secure mobile computing using biotelemetrics l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Secure Mobile Computing Using Biotelemetrics PowerPoint Presentation
Download Presentation
Secure Mobile Computing Using Biotelemetrics

Loading in 2 Seconds...

play fullscreen
1 / 17

Secure Mobile Computing Using Biotelemetrics - PowerPoint PPT Presentation


  • 348 Views
  • Uploaded on

Secure Mobile Computing Using Biotelemetrics Alf Weaver (CS) Ben Calhoun (ECE) Travis Blalock (ECE) Secure Mobile Computing Problem: mobile devices (PDA, laptop, cell phone) can represent a security leak if either user or device is compromised Goal is to secure devices by:

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Secure Mobile Computing Using Biotelemetrics' - Faraday


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
secure mobile computing using biotelemetrics

Secure Mobile Computing Using Biotelemetrics

Alf Weaver (CS)

Ben Calhoun (ECE)

Travis Blalock (ECE)

secure mobile computing
Secure Mobile Computing
  • Problem: mobile devices (PDA, laptop, cell phone) can represent a security leak if either user or device is compromised
  • Goal is to secure devices by:
    • require initial personal authentication
    • continue operation only in the presence of an acceptable biometric signal
    • revert to a locked (suspended) or safe (inoperable) state if user or device is compromised
slide3
Uses

Emergency Medical Services

Physicians

Soldiers

the patch
“The Patch”
  • Low-power IC with sensor, microcontroller, and radio
  • Designed using sub-threshold logic
  • Form factor like a BandAid
  • Collects biometric data, performs some local processing, and transmits over a wireless channel
  • Initially: heart rate sensor, Bluetooth
  • Ultimately: energy-scavenging from body; additional sensors such as blood pressure, respiration, pulse oximetry, skin temperature, motion/acceleration
pcb prototype data flow
PCB Prototype – Data Flow
  • Full EKG data flow working on PCB

Patch

Sensor

u-Processor

Bluetooth

PDA

Front End

Integrated first onto PCB, then into a custom chip

patch prototype
Patch Prototype
  • Sensor, microcontroller, radio
pda policy setting
PDA policy setting
  • PDA monitors heart rate to determine if the data should be locked (inaccessible until re-authentication) or erased (safe state)
  • Potential triggers:
    • no heart beat detected
    • low heart rate for some period of time
    • PDA out of range
    • tampering with the patch
    • distress signal
    • many more possible with more/different sensors
patch simulator
Patch Simulator
  • Simulates the heart beat data in a repeatable way for development and debugging
research issues
Research Issues
  • Sub-threshold logic design
  • Additional sensors (temperature, respiration, accelerometer)
  • Tradeoffs between continuous vs. periodic communication
  • Handling foreseeable events (battery change, out of range)
  • Distress signaling—a non-obvious way to force the device into a safe state
research issues16
Research Issues
  • Expanding the types of mobile devices (laptops, cell phone, special gear)
  • Signal processing on the mobile device
  • Exporting the signal (raw or processed) to the Internet for remote monitoring
  • Does ECG signal contain enough information for personal authentication?
  • Energy harvesting
  • Signal exfiltration
signal exfiltration
Signal Exfiltration

Infant monitoring

Gait Analysis