Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3300061.3300124acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Taprint: Secure Text Input for Commodity Smart Wristbands

Published: 05 August 2019 Publication History

Abstract

Smart wristband has become a dominant device in the wearable ecosystem, providing versatile functions such as fitness tracking, mobile payment, and transport ticketing. However, the small form-factor, low-profile hardware interfaces and computational resources limit their capabilities in security checking. Many wristband devices have recently witnessed alarming vulnerabilities, e.g., personal data leakage and payment fraud, due to the lack of authentication and access control. To fill this gap, we propose a secure text pin input system, namely Taprint, which extends a virtual number pad on the back of a user's hand. Taprint builds on the key observation that the hand "landmarks'', especially finger knuckles, bear unique vibration characteristics when being tapped by the user herself. It thus uses the tapping vibrometry as biometrics to authenticate the user, while distinguishing the tapping locations. Taprint reuses the inertial measurement unit in the wristband, "overclocks'' its sampling rate to extrapolate fine-grained features, and further refines the features to enhance the uniqueness and reliability. Extensive experiments on 128 users demonstrate that Taprint achieves a high accuracy (96%) of keystrokes recognition. It can authenticate users, even through a single-tap, at extremely low error rate (2.4%), and under various practical usage disturbances.

References

[1]
R. Morris and K. Thompson. "Password security: A case history." In Communications of the ACM, 1979: 594--597.
[2]
X. Suo, Y. Zhu, and G. Owen. "Graphical passwords: A survey." In Proc. IEEE Computer security applications conference, 2005.
[3]
W. Meng, W. Li, L. Jiang, and L. Meng. "On Multiple Password Interference of Touch Screen Patterns and Text Passwords." In Proc. ACM CHI, 2016:4818--4822.
[4]
A. Timons and O. Altan. "Grid unlock." US Patent App. 2010, 12/698,321.
[5]
A. C. Morris, S. Jassim, H. Sellahewa, L. Allano, J. Ehlers, D. Wu, J. Koreman, S. Garcia-Salicetti, B. Ly-Van, and B. Dorizzi. "Multimodal person authentication on a smartphone under realistic conditions." In Proc. SPIE, vol. 6250, 2006, pp. 120--131.
[6]
R. Brunelli and D. Falavigna. "Person identification using multiple cues." Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 17, no. 10, pp. 955--966, 1995.
[7]
A. Arakala, J. Jeffers, and K. Horadam. "Fuzzy extractors for minutiae-based fingerprint authentication." In International Conference on Biometrics. Springer, 2007: 760--769.
[8]
B. Duc, S. Fischer, and J. Biun. " Face authentication with Gabor information on deformable graphs." In IEEE Transactions on Image Processing, 1999:504--516.
[9]
A. Kumar and A. Passi. "Comparison and combination of irismatchers for reliable personal authentication." Pattern recognition, 2010: 1016--1026.
[10]
C. Cornelius, R. Peterson, J. Skinner, R. Halter,and D. Kotz. "A wearable system that knows who wears it." In Proc. ACM Mobisys, 2014, pp. 55--67.
[11]
W. Wang, A. X. Liu, and M. Shahzad. "Gait Recognition Using WiFi Signals." In Proc. ACM UbiComp, 2016.
[12]
Y. Zeng, P. H. Pathak, and P. Mohapatra. "WiWho: wifi-based person identification in smart spaces." In Proc. IEEE IPSN, 2016.
[13]
Y. Ren, Y. Chen, M. Chuah, and J. Yang. "Smartphone based user verification leveraging gait recognition for mobile healthcare systems." In Proc. IEEE Secon, 2013.
[14]
J. Mantyjarvi, M. Lindholm, E. Vildjiounaite, S. M. Makela, and H. A. Ailisto. "Identifying users of portable devices from gait pattern with accelerometers." In Proc. IEEE ICASSP, 2005, pp. ii/973-ii/976 Vol. 2.
[15]
H. Lu, J. Huang, T. Saha, and L. Nachman. "Unobtrusive gait verification for mobile phones." In Proc. ACM International Symposium on Wearable Computers, 2014.
[16]
G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, and A. de Santos Sierra. "Analysis of pattern recognition techniques for in-air signature biometrics." Pattern Recognition, 2011, vol. 44, no. 10, pp.2468--2478.
[17]
Y.Yang, G. D. Clark, J.Lindqvist, and A. Oulasvirta. "Free-form gesture authentication in the wild." In Proc. ACM CHI, 2016, pp. 3722--3735.
[18]
M. Sherman, G. Clark, Y. Yang, S. Sugrim, A. Modig, J. Lindqvist, A. Oulasvirta, and T. Roos. "User-generated Freeform Gestures for Authentication: Security and Memorability." In Proc. ACM MobiSys, 2014, pp. 176--189.
[19]
F. Monrose and A. Rubin. "Authentication via keystroke dynamics." In Proc. ACM CCS, 1997.
[20]
F. Monrose, K. M. Reiter, and S. Wetzel. "Password hardening based on keystroke dynamics." International Journal of Information Security, vol. 1, pp. 69--83.
[21]
N. L. Clarke, S. M. Furnell, B. M. Lines, and P. L. Reynolds. "Keystroke dynamics on a mobile handset: a feasibility study." Information Management and Computer Security, vol. 11, pp.161--166, 2003.
[22]
N. Zheng, K. Bai, H. Huang, and H. Wang. "You Are How You Touch: User Verification on Smartphones via Tapping Behaviors." In Proc. IEEE ICNP, 2014, pp. 221--232.
[23]
C. Giuffrida, K. Majdanik, M. Conti, and H. Bos. "I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics." In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2014, pp. 92--111.
[24]
Y. Song, Z. Cai, and Z. L. Zhang. "Multi-touch Authentication Using Hand Geometry and Behavioral Information." In Proc. IEEE SP, 2017,pp. 357--372.
[25]
G. Laput, R. Xiao, X. A. Chen, S. E. Hudson, and C. Harrison. "Skin buttons: cheap, small, low-powered and clickable fixedicon laser projectors." In Proc. ACM UIST, 2014, pp. 389--394.
[26]
C. Harrison, D. Tan, and D. Morris. "Skinput: appropriating the body as an input surface." In Proc. ACM CHI,2010, pp. 453--462.
[27]
P. C. Wong, K. Zhu, and H. Fu. - FingerT9: Leveraging thumb - to- finger interaction for one-handed text entry on smartwatches." In Proc. ACM CHI, 2018.
[28]
C. Harrison, H. Benko, and A. D.Wilson. "OmniTouch: wearable multitouch interaction everywhere." In Proc. ACM UIST, 2011, pp. 441--450.
[29]
C. Holz, T. Grossman, G. Fitzmaurice, and A. Agur. "Implanted user interfaces." In Proc. ACM CHI, 2012, pp. 503--512.
[30]
M. Zhang, Q. Dai, P. Yang, J. Xiong, C. Tian, and C. Xiang. "iDial: Enabling a Virtual Dial Plate on the Hand Back for Around-Device." In Proc. ACM Ubicomp, 2018.
[31]
G. Laput, R. Xiao, and C. Harrison. "ViBand: High-Fidelity Bio-Acoustic Sensing Using Commodity Smartwatch Accelerometers." In Proc. ACM UIST, 2016, pp. 321--333.
[32]
H. Wen, J. Ramos Rojas, and A. K. Dey. "Serendipity: Finger gesture recognition using an off-the-shelf smartwatch." In Proc. ACM CHI, 2016, pp. 3847--3851.
[33]
P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp)iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers." In Proc. ACM CCS, 2011, pp. 551--562.
[34]
D. J. Matthies, G. Bieber, and U. Kaulbars. "AGIS: automated tool detection and hand-arm vibration estimation using an unmodified smartwatch." In Proc. ACM 3rd International Workshop on Sensor-based Activity Recognition and Interaction, 2016.
[35]
S. Li, A. Ashok, Y. Zhang, C. Xu, J. Lindqvist, and M. Gruteser. "Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns." In Proc. IEEE Percom, 2016, pp. 1--9.
[36]
L. Yang, W. Wang, and Q. Zhang. "VibID: user identification through bio-vibrometry." In Proc. IEEE IPSN, 2016, pp. 1--12.
[37]
J. Liu, C. Wang, Y. Chen, and N. Saxena. "VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration." In Proc. ACM CCS, 2017, pp. 73--87.
[38]
J. Wang, K. Zhao and X. Zhang. "Ubiquitous Keyboard for Small Mobile Devices: Harnessing Multipath Fading for Fine- Grained Keystroke Localization." In Proc. ACM MobiSys, 2014.
[39]
Jacob B. "Surveillance Society: Wearable fitness devices often carry security risks". http://www.post-gazette.com/news/surveillancesociety/ 2015/08/03/Surveillance-Society-Wearable-fitnessdevices- often-carry-security-risks/stories/201508030023, 2015.
[40]
Rahman, M., B. Carbunar, and M. Banik, "Fit and vulnerable: Attacks and defenses for a health monitoring device". arXiv preprint arXiv:1304.5672, 2013.
[41]
W. Chen, M. Guan, Y. Huang, L. Wang, R. Ruby, W. Hu and K. Wu. "ViType: A Cost Efficient On-body Typing System through Vibration." In Proc. IEEE Secon, 2018.
[42]
W. E. Siri. "The gross composition of the body." Adv Biol Med Phys, 1956, vol. 4, no. 239--279, pp. 513.
[43]
C. Song, F. Lin, Y. Zhuang, W. Xu, C. Li and K. Ren. "Cardiac Scan: A Non-Contact and Continuous Heart-Based User Authentication System." In Proc. ACM MobiCom, 2017.
[44]
H. Feng, K. Fawaz, K. G. Shin. "Continuous Authentication for Voice Assistants." In Proc. ACM MobiCom, 2017.
[45]
C. Zhang, A. Bedri, G. Reyes, B. Bercik, O. T. Inan, T. E. Starner and G. D. Abowd. "TapSkin: Recognizing On-Skin Input for Smartwatches" In Proc. ACM ISS, 2016.
[46]
C. Knapp and G. Carter. "The generalized correlation method for estimation of time delay" IEEE Trans. Acoust., Speech, Signal Processing, 1976, 24:320--327.
[47]
http://tech.qq.com/a/20160222/006556.htm
[48]
https://blog.csdn.net/li4951/article/details/7410511?utm_source
[49]
T. Wei, S. Wang, A. Zhou and X. Zhang "Acoustic Eaves dropping through Wireless Vibrometry", In Proc. of ACMMobiCom, 2015

Cited By

View all
  • (2024)Wearable Activity Trackers: A Survey on Utility, Privacy, and SecurityACM Computing Surveys10.1145/364509156:7(1-40)Online publication date: 8-Feb-2024
  • (2024)ViObjectProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435478:1(1-26)Online publication date: 6-Mar-2024
  • (2024)CAvatarProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314247:4(1-24)Online publication date: 12-Jan-2024
  • Show More Cited By

Index Terms

  1. Taprint: Secure Text Input for Commodity Smart Wristbands

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiCom '19: The 25th Annual International Conference on Mobile Computing and Networking
    August 2019
    1017 pages
    ISBN:9781450361699
    DOI:10.1145/3300061
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 August 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. authentication
    2. secure input
    3. vibration recognition
    4. wearable devices

    Qualifiers

    • Research-article

    Conference

    MobiCom '19
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 440 of 2,972 submissions, 15%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)162
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 23 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Wearable Activity Trackers: A Survey on Utility, Privacy, and SecurityACM Computing Surveys10.1145/364509156:7(1-40)Online publication date: 8-Feb-2024
    • (2024)ViObjectProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36435478:1(1-26)Online publication date: 6-Mar-2024
    • (2024)CAvatarProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314247:4(1-24)Online publication date: 12-Jan-2024
    • (2024)RadarHand: A Wrist-Worn Radar for On-Skin Touch-Based Proprioceptive GesturesACM Transactions on Computer-Human Interaction10.1145/361736531:2(1-36)Online publication date: 29-Jan-2024
    • (2024)Two-Factor Authentication for Keyless Entry System via Finger-Induced VibrationsIEEE Transactions on Mobile Computing10.1109/TMC.2024.336833123:10(9708-9720)Online publication date: Oct-2024
    • (2024)AcouWrite: Acoustic-Based Handwriting Recognition on SmartphonesIEEE Transactions on Mobile Computing10.1109/TMC.2024.335148423:8(8557-8568)Online publication date: Aug-2024
    • (2024)Combining IMU With Acoustics for Head Motion Tracking Leveraging Wireless EarphoneIEEE Transactions on Mobile Computing10.1109/TMC.2023.332582623:6(6835-6847)Online publication date: Jun-2024
    • (2024)Exploring Practical Acoustic Transduction Attacks on Inertial Sensors in MDOF SystemsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3277287(1-18)Online publication date: 2024
    • (2024)ThumbUp: Secure Smartwatch Controller for Smart Homes Using Simple Hand GesturesIEEE Transactions on Mobile Computing10.1109/TMC.2022.321692723:1(865-878)Online publication date: Jan-2024
    • (2024)HandKey: Knocking-Triggered Robust Vibration Signature for Keyless UnlockingIEEE Transactions on Mobile Computing10.1109/TMC.2022.321686823:1(520-534)Online publication date: Jan-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    ePub

    View this article in ePub.

    ePub

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media