Monday, January 6, 2025
HomeInfosec- ResourcesYour Heart Beat As a Password -Smart or Stupid ?

Your Heart Beat As a Password -Smart or Stupid ?

Published on

Scientists from the Binghamton University in New York have explored with using a person’s heartbeat as a password for encrypting and then decrypting personal data.

Researchers say that each person possesses a unique electrocardiograph (ECG), which just like fingerprints and iris, can be used for authentication.

Binghamton researchers say that systems can be created that use these generally stable ECG measurements as keys for encrypting data and storing data.

- Advertisement - SIEM as a Service

Basically, scientists are proposing to replace random data (entropy) or static encryption keys with ECGs and use these unique parameters to secure a person’s data.

What is ECG? 

Electrocardiography (ECG or EKG*) is the process of recording the electrical activity of the heart over a period of time using electrodes placed on the skin. These electrodes detect the tiny electrical changes on the skin that arise from the heart muscle’s electrophysiologic pattern of depolarizing during each heartbeat.

Computing power Will be required very less:

While most home computers and web servers can handle these operations, IoT and smart devices don’t have the processing power to deal with these calculations. Hence, most of them can’t support encryption and end up exposing data. Researchers cite the high computational costs of supporting proper entropy and encryption using classic techniques.

Using an ECG-based biometrics solution simplifies the implementation details, making this a viable solution for smart healthcare devices.

Scientists say that a patient’s data and personal files could be immediately encrypted and managed via a central healthcare data storage server as soon as the patient’s heartbeat is acquired. This should, in theory, safeguard the data from any intruder who can’t reproduce the user’s unique ECG.

A doctor could just press a biometrics sensor against a patient’s skin for a few seconds and immediately access patient files.

The ECG signal is one of the most important and common physiological parameters collected and analyzed to understand a patient’s’ health,” said Zhanpeng Jin, assistant professor in the Department of Electrical and Computer Engineering at the Thomas J. Watson School of Engineering and Applied Science at Binghamton University.

“While ECG signals are collected for clinical diagnosis and transmitted through networks to electronic health records, we strategically reused the ECG signals for the data encryption,” Jin added. “Through this strategy, the security and privacy can be enhanced while minimum cost will be added.”

What are the Remaining Causes?

  1. if ECGs aren’t rolled out as passwords for all sorts of online services and only used to safely store medical records, what happens to the encrypted data (medical records) after the patient dies?
  2. ECGs change due to age, illness, or injury, a problem which researchers still haven’t found a way to solve.
  3. Regular text-based passwords can be changed withing seconds when exposed in a data breach. What happens when a person’s ECG footprint leaks online, and anyone can reproduce it? How does a person protect all the information he encrypted using his heartbeat?

This Research Paper have been presented at IEEE Global Communications Conference (GLOBECOM 2016) held in Washington, in December 2016 with Title of “A Robust and Reusable ECG-based Authentication and Data Encryption Scheme for eHealth Systems”

Source : PCworld

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Tenable CEO “Amit Yoran” Passed Away at the Age of 54

Tenable Holdings, Inc. has announced with profound sadness the unexpected passing of its Chairman...

How Learning Experience Platforms Are Transforming Training

Within today's fast-changing global society, effective training is vital for personal and professional success....

Windows Registry Privilege Escalation Vulnerability – PoC Released

Researchers have released a proof of concept (PoC) exploit for a critical privilege escalation...

North Korean Hackers Wipe Cryptocurrency Wallets via Fake Job Interviews

Cybersecurity experts have uncovered a new wave of cyberattacks linked to North Korean threat...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called "PentestGPT" that helps penetration...

Top 10 Best Proxy Server 2025 & Important Methods to Prevent Yourself From Hackers

Best Proxy Server has been used in enormous cases where some personal data or...