1 / 17

Secure Mobile Computing Using Biotelemetrics

Secure Mobile Computing Using Biotelemetrics Alf Weaver (CS) Ben Calhoun (ECE) Travis Blalock (ECE) Secure Mobile Computing Problem: mobile devices (PDA, laptop, cell phone) can represent a security leak if either user or device is compromised Goal is to secure devices by:

Faraday
Télécharger la présentation

Secure Mobile Computing Using Biotelemetrics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Mobile Computing Using Biotelemetrics Alf Weaver (CS) Ben Calhoun (ECE) Travis Blalock (ECE)

  2. Secure Mobile Computing • Problem: mobile devices (PDA, laptop, cell phone) can represent a security leak if either user or device is compromised • Goal is to secure devices by: • require initial personal authentication • continue operation only in the presence of an acceptable biometric signal • revert to a locked (suspended) or safe (inoperable) state if user or device is compromised

  3. Uses Emergency Medical Services Physicians Soldiers

  4. “The Patch” • Low-power IC with sensor, microcontroller, and radio • Designed using sub-threshold logic • Form factor like a BandAid • Collects biometric data, performs some local processing, and transmits over a wireless channel • Initially: heart rate sensor, Bluetooth • Ultimately: energy-scavenging from body; additional sensors such as blood pressure, respiration, pulse oximetry, skin temperature, motion/acceleration

  5. PCB Prototype – Data Flow • Full EKG data flow working on PCB Patch Sensor u-Processor Bluetooth PDA Front End Integrated first onto PCB, then into a custom chip

  6. Patch Prototype • Sensor, microcontroller, radio

  7. PCB Prototype

  8. PDA policy setting • PDA monitors heart rate to determine if the data should be locked (inaccessible until re-authentication) or erased (safe state) • Potential triggers: • no heart beat detected • low heart rate for some period of time • PDA out of range • tampering with the patch • distress signal • many more possible with more/different sensors

  9. Setting Policies

  10. Monitoring the Signal

  11. Re-authentication

  12. Patch Simulator • Simulates the heart beat data in a repeatable way for development and debugging

  13. PDA or Laptop Display

  14. Research Issues • Sub-threshold logic design • Additional sensors (temperature, respiration, accelerometer) • Tradeoffs between continuous vs. periodic communication • Handling foreseeable events (battery change, out of range) • Distress signaling—a non-obvious way to force the device into a safe state

  15. Research Issues • Expanding the types of mobile devices (laptops, cell phone, special gear) • Signal processing on the mobile device • Exporting the signal (raw or processed) to the Internet for remote monitoring • Does ECG signal contain enough information for personal authentication? • Energy harvesting • Signal exfiltration

  16. Signal Exfiltration Infant monitoring Gait Analysis

More Related