Monday, March 4, 2024

Your Heart Beat As a Password -Smart or Stupid ?

Scientists from the Binghamton University in New York have explored with using a person’s heartbeat as a password for encrypting and then decrypting personal data.

Researchers say that each person possesses a unique electrocardiograph (ECG), which just like fingerprints and iris, can be used for authentication.

Binghamton researchers say that systems can be created that use these generally stable ECG measurements as keys for encrypting data and storing data.

Basically, scientists are proposing to replace random data (entropy) or static encryption keys with ECGs and use these unique parameters to secure a person’s data.

What is ECG? 

Electrocardiography (ECG or EKG*) is the process of recording the electrical activity of the heart over a period of time using electrodes placed on the skin. These electrodes detect the tiny electrical changes on the skin that arise from the heart muscle’s electrophysiologic pattern of depolarizing during each heartbeat.

Computing power Will be required very less:

While most home computers and web servers can handle these operations, IoT and smart devices don’t have the processing power to deal with these calculations. Hence, most of them can’t support encryption and end up exposing data. Researchers cite the high computational costs of supporting proper entropy and encryption using classic techniques.

Using an ECG-based biometrics solution simplifies the implementation details, making this a viable solution for smart healthcare devices.

Scientists say that a patient’s data and personal files could be immediately encrypted and managed via a central healthcare data storage server as soon as the patient’s heartbeat is acquired. This should, in theory, safeguard the data from any intruder who can’t reproduce the user’s unique ECG.

A doctor could just press a biometrics sensor against a patient’s skin for a few seconds and immediately access patient files.

The ECG signal is one of the most important and common physiological parameters collected and analyzed to understand a patient’s’ health,” said Zhanpeng Jin, assistant professor in the Department of Electrical and Computer Engineering at the Thomas J. Watson School of Engineering and Applied Science at Binghamton University.

“While ECG signals are collected for clinical diagnosis and transmitted through networks to electronic health records, we strategically reused the ECG signals for the data encryption,” Jin added. “Through this strategy, the security and privacy can be enhanced while minimum cost will be added.”

What are the Remaining Causes?

  1. if ECGs aren’t rolled out as passwords for all sorts of online services and only used to safely store medical records, what happens to the encrypted data (medical records) after the patient dies?
  2. ECGs change due to age, illness, or injury, a problem which researchers still haven’t found a way to solve.
  3. Regular text-based passwords can be changed withing seconds when exposed in a data breach. What happens when a person’s ECG footprint leaks online, and anyone can reproduce it? How does a person protect all the information he encrypted using his heartbeat?

This Research Paper have been presented at IEEE Global Communications Conference (GLOBECOM 2016) held in Washington, in December 2016 with Title of “A Robust and Reusable ECG-based Authentication and Data Encryption Scheme for eHealth Systems”

Source : PCworld


Latest articles

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles