Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 - - PowerPoint PPT Presentation

authentication using pulse response biometrics
SMART_READER_LITE
LIVE PREVIEW

Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 - - PowerPoint PPT Presentation

Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit About Myself Lecturer at University of


slide-1
SLIDE 1

Slide 1.

Authentication Using Pulse-Response Biometrics

Kasper B. Rasmussen1 Marc Roeschlin2 Ivan Martinovic1 Gene Tsudik3

1University of Oxford 2ETH Zurich 3UC Irvine

Clermont Ferrand, 2014

slide-2
SLIDE 2

Slide 2.

A Bit About Myself

Lecturer at University of Oxford.

Current Research Topics

Security of Wireless Networks Protocol design Applied Cryptography Security of embedded systems Cyber-physical systems Oh yes—Biometrics.

slide-3
SLIDE 3

Slide 3.

Outline

1

Background on Biometrics

2

Pulse-Response

3

Security Applications

4

Experimental Results

slide-4
SLIDE 4

Slide 4.

Biometrics: A Definition

Biometrics

A means to identify individual human beings by their characteristics or traits.

slide-5
SLIDE 5

Slide 5.

Biometrics

Behavioral

Keystroke timing, speech pattern analysis, gait recognition and hand-writing

Physiological

Fingerprints, hand geometry, facial recognition, speech analysis and iris/retina scans

slide-6
SLIDE 6

Slide 6.

Biometrics

Unobtrusive

Keystroke timing, speech pattern analysis, gait recognition, hand-writing, facial recognition and speech analysis

Invasive

Fingerprints, hand geometry and iris/retina scans

slide-7
SLIDE 7

Slide 7.

Why a New Biometric?

Some biometrics are“secure”but“hard to use” .

Fingerprints Iris/Retina

Others are“less secure”but“easy to use” .

Face recognition Key-stroke dynamics

slide-8
SLIDE 8

Slide 8.

Biometric Design Goals

1

Universal: The biometric must be universally applicable, to the extent required by the application.

2

Unique: The biometric must be unique within the target population.

3

Permanent: The biometric must be consistent over the time period where it’s used.

slide-9
SLIDE 9

Slide 9.

Biometric Design Goals ...cont.

4

Unobtrusive: An unobtrusive biometric is much more likely to be accepted.

5

Difficult to circumvent: Essential for a biometric in any security context.

...also, for completeness

Collectability, Acceptability and Cost Effectiveness

slide-10
SLIDE 10

Slide 10.

Biometrics in Security

Identification

Obtain the identity of a user. vs.

Authentication

Confirm the identity of a user.

slide-11
SLIDE 11

Slide 11.

Biometrics in Security

Identification

Obtain the identity of a user. vs.

Authentication

Confirm the identity of a user.

Continuous Authentication

Continuously confirm the identity of a user.

slide-12
SLIDE 12

Slide 12.

Pulse-Response Biometric

Pulse signal applied to the palm of one hand. The biometric is captured by measuring the response in the user’s hand.

slide-13
SLIDE 13

Slide 13.

User Safety

Voltage (V) 1 1.5 Max Current (mA) 0.1 500+ Exposure 100ns ∼500ms

slide-14
SLIDE 14

Slide 14.

Case 1: Hardening PIN Entry

slide-15
SLIDE 15

Slide 15.

Case 1: Hardening PIN Entry

Biometric Properties

Universality, Uniqueness, Permanence, Unobtrusiveness, Circumvention Difficulty

slide-16
SLIDE 16

Slide 16.

ATM Decision Flowchart

End Start Is PIN Correct? Accept! Reject! Does pulse-response match?

No No Yes Yes

slide-17
SLIDE 17

Slide 17.

ATM Decision Flowchart

End Start Is PIN Correct? Accept! Reject! Does pulse-response match?

No No Yes Yes

Pbreak = Pguess·Pforge

slide-18
SLIDE 18

Slide 18.

Case 2: Continuous Authentication

slide-19
SLIDE 19

Slide 19.

Case 2: Continuous Authentication

Biometric Properties

Universality, Uniqueness, Permanence, Unobtrusiveness, Circumvention Difficulty

slide-20
SLIDE 20

Slide 20.

  • Cont. Auth. Decision Flowchart

Reacquire pulse-response Does pulse-response match? Wait T ake action. End Policy database Start Wait for login. Get pulse-response reference.

No Yes

Pulse-response database

slide-21
SLIDE 21

Slide 21.

  • Cont. Auth. Security

Detected Passed biometric test "Start" Adv sits down 1 2 3

Reacquire pulse-response Does pulse-response match? Wait T ake action. End Policy database Start Wait for login. Get pulse-response reference. No Yes Pulse-response database

slide-22
SLIDE 22

Slide 22.

  • Cont. Auth. Security

Detected Passed biometric test "Start" Adv sits down 1 2 3

Reacquire pulse-response Does pulse-response match? Wait T ake action. End Policy database Start Wait for login. Get pulse-response reference. No Yes Pulse-response database

P =   0 1 − α α 0 1 − β β 1  

slide-23
SLIDE 23

Slide 23.

  • Cont. Auth. Security

P =   0 1 − α α 0 1 − β β 1   Probabilities after i rounds, starting in state 1 [1, 0, 0] · Pi = [0, (1 − α)(1 − β)i−1, 1 − (1 − α)(1 − β)i−1] Probability of detection (state 3) for i = 10 1 − (1 − α)(1 − β)i−1 = 1 − (1 − 0.99)(1 − 0.3)10−1 = 1 − 0.01 · 0.79 ≈ 99.96%

slide-24
SLIDE 24

Slide 24.

  • Cont. Auth. Security

P =   0 1 − α α 0 1 − β β 1   Probabilities after i rounds, starting in state 1 [1, 0, 0] · Pi = [0, (1 − α)(1 − β)i−1, 1 − (1 − α)(1 − β)i−1] Probability of detection (state 3) for i = 10 1 − (1 − α)(1 − β)i−1 = 1 − (1 − 0.99)(1 − 0.3)10−1 = 1 − 0.01 · 0.79 ≈ 99.96% After 50 rounds this grows to 99.99999997%

slide-25
SLIDE 25

Slide 25.

Experimental Setup

slide-26
SLIDE 26

Slide 26.

Signals

0.0 0.5 1.0 200 400 600 800

Time [ns] Signal magnitude [Volt]

Input pulse Measured pulse 100 200 300 400 500 25 50 75 100

Frequency bins Spectral density

slide-27
SLIDE 27

Slide 27.

Classification

slide-28
SLIDE 28

Slide 28.

Selecting the Classifier

Support Vector Machine, Euclidean Distance, Latent Dirichlet Allocation, K-Nearest Neighbor

SVM Euclidean LDA Knn

  • 0%

25% 50% 75% 100% P u l s e − 1 − 1 P u l s e − 1 − 1 P u l s e − 1 − 1 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 5 − 2 5 S i n e L i n − 5 − 5 S i n e L i n − 5 − 9 8 S q u a r e L i n − 1 − 2 5 S q u a r e L i n − 1 − 2 5 P u l s e − 1 − 1 P u l s e − 1 − 1 P u l s e − 1 − 1 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 5 − 2 5 S i n e L i n − 5 − 5 S i n e L i n − 5 − 9 8 S q u a r e L i n − 1 − 2 5 S q u a r e L i n − 1 − 2 5 P u l s e − 1 − 1 P u l s e − 1 − 1 P u l s e − 1 − 1 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 5 − 2 5 S i n e L i n − 5 − 5 S i n e L i n − 5 − 9 8 S q u a r e L i n − 1 − 2 5 S q u a r e L i n − 1 − 2 5 P u l s e − 1 − 1 P u l s e − 1 − 1 P u l s e − 1 − 1 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 5 − 2 5 S i n e L i n − 5 − 5 S i n e L i n − 5 − 9 8 S q u a r e L i n − 1 − 2 5 S q u a r e L i n − 1 − 2 5

Binary detection error rate

slide-29
SLIDE 29

Slide 29.

Selecting the Classifier

Support Vector Machine, Euclidean Distance, Latent Dirichlet Allocation, K-Nearest Neighbor

SVM Euclidean LDA Knn

  • 0%

25% 50% 75% 100% P u l s e − 1 − 1 P u l s e − 1 − 1 P u l s e − 1 − 1 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 5 − 2 5 S i n e L i n − 5 − 5 S i n e L i n − 5 − 9 8 S q u a r e L i n − 1 − 2 5 S q u a r e L i n − 1 − 2 5 P u l s e − 1 − 1 P u l s e − 1 − 1 P u l s e − 1 − 1 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 5 − 2 5 S i n e L i n − 5 − 5 S i n e L i n − 5 − 9 8 S q u a r e L i n − 1 − 2 5 S q u a r e L i n − 1 − 2 5 P u l s e − 1 − 1 P u l s e − 1 − 1 P u l s e − 1 − 1 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 5 − 2 5 S i n e L i n − 5 − 5 S i n e L i n − 5 − 9 8 S q u a r e L i n − 1 − 2 5 S q u a r e L i n − 1 − 2 5 P u l s e − 1 − 1 P u l s e − 1 − 1 P u l s e − 1 − 1 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 1 − 2 5 S i n e L i n − 1 − 5 S i n e L i n − 1 − 9 8 S i n e L i n − 5 − 2 5 S i n e L i n − 5 − 5 S i n e L i n − 5 − 9 8 S q u a r e L i n − 1 − 2 5 S q u a r e L i n − 1 − 2 5

Binary detection error rate

SVM

  • 0%

25% 50% 75% 100% Pulse−1−1 Pulse−1−100 Pulse−1−10000 SineLin−10−250 SineLin−10−500 SineLin−10−980 SineLin−1−250 SineLin−1−500 SineLin−1−980 SineLin−5−250 SineLin−5−500 SineLin−5−980 SquareLin−10−250 SquareLin−1−250 Pulse−1−1 Pulse−1−100 Pulse−1−10000

Binary detection error rate

slide-30
SLIDE 30

Slide 30.

ROC Curves

Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate Equal Error Rate

0.00 0.25 0.50 0.75 1.00 0.00 0.25 0.50 0.75 1.00

False positive rate (FPR) True positive rate (TPR)

Classifier Euclidean Mahalanobis SVM Data set Over time Single data set

slide-31
SLIDE 31

Slide 31.

Authentication Classifier

Over Time

Aiden Ethan Jacob Liam Mason 0% 25% 50% 75% 100% 0% 25% 50% 75% 100% 0% 25% 50% 75% 100% 90 92 94 96 98 100

Threshold [%] Sensitivity (TPR)

slide-32
SLIDE 32

Slide 32.

Auth: Single Session

Charles David Ethan Jackson Liam Lucas Mason Noah Richard Sophia 0% 25% 50% 75% 100% 0% 25% 50% 75% 100% 0% 25% 50% 75% 100% 0% 25% 50% 75% 100% 0% 25% 50% 75% 100% 90 92 94 96 98 100 90 92 94 96 98 100

Threshold [%] Sensitivity (TPR)

slide-33
SLIDE 33

Slide 33.

Identification Classifier

Over time Single data set 0% 25% 50% 75% 100% A i d e n E t h a n J a c

  • b

L i a m M a s

  • n

C h a r l e s D a v i d E t h a n J a c k s

  • n

L i a m L u c a s M a s

  • n

N

  • a

h R i c h a r d S

  • p

h i a

Sensitivity (TPR)

slide-34
SLIDE 34

Slide 34.

Future Work

Prototype

Build PIN entry prototype. Gather experience on acquisition time, etc. Gather more data.

Acquisition Signal

Higher bandwidth No signal Effects of stress, blood sugar levels, etc. Assess impersonation strategies.

slide-35
SLIDE 35

Slide 35.

WiSec 2014, in Oxford

slide-36
SLIDE 36

Slide 36.

Conclusion

A new biometric based on Pulse-Response. Two simple application scenarios for Pulse-Response integration. Very promising results. Very high degree of uniqueness and good stability over time.

slide-37
SLIDE 37

Slide 37.

Conclusion – Questions?

A new biometric based on Pulse-Response. Two simple application scenarios for Pulse-Response integration. Very promising results. Very high degree of uniqueness and good stability over time. Thank you for your attention. Questions? kasper.rasmussen@cs.ox.ac.uk