skip to main content


Title: Touch-Based Magnetic Communication through Your Hand
Near field communication (NFC), which emerged only a decade ago, has been rapidly adopted in business services including point-of-sale (POS) systems, payments, identification, ticketing, and various other types of services. NFC offers great and varied promise in providing secure and implicit paired communication capability in smartphones. As a short-range wireless communication technology, the level of "secure" is contributed by the short-range nature. Compared with other competitive technologies, NFC achieves physical-level security but sacrifices convenience. For example, NFC cannot achieve device-free or hands-free payment transactions like the service provided by PayPal called PayPal beacon which utilizes Bluetooth-low-energy (BLE) technology. In this paper, we propose a low-cost wearable device that can achieve better physical-level security than NFC provides. This system is compatible with existing NFC-based POS systems and can help users realize a convenient hands-free payment transaction. Specifically, a custom NFC wristband was designed to channel its magnetic field through the human arm. By confining the magnetic field in NFC to the area around the body, we could minimize energy radiation, reduce the possibility of communication sniffing and hijackings, and improve security. To evaluate this approach, we conducted various experiments via different configurations. The results showed that the communication range for the human body channel was greater than that of the air and water channels. In addition, through this study we demonstrated that the human body is a naturally secure channel, and hacking and nearby interference are minimized during such communication. Our system also defines a new way of communication, for example, people can share confidential information with a simple handshake without pulling out and touching, or tapping smartphones.  more » « less
Award ID(s):
1637371
NSF-PAR ID:
10092484
Author(s) / Creator(s):
;
Date Published:
Journal Name:
2018 IEEE International Congress on Internet of Things (ICIOT)
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Near-field communication (NFC) is one of the essential technologies in the Internet of Things (IoT) that has facilitated mobile payment across different services. The technology has become increasingly popular, as cryptocurrencies like Bitcoin have revolutionized how payment systems can be designed. However, this technology is subject to security problems, such as man-in-the-middle attacks, double-spending, and replay attacks, raising the need to incorporate other solutions such as blockchain technology. Concerns about the security and privacy of payments using NFC technology raise the need to adopt blockchain-based cryptocurrency payment. For instance, NFC payment has been criticized for a lack of measures to counter potential attacks, such as brute force or double-spending. Thus, incorporating blockchain technology is expected to improve the security features of the NFC mobile payment protocol and improve user experience. Blockchain technology has been praised for enabling fair payment, as it permits direct transactions without engaging a third party. Therefore, integrating blockchain cryptocurrency in IoT devices will revolutionize the NFC payment method and provide value transfer using IoT devices. Combining NFC with blockchain technology and cryptocurrencies is necessary to address security and privacy problems. The purpose of this paper is to explore the potential behind incorporating blockchain technology and cryptocurrencies like Bitcoin in the NFC payment protocol. 
    more » « less
  2. null (Ed.)
    Communication during touch provides a seamless and natural way of interaction between humans and ambient intelligence. Current techniques that couple wireless transmission with touch detection suffer from the problem of selectivity and security, i.e., they cannot ensure communication only through direct touch and not through close proximity. We present  BodyWire-HCI , which utilizes the human body as a wire-like communication channel, to enable human–computer interaction, that for the first time, demonstrates selective and physically secure communication strictly during touch. The signal leakage out of the body is minimized by utilizing a novel, low frequency Electro-QuasiStatic Human Body Communication (EQS-HBC) technique that enables interaction strictly when there is a conductive communication path between the transmitter and receiver through the human body. Design techniques such as capacitive termination and voltage mode operation are used to minimize the human body channel loss to operate at low frequencies and enable EQS-HBC. The demonstrations highlight the impact of  BodyWire-HCI in enabling new human–machine interaction modalities for variety of application scenarios such as secure authentication (e.g., opening a door and pairing a smart device) and information exchange (e.g., payment, image, medical data, and personal profile transfer) through touch (https://www.youtube.com/watch?v=Uwrig2XQIH8). 
    more » « less
  3. Near-field communication (NFC) readers, ubiquitously embedded in smartphones and other infrastructures can wirelessly deliver mW-level power to NFC tags. Our previous work NFC-wireless identification and sensing platform (WISP) proves that the generated NFC signal from an NFC enabled phone can power a tag (NFC-WISP) with display and sensing capabilities in addition to identification. However, accurately aligning and placing the NFC tag's antenna to ensure the high power delivery efficiency and communication performance is very challenging for the users. In addition, the performance of the NFC tag is not only range and alignment sensitive but also is a function of its run-time load impedance. This makes the execution of power-hungry tasks on an NFC tag (like the NFC-WISP) very challenging. Therefore, we explore a low-cost tag antenna design to achieve higher power delivered to the load (PDL) by utilizing two different antenna configurations (2-coil/3-coil). The two types of antenna configurations can be used to dynamically adapt to the requirements of varied range, alignment and load impedance in real-time, therefore, we achieve continuous high PDL and reliable communication. With the proposed method, we can, for example, turn a semi-passive NFC-WISP into a passive display tag in which an embedded 2.7″ E-ink screen can be updated robustly by a tapped NFC reader (e.g. an NFC-enable cell-phone) over a 3 seconds and within 1.5cm range. 
    more » « less
  4. Mobile devices typically rely on entry-point and other one-time authentication mechanisms such as a password, PIN, fingerprint, iris, or face. But these authentication types are prone to a wide attack vector and worse 1 INTRODUCTION Currently smartphones are predominantly protected a patterned password is prone to smudge attacks, and fingerprint scanning is prone to spoof attacks. Other forms of attacks include video capture and shoulder surfing. Given the increasingly important roles smartphones play in e-commerce and other operations where security is crucial, there lies a strong need of continuous authentication mechanisms to complement and enhance one-time authentication such that even if the authentication at the point of login gets compromised, the device is still unobtrusively protected by additional security measures in a continuous fashion. The research community has investigated several continuous authentication mechanisms based on unique human behavioral traits, including typing, swiping, and gait. To this end, we focus on investigating physiological traits. While interacting with hand-held devices, individuals strive to achieve stability and precision. This is because a certain degree of stability is required in order to manipulate and interact successfully with smartphones, while precision is needed for tasks such as touching or tapping a small target on the touch screen (Sitov´a et al., 2015). As a result, to achieve stability and precision, individuals tend to develop their own postural preferences, such as holding a phone with one or both hands, supporting hands on the sides of upper torso and interacting, keeping the phone on the table and typing with the preferred finger, setting the phone on knees while sitting crosslegged and typing, supporting both elbows on chair handles and typing. On the other hand, physiological traits, such as hand-size, grip strength, muscles, age, 424 Ray, A., Hou, D., Schuckers, S. and Barbir, A. Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human Subjects. DOI: 10.5220/0010225804240431 In Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021), pages 424-431 ISBN: 978-989-758-491-6 Copyrightc 2021 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved still, once compromised, fail to protect the user’s account and data. In contrast, continuous authentication, based on traits of human behavior, can offer additional security measures in the device to authenticate against unauthorized users, even after the entry-point and one-time authentication has been compromised. To this end, we have collected a new data-set of multiple behavioral biometric modalities (49 users) when a user fills out an account recovery form in sitting using an Android app. These include motion events (acceleration and angular velocity), touch and swipe events, keystrokes, and pattern tracing. In this paper, we focus on authentication based on motion events by evaluating a set of score level fusion techniques to authenticate users based on the acceleration and angular velocity data. The best EERs of 2.4% and 6.9% for intra- and inter-session respectively, are achieved by fusing acceleration and angular velocity using Nandakumar et al.’s likelihood ratio (LR) based score fusion. 
    more » « less
  5. We have been witnessing an unprecedented increase in the aging population in human history. It is nontrivial to ensure the health and safety of seniors living alone. The prohibitive human labor cost necessitates more sustainable, technology oriented approaches instead of labor-intensive solutions. The raising digital healthcare services (DHS) leveraging the Internet of Medical Things (IoMT), Digital Twins (DT), and advanced fifth-generation and beyond (B5G) wireless communication technology, are widely recognized as promising solutions. By enabling a seamless interwoven of the physical world and cyberspace, Metaverse makes an ideal home for the next generation of DHS. Thanks to characteristics of decentralization, traceability, and unalterability, Blockchain is envisioned to enhance security properties in Metaverse. This paper proposes MetaSafe, a DHS architecture for seniors’ safety monitoring in Metaverse. Based on monitoring data collected by sensors, the activities and status of seniors, who are considered as the physical objects (PO), are mirrored to corresponding logical objects (LO) in a virtual community in the Metaverse, where activity recognition, potential risk prediction, and alert generation are realized. By leveraging Non-Fungible Token (NFT) technology to tokenize identities (POs and LOs) and data streams of the DHS on the blockchain, an NFT-based authentication fabric allows for verifiable ownership and traceable transferability during the data-sharing process. Specifically, an instant alerting system is introduced in this work that leverages a hybrid algorithm combining the singular spectrum analysis (SSA) approach with the long-short-term memory (LSTM) networks. Through an extensive experimental study, MetaSafe is validated as a feasible and promising approach to protect seniors living alone. 
    more » « less