Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

VibPath: Two-Factor Authentication with Your Hand's Vibration Response to Unlock Your Phone

Published: 27 September 2023 Publication History

Abstract

Technical advances in the smart device market have fixated smartphones at the heart of our lives, warranting an ever more secure means of authentication. Although most smartphones have adopted biometrics-based authentication, after a couple of failed attempts, most users are given the option to quickly bypass the system with passcodes. To add a layer of security, two-factor authentication (2FA) has been implemented but has proven to be vulnerable to various attacks. In this paper, we introduce VibPath, a simultaneous 2FA scheme that can understand the user's hand neuromuscular system through touch behavior. VibPath captures the individual's vibration path responses between the hand and the wrist with the attention-based encoder-decoder network, authenticating the genuine users from the imposters unobtrusively. In a user study with 30 participants, VibPath achieved an average performance of 0.98 accuracy, 0.99 precision, 0.98 recall, 0.98 f1-score for user verification, and 94.3% accuracy for user identification across five passcodes. Furthermore, we also conducted several extensive studies, including in-the-wile, permanence, vulnerability, usability, and system overhead studies, to assess the practicability and viability of the VibPath from multiple aspects.

References

[1]
2022. Smartwatch Market Size, Share COVID-19 Impact Analysis, By Operating System (IOS, Android, and Others), By End-User (Male and Female), By Application(Running, Checking, Notifications, Swimming, Cycling, and Others) and Regional Forecast, 2021-2028. https://www.fortunebusinessinsights.com/smartwatch-market-106625
[2]
Kamran Ali and Alex X Liu. 2021. Fine-grained Vibration Based Sensing Using a Smartphone. IEEE Transactions on Mobile Computing (2021).
[3]
Atefeh Aminian-Far, Mohammad-Reza Hadian, Gholamreza Olyaei, Saeed Talebian, and Amir Hoshang Bakhtiary. 2011. Whole-body vibration and the prevention and treatment of delayed-onset muscle soreness. Journal of athletic training 46, 1 (2011), 43--49.
[4]
Apple. 2017. About Touch ID advanced security technology. https://support.apple.com/en-us/HT204587
[5]
Mozhgan Azimpourkivi, Umut Topkara, and Bogdan Carbunar. 2017. Camera based two factor authentication through mobile and wearable devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 1--37.
[6]
C. Bradford Barber, David P. Dobkin, and Hannu Huhdanpaa. 1996. The quickhull algorithm for convex hulls. ACM Transactions on Mathematical Software (TOMS) 22, 4 (1996), 469--483.
[7]
Hangcheng Cao, Hongbo Jiang, Daibo Liu, and Jie Xiong. 2021. Evidence in Hand: Passive Vibration Response-based Continuous User Authentication. In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 1020--1030.
[8]
Yetong Cao, Qian Zhang, Fan Li, Song Yang, and Yu Wang. 2020. PPGPass: Nonintrusive and secure mobile two-factor authentication via wearables. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 1917--1926.
[9]
Huijie Chen, Fan Li, Wan Du, Song Yang, Matthew Conn, and Yu Wang. 2020. Listen to your fingers: User authentication based on geometry biometrics of touch gesture. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 3 (2020), 1--23.
[10]
Wenqiang Chen, Lin Chen, Yandao Huang, Xinyu Zhang, Lu Wang, Rukhsana Ruby, and Kaishun Wu. 2019. Taprint: Secure text input for commodity smart wristbands. In The 25th Annual International Conference on Mobile Computing and Networking. 1--16.
[11]
Wenqiang Chen, Lin Chen, Meiyi Ma, Farshid Salemi Parizi, Shwetak Patel, and John Stankovic. 2021. ViFin: Harness Passive Vibration to Continuous Micro Finger Writing with a Commodity Smartwatch. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 1 (2021), 1--25.
[12]
Yongliang Chen, Tao Ni, Weitao Xu, and Tao Gu. 2022. SwipePass: Acoustic-based Second-factor User Authentication for Smartphones. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 3 (2022), 1--25.
[13]
Seokmin Choi, Yang Gao, Yincheng Jin, Se jun Kim, Jiyang Li, Wenyao Xu, and Zhanpeng Jin. 2022. PPGface: Like What You Are Watching? Earphones Can" Feel" Your Facial Expressions. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 2 (2022), 1--32.
[14]
Charles Edward Connor, Steven S Hsiao, John R Phillips, and Kenneth O Johnson. 1990. Tactile roughness: neural codes that account for psychophysical magnitude estimates. Journal of Neuroscience 10, 12 (1990), 3823--3836.
[15]
Jeremy W Crampton. 2019. Platform biometrics. Surveillance & Society 17, 1/2 (2019), 54--62.
[16]
Aurora Felicia Cristea and Radu Morariu-Gligor. 2013. The simulation of vibration attenuation in the hand-arm sistem. UPB Scientific Bulletin, Series D 75, 3 (2013).
[17]
Benoit Delhaye, Vincent Hayward, Philippe Lefèvre, and Jean-Louis Thonnard. 2012. Texture-induced vibrations in the forearm during tactile exploration. Frontiers in behavioral neuroscience 6 (2012), 37.
[18]
Ren G Dong, Daniel E Welcome, John Z Wu, and Thomas W McDowell. 2008. Development of hand-arm system models for vibrating tool analysis and test rig construction. Noise Control Engineering Journal 56, 1 (2008), 35--44.
[19]
Yang Gao, Yincheng Jin, Jagmohan Chauhan, Seokmin Choi, Jiyang Li, and Zhanpeng Jin. 2021. Voice in ear: Spoofing-resistant and passphrase-independent body sound authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 1 (2021), 1--25.
[20]
Fernando Godínez, Dieter Hutter, and Raúl Monroy. 2006. On the use of word networks to mimicry attack detection. In International Conference on Emerging Trends in Information and Communication Security. Springer, 423--435.
[21]
Mayank Goel, Jacob Wobbrock, and Shwetak Patel. 2012. Gripsense: using built-in sensors to detect hand posture and pressure on commodity mobile phones. In Proceedings of the 25th annual ACM symposium on User interface software and technology. 545--554.
[22]
Jianping Gou, Baosheng Yu, Stephen J Maybank, and Dacheng Tao. 2021. Knowledge distillation: A survey. International Journal of Computer Vision 129, 6 (2021), 1789--1819.
[23]
Anqi Huang, Runping Shen, Wenli Di, and Huimin Han. 2021. A methodology to reconstruct LAI time series data based on generative adversarial network and improved Savitzky-Golay filter. International Journal of Applied Earth Observation and Geoinformation 105 (2021), 102633.
[24]
Yongzhi Huang, Kaixin Chen, Yandao Huang, Lu Wang, and Kaishun Wu. 2021. A Portable and Convenient System for Unknown Liquid Identification with Smartphone Vibration. IEEE Transactions on Mobile Computing (2021).
[25]
Yongzhi Huang, Kaixin Chen, Yandao Huang, Lu Wang, and Kaishun Wu. 2021. Vi-liquid: unknown liquid identification with your smartphone vibration. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. 174--187.
[26]
Jun Ho Huh, Hyejin Shin, HongMin Kim, Eunyong Cheon, Youngeun Song, Choong-Hoon Lee, and Ian Oakley. 2023. WristAcoustic: Through-Wrist Acoustic Response Based Authentication for Smartwatches. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 4 (2023), 1--34.
[27]
Eric Husa and Reza Tourani. 2021. Vibe: An Implicit Two-Factor Authentication using Vibration Signals. In 2021 IEEE Conference on Communications and Network Security (CNS). IEEE, 236--244.
[28]
Min-Shiang Hwang and Li-Hua Li. 2000. A new remote user authentication scheme using smart cards. IEEE Transactions on consumer Electronics 46, 1 (2000), 28--30.
[29]
Sungjae Hwang, Andrea Bianchi, and Kwang-yun Wohn. 2013. VibPress: estimating pressure input using vibration absorption on mobile devices. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services. 31--34.
[30]
Duo Security Inc. 2022. Duo 2 factor authentication. https://duo.com/product/multi-factor-authentication-mfa/authentication-methods/duo-push
[31]
Xinyu Jiang, Ke Xu, Xiangyu Liu, Chenyun Dai, David A Clifton, Edward A Clancy, Metin Akay, and Wei Chen. 2020. Neuromuscular password-based user authentication. IEEE Transactions on Industrial Informatics 17, 4 (2020), 2641--2652.
[32]
Kevin Jiokeng, Gentian Jakllari, and André-Luc Beylot. 2022. I Want to Know Your Hand: Authentication on Commodity Mobile Phones Based on Your Hand's Vibrations. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 2 (2022), 58.
[33]
Teoh joo Fong, Azween Abdullah, NZ Jhanjhi, and Mahadevan Supramaniam. 2019. The coin passcode: A shoulder-surfing proof graphical password authentication model for mobile devices. Int'l J. of Advanced Computer Science and Applications 10, 1 (2019).
[34]
Md Abdullah Al Hafiz Khan, Nirmalya Roy, and Archan Misra. 2018. Scaling human activity recognition via deep learning-based domain adaptation. In 2018 IEEE international conference on pervasive computing and communications (PerCom). IEEE, 1--9.
[35]
Salman H Khan, M Ali Akbar, Farrukh Shahzad, Mudassar Farooq, and Zeashan Khan. 2015. Secure biometric template generation for multi-factor authentication. Pattern Recognition 48, 2 (2015), 458--472.
[36]
Adams Kong, David Zhang, and Mohamed Kamel. 2006. Palmprint identification using feature-level fusion. Pattern Recognition 39, 3 (2006), 478--487.
[37]
KENZO Kumamoto, HIROYUKI Senuma, SATOMI Ebara, and TADAO Matsuura. 1993. Distribution of pacinian corpuscles in the hand of the monkey, Macaca fuscata. Journal of anatomy 183, Pt 1 (1993), 149.
[38]
Alexander S La Cour, Khurram K Afridi, and G Edward Suh. 2021. Wireless charging power side-channel attacks. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 651--665.
[39]
Sunwoo Lee, Wonsuk Choi, and Dong Hoon Lee. 2021. Usable user authentication on a smartwatch using vibration. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 304--319.
[40]
Fangyu Li, Maria Valero, Jose Clemente, Zion Tse, and Wenzhan Song. 2020. Smart sleep monitoring system via passively sensing human vibration signals. IEEE Sensors Journal 21, 13 (2020), 14466--14473.
[41]
Jingjie Li, Kassem Fawaz, and Younghyun Kim. 2019. Velody: Nonlinear vibration challenge-response for resilient user authentication. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1201--1213.
[42]
Yue Li, Haining Wang, and Kun Sun. 2016. A study of personal information in human-chosen passwords and its security implications. In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, 1--9.
[43]
Xavier Libouton, Olivier Barbier, Leon Plaghki, and Jean-Louis Thonnard. 2010. Tactile roughness discrimination threshold is unrelated to tactile spatial acuity. Behavioural brain research 208, 2 (2010), 473--478.
[44]
Jian Liu, Yingying Chen, and Marco Gruteser. 2016. Vibkeyboard: virtual keyboard leveraging physical vibration. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking. 507--508.
[45]
Jian Liu, Yingying Chen, Marco Gruteser, and Yan Wang. 2017. Vibsense: Sensing touches on ubiquitous surfaces through vibration. In 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, 1--9.
[46]
Jian Liu, Chen Wang, Yingying Chen, and Nitesh Saxena. 2017. Vibwrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 73--87.
[47]
Melody M Moore and Umang Dua. 2003. A galvanic skin response interface for people with severe motor disabilities. In Proceedings of the 6th international ACM SIGACCESS Conference on Computers and Accessibility. 48--54.
[48]
Yury A. Nikolaev, Viktor V. Feketa, Evan O. Anderson, Eve R. Schneider, Elena O. Gracheva, and Sviatoslav N. Bagriantsev. 2020. Lamellar cells in Pacinian and Meissner corpuscles are touch sensors. Science Advances 6, 51 (2020), eabe6393.
[49]
Hiroki Ohashi, M Al-Nasser, Sheraz Ahmed, Takayuki Akiyama, Takuto Sato, Phong Nguyen, Katsuyuki Nakamura, and Andreas Dengel. 2017. Augmenting wearable sensor data with physical constraint for DNN-based human-action recognition. In ICML 2017 times series workshop. 6--11.
[50]
Shijia Pan, Ceferino Gabriel Ramirez, Mostafa Mirshekari, Jonathon Fagert, Albert Jin Chung, Chih Chi Hu, John Paul Shen, Hae Young Noh, and Pei Zhang. 2017. Surfacevibe: vibration-based tap & swipe tracking on ubiquitous surfaces. In 2017 16th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN). IEEE, 197--208.
[51]
Jinseon Park, Heesu Jun, Hyosu Kim, and Syed Asif Raza Shah. 2020. VibAuth: Enabling Accurate, Usable, and Deployable User Authentication by Leveraging Vibration. In 2020 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 1771--1773.
[52]
Value Penguin. 2022. Survey on a number of smartwatch users for different generations. valuepenguin.com. https://www.valuepenguin. com/fitness-tracker-smartwatch-health-survey Number of smartwatch users.
[53]
Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, and Sotiris Ioannidis. 2015. Two-Factor Authentication: Is the World Ready? Quantifying 2FA Adoption. In Proceedings of the Eighth European Workshop on System Security (Bordeaux, France) (EuroSec '15). Association for Computing Machinery, New York, NY, USA, Article 4, 7 pages.
[54]
Paulo Henrique Pisani, Abir Mhenni, Romain Giot, Estelle Cherrier, Norman Poh, André Carlos Ponce de Leon Ferreira de Carvalho, Christophe Rosenberger, and Najoua Essoukri Ben Amara. 2019. Adaptive biometric systems: Review and perspectives. ACM Computing Surveys (CSUR) 52, 5 (2019), 1--38.
[55]
Ilmari Pyykkö, Markus Färkkilä, Jarmo Toivanen, Olli Korhonen, and Juhani Hyvärinen. 1976. Transmission of vibration in the hand-arm system with special reference to changes in compression force and acceleration. Scandinavian Journal of Work, Environment & Health (1976), 87--95.
[56]
Danissa Sandykbayeva, Zhanat Kappassov, and Bakhtiyar Orazbayev. 2022. VibroTouch: Active Tactile Sensor for Contact Detection and Force Sensing via Vibrations. Sensors 22, 17 (2022), 6456.
[57]
Abraham Savitzky and Marcel JE Golay. 1964. Smoothing and differentiation of data by simplified least squares procedures. Analytical chemistry 36, 8 (1964), 1627--1639.
[58]
Stefan Schneegass, Youssef Oualil, and Andreas Bulling. 2016. SkullConduct: Biometric User Identification on Eyewear Computers Using Bone Conduction Through the Skull. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI '16). Association for Computing Machinery, New York, NY, USA, 1379--1384. https://doi.org/10.1145/2858036. 2858152
[59]
Bruce Schneier. 2005. Two-Factor Authentication: Too Little, Too Late. Commun. ACM 48, 4 (apr 2005), 136.
[60]
Jessica Sehrt, Feng Yi Lu, Leonard Husske, Anton Roesler, and Valentin Schwind. 2022. WristConduct: Biometric User Authentication Using Bone Conduction at the Wrist. In Proceedings of Mensch und Computer 2022. 371--375.
[61]
Syed W Shah and Salil S Kanhere. 2018. Wi-access: Second factor user authentication leveraging WiFi signals. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 330--335.
[62]
Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).
[63]
Ivan Švogor and Tonimir Kišasondi. 2012. Two factor authentication using EEG augmented passwords. In Proceedings of the ITI 2012 34th International Conference on Information Technology Interfaces. IEEE, 373--378.
[64]
Yoshihiro Tanaka, Yoshihiro Horita, and Akihito Sano. 2012. Finger-mounted skin vibration sensor for active touch. In International Conference on Human Haptic Sensing and Touch Enabled Computer Applications. Springer, 169--174.
[65]
SK Deric Tang, YY Sebastian Goh, ML Dennis Wong, and YL Eileen Lew. 2016. PPG signal reconstruction using a combination of discrete wavelet transform and empirical mode decomposition. In 2016 6th International Conference on Intelligent and Advanced Systems (ICIAS). IEEE, 1--4.
[66]
Maggie Tillman. 2021. These are the 20 most common phone PINs: Is your device vulnerable? pocket-lint.com. https://www.pocket-lint.com/phones/news/148224-these-are-the-20-most-common-phone-pins-is-your-device-vulnerable The most common passcodes.
[67]
Andreas Uhl and Peter Wild. 2013. Experimental evidence of ageing in hand biometrics. In 2013 international conference of the BIOSIG Special Interest Group (BIOSIG). IEEE, 1--6.
[68]
valuepenguin. 2022. Nearly 70% of Americans Would Wear a Fitness Tracker/Smartwatch for Discounted Health Insurance. https://www.valuepenguin.com/fitness-tracker-smartwatch-health-survey
[69]
Kaishun Wu, Yandao Huang, Minghui Qiu, Zhencan Peng, and Lu Wang. 2022. Towards Device-free and User-independent Fall Detection using Floor Vibration. ACM Transactions on Sensor Networks (TOSN) (2022).
[70]
Xiangyu Xu, Jiadi Yu, Yingying Chen, Qin Hua, Yanmin Zhu, Yi-Chao Chen, and Minglu Li. 2020. TouchPass: towards behavior-irrelevant on-touch user authentication on smartphones leveraging vibrations. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking. 1--13.
[71]
Bin Yan, Houwen Peng, Jianlong Fu, Dong Wang, and Huchuan Lu. 2021. Learning spatio-temporal transformer for visual tracking. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 10448--10457.
[72]
Dimitra Zarafeta, Christina Katsini, George E Raptis, and Nikolaos M Avouris. 2019. Ultrasonic watch: Seamless two-factor authentication through ultrasound. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--6.
[73]
Jingyang Zhang, Wenhao Ding, and Liang He. 2019. Data augmentation and prior knowledge-based regularization for sound event localization and detection. DCASE 2019 Detection and Classification of Acoustic Scenes and Events 2019 Challenge (2019).
[74]
Shaohu Zhang and Anupam Das. 2021. HandLock: Enabling 2-FA for Smart Home Voice Assistants using Inaudible Acoustic Signal. In 24th International Symposium on Research in Attacks, Intrusions and Defenses. 251--265.
[75]
Yan Zhang, Dianqi Han, Ang Li, Lili Zhang, Tao Li, and Yanchao Zhang. 2021. Magauth: Secure and usable two-factor authentication with magnetic wrist wearables. IEEE Transactions on Mobile Computing (2021).
[76]
Bing Zhou, Jay Lohokare, Ruipeng Gao, and Fan Ye. 2018. Echoprint: Two-factor authentication using acoustics and vision on smartphones. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. 321--336.
[77]
Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A Efros. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In Proceedings of the IEEE international conference on computer vision. 2223--2232.
[78]
Claudio Zippenfennig, Bert Wynands, and Thomas L Milani. 2021. Vibration perception thresholds of skin mechanoreceptors are influenced by different contact forces. Journal of Clinical Medicine 10, 14 (2021), 3083.

Cited By

View all
  • (2024)Gazenum: unlock your phone with gaze tracking viewing numbers for authenticationCCF Transactions on Pervasive Computing and Interaction10.1007/s42486-024-00165-wOnline publication date: 30-Aug-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 7, Issue 3
September 2023
1734 pages
EISSN:2474-9567
DOI:10.1145/3626192
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 September 2023
Published in IMWUT Volume 7, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IMU
  2. Smartphone
  3. Smartwatch
  4. User Authentication
  5. Vibration
  6. Wearables

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Guangdong Provincial Key Laboratory of Human Digital Twin
  • Shenzhen Holdfound Foundation

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)318
  • Downloads (Last 6 weeks)38
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Gazenum: unlock your phone with gaze tracking viewing numbers for authenticationCCF Transactions on Pervasive Computing and Interaction10.1007/s42486-024-00165-wOnline publication date: 30-Aug-2024

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media