DISTINGUISHING USERS WITH CAPACITIVE TOUCH COMMUNICATION VU, BAID, GAO, GRUTESER, HOWARD, LINDQVIST, SPASOJEVIC, WALLING

Similar documents
Through-body capacitive touch communication. Hoang Truong, Phuc Nguyen, Viet Nguyen, Mohamed Ibrahim, Richard Howard, Marco Gruteser, Tam Vu

MOBILE devices now provide us ubiquitous access to a

Distinguishing Users with Capacitive Touch Communication

ISSN: [Pandey * et al., 6(9): September, 2017] Impact Factor: 4.116

Chapter 10. User Cooperative Communications

Touchscreens, tablets and digitizers. RNDr. Róbert Bohdal, PhD.

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

COLLECTING USER PERFORMANCE DATA IN A GROUP ENVIRONMENT

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

Device Pairing at the Touch of an Electrode

Contextual Pedestrian-to-Vehicle DSRC Communication

Radio Frequency Integrated Circuits Prof. Cameron Charles

By Nour Alhariqi. nalhareqi

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

Biometrics - A Tool in Fraud Prevention

Automatic Two Wheeler Driving Licence System by Using Labview

Biomedical sensors data fusion algorithm for enhancing the efficiency of fault-tolerant systems in case of wearable electronics device

RECOMMENDATION ITU-R BS

Radio Frequency Integrated Circuits Prof. Cameron Charles

Chapter 1 Basic concepts of wireless data networks (cont d.)

Smart Lot by. Landon Anderton, Alex Freshman, Kameron Sheffield, and Sunny Trinh

GSM Interceptor Fast and reliable interception of GSM traffic

Transmit Diversity Schemes for CDMA-2000

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

AN12082 Capacitive Touch Sensor Design

Implementation of Pixel Array Bezel-Less Cmos Fingerprint Sensor

SpotFi: Decimeter Level Localization using WiFi. Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, Sachin Katti Stanford University

CSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc.

Programmable Wireless Networking Overview

Wireless Network Security Spring 2012

UNDERSTANDING AND MITIGATING

An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service

TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes

K.NARSING RAO(08R31A0425) DEPT OF ELECTRONICS & COMMUNICATION ENGINEERING (NOVH).

Introduction to Biometrics 1

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

EMC Pulse Measurements

Chapter 3. Communication and Data Communications Table of Contents

Zippy: On-Demand Network Flooding

Indoor Positioning by the Fusion of Wireless Metrics and Sensors

Bringing Smart Buildings to Life

Self Localization Using A Modulated Acoustic Chirp

SHF Communication Technologies AG

- 1 - Rep. ITU-R M.2009 REPORT ITU-R M.2009 DIRECT-DIAL TELEPHONE SYSTEMS FOR THE MARITIME MOBILE SERVICE

RFID Door Unlocking System

RECOMMENDATION ITU-R F ARRANGEMENT OF VOICE-FREQUENCY, FREQUENCY-SHIFT TELEGRAPH CHANNELS OVER HF RADIO CIRCUITS. (Question ITU-R 145/9)

Data transmission - Transmission modes

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Active RFID System with Wireless Sensor Network for Power

Prof. Maria Papadopouli

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS

A 3D ultrasonic positioning system with high accuracy for indoor application

Electrical signal types

Localization in Wireless Sensor Networks

Wireless InSite. Simulation of MIMO Antennas for 5G Telecommunications. Copyright Remcom Inc. All rights reserved.

Wireless Keyboard Without Need For Battery

Chapter- 5. Performance Evaluation of Conventional Handoff

The use of diversity for voice-frequency telegraphy on HF radio circuits

A Proximity Information Propagation Mechanism Using Bluetooth Beacons for Grouping Devices

SURVEILLANCE MONITORING OF PARALLEL PRECISION APPROACHES IN A FREE FLIGHT ENVIRONMENT. Carl Evers Dan Hicok Rannoch Corporation

Come toward the Light: A Post Biblical Project in Luminal Navigation. Ji Hoon Baik Mike Sherman Faizan Wajid

Graduation Design Project Proposal Form

The physics of capacitive touch technology

AM and FM analogue signal demodulation

Smart Antenna ABSTRACT

WearLock: Unlock Your Phone via Acoustics using Smartwatch

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

Bluetooth Low Energy Sensing Technology for Proximity Construction Applications

Part 2 of this CDE begins with a brief overview

Accurate Distance Tracking using WiFi

On Practical Coexistence Gaps in. A. Zubow, P. Gawłowicz, S. Bayhan European Wireless 2018

Efficient Multihop Broadcast for Wideband Systems

An Overview of the QUALCOMM CDMA Digital Cellular Proposal

RED TACTON ABSTRACT:

Energy Efficient Source Coding and Modulation for Wireless Applications

Touch technologies for large-format applications

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates

COMMISSION OF THE EUROPEAN COMMUNITIES. Draft COMMISSION DECISION

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

ZigBee Propagation Testing

Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016

APPLICATION NOTE. AT11849: QTouch Surface Design Guide. Atmel QTouch. Introduction. Features

SIGNIFICANT advances in hardware technology have led

Digi-Wave Technology Williams Sound Digi-Wave White Paper

Exercise Data Networks

CS601-Data Communication Latest Solved Mcqs from Midterm Papers

ROBOT VISION. Dr.M.Madhavi, MED, MVSREC

P. 241 Figure 8.1 Multiplexing

Hardware/Software Co-Simulation of BPSK Modulator and Demodulator using Xilinx System Generator

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Wireless Network Security Spring 2014

NIST Activities in Wireless Coexistence

OrionBMS Master/Slave Supplement

Research Article Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality

COPYRIGHTED MATERIAL. Introduction. 1.1 Communication Systems

Multiple Access System

In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics:

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Transcription:

DISTINGUISHING USERS WITH CAPACITIVE TOUCH COMMUNICATION VU, BAID, GAO, GRUTESER, HOWARD, LINDQVIST, SPASOJEVIC, WALLING RUTGERS UNIVERSITY MOBICOM 2012 Computer Networking CptS/EE555 Michael Carosino Washington State University

INTRODUCTION Mobile devices such as smart phones, tablets, laptops have become increasingly ubiquitous Many of these devices have adopted touch screens as the primary method of interfacing with the user Devices are often shared between multiple users and even used simultaneously User identification and authentication has become an increasing concern Existing methods tend to be slow, cumbersome, and exploitable

CAPACITIVE TOUCHSCREEN TECHNOLOGY Projected Capacitive Touch (PCT) has become the standard for mobile devices PCT utilizes an etched grid of electrodes behind the screen Mutual capacitive PCT measures the capacitance at every intersection of this grid Provides an accurate location of touch point and supports multiple touch tracking

CAPACITIVE TOUCHSCREEN DIAGRAM

CAPACITIVE SENSING CIRCUIT S3 initially closed to remove any charge on Ci S3 and S2 are opened while S1 is closed, allowing the common node to charge fully to Vsig S1 is opened and S2 closed, causing charge to flow onto integrating capacitor Ci After fixed number of repetitions of the cycle, accumulated charge on Ci will reflect the proximity of the touch finger or device to the sensing node

EXISTING AUTHENTICATION METHODS PINs, passwords, swipe patterns are easy to implement but are observable and have low information entropy Authentication tokens, Magkey, RFID tokens are more costly, require specific hardware, and are prone to wireless sniffing and interference Iris, face, and voice recognition either require specialized hardware or are still easily exploited by attackers

CAPACITIVE TOUCH COMMUNICATION A wireless communication where a touchscreen acts as a receiver and small ring-like device or bio-implant acts as a transmitter Restricting area of study to off the shelf touchscreen devices without hardware or firmware modification for more rapid deployment Raw sensor voltages will not be available, must work with touch events returned by the touch screen driver

ARTIFICIAL TOUCH EVENT CREATION Can manually increase or decrease charge integrated on Ci by means of injecting a synchronized signal V sig into the circuit Such synchronization is not possible without access to Vsig Alternatively, an unsynchronized lower frequency signal is injected causing Ci to be charged/discharged asynchronously This method results in irregular but repetitive touch/no touch events reported by the touch screen driver

COMMUNICATION SYSTEM OVERVIEW The transmitter consists of wearable ring that when pressed against the screen acts as voltage source V sig and transmits an identifier or authentication token The channel is made up of the touchscreen hardware components and the firmware used to detect touch events The receiver is made up of the software to listen for touch events and utilize their timestamps in order to demodulate them using event threshold detection

DECODER DESIGN ISSUES In testing this method, multiple challenges have been discovered: Receiver responds differently to the same input when the inputs sent before it differ (channel has memory) Variable delay between symbol transmission and reception due to touch screen controller processing delay and jitter Channel adds an unknown delay between the receiver and transmitter

CHARACTERIZING THE CHANNEL Jitter, delay, and channel performance varies vastly between different touch devices To account for this, an off-line algorithm is run with a predetermined input sequence so that the output can be analyzed Ideally, given a set of received touch responses, the number of responses corresponding to a bit 0 should be minimized and the number corresponding to a bit 1 be maximized

EXAMPLE CHANNEL RESPONSE HISTOGRAM

MINIMUM DISTANCE DEMODULATION Decoding and demodulation can proceed utilizing the previously determined event thresholds The minimum distance algorithm operates by first selecting the length of an event sequence via the event thresholds Next, the algorithm traverses all the events in the sequence to test all starting points At each starting point, the event sequence is compared with every possible transmitted message The closest or most similar message over all starting points is chosen as the decoded message

TRANSMITTER RING OVERVIEW

PROTOTYPE TEST RESULTS

CONCLUSIONS Experiments show that using the touchscreen as a communication channel is feasible Challenges remain in reducing channel error rate and false positives Data rates are on the range of 4-10 bits per second which need to be improved Will require significant improvements before being valuable as a secure authentication technology

IDEAS FOR FUTURE WORK Investigating the touchscreen channel further and determining if higher complexity channel codes such as Turbo Codes can be used Research into the touch screen driver of current generation rooted phones to discover if more info is available then just touch events Design of a feedback photodiode into the ring which would allow for two way communication between the device and the ring This would allow for a challenge-response authentication and may also alleviate other issues such as timing jitter and delay.