Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Education

Taking a ‘hands-on’ approach to smartphone identity verification

  • Joshua Duplechain
  • April 8, 2022
Courtesy of: Louisiana State University
Courtesy of: Louisiana State University
Total
0
Shares
0
0
0
0

As smartphones have grown more sophisticated over the years, so have their accompanying security measures for identity verification. Simple passwords have been replaced by thumbprints and facial recognition. However, those methods do not solve the issue of notification privacy. With smartphones now used everywhere from public places to the plant floor — and often conveying private and confidential work information — privacy is becoming paramount.

For example, sharing your phone with a friend, family member or other individual — or even leaving it briefly on a nearby surface — could expose your privacy in the form of an incoming call, email, reminder or app notification. Existing iOS guided access and Android multi-account features have been tested to solve this problem but have been unsuccessful.

Louisiana State University computer science Assistant Professor Chen Wang believes he may have the answer. Wang is working with third-year Ph.D. student Long Huang on a gripping-hand identity verification method that ensures the correct user is holding the smartphone before displaying potentially sensitive content. Their recent paper on this topic was published at Mobicom 2021, the annual international conference on mobile computing and networking. A short demo can be viewed here.

When a notification tone is played, the phone’s mic records the sound. An artificial intelligence (AI)-based algorithm processes the sound and extracts biometric features to match with the user’s feature profile, or recorded hand grip. If there is a match, the verification is successful, and the notification preview is displayed on the screen. Otherwise, only the number of notifications pending is shown.

“We consider this an attempt for security design to embrace art,” said Wang, whose expertise is in cybersecurity and privacy, mobile sensing and computing, and wireless communications, among other areas. “We find that when playing music with a phone, our holding hands often feel the beats, which are caused by the phone surface vibrations. This is a way in which the music sound conveys information to us. Because music sounds are signals, they can be absorbed/dampened, reflected, or refracted by our hands.

“We then use the phone’s own mic to capture the remaining sounds to see how we respond to music. Because people have different hand sizes, finger lengths, holding strengths and hand shapes, the impacts on sounds are different and can be learned and distinguished by AI. Along this way, we develop a system to use the notification tones to verify the gripping hand for notification privacy protection. This is very different from prior acoustic sensing works, which all rely on dedicated sounds, inaudible or annoying to human ears.”

The project is one of two supported by the Louisiana Board of Regents that Chen is working on involving smartphones and users’ hands. The other — in collaboration with second-year Ph.D. student Ruxin Wang and computer science master’s graduate Kailyn Maiden — uses the back of the user’s phone-gripping hand for identity verification at kiosks, such as those used to order food, print tickets and self-checkout at the grocery store. This research will be published as a late-breaking work at the 2022 ACM CHI Conference on Human Factors in Computing Systems.

“When a user holds [his or her] phone close to the kiosk for NFC-based or QR code authentication, the back of the user’s gripping hand is captured by a camera on the kiosk,” Wang said. “An AI-based method will process the gripping-hand image and compare it against the user’s registered hand image by checking the gripping hand’s shape, skin patterns/color and gripping gesture. Notice here, the user’s identity has been claimed by the traditional NFC or QR code methods as they transmit the user’s security token. Thus, here we provide a two-factor authentication to the kiosk — the security token and the gripping-hand geometry biometrics.”

Wang added that he and the students are improving the authentication systems and conducting user studies with more participants and device methods. They are also examining the impact factors on the practical use of these systems, including the ambient noise and light conditions. Additionally, they are investigating potential attacks, for example, a 3D-printed silicon fake hand and acoustic replay attacks.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Joshua Duplechain

Related Topics
  • CFE Content
  • Featured
Previous Article
Hero and Rajapaske stand next to the microscope display showing an image of the multiplying B-cells. (Courtesy of: Silvia Cardarelli, Electrical and Computer Engineering, University of Michigan)
  • Education

Immune to hacks: Inoculating deep neural networks to thwart attacks

  • Catharine June
  • April 6, 2022
Read More
Next Article
  • Threats & Vulnerabilities

Throwback attack: The Equation Group, ‘God of cyberespionage’

  • Christina Miller
  • April 8, 2022
Read More
You May Also Like
Read More

Protecting Critical Infrastructure eBook

Courtesy: Bundy Group
Read More

Cybersecurity mergers and acquisitions and capital markets update

Read More

Webcast: How to Protect Against Supply Chain Attacks

Courtesy: Applied Control Engineering Inc.
Read More

New funding will help University of Arizona grow the cybersecurity workforce

Hero and Rajapaske stand next to the microscope display showing an image of the multiplying B-cells. (Courtesy of: Silvia Cardarelli, Electrical and Computer Engineering, University of Michigan)
Read More

Immune to hacks: Inoculating deep neural networks to thwart attacks

Read More

Introduction to ICS security fundamentals

Courtesy: CFE Media and Technology
Read More

NSF award will help IUPUI train, increase diversity of next wave of cybersecurity engineers

Test 2 Alt Text
Read More

Hottest topics in industrial cybersecurity from 2021

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT