Attacks on heartbeat-based security using remote photoplethysmography

Robert Mark Seepers, Wenjin Wang, Gerard de Haan, Ioannis Sourdis, Christos Strydis

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)
260 Downloads (Pure)

Abstract

The time interval between consecutive heartbeats (interpulse interval, IPI) has previously been suggested for securing mobile-health solutions. This time interval is known to contain a degree of randomness, permitting the generation of a time- and person-specific identifier. It is commonly assumed that only devices trusted by a person can make physical contact with him/her, and that this physical contact allows each device to generate a similar identifier based on its own cardiac recordings. Under these conditions, the identifiers generated by different trusted devices can facilitate secure authentication. Recently, a wide range of techniques have been proposed for measuring heartbeats remotely, a prominent example of which is remote photoplethysmography (rPPG). These techniques may pose a significant threat to heartbeat-based security, as an adversary may pretend to be a trusted device by generating a similar identifier without physical contact, thus bypassing one of the core security conditions. In this paper, we assess the feasibility of such remote attacks using state-of-the-art rPPG methods. Our evaluation shows that rPPG has similar accuracy as contact PPG and, thus, forms a substantial threat to heartbeat-based-security systems that permit trusted devices to obtain their identifiers from contact PPG recordings. Conversely, rPPG cannot obtain an accurate representation of an identifier generated from electrical cardiac signals, making the latter invulnerable to state-of-the-art remote attacks.

Original languageEnglish
Pages (from-to)714-721
Number of pages8
JournalIEEE Journal of Biomedical and Health Informatics
Volume22
Issue number3
Early online dateApr 2017
DOIs
Publication statusPublished - 1 May 2018

Keywords

  • Authentication
  • Biometrics (access control)
  • Photoplethysmography
  • Remote monitoring
  • Robert Seepers
  • side-channel attacks
  • with kind regards

Fingerprint Dive into the research topics of 'Attacks on heartbeat-based security using remote photoplethysmography'. Together they form a unique fingerprint.

Cite this