ABSTRACT
Forming secure pairing between wearable devices has become an important problem in many scenarios, such as mobile payments and private data transmission. This paper presents EMG-KEY, a system that can securely pair wearable devices by leveraging the electrical activity caused by human muscle contraction, that is, Electromyogram (EMG), to generate a secret key. Such a key can then be used by devices to authenticate each other's physical proximity and communicate confidentially. Extensive evaluation on 10 volunteers under different scenarios demonstrates that our system can achieve a competitive bit generation rate of 5.51 bit/s while maintaining a matching probability of 88.84%. Also, the evaluation results with the presence of adversaries demonstrate our system is secure to strong attackers who can eavesdrop on proximate wireless communication, capture and imitate legitimate pairing process with the help of camera.
Supplemental Material
- Apple pay. http://www.apple.com/apple-pay.Google Scholar
- Arduino uno. https://www.arduino.cc/en/Main/ArduinoBoardUno.Google Scholar
- Athos gear. https://www.liveathos.com.Google Scholar
- Devices with emg sensor. http://vandrico.com/wearables/device-categories/components/emg-sensor.Google Scholar
- Fitbit. https://www.fitbit.com.Google Scholar
- Leo smartband. http://leohelps.com.Google Scholar
- Myo armband. https://www.myo.com.Google Scholar
- Olimex emg shield. https://www.olimex.com/Products/Duino/Shields/SHIELD-EKG-EMG/.Google Scholar
- J. Adkins, G. Flaspohler, and P. Dutta. Ving: Bootstrapping the desktop area network with a vibratory ping. HotWireless, pages 21--25. ACM, 2015. Google ScholarDigital Library
- I. Ahmed and et al. Checksum gestures: continuous gestures as an out-of-band channel for secure pairing. UbiComp, pages 391--401. ACM, 2015. Google ScholarDigital Library
- C. Amma and et al. Advancing muscle-computer interfaces with high-density electromyography. CHI '15, pages 929--938. ACM, 2015. Google ScholarDigital Library
- A. H. Arieta and et al. Study on the effects of electrical stimulation on the pattern recognition for an emg prosthetic application. EMBS, pages 6919--6922. IEEE, 2006.Google Scholar
- B. Azimi-Sadjadi and et al. Robust key generation from signal envelopes in wireless networks. CCS, pages 401--410. ACM, 2007. Google ScholarDigital Library
- R. Beck. Muscle fiber conduction velocity. Wiley Encyclopedia of Biomedical Engineering, 2006.Google ScholarCross Ref
- B. Bigland-Ritchie, E. Donovan, and C. Roussos. Conduction velocity and emg power spectrum changes in fatigue of sustained maximal efforts. Journal of applied physiology, 51(5):1300--1305, 1981.Google Scholar
- B. Cheng and G.-Y. Liu. Emotion recognition from surface emg signal using wavelet transform and neural network. ICBBE, pages 1363--1366, 2008.Google ScholarCross Ref
- G. C. Clark Jr and J. B. Cain. Error-correction coding for digital communications. Springer Science & Business Media, 2013. Google ScholarDigital Library
- C. Cornelius and et al. A wearable system that knows who wears it. MobiSys '14, pages 55--67. ACM, 2014. Google ScholarDigital Library
- T. M. Cover and J. A. Thomas. Elements of information theory. John Wiley & Sons, 2012.Google ScholarDigital Library
- H. P. da Silva and et al. Finger ecg signal for user authentication: Usability and performance. BTAS, pages 1--8, 2013.Google Scholar
- M. De Wied and et al. Facial emg and heart rate responses to emotion-inducing film clips in boys with disruptive behavior disorders. Psychophysiology, 46(5):996--1004, 2009.Google ScholarCross Ref
- S. R. Devasahayam. Signals and systems in biomedical engineering: signal processing and physiological systems modeling. Springer Science & Business Media, 2012.Google Scholar
- R. Ferri and et al. A quantitative statistical analysis of the submentalis muscle emg amplitude during sleep in normal controls and patients with rem sleep behavior disorder. Journal of sleep research, 17(1):89--100, 2008.Google Scholar
- P. A. Gribble and J. Hertel. Effect of lower-extremity muscle fatigue on postural control. Archives of physical medicine and rehabilitation, 85(4):589--592, 2004.Google Scholar
- Grosse-Puppendahl and et al. Platypus: Indoor localization and identification through sensing of electric potential changes in human bodies. MobiSys '16, pages 17--30. ACM, 2016. Google ScholarDigital Library
- J. J. Gummeson and et al. Engarde: Protecting the mobile phone from malicious nfc interactions. MobiSys '13, pages 445--458. ACM, 2013. Google ScholarDigital Library
- Y. Hayashi and et al. A threat for tablet pcs in public space: Remote visualization of screen images using em emanation. CCS '14, pages 954--965. ACM, 2014. Google ScholarDigital Library
- S. Jana and et al. On the effectiveness of secret key extraction from wireless signal strength in real environments. MobiCom'09, pages 321--332. ACM, 2009. Google ScholarDigital Library
- S.-C. S. Jou and et al. Towards continuous speech recognition using surface electromyography. INTERSPEECH, 2006.Google Scholar
- E. J. Keogh and M. J. Pazzani. Scaling up dynamic time warping for datamining applications. SIGKDD, pages 285--289. ACM, 2000. Google ScholarDigital Library
- D. Kim and et al. Digits: freehand 3d interactions anywhere using a wrist-worn gloveless sensor. UIST, pages 167--176. ACM, 2012. Google ScholarDigital Library
- D. J. Kim, K. W. Chung, and K. S. Hong. Person authentication using face, teeth and voice modalities for mobile device security. IEEE Transactions on Consumer Electronics, 56(4):2678--2685, 2010. Google ScholarDigital Library
- H. Liu and et al. Fast and practical secret key extraction by exploiting channel response. INFOCOM'13, pages 3048--3056. IEEE, 2013.Google Scholar
- L. Maier-Hein and et al. Session independent non-audible speech recognition using surface electromyography. ASRU'05, pages 331--336. IEEE, 2005.Google Scholar
- E. N. Marieb and K. Hoehn. Human anatomy & physiology. Pearson Education, 2007.Google Scholar
- S. Mathur and et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. MobiCom'08, pages 128--139. ACM, 2008. Google ScholarDigital Library
- S. Mathur and et al. Proximate: proximity-based secure pairing using ambient wireless signals. MobiSys, pages 211--224. ACM, 2011. Google ScholarDigital Library
- R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. Mobile Computing, IEEE Transactions on, 8(6):792--806, 2009. Google ScholarDigital Library
- R. Merletti and P. A. Parker. Electromyography: physiology, engineering, and non-invasive applications, volume 11. John Wiley & Sons, 2004.Google Scholar
- F. Mokaya and et al. Myovibe: Vibration based wearable muscle activation detection in high mobility exercises. UbiComp '15, pages 27--38. ACM, 2015. Google ScholarDigital Library
- R. Nandakumar and et al. Dhwani: secure peer-to-peer acoustic nfc. volume 43 of SIGCOMM, pages 63--74. ACM, 2013. Google ScholarDigital Library
- t. Peter Harrop. Wearable technology 2015-2025: Technologies, markets, forecasts. pages 285--289. IDTechEx, 2015 Feb.Google Scholar
- Y. Qiao, K. Srinivasan, and A. Arora. Shape matters, not the size: A new approach to extract secrets from channel. HotWireless'14, pages 37--42. ACM, 2014. Google ScholarDigital Library
- A. Rukhin and et al. A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. NIST special publication, pages 800--22.Google Scholar
- M. Sato and et al. Touché: Enhancing touch interaction on humans, screens, liquids, and everyday objects. CHI '12, pages 483--492. ACM, 2012. Google ScholarDigital Library
- D. Schurmann and S. Sigg. Secure communication based on ambient audio. Mobile Computing, IEEE Transactions on, 12(2):358--370, 2013. Google ScholarDigital Library
- A. Subasi. Classification of emg signals using pso optimized svm for diagnosis of neuromuscular disorders. Computers in biology and medicine, 43(5):576--586, 2013. Google ScholarDigital Library
- M. Vuagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. SSYM'09, pages 1--16. USENIX Association, 2009. Google ScholarDigital Library
- W. Xu and et al. Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication. IPSN, pages 1--12. IEEE, 2016. Google ScholarDigital Library
- L. Yang, W. Wang, and Q. Zhang. Vibid: User identification through bio-vibrometry. IPSN, pages 1--12. IEEE, 2016. Google ScholarDigital Library
- R. Zhou and G. Xing. nshield: A noninvasive nfc security system for mobiledevices. MobiSys '14, pages 95--108. ACM, 2014. Google ScholarDigital Library
Recommendations
ID-based secret-key cryptography
This paper introduces ID-based secret-key cryptography, in which secret keys are privately and uniquely binded to an identity. This enables to extend public-key cryptography features at the high throughput rate of secret-key cryptography. As ...
Secret Public Key Protocols Revisited
Security ProtocolsPassword-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line ...
Using audio in secure device pairing
Secure pairing of electronic devices is an important issue that must be addressed in many contexts. In the absence of prior security context, the need to involve the user in the pairing process is a prominent challenge. In this paper, we investigate the ...
Comments