re generally more secure than ...
- Apple takes flak for disputing iOS security bombshell dropped by Googleon September 7, 2019 at 5:30 am
Earlier this week, researchers at security firm Volexity reported finding 11 websites serving the interests of Uyghur Muslims that the researchers believed were tied to the attacks Project Zero ...
- Q&A: A passwordless future for enterprise security?on September 6, 2019 at 9:50 pm
This means that password management for businesses remains a key security issue. To develop alternatives to passwords, the much-discussed zero sign-on technologies and authentication methods such as ...
- Google’s Security Team Finds iPhones Infected by Monitoring Implantson September 6, 2019 at 12:10 pm
Along with that, iPhones’ keychains, containing all users’ passwords, were able to be uploaded. Also in the security vulnerability mix was the ability to obtain users’ address books and ...
- Jungle Disk adds security awareness training to cybersecurity suiteon September 6, 2019 at 8:38 am
“Having the right cybersecurity software, tools and security training in place is something that ... the cybersecurity suite includes computer and server backup, email archiving, password management ...
- More than half a million GPS trackers have the password 123456on September 6, 2019 at 4:52 am
A CHINESE MANUFACTURER of inexpensive GPS tracking devices for pets, cars, children and elderly relatives has been incredibly lax in its security, shipping the devices with the default password of ...
- Mobile Identity is the New Security Perimeteron September 6, 2019 at 4:32 am
The following IDG survey results reflect enterprise security leaders’ prediction of when mobile devices will authenticate Identity Access Management (IAM): Passwords Aren’t Strong Enough For A Zero ...
- Over half a million active GPS trackers have ‘123456’ as default passwordon September 6, 2019 at 4:23 am
Researchers have found serious security vulnerabilities in over 600,000 ... with the default password being “123456.” Avast warned that hackers can use this information to intercept data ...
- Security chief warns on basic passwordson September 6, 2019 at 12:21 am
Easy-to-guess passwords like 123456 remain in use despite repeated warnings, according to a senior UK cyber security chief. Chris Ensor, deputy director for cyber skills and growth at the UK’s ...
via Bing News