Abstract
Inter-Pulse Intervals (IPIs) have been proposed as a source of entropy for key generation and establishment algorithms in Implantable Medical Devices (IMDs) and Body Area Networks (BANs). Most of the proposed protocols built on top of this biometric feature assume that reliable measures of the IPIs are only available to devices maintaining physical contact with the user. However, computer vision techniques have proved to be able to obtain estimates of heart timings from a video recording of the user’s face. In this paper, we study the impact of these techniques on IPI-based authentication protocols, comparing a heart signal captured using a traditional contact-based approach against a signal retrieved using such a contactless technique. One key finding is that quantization is a crucial step in the process and we report our empirical assessment of the main approaches proposed so far. Our results show that up to 70% of the information obtained by means of the contact-based method can be also obtained through contactless techniques.
Chapter PDF
Similar content being viewed by others
References
Halperin, D., Kohno, T., Heydt-Benjamin, T.S., Fu, K., Maisel, W.H.: Security and privacy for implantable medical devices. IEEE Pervasive Computing 7, 30–39 (2008)
Li, C., Raghunathan, A., Jha, N.K.: Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: 13th IEEE International Conference on e-Health Networking Applications and Services (Healthcom), pp. 150–156. IEEE (2011)
Radcliffe, J.: Hacking medical devices for fun and insulin: Breaking the human scada system. In: Black Hat Conference Presentation Slides, vol. 2011 (2011)
Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 129–142. IEEE (2008)
Poon, C.C., Zhang, Y.T., Bao, S.D.: A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Communications Magazine 44, 73–81 (2006)
Bao, S.D., Poon, C.C., Zhang, Y.T., Shen, L.F.: Using the timing information of heartbeats as an entity identifier to secure body sensor network. IEEE Transactions on Information Technology in Biomedicine 12, 772–779 (2008)
Bao, S.D., Zhang, Y.T., Shen, L.F.: Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems. In: 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS 2005, pp. 2455–2458. IEEE (2005)
Rostami, M., Juels, A., Koushanfar, F.: Heart-to-heart (h2h): authentication for implanted medical devices. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 1099–1112. ACM (2013)
Poh, M.Z., McDuff, D.J., Picard, R.W.: Non-contact, automated cardiac pulse measurements using video imaging and blind source separation. Optics Express 18, 10762–10774 (2010)
Wu, H.Y., Rubinstein, M., Shih, E., Guttag, J.V., Durand, F., Freeman, W.T.: Eulerian video magnification for revealing subtle changes in the world. ACM Trans. Graph. 31, 65 (2012)
Jain, A.K., Dass, S.C., Nandakumar, K.: Soft biometric traits for personal recognition systems. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 731–738. Springer, Heidelberg (2004)
Zhu, Y., Tan, T., Wang, Y.: Biometric personal identification based on iris patterns. In: International Conference on Pattern Recognition, vol. 2, pp. 2801–2801. IEEE Computer Society (2000)
Kumar, A., Wong, D., Shen, H., Jain, A.: Personal verification using palmprint and hand geometry biometric. In: Kittler, J., Nixon, M. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 668–678. Springer, Berlin Heidelberg (2003)
Guennoun, M., Abbad, N., Talom, J., Rahman, M., El-Khatib, K.: Continuous authentication by electrocardiogram data. In: 2009 IEEE Toronto International Conference on Science and Technology for Humanity (TIC-STH), pp. 40–42. IEEE (2009)
Xu, F., Qin, Z., Tan, C.C., Wang, B., Li, Q.: Imdguard: Securing implantable medical devices with the external wearable guardian. In: Proceedings IEEE INFOCOM, pp. 1862–1870. IEEE (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Calleja, A., Peris-Lopez, P., Tapiador, J.E. (2015). Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols. In: Akram, R., Jajodia, S. (eds) Information Security Theory and Practice. WISTP 2015. Lecture Notes in Computer Science(), vol 9311. Springer, Cham. https://doi.org/10.1007/978-3-319-24018-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-24018-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24017-6
Online ISBN: 978-3-319-24018-3
eBook Packages: Computer ScienceComputer Science (R0)