Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Public Access

BlinKey: A Two-Factor User Authentication Method for Virtual Reality Devices

Published: 18 December 2020 Publication History

Abstract

Virtual Reality (VR) has shown promising potentials in many applications, such as e-business, healthcare, and social networking. Rich information regarding user's activities and their online accounts is stored in VR devices. If it is carelessly unattended, then attackers, including insiders, can make use of the stored information to, for example, perform in-app purchases at the legitimate owner's expenses. Current solutions, mostly following schemes designed for general personal devices, have been proved vulnerable to shoulder-surfing attacks due to the sight blocking caused by the headset. Although there have been efforts trying to fill this gap, they either rely on some highly advanced equipment, such as electrodes to read brainwaves, or introduce heavy cognitive load that has users perform a series of cumbersome authentication tasks. Therefore, an authentication method for VR devices that is robust and convenient is in dire need.
In this paper, we present the design, implementation, and evaluation of a two-factor user authentication scheme, BlinKey, for VR devices that are equipped with an eye tracker. A user's secret passcode is a set of recorded rhythms when he/she blinks, together with the unique pupil size variation pattern. We call this passcode as a blinkey, which can be jointly characterized by knowledge-based and biometric features. To examine the performances, BlinKey is implemented on an HTC Vive Pro with a Pupil Labs eye tracker. Through extensive experimental evaluations with 52 participants, we show that our scheme can achieve the average EER as low as 4.0% with only 6 training samples. Besides, it is robust against various types of attacks. BlinKey also exhibits satisfactory usability in terms of login attempts, memorability, and impact of user motions. We also carry out questionnaire-based pre-/post-studies. The survey result indicates that BlinKey is well accepted as a user authentication scheme for VR devices.

References

[1]
Viar 360. 2017. Virtual reality in education -- how are schools using VR? https://www.viar360.com/education-schools-using-virtual-reality/
[2]
Michael Abehsera. 2020. 3 ways virtual reality will transform e-commerce. https://www.toptal.com/insights/innovation/3-ways-virtual-reality-transforms-ecommerce
[3]
Mayank Agarwal, Mahendra Mehra, Renuka Pawar, and Deven Shah. 2011. Secure authentication using dynamic virtual keyboard layout. In Proceedings of the International Conference Workshop on Emerging Trends in Technology (ICWET '11). Association for Computing Machinery 288-291.
[4]
Fawaz Alsulaiman and Abdulmotale El Saddik. 2006. A novel 3D graphical password schema. In Proceedings of the 2006 IEEE Symposium on Virtual Environments, Human-Computer Interfaces and Measurement Systems. 125--128.
[5]
Cemil Altin and Orhan Er. 2016. Comparison of different time and frequency domain feature extraction methods on elbow gesture's EMG. European Journal of Interdisciplinary Studies 5 (August 2016), 35.
[6]
Ilhan Aslan, Andreas Uhl, Alexander Meschtscherjakov, and Manfred Tscheligi. 2014. Mid-air authentication gestures: An exploration of authentication based on palm and finger motions. In Proceedings of the 16th International Conference on Multimodal Interaction (ICMI '14). Association for Computing Machinery 311--318.
[7]
Nick Babich. 2019. How VR in education will change how we learn and teach. https://xd.adobe.com/ideas/principles/emerging-technology/virtual-reality-will-change-learn-teach/
[8]
Roman Bednarik, Tomi Kinnunen, Andrei Mihaila, and Pasi Fränti. 2005. Eye-movements as a biometric. In Scandinavian conference on image analysis. Springer, 780--789.
[9]
Ariel Bogle. 2020. eBay launches a world-first virtual reality department Store. http://mashable.com/2016/05/18/ebay-virtual-reality-shopping/#MqZVNlqvUEqf.
[10]
Bhavana Borkar, Shiba Sheikh, and PD Kaware. 2016. 4D password mechanism. In Imperial Journal of Interdisciplinary Research, Vol. 2. 240--245.
[11]
Steven Brand. 2020. How virtual reality is changing the manufacturing game. https://www.cmtc.com/blog/how-virtual-reality-is-changing-the-manufacturing-game
[12]
Davina Bristow, John-Dylan Haynes, Richard Sylvester, Christopher D. Frith, and Geraint Rees. 2005. Blinking Suppresses the Neural Response to Unchanging Retinal Stimulation. Current Biology 15, 14 (June 2005), 1296 - 1300. https://doi.org/10.1016/j.cub.2005.06.025
[13]
Virginio Cantoni, Chiara Galdi, Michele Nappi, Marco Porta, and Daniel Riccio. 2015. GANT: Gaze analysis technique for human identification. Pattern Recognition 48 (2015), 1027--1038.
[14]
Supply Chain Game Changer. 2020. Virtual reality (VR) is enhancing e-commerce shopping! https://supplychaingamechanger.com/how-virtual-reality-vr-is-drastically-enhancing-the-e-commerce-shopping-experience-infographic/
[15]
Yimin Chen, Jingchao Sun, Rui Zhang, and Yanchao Zhang. 2015. Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices. In Proceedings of the 2015 IEEE Conference on Computer Communications. 2686--2694.
[16]
Jennifer Clopton. 2020. Virtual reality brings new vision to health care. https://www.webmd.com/cancer/news/20200210/virtual-reality-brings-new-vision-to-health-care
[17]
Sauvik Das, Gierad Laput, Chris Harrison, and Jason I Hong. 2017. Thumprint: Socially-inclusive local group authentication through shared secret knocks. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). Association for Computing Machinery, 3764--3774.
[18]
Statista Research Department. 2020. Global virtual reality device shipments by vendor. https://www.statista.com/statistics/671403/global-virtual-reality-device-shipments-by-vendor/
[19]
Chesner Désir, Simon Bernard, Caroline Petitjean, and Heutte Laurent. 2013. One class random forests. Pattern Recognition 46, 12 (2013), 3490--3506. https://doi.org/10.1016/j.patcog.2013.05.022
[20]
Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, and Ivan Martinovic. 2015. Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics. In The Network and Distributed System Security Symposium.
[21]
Malin Eiband, Mohamed Khamis, Emanuel von Zezschwitz, Heinrich Hussmann, and Florian Alt. 2017. Understanding shoulder surfing in the wild: Stories from users and observers. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). Association for Computing Machinery, 4254--4265.
[22]
eMarkerter. 2020. US Virtual and Augmented Reality Users 2020. https://www.emarketer.com/content/us-virtual-and-augmented-reality-users-2020/
[23]
Wells Fargo. 2020. Biometric Authentication. https://www.wellsfargo.com/online-banking/biometric/
[24]
Michael Fauscette. 2020. Biometrics are coming so are security concerns. https://www.darkreading.com/endpoint/biometrics-are-coming-and-so-are-security-concerns/a/d-id/1331536
[25]
Caleb Finch. 2018. Manufacturing with VR becoming a (virtual) reality. https://blog.qad.com/2018/09/manufacturing-vr-becoming-virtual-reality/
[26]
FOVE. 2016. FOVE 0 eye tracking VR devkit for developers, creators, researchers. https://www.getfove.com/
[27]
Markus Funk, Karola Marky, Iori Mizutani, Mareike Kritzler, Simon Mayer, and Florian Michahelles. 2019. LookUnlock: Using spatial-targets for user-authentication on HMDs. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). Association for Computing Machinery, Article Paper LBW0114, 6 pages.
[28]
Albizu Garcia. 2019. Is virtual reality the future of social networking? https://sociable.co/social-media/is-virtual-reality-future-social-networking/
[29]
Ceenu George, Mohamed Khamis, Daniel Buschek, and Heinrich Hussmann. 2019. Investigating the third dimension for authentication in immersive virtual reality and in the real world. In Proceedings of the 2019 IEEE Conference on Virtual Reality and 3D User Interfaces. 277--285.
[30]
Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt, Florian Alt, and Heinrich Hußmann. 2017. Seamless and secure VR: Adapting and evaluating established authentication systems for virtual reality. In Network and Distributed System Security Symposium.
[31]
Stephen Gossett. 2020. Virtual reality in education: An overview. https://builtin.com/edtech/virtual-reality-in-education
[32]
Kelly S Hale and Kay M Stanney. 2014. Handbook of virtual environments: Design, implementation, and applications. CRC Press.
[33]
Corey D Holland and Oleg V Komogortsev. 2011. Biometric identification via eye movement scanpaths in reading. In 2011 International Joint Conference on Biometrics. 1--8.
[34]
Corey D Holland and Oleg V Komogortsev. 2013. Complex eye movement pattern biometrics: Analyzing fixations and saccades. Proceedings of the 2013 International Conference on Biometrics, ICB 2013, 1--8. https://doi.org/10.1109/ICB.2013.6612953
[35]
HTC. 2020. HTC Vive Pro Eye. https://www.vive.com/eu/product/vive-pro-eye/
[36]
Ben Hutchins, Anudeep Reddy, Wenqiang Jin, Michael Zhou, Ming Li, and Lei Yang. 2018. Beat-PIN: A user authentication mechanism for wearable devices through secret beats. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS '18). Association for Computing Machinery, 101--115.
[37]
Andrew Hutchinson. 2020. Facebook begins user testing of new 'Horizon' VR social platform. https://www.socialmediatoday.com/news/facebook-begins-user-testing-of-new-horizon-vr-social-platform/573852/
[38]
Mordor Intelligence. 2020. Virtual reality (VR) market - growth, trends, and forecast (2020 - 2025). https://www.mordorintelligence.com/industry-reports/virtual-reality-market
[39]
Kapil Jain and Nirbhay Pherwani. 2017. Virtual reality based user authentication system. In International Journal of Science Technology Engineering, Vol. 4. 49--53.
[40]
Tomi Kinnunen, Filip Sedlak, and Roman Bednarik. 2010. Towards task-independent person authentication using eye movement signals. In Proceedings of the 2010 Symposium on Eye-Tracking Research Applications (ETRA '10). Association for Computing Machinery, 187--190.
[41]
Nadia Kovics. 2020. Virtual reality in military. https://thinkmobiles.com/blog/virtual-reality-military/
[42]
Alexander Kupin, Benjamin Moeller, Yijun Jiang, Natasha Kholgade Banerjee, and Sean Banerjee. 2019. Task-driven biometric authentication of users in virtual reality (VR) environments: 25th International Conference, MMM 2019, Thessaloniki, Greece, January 8-11, 2019, Proceedings, Part I. 55--67.
[43]
Oscar D Lara and Miguel A Labrador. 2013. A survey on human activity recognition using wearable sensors. IEEE Communications Surveys Tutorials 15, 3 (March 2013), 1192--1209.
[44]
Feng Lin, Kun Woo Cho, Chen Song, Wenyao Xu, and Zhanpeng Jin. 2018. Brain password: A secure and truly cancelable brain biometrics for smart headwear. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '18). Association for Computing Machinery, 296--309.
[45]
Jian Liu, Chen Wang, Yingying Chen, and Nitesh Saxena. 2017. VibWrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). Association for Computing Machinery, 73--87.
[46]
Dong Ma, Guohao Lan, Mahbub Hassan, Wen Hu, Mushfika B Upama, Ashraf Uddin, and Moustafa Youssef. 2019. SolarGest: Ubiquitous and battery-free gesture recognition using solar cells. In Proceedings of the 25th Annual International Conference on Mobile Computing and Networking (MobiCom '19). Association for Computing Machinery, Article Article 12, 15 pages.
[47]
Florian Mathis, Hassan Ismail Fawaz, and Mohamed Khamis. 2020. Knowledge-Driven Biometric Authentication in Virtual Reality. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (CHI EA '20). Association for Computing Machinery, 1--10. https://doi.org/10.1145/3334480.3382799
[48]
Florian Mathis, John Williamson, Kami Vaniea, and Mohamed Khamis. 2020. RubikAuth: Fast and Secure Authentication in Virtual Reality. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (CHI EA '20). Association for Computing Machinery, 1--9. https://doi.org/10.1145/3334480.3382827
[49]
Michael Morozov. 2019. Virtual reality in manufacturing. https://jasoren.com/virtual-reality-manufacturing/
[50]
Tahrima Mustafa, Richard Matovu, Abdul Serwadda, and Nicholas Muirhead. 2018. Unsure how to authenticate on your VR headset?: Come on, use your head!. In Proceedings of the 4th ACM International Workshop on Security and Privacy Analytics (IWSPA '18). 23--30.
[51]
Toan Nguyen and Nasir Memon. 2018. Tap-based user authentication for smartwatches. Computers and Security 78 (September 2018), 174--186. https://doi.org/10.1016/j.cose.2018.07.001
[52]
Oculus. 2020. Facebook Horizon. https://www.oculus.com/facebookhorizon/?locale=en_US
[53]
Bank of America. 2020. Access your account securely with fingerprint sign-in. https://www.bankofamerica.com/online-banking/mobile-and-online-banking-features/touch-id/
[54]
Internet of Business. 2020. Alibaba launches VR Pay, gives virtual reality payments the nod. https://internetofbusiness.com/alibaba-vr-pay-virtual-reality/
[55]
The Database of Useful Biological Numbers. 2001. Average duration of a single eye blink. https://bionumbers.hms.harvard.edu/bionumber.aspx?&id=100706&ver=4
[56]
Poojan Oza and Vishal Patel. 2019. Active Authentication using an Autoencoder regularized CNN-based One-Class Classifier. 1--8. https://doi.org/10.1109/FG.2019.8756525
[57]
P. Oza and V. M. Patel. 2019. One-Class Convolutional Neural Network. IEEE Signal Processing Letters 26, 2 (2019), 277--281.
[58]
Ken Pfeuffer, Matthias Geiger Geiger, Sarah Prange, Lukas Mecke, Daniel Buschek, and Florian Alt. 2019. Behavioural biometrics in VR: Identifying people from body motion and relations in virtual reality. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19). Association for Computing Machinery, Article Paper 110, 12 pages.
[59]
Pico. 2020. Pico Neo 2. https://www.pico-interactive.com/us/neo2.html
[60]
Sundaramurthi Rajarajan, K Kavitha Maheswari, R Hemapriya, and S Sriharilakshmi. 2014. Shoulder surfing resistant virtual keyboard for internet banking. World Applied Sciences Journal 31, 7 (2014), 1297--1304.
[61]
Ioannis Rigas, George Economou, and Spiros Fotopoulos. 2012. Biometric identification based on the eye movements and graph matching techniques. Pattern Recognition Letters 33 (2012), 786--792.
[62]
Ioannis Rigas and Oleg Komogortsev. 2014. Biometric recognition via probabilistic spatial projection of eye movement trajectories in dynamic visual environments. Information Forensics and Security, IEEE Transactions on 9 (2014), 1743--1754.
[63]
Giuseppe Riva and Brenda K Wiederhold. 2015. The new dawn of virtual reality in health care: Medical simulation and experiential interface. SHTI '15, Vol. 219. IOS Press. 3-6 pages.
[64]
Sol Rogers. 2019. Seven reasons why eye-tracking will fundamentally change VR. https://www.forbes.com/sites/solrogers/2019/02/05/seven-reasons-why-eye-tracking-will-fundamentally-change-vr/#22e0ef2c3459
[65]
Kenneth S Saladin. 2012. Anatomy and physiology. McGraw-Hill.
[66]
Stefan Schneegass, Youssef Oualil, and Andreas Bulling. 2016. SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). Association for Computing Machinery, 1379--1384. https://doi.org/10.1145/2858036.2858152
[67]
Ivo Sluganovic, Marc Roeschlin, Kasper B Rasmussen, and Ivan Martinovic. 2016. Using reflexive eye movements for fast challenge-response authentication. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). Association for Computing Machinery, 1056--1067.
[68]
Virtual Reality Society. 2017. Virtual reality in the military. https://www.vrs.org.uk/virtual-reality-military/
[69]
Yunpeng Song, Zhongmin Cai, and Zhi-Li Zhang. 2017. Multi-touch authentication using hand geometry and behavioral information. In Proceedings of the 2017 IEEE Symposium on Security and Privacy. 357--372.
[70]
Scott Stein. 2020. Eye tracking is the next phase for VR, ready or not. https://www.cnet.com/news/eye-tracking-is-the-next-phase-for-vr-ready-or-not/
[71]
Qbit Technologies. 2020. How VR will revolutionize e-commerce. https://www.qbittech.com/index.php/vr-blog/item/130-the-future-of-e-commerce-is-virtual-reality
[72]
Varjo. 2020. Varjo VR-1: The first human-eye resolution headset. https://varjo.com/products/vr-1/
[73]
Michael Velichko. 2019. VR military training -- the next step of combat evolution. https://jasoren.com/vr-military-training-the-next-step-of-combat-evolution/
[74]
Visualise. 2020. Virtual reality in healthcare. https://visualise.com/virtual-reality/virtual-reality-healthcare
[75]
Tracy Watson. 2019. VR social media: Is it the future of social interaction? https://skywell.software/blog/vr-social-media-future/
[76]
Wikipedia. 2020. Blinking. https://en.wikipedia.org/wiki/Blinking
[77]
Wikipedia. 2020. Spline interpolatoin. https://en.wikipedia.org/wiki/Spline_interpolation
[78]
Jacob Otto Wobbrock. 2009. TapSongs: Tapping rhythm-based passwords on a single binary sensor. In Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology (UIST '09). Association for Computing Machinery, 93--96.
[79]
Zhen Yu, Hai-Ning Liang, Charles Fleming, and Ka Lok Man. 2016. An exploration of usable authentication mechanisms for virtual reality systems. In Proceedings of the 2016 IEEE Asia Pacific Conference on Circuits and Systems. 458--460.
[80]
Mei Zhang, Jinglan Wu, Huifeng Lin, Peng Yuan, and Yanan Song. 2017. The Application of One-Class Classifier Based on CNN in Image Defect Detection. Procedia Computer Science 114 (2017), 341 - 348. https://doi.org/10.1016/j.procs.2017.09.040 Complex Adaptive Systems Conference with Theme: Engineering Cyber Physical Systems, CAS October 30 - November 1, 2017, Chicago, Illinois, USA.
[81]
Yongtuo Zhang, Wen Hu, Weitao Xu, Chun Tung Chou, and Jiankun Hu. 2018. Continuous authentication using eye movement response of implicit visual stimuli. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 4, Article Article 177 (January 2018), 22 pages.

Cited By

View all
  • (2024)Implementation of two-factor user authentication in computer systemsVojnotehnicki glasnik10.5937/vojtehg72-4808172:1(170-191)Online publication date: 2024
  • (2024)Recent Trends of Authentication Methods in Extended Reality: A SurveyApplied System Innovation10.3390/asi70300457:3(45)Online publication date: 28-May-2024
  • (2024)EM-Rhythm: An Authentication Method for Heterogeneous IoT DevicesACM Transactions on Sensor Networks10.1145/3700441Online publication date: 16-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 4, Issue 4
December 2020
1356 pages
EISSN:2474-9567
DOI:10.1145/3444864
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 December 2020
Published in IMWUT Volume 4, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Two-factor authentication
  2. VR device
  3. blinking rhythm
  4. pupil size variation

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)489
  • Downloads (Last 6 weeks)52
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Implementation of two-factor user authentication in computer systemsVojnotehnicki glasnik10.5937/vojtehg72-4808172:1(170-191)Online publication date: 2024
  • (2024)Recent Trends of Authentication Methods in Extended Reality: A SurveyApplied System Innovation10.3390/asi70300457:3(45)Online publication date: 28-May-2024
  • (2024)EM-Rhythm: An Authentication Method for Heterogeneous IoT DevicesACM Transactions on Sensor Networks10.1145/3700441Online publication date: 16-Oct-2024
  • (2024)Medusa3D: The Watchful Eye Freezing Illegitimate Users in Virtual Reality InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765158:MHCI(1-21)Online publication date: 24-Sep-2024
  • (2024)Haptic2FA: Haptics-Based Accessible Two-Factor Authentication for Blind and Low Vision PeopleProceedings of the ACM on Human-Computer Interaction10.1145/36765098:MHCI(1-20)Online publication date: 24-Sep-2024
  • (2024)Exploring Redirection and Shifting Techniques to Mask Hand Movements from Shoulder-Surfing Attacks during PIN Authentication in Virtual RealityProceedings of the ACM on Human-Computer Interaction10.1145/36765028:MHCI(1-24)Online publication date: 24-Sep-2024
  • (2024)Behaviors Speak More: Achieving User Authentication Leveraging Facial Activities via mmWave SensingProceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems10.1145/3666025.3699330(169-183)Online publication date: 4-Nov-2024
  • (2024)MetaFL: Privacy-preserving User Authentication in Virtual Reality with Federated LearningProceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems10.1145/3666025.3699322(54-67)Online publication date: 4-Nov-2024
  • (2024)Uncovering and Addressing Blink-Related Challenges in Using Eye Tracking for Interactive SystemsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642086(1-23)Online publication date: 11-May-2024
  • (2024)ExpressionAuth: Utilizing Avatar Expression Blendshapes for Behavioral Biometrics in VR2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)10.1109/VRW62533.2024.00136(679-680)Online publication date: 16-Mar-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media