Friday, April 19, 2024

Your Heart Beat As a Password -Smart or Stupid ?

Scientists from the Binghamton University in New York have explored with using a person’s heartbeat as a password for encrypting and then decrypting personal data.

Researchers say that each person possesses a unique electrocardiograph (ECG), which just like fingerprints and iris, can be used for authentication.

Binghamton researchers say that systems can be created that use these generally stable ECG measurements as keys for encrypting data and storing data.

Basically, scientists are proposing to replace random data (entropy) or static encryption keys with ECGs and use these unique parameters to secure a person’s data.

What is ECG? 

Electrocardiography (ECG or EKG*) is the process of recording the electrical activity of the heart over a period of time using electrodes placed on the skin. These electrodes detect the tiny electrical changes on the skin that arise from the heart muscle’s electrophysiologic pattern of depolarizing during each heartbeat.

Computing power Will be required very less:

While most home computers and web servers can handle these operations, IoT and smart devices don’t have the processing power to deal with these calculations. Hence, most of them can’t support encryption and end up exposing data. Researchers cite the high computational costs of supporting proper entropy and encryption using classic techniques.

Using an ECG-based biometrics solution simplifies the implementation details, making this a viable solution for smart healthcare devices.

Scientists say that a patient’s data and personal files could be immediately encrypted and managed via a central healthcare data storage server as soon as the patient’s heartbeat is acquired. This should, in theory, safeguard the data from any intruder who can’t reproduce the user’s unique ECG.

A doctor could just press a biometrics sensor against a patient’s skin for a few seconds and immediately access patient files.

The ECG signal is one of the most important and common physiological parameters collected and analyzed to understand a patient’s’ health,” said Zhanpeng Jin, assistant professor in the Department of Electrical and Computer Engineering at the Thomas J. Watson School of Engineering and Applied Science at Binghamton University.

“While ECG signals are collected for clinical diagnosis and transmitted through networks to electronic health records, we strategically reused the ECG signals for the data encryption,” Jin added. “Through this strategy, the security and privacy can be enhanced while minimum cost will be added.”

What are the Remaining Causes?

  1. if ECGs aren’t rolled out as passwords for all sorts of online services and only used to safely store medical records, what happens to the encrypted data (medical records) after the patient dies?
  2. ECGs change due to age, illness, or injury, a problem which researchers still haven’t found a way to solve.
  3. Regular text-based passwords can be changed withing seconds when exposed in a data breach. What happens when a person’s ECG footprint leaks online, and anyone can reproduce it? How does a person protect all the information he encrypted using his heartbeat?

This Research Paper have been presented at IEEE Global Communications Conference (GLOBECOM 2016) held in Washington, in December 2016 with Title of “A Robust and Reusable ECG-based Authentication and Data Encryption Scheme for eHealth Systems”

Source : PCworld

Website

Latest articles

Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums

A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale...

Palo Alto ZeroDay Exploited in The Wild Following PoC Release

Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified...

FIN7 Hackers Attacking IT Employees Of Automotive Industry

IT employees in the automotive industry are often targeted by hackers because they have...

Russian APT44 – The Most Notorious Cyber Sabotage Group Globally

As Russia's invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS,...

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is...

LeSlipFrancais Data Breach: Customers’ Personal Information Exposed

LeSlipFrancais, the renowned French underwear brand, has confirmed a data breach impacting its customer...

Cisco Hypershield: AI-Powered Hyper-Distributed Security for Data Center

Cisco has unveiled its latest innovation, Cisco Hypershield, marking a milestone in cybersecurity.This groundbreaking...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles