skip to main content
10.1145/2994551.2994556acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

Secret from Muscle: Enabling Secure Pairing with Electromyography

Authors Info & Claims
Published:14 November 2016Publication History

ABSTRACT

Forming secure pairing between wearable devices has become an important problem in many scenarios, such as mobile payments and private data transmission. This paper presents EMG-KEY, a system that can securely pair wearable devices by leveraging the electrical activity caused by human muscle contraction, that is, Electromyogram (EMG), to generate a secret key. Such a key can then be used by devices to authenticate each other's physical proximity and communicate confidentially. Extensive evaluation on 10 volunteers under different scenarios demonstrates that our system can achieve a competitive bit generation rate of 5.51 bit/s while maintaining a matching probability of 88.84%. Also, the evaluation results with the presence of adversaries demonstrate our system is secure to strong attackers who can eavesdrop on proximate wireless communication, capture and imitate legitimate pairing process with the help of camera.

Skip Supplemental Material Section

Supplemental Material

p28.mov

mov

1 GB

References

  1. Apple pay. http://www.apple.com/apple-pay.Google ScholarGoogle Scholar
  2. Arduino uno. https://www.arduino.cc/en/Main/ArduinoBoardUno.Google ScholarGoogle Scholar
  3. Athos gear. https://www.liveathos.com.Google ScholarGoogle Scholar
  4. Devices with emg sensor. http://vandrico.com/wearables/device-categories/components/emg-sensor.Google ScholarGoogle Scholar
  5. Fitbit. https://www.fitbit.com.Google ScholarGoogle Scholar
  6. Leo smartband. http://leohelps.com.Google ScholarGoogle Scholar
  7. Myo armband. https://www.myo.com.Google ScholarGoogle Scholar
  8. Olimex emg shield. https://www.olimex.com/Products/Duino/Shields/SHIELD-EKG-EMG/.Google ScholarGoogle Scholar
  9. J. Adkins, G. Flaspohler, and P. Dutta. Ving: Bootstrapping the desktop area network with a vibratory ping. HotWireless, pages 21--25. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. I. Ahmed and et al. Checksum gestures: continuous gestures as an out-of-band channel for secure pairing. UbiComp, pages 391--401. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Amma and et al. Advancing muscle-computer interfaces with high-density electromyography. CHI '15, pages 929--938. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. H. Arieta and et al. Study on the effects of electrical stimulation on the pattern recognition for an emg prosthetic application. EMBS, pages 6919--6922. IEEE, 2006.Google ScholarGoogle Scholar
  13. B. Azimi-Sadjadi and et al. Robust key generation from signal envelopes in wireless networks. CCS, pages 401--410. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Beck. Muscle fiber conduction velocity. Wiley Encyclopedia of Biomedical Engineering, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  15. B. Bigland-Ritchie, E. Donovan, and C. Roussos. Conduction velocity and emg power spectrum changes in fatigue of sustained maximal efforts. Journal of applied physiology, 51(5):1300--1305, 1981.Google ScholarGoogle Scholar
  16. B. Cheng and G.-Y. Liu. Emotion recognition from surface emg signal using wavelet transform and neural network. ICBBE, pages 1363--1366, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  17. G. C. Clark Jr and J. B. Cain. Error-correction coding for digital communications. Springer Science & Business Media, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Cornelius and et al. A wearable system that knows who wears it. MobiSys '14, pages 55--67. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. M. Cover and J. A. Thomas. Elements of information theory. John Wiley & Sons, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. P. da Silva and et al. Finger ecg signal for user authentication: Usability and performance. BTAS, pages 1--8, 2013.Google ScholarGoogle Scholar
  21. M. De Wied and et al. Facial emg and heart rate responses to emotion-inducing film clips in boys with disruptive behavior disorders. Psychophysiology, 46(5):996--1004, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  22. S. R. Devasahayam. Signals and systems in biomedical engineering: signal processing and physiological systems modeling. Springer Science & Business Media, 2012.Google ScholarGoogle Scholar
  23. R. Ferri and et al. A quantitative statistical analysis of the submentalis muscle emg amplitude during sleep in normal controls and patients with rem sleep behavior disorder. Journal of sleep research, 17(1):89--100, 2008.Google ScholarGoogle Scholar
  24. P. A. Gribble and J. Hertel. Effect of lower-extremity muscle fatigue on postural control. Archives of physical medicine and rehabilitation, 85(4):589--592, 2004.Google ScholarGoogle Scholar
  25. Grosse-Puppendahl and et al. Platypus: Indoor localization and identification through sensing of electric potential changes in human bodies. MobiSys '16, pages 17--30. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. J. Gummeson and et al. Engarde: Protecting the mobile phone from malicious nfc interactions. MobiSys '13, pages 445--458. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Y. Hayashi and et al. A threat for tablet pcs in public space: Remote visualization of screen images using em emanation. CCS '14, pages 954--965. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. Jana and et al. On the effectiveness of secret key extraction from wireless signal strength in real environments. MobiCom'09, pages 321--332. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S.-C. S. Jou and et al. Towards continuous speech recognition using surface electromyography. INTERSPEECH, 2006.Google ScholarGoogle Scholar
  30. E. J. Keogh and M. J. Pazzani. Scaling up dynamic time warping for datamining applications. SIGKDD, pages 285--289. ACM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. D. Kim and et al. Digits: freehand 3d interactions anywhere using a wrist-worn gloveless sensor. UIST, pages 167--176. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. D. J. Kim, K. W. Chung, and K. S. Hong. Person authentication using face, teeth and voice modalities for mobile device security. IEEE Transactions on Consumer Electronics, 56(4):2678--2685, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. H. Liu and et al. Fast and practical secret key extraction by exploiting channel response. INFOCOM'13, pages 3048--3056. IEEE, 2013.Google ScholarGoogle Scholar
  34. L. Maier-Hein and et al. Session independent non-audible speech recognition using surface electromyography. ASRU'05, pages 331--336. IEEE, 2005.Google ScholarGoogle Scholar
  35. E. N. Marieb and K. Hoehn. Human anatomy & physiology. Pearson Education, 2007.Google ScholarGoogle Scholar
  36. S. Mathur and et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. MobiCom'08, pages 128--139. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. S. Mathur and et al. Proximate: proximity-based secure pairing using ambient wireless signals. MobiSys, pages 211--224. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. Mobile Computing, IEEE Transactions on, 8(6):792--806, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. R. Merletti and P. A. Parker. Electromyography: physiology, engineering, and non-invasive applications, volume 11. John Wiley & Sons, 2004.Google ScholarGoogle Scholar
  40. F. Mokaya and et al. Myovibe: Vibration based wearable muscle activation detection in high mobility exercises. UbiComp '15, pages 27--38. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. R. Nandakumar and et al. Dhwani: secure peer-to-peer acoustic nfc. volume 43 of SIGCOMM, pages 63--74. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. t. Peter Harrop. Wearable technology 2015-2025: Technologies, markets, forecasts. pages 285--289. IDTechEx, 2015 Feb.Google ScholarGoogle Scholar
  43. Y. Qiao, K. Srinivasan, and A. Arora. Shape matters, not the size: A new approach to extract secrets from channel. HotWireless'14, pages 37--42. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. A. Rukhin and et al. A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. NIST special publication, pages 800--22.Google ScholarGoogle Scholar
  45. M. Sato and et al. Touché: Enhancing touch interaction on humans, screens, liquids, and everyday objects. CHI '12, pages 483--492. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. D. Schurmann and S. Sigg. Secure communication based on ambient audio. Mobile Computing, IEEE Transactions on, 12(2):358--370, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. A. Subasi. Classification of emg signals using pso optimized svm for diagnosis of neuromuscular disorders. Computers in biology and medicine, 43(5):576--586, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. M. Vuagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. SSYM'09, pages 1--16. USENIX Association, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. W. Xu and et al. Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication. IPSN, pages 1--12. IEEE, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. L. Yang, W. Wang, and Q. Zhang. Vibid: User identification through bio-vibrometry. IPSN, pages 1--12. IEEE, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. R. Zhou and G. Xing. nshield: A noninvasive nfc security system for mobiledevices. MobiSys '14, pages 95--108. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SenSys '16: Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM
    November 2016
    398 pages
    ISBN:9781450342636
    DOI:10.1145/2994551

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 November 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate174of867submissions,20%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader