Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2348543.2348569acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Distinguishing users with capacitive touch communication

Published: 22 August 2012 Publication History

Abstract

As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In this paper, we present a capacitive communication method through which a device can recognize who is interacting with it. This method exploits the capacitive touchscreens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter embedded into a ring, watch, or other artifact carried on the human body. We explore two example system designs with a low-power continuous transmitter that communicates through the skin and a signet ring that needs to be touched to the screen. Experiments with our prototype transmitter and tablet receiver show that capacitive communication through a touchscreen is possible, even without hardware or firmware modifications on a receiver. This latter approach imposes severe limits on the data rate, but the rate is sufficient for differentiating users in multiplayer tablet games or parental control applications. Controlled experiments with a signal generator also indicate that future designs may be able to achieve datarates that are useful for providing less obtrusive authentication with similar assurance as PIN codes or swipe patterns commonly used on smartphones today.

References

[1]
Face recognition on galaxy nexus is very neat, but easily compromised with the picture? http://tiny.cc/gj50gw, 2011.
[2]
Nearfield communications forum. http://www.nfc-forum.org/, 2011.
[3]
A. Adler. Vulnerabilities in biometric encryption systems. In Proc. of AVBPA, 2005.
[4]
Afg3000 series arbitrary function generators. http://www.tek.com/AFG3000.
[5]
Amplifier transistors bc548b. http://onsemi.com.
[6]
An mcu-based buck-boost converter for battery chargers. http://www.st.com/.
[7]
Atmel maxtouch mxt1386 specifications. http://www.atmel.com/devices/MXT1386.aspx.
[8]
G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, and A. de Santos Sierra. Analysis of pattern recognition techniques for in-air signature biometrics. Pattern Recognition, 44(10--11):2468 -- 2478, 2011.
[9]
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. of NDSS, Feb. 2002.
[10]
Belkin. Wemo home automation system.
[11]
N. Ben-Asher, N. Kirschnick, H. Sieger, J. Meyer, A. Ben-Oved, and S. Möller. On the need for different security methods on mobile phones. In Proc. of MobileHCI, Aug. 2011.
[12]
H. Bojinov and D. Boneh. Mobile token-based authentication on a budget. In Proc. of HotMobile, Feb. 2011.
[13]
Craftsman. Assurelink garage doors openers.
[14]
P. Dietz and D. Leigh. Diamondtouch: a multi-user touch technology. In Proc. of UIST, Nov. 2001.
[15]
Digital Modulation Schemes. http://robotics.eecs.berkeley.edu/ sastry/ee20/modulation/node5.html.
[16]
P. Dunphy, A. P. Heiner, and N. Asokan. A closer look at recognition-based graphical passwords on mobile devices. In Proc. of SOUPS, July 2010.
[17]
M. Faundez-Zanuy. On the vulnerability of biometric security systems. Aerospace and Electronic Systems Magazine, IEEE, 19(6):3 -- 8, June 2004.
[18]
C. Foresman. Apple facing class-action lawsuit over kids' in-app purchases. Ars Technica, Apr. 2011.
[19]
Fundamentals of electrostatic discharge. http://www.esda.org/fundamentalsp5.html, 2010.
[20]
J. Galbally-Herrero, J. Fierrez-Aguilar, J. D. Rodriguez-Gonzalez, F. Alonso-Fernandez, J. Ortega-Garcia, and M. Tapiador. On the vulnerability of fingerprint verification systems to fake fingerprints attacks. In Proc. of Carnahan Conferences on Security Technology, Oct. 2006.
[21]
C. Gehrmann, C. J. Mitchell, and K. Nyberg. Manual authentication for wireless devices. CryptoBytes, Spring 2004.
[22]
E. Haselsteiner and K. Breitfuss. Security in Near Field Communication (NFC). In Proc. of the Workshop on RFID Security, 2006.
[23]
K. Hawkey and K. M. Inkpen. Examining the content and privacy of web browsing incidental information. In Proc. of WWW, May 2006.
[24]
A. K. Jain, K. Nandakumar, and A. Nagar. Biometric template security. EURASIP J. Adv. Signal Process, 2008:113:1--113:17, Jan. 2008.
[25]
E. A. Johnson. Touch Displays: A Programmed Man-Machine Interface. Ergonomics, 10(2):271--277, 1967.
[26]
A. K. Karlson, A. B. Brush, and S. Schechter. Can i borrow your phone?: understanding concerns when sharing mobile phones. In Proc. of CHI, Apr. 2009.
[27]
S. Kurkovsky, T. Carpenter, and C. MacDonald. Experiments with simple iris recognition for mobile phones. In Proc. of Information Technology: New Generations, pages 1293 --1294, april 2010.
[28]
J. Liu, L. Zhong, J. Wickramasuriya, and V. Vasudevan. User evaluation of lightweight user authentication with a single tri-axis accelerometer. In Proc. of MobileHCI, Sept. 2009.
[29]
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam. Proximate: proximity-based secure pairing using ambient wireless signals. In Proc. of MobiSys, June 2011.
[30]
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of Artificial "Gummy" Fingers on Fingerprint Systems. In Proc. of SPIE Vol. 4677, 2002.
[31]
R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE TMC, 8(6):792 --806, Jun. 2009.
[32]
M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter. Access control for home data sharing: Attitudes, needs and practices. In Proc. of CHI, May 2010.
[33]
Mobile biometry: European funded project (fp7--2007-ict-1). http://www.mobioproject.org/, 2011.
[34]
Motorola atrix: Technical specifications. http://bit.ly/f7nfEX, 2011.
[35]
Msp430 ultra-low power 16-bit microcontrollers. http://msp430.com.
[36]
A. Nicholson, M. D. Corner, and B. D. Noble. Mobile Device Security using Transient Authentication. IEEE TMC, 5(11):1489--1502, November 2006.
[37]
Ringbow. http://ringbow.com/ringbow/.
[38]
V. Roth, P. Schmidt, and B. Güldenring. The IR ring: authenticating users' touches on a multi-touch display. In Proc. of UIST, Oct. 2010.
[39]
M. Sato, I. Poupyrev, and C. Harrison. Touche: enhancing touch interaction on humans, screens, liquids, and everyday objects. In Proc. of CHI, pages 483--492, New York, NY, USA, 2012.
[40]
Y. Shaked and A. Wool. Cracking the bluetooth pin. In Proc. of MobiSys, pages 39--50, 2005.
[41]
E. Sofge. Can a smartphone make your car smarter? MSN Autos, 2010.
[42]
Sony - mofiria finger-vien pattern recognition. http://bit.ly/cIHGuj, 2009.
[43]
F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proc. of Security Protocols, Apr. 2000.
[44]
Technology review article: Pushing the limits of the touch screen, 2011.
[45]
L. Thalheim and J. Krissler. Body check: Biometric access protection devices and their programs put to the test. ct Magazine, Nov. 2002.
[46]
M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proc. of CCS, Oct. 2010.
[47]
W. Westerman and J. G. Elias. US 0232567 Patent - Capacitive Sensing Arrangment, 2006.

Cited By

View all
  • (2024)Towards ISAC-Empowered mmWave Radars by Capturing Modulated VibrationsIEEE Transactions on Mobile Computing10.1109/TMC.2024.344340423:12(13787-13803)Online publication date: Dec-2024
  • (2024)CT-Auth: Capacitive Touchscreen-Based Continuous Authentication on SmartphonesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.327787936:1(90-106)Online publication date: Jan-2024
  • (2023)mmRipple: Communicating with mmWave Radars through Smartphone VibrationProceedings of the 22nd International Conference on Information Processing in Sensor Networks10.1145/3583120.3586956(149-162)Online publication date: 9-May-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
Mobicom '12: Proceedings of the 18th annual international conference on Mobile computing and networking
August 2012
484 pages
ISBN:9781450311595
DOI:10.1145/2348543
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 August 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. capacitive touch communication
  2. distinguishing users
  3. signetring
  4. touchscreen communication
  5. user identification

Qualifiers

  • Research-article

Conference

Mobicom'12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)7
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Towards ISAC-Empowered mmWave Radars by Capturing Modulated VibrationsIEEE Transactions on Mobile Computing10.1109/TMC.2024.344340423:12(13787-13803)Online publication date: Dec-2024
  • (2024)CT-Auth: Capacitive Touchscreen-Based Continuous Authentication on SmartphonesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.327787936:1(90-106)Online publication date: Jan-2024
  • (2023)mmRipple: Communicating with mmWave Radars through Smartphone VibrationProceedings of the 22nd International Conference on Information Processing in Sensor Networks10.1145/3583120.3586956(149-162)Online publication date: 9-May-2023
  • (2023)Z-Ring: Single-Point Bio-Impedance Sensing for Gesture, Touch, Object and User RecognitionProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581422(1-18)Online publication date: 19-Apr-2023
  • (2023)Touch-to-Access Device Authentication For Indoor Smart ObjectsIEEE Transactions on Mobile Computing10.1109/TMC.2021.308949722:2(1185-1197)Online publication date: 1-Feb-2023
  • (2023)MagAuth: Secure and Usable Two-Factor Authentication With Magnetic Wrist WearablesIEEE Transactions on Mobile Computing10.1109/TMC.2021.307259822:1(311-327)Online publication date: 1-Jan-2023
  • (2023)mmLock: User Leaving Detection Against Data Theft via High-Quality mmWave Radar Imaging2023 32nd International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN58024.2023.10230151(1-10)Online publication date: Jul-2023
  • (2023)Graphene as the ultra-transparent conductive layer in developing the nanotechnology-based flexible smart touchscreensMicroelectronic Engineering10.1016/j.mee.2022.111899267:COnline publication date: 1-Jan-2023
  • (2022)IBSync: Intra-body synchronization and implicit contextualization of wearable devices using artificial ECG landmarksFrontiers in Computer Science10.3389/fcomp.2022.9154484Online publication date: 8-Sep-2022
  • (2022)Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT DevicesIEEE Transactions on Mobile Computing10.1109/TMC.2021.305708321:10(3565-3580)Online publication date: 1-Oct-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media