Secure mobile computing using biotelemetrics
Download
1 / 17

Secure Mobile Computing Using Biotelemetrics - PowerPoint PPT Presentation


  • 332 Views
  • Updated On :

Secure Mobile Computing Using Biotelemetrics Alf Weaver (CS) Ben Calhoun (ECE) Travis Blalock (ECE) Secure Mobile Computing Problem: mobile devices (PDA, laptop, cell phone) can represent a security leak if either user or device is compromised Goal is to secure devices by:

Related searches for Secure Mobile Computing Using Biotelemetrics

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Secure Mobile Computing Using Biotelemetrics' - Faraday


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Secure mobile computing using biotelemetrics l.jpg

Secure Mobile Computing Using Biotelemetrics

Alf Weaver (CS)

Ben Calhoun (ECE)

Travis Blalock (ECE)


Secure mobile computing l.jpg
Secure Mobile Computing

  • Problem: mobile devices (PDA, laptop, cell phone) can represent a security leak if either user or device is compromised

  • Goal is to secure devices by:

    • require initial personal authentication

    • continue operation only in the presence of an acceptable biometric signal

    • revert to a locked (suspended) or safe (inoperable) state if user or device is compromised


Slide3 l.jpg
Uses

Emergency Medical Services

Physicians

Soldiers


The patch l.jpg
“The Patch”

  • Low-power IC with sensor, microcontroller, and radio

  • Designed using sub-threshold logic

  • Form factor like a BandAid

  • Collects biometric data, performs some local processing, and transmits over a wireless channel

  • Initially: heart rate sensor, Bluetooth

  • Ultimately: energy-scavenging from body; additional sensors such as blood pressure, respiration, pulse oximetry, skin temperature, motion/acceleration


Pcb prototype data flow l.jpg
PCB Prototype – Data Flow

  • Full EKG data flow working on PCB

Patch

Sensor

u-Processor

Bluetooth

PDA

Front End

Integrated first onto PCB, then into a custom chip


Patch prototype l.jpg
Patch Prototype

  • Sensor, microcontroller, radio



Pda policy setting l.jpg
PDA policy setting

  • PDA monitors heart rate to determine if the data should be locked (inaccessible until re-authentication) or erased (safe state)

  • Potential triggers:

    • no heart beat detected

    • low heart rate for some period of time

    • PDA out of range

    • tampering with the patch

    • distress signal

    • many more possible with more/different sensors





Patch simulator l.jpg
Patch Simulator

  • Simulates the heart beat data in a repeatable way for development and debugging



Research issues l.jpg
Research Issues

  • Sub-threshold logic design

  • Additional sensors (temperature, respiration, accelerometer)

  • Tradeoffs between continuous vs. periodic communication

  • Handling foreseeable events (battery change, out of range)

  • Distress signaling—a non-obvious way to force the device into a safe state


Research issues16 l.jpg
Research Issues

  • Expanding the types of mobile devices (laptops, cell phone, special gear)

  • Signal processing on the mobile device

  • Exporting the signal (raw or processed) to the Internet for remote monitoring

  • Does ECG signal contain enough information for personal authentication?

  • Energy harvesting

  • Signal exfiltration


Signal exfiltration l.jpg
Signal Exfiltration

Infant monitoring

Gait Analysis


ad