Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3319535.3354242acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication

Published: 06 November 2019 Publication History

Abstract

Biometrics have been widely adopted for enhancing user authentication, benefiting usability by exploiting pervasive and collectible unique characteristics from physiological or behavioral traits of human. However, successful attacks on "static" biometrics such as fingerprints have been reported where an adversary acquires users' biometrics stealthily and compromises non-resilient biometrics.
To mitigate the vulnerabilities of static biometrics, we leverage the unique and nonlinear hand-surface vibration response and design a system called Velody to defend against various attacks including replay and synthesis. The Velody system relies on two major properties in hand-surface vibration responses: uniqueness, contributed by physiological characteristics of human hands, and nonlinearity, whose complexity prevents attackers from predicting the response to an unseen challenge. Velody employs a challenge-response protocol. By changing the vibration challenge, the system elicits input-dependent nonlinear "symptoms" and unique spectrotemporal features in the vibration response, stopping both replay and synthesis attacks. Also, a large number of disposable challenge-response pairs can be collected during enrollment passively for daily authentication sessions.
We build a prototype of Velody with an off-the-shelf vibration speaker and accelerometers to verify its usability and security through a comprehensive user experiment. Our results show that Velody demonstrates both strong security and long-term consistency with a low equal error rate (EER) of 5.8% against impersonation attack while correctly rejecting all other attacks including replay and synthesis attacks using a very short vibration challenge.

Supplementary Material

WEBM File (p1201-li.webm)

References

[1]
Surajudeen Adewusi, Subhash Rakheja, Patrice Marcotte, and Jérôme Boutine. 2010. Vibration transmissibility characteristics of the human hand--arm system under different postures, hand forces and excitation levels. Journal of Sound and Vibration, Vol. 329, 14 (2010), 2953--2971.
[2]
Corey Ashby, Amit Bhatia, Francesco Tenore, and Jacob Vogelstein. 2011. Low-cost electroencephalogram (EEG) based authentication. In Proceedings of IEEE/EMBS Conference on Neural Engineering (NER). 442--445.
[3]
Silvio Barra, Maria De Marsico, Michele Nappi, Fabio Narducci, and Daniel Riccio. 2019. A hand-based biometric system in visible light for mobile environments. Information Sciences, Vol. 479 (2019), 472--485.
[4]
Jagmohan Chauhan, Yining Hu, Suranga Seneviratne, Archan Misra, Aruna Seneviratne, and Youngki Lee. 2017. BreathPrint: Breathing acoustics-based user authentication. In Proceedings of the ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys). 278--291.
[5]
Wenqiang Chen, Lin Chen, Yandao Huang, Xinyu Zhang, Lu Wang, Rukhsana Ruby, and Kaishun Wu. 2019. Taprint: Secure text input for commodity smart wearables. In Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MobiCom) .
[6]
Yimin Chen, Jingchao Sun, Rui Zhang, and Yanchao Zhang. 2015. Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices. In Proceedings of IEEE Conference on Computer Communications (INFOCOM). 2686--2694.
[7]
Mohammad Omar Derawi, Claudia Nickel, Patrick Bours, and Christoph Busch. 2010. Unobtrusive user-authentication on mobile phones using biometric gait recognition. In Proceedings of the IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). 306--311.
[8]
Ren G. Dong, Aaron W. Schopper, Thomas McDowell, Daniel E. Welcome, John Wu, W. Paul Smutz, Christopher M. Warren, and Subhash Rakheja. 2004. Vibration energy absorption (VEA) in human fingers-hand-arm system. Medical engineering & physics, Vol. 26, 6 (2004), 483--492.
[9]
Ren G. Dong, John Wu, and Daniel E Welcome. 2005. Recent advances in biodynamics of human hand-arm system. Industrial health, Vol. 43, 3 (2005), 449--471.
[10]
Jesse Engel, Cinjon Resnick, Adam Roberts, Sander Dieleman, Mohammad Norouzi, Douglas Eck, and Karen Simonyan. 2017. Neural audio synthesis of musical notes with wavenet autoencoders. In Proceedings of the International Conference on Machine Learning (ICML). 1068--1077.
[11]
Anil Jain, Lin Hong, and Sharath Pankanti. 2000. Biometric identification. ACM Communications, Vol. 43, 2 (2000), 90--98.
[12]
Nathan D Kalka, Jinyu Zuo, Natalia A Schmid, and Bojan Cukic. 2006. Image quality assessment for iris biometric. In Biometric technology for human identification III, Vol. 6202. 62020D.
[13]
Mohamed Khamis, Florian Alt, Mariam Hassib, Emanuel von Zezschwitz, Regina Hasholzner, and Andreas Bulling. 2016. Gazetouchpass: Multimodal authentication using gaze and touch on mobile devices. In Proceedings of the ACM Conference Extended Abstracts on Human Factors in Computing Systems (CHI). 2156--2164.
[14]
Muhammad Khurram Khan, Jiashu Zhang, and Xiaomin Wang. 2008. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals, Vol. 35, 3 (2008), 519--524.
[15]
Tomi Kinnunen, Filip Sedlak, and Roman Bednarik. 2010. Towards task-independent person authentication using eye movement signals. In Proceedings of the ACM Symposium on Eye-Tracking Research & Applications (ETRA). 187--190.
[16]
Wolfgang Klippel. 2006. Tutorial: Loudspeaker nonlinearities--causes, parameters, symptoms. Journal of the Audio Engineering Society, Vol. 54, 10 (2006), 907--939.
[17]
Gierad Laput, Robert Xiao, and Chris Harrison. 2016. Viband: High-fidelity bio-acoustic sensing using commodity smartwatch accelerometers. In Proceedings of the ACM Annual Symposium on User Interface Software and Technology (UIST). 321--333.
[18]
Zhengxiong Li, Zhuolin Yang, Chen Song, Changzhi Li, Zhengyu Peng, and Wenyao Xu. 2018. E-Eye: Hidden electronics recognition through mmwave nonlinear effects. In Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys). 68--81.
[19]
Feng Lin, Kun Woo Cho, Chen Song, Wenyao Xu, and Zhanpeng Jin. 2018. Brain password: A secure and truly cancelable brain biometrics for smart headwear. In Proceedings of the ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys). 296--309.
[20]
Feng Lin, Chen Song, Yan Zhuang, Wenyao Xu, Changzhi Li, and Kui Ren. 2017. Cardiac scan: A non-contact and continuous heart-based user authentication system. In Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MobiCom). 315--328.
[21]
Jian Liu, Chen Wang, Yingying Chen, and Nitesh Saxena. 2017. VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 73--87.
[22]
Peipei Liu and Hoon Sohn. 2017. Development of nonlinear spectral correlation between ultrasonic modulation components. NDT & E International, Vol. 91 (2017), 120--128.
[23]
Rui Liu, Cory Cornelius, Reza Rawassizadeh, Ronald Peterson, and David Kotz. 2018. Vocal resonance: Using internal body voice for wearable authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Vol. 2, 1 (2018), 19.
[24]
Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, and Tomi Kinnunen. 2018. Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama's voice using GAN, WaveNet and low-quality found data. arXiv preprint arXiv:1803.00860 (2018).
[25]
Shrirang Mare, Mary Baker, and Jeremy Gummeson. 2016. A study of authentication in daily life. In Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS). 189--206.
[26]
Parimarjan Negi, Prafull Sharma, Vivek Jain, and Bahman Bahmani. 2018. K-means+ vs. behavioral biometrics: One loop to rule them all. In Proceedings of the Network and Distributed System Security Symposium (NDSS) .
[27]
Saurabh Panjwani and Achintya Prakash. 2014. Crowdsourcing attacks on biometric systems. In Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS). 257--269.
[28]
Jaebum Park, Nemanja Pavz in, Jason Friedman, Vladimir M Zatsiorsky, and Mark L Latash. 2014. Mechanical properties of the human hand digits: Age-related differences. Clinical Biomechanics, Vol. 29, 2 (2014), 129--137.
[29]
Alexandre Presas, David Valentin, Eduard Egusquiza, Carme Valero, Mònica Egusquiza, and Matias Bossio. 2017. Accurate determination of the frequency response function of submerged and confined structures by using PZT-patches. Sensors, Vol. 17, 3 (2017), 660.
[30]
Marc Rébillat, Romain Hennequin, Etienne Corteel, and Brian FG Katz. 2011. Identification of cascade of Hammerstein models for the description of nonlinearities in vibrating devices. Journal of Sound and Vibration, Vol. 330, 5 (2011), 1018--1038.
[31]
Douglas A Reynolds, Thomas F Quatieri, and Robert B Dunn. 2000. Speaker verification using adapted Gaussian mixture models. Digital Signal Processing, Vol. 10, 1--3 (2000), 19--41.
[32]
Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, and Teemu Roos. 2014. User-generated free-form gestures for authentication: Security and memorability. In Proceedings of the ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys). 176--189.
[33]
Ivo Sluganovic, Marc Roeschlin, Kasper B Rasmussen, and Ivan Martinovic. 2016. Using reflexive eye movements for fast challenge-response authentication. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 1056--1067.
[34]
Yunpeng Song, Zhongmin Cai, and Zhi-Li Zhang. 2017. Multi-touch authentication using hand geometry and behavioral information. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). 357--372.
[35]
G Edward Suh and Srinivas Devadas. 2007. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the ACM/IEEE Design Automation Conference (DAC). 9--14.
[36]
A Talarico, M Malvezzi, and Domenico Prattichizzo. 2014. Modeling the human touch: A FEM model of the human hand fingertips for haptic application. In Proceedings of the COMSOL Conference .
[37]
Aaron Van Den Oord, Sander Dieleman, Heiga Zen, Karen Simonyan, Oriol Vinyals, Alex Graves, Nal Kalchbrenner, Andrew W Senior, and Koray Kavukcuoglu. 2016. WaveNet: A generative model for raw audio. arXiv preprint arXiv:1609.03499 (2016).
[38]
Shreyas Venugopalan, Felix Juefei-Xu, Benjamin Cowley, and Marios Savvides. 2015. Electromyograph and keystroke dynamics for spoof-resistant biometric authentication. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPR). 109--118.
[39]
Alexander Voishvillo, Alexander Terekhov, Eugene Czerwinski, and Sergei Alexandrov. 2004. Graphing, interpretation, and comparison of results of loudspeaker nonlinear distortion measurements. Journal of the Audio Engineering Society, Vol. 52, 4 (2004), 332--357.
[40]
Lei Wang, Kang Huang, Ke Sun, Wei Wang, Chen Tian, Lei Xie, and Qing Gu. 2018. Unlock with your heart: Heartbeat-based authentication on commercial mobile phones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Vol. 2, 3 (2018), 140.
[41]
Zhizheng Wu, Junichi Yamagishi, Tomi Kinnunen, Cemal Hanilcc i, Mohammed Sahidullah, Aleksandr Sizov, Nicholas Evans, and Massimiliano Todisco. 2017. ASVspoof: the automatic speaker verification spoofing and countermeasures challenge. IEEE Journal of Selected Topics in Signal Processing, Vol. 11, 4 (2017), 588--604.
[42]
Vladimir Yu. Zaitsev, Lev A. Matveev, and Alex Matveyev. 2011. Elastic-wave modulation approach to crack detection: Comparison of conventional modulation and higher-order interactions. NDT & E International, Vol. 44, 1 (2011), 21--31.
[43]
Linghan Zhang, Sheng Tan, and Jie Yang. 2017. Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 57--71.
[44]
Linghan Zhang, Sheng Tan, Jie Yang, and Yingying Chen. 2016. Voicelive: A phoneme localization based liveness detection for voice authentication on smartphones. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). 1080--1091.
[45]
Zhaoyang Zhang, Honggang Wang, Athanasios V Vasilakos, and Hua Fang. 2012. ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, Vol. 16, 6 (2012), 1070--1078.
[46]
Yongpan Zou, Meng Zhao, Zimu Zhou, Jiawei Lin, Mo Li, and Kaishun Wu. 2018. BiLock: User authentication via dental occlusion biometrics. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Vol. 2, 3 (2018), 152.

Cited By

View all
  • (2024)Medusa3D: The Watchful Eye Freezing Illegitimate Users in Virtual Reality InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765158:MHCI(1-21)Online publication date: 24-Sep-2024
  • (2024)VibHead: An Authentication Scheme for Smart Headsets through VibrationACM Transactions on Sensor Networks10.1145/361443220:4(1-21)Online publication date: 11-May-2024
  • (2024)Two-Factor Authentication for Keyless Entry System via Finger-Induced VibrationsIEEE Transactions on Mobile Computing10.1109/TMC.2024.336833123:10(9708-9720)Online publication date: Oct-2024
  • Show More Cited By

Index Terms

  1. Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
    November 2019
    2755 pages
    ISBN:9781450367479
    DOI:10.1145/3319535
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 November 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. authentication
    2. biometric
    3. challenge-response
    4. nonlinear vibration

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS '19
    Sponsor:

    Acceptance Rates

    CCS '19 Paper Acceptance Rate 149 of 934 submissions, 16%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)544
    • Downloads (Last 6 weeks)66
    Reflects downloads up to 02 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Medusa3D: The Watchful Eye Freezing Illegitimate Users in Virtual Reality InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765158:MHCI(1-21)Online publication date: 24-Sep-2024
    • (2024)VibHead: An Authentication Scheme for Smart Headsets through VibrationACM Transactions on Sensor Networks10.1145/361443220:4(1-21)Online publication date: 11-May-2024
    • (2024)Two-Factor Authentication for Keyless Entry System via Finger-Induced VibrationsIEEE Transactions on Mobile Computing10.1109/TMC.2024.336833123:10(9708-9720)Online publication date: Oct-2024
    • (2024)FingerSlid: Towards Finger-sliding Continuous Authentication on Smart Devices via VibrationIEEE Transactions on Mobile Computing10.1109/TMC.2023.3315291(1-15)Online publication date: 2024
    • (2024)MagSign: Harnessing Dynamic Magnetism for User Authentication on IoT DevicesIEEE Transactions on Mobile Computing10.1109/TMC.2022.321685123:1(597-611)Online publication date: Jan-2024
    • (2024)An Identity Authentication Method Of Configuration Terminal Based On Audio Feature Recognition In Smart Distribution NetworkJournal of Physics: Conference Series10.1088/1742-6596/2774/1/0120272774:1(012027)Online publication date: 1-Jul-2024
    • (2024)Hiding Your Signals: A Security Analysis of PPG-Based Biometric AuthenticationComputer Security – ESORICS 202310.1007/978-3-031-51479-1_10(183-202)Online publication date: 12-Jan-2024
    • (2023)VibPathProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36108947:3(1-26)Online publication date: 27-Sep-2023
    • (2023)BioCase: Privacy Protection via Acoustic Sensing of Finger Touches on Smartphone Case Mini-StructuresProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596841(397-409)Online publication date: 18-Jun-2023
    • (2023)NF-HeartProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35808517:1(1-24)Online publication date: 28-Mar-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media