secure mobile computing using biotelemetrics mahlon graham university of virginia nsf research...
TRANSCRIPT
![Page 1: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/1.jpg)
Secure Mobile Computingusing Biotelemetrics
Mahlon GrahamUniversity of Virginia
NSF Research Experience for Undergraduates
![Page 2: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/2.jpg)
Contents
Motivation Patch Simulator State Diagram State Definitions Secure Mobile Computing in Action Future Work Special Thanks
![Page 3: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/3.jpg)
Motivation
Secure Mobile Computing is a way to protect data stored on mobile computing devices, such as PDA’s, laptops, as well as specialized Military equipment.
Use biometric data to authenticate Heart beat, respiratory, body heat
![Page 4: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/4.jpg)
Motivation What sort of data should be secured?
Corporation Trade Secrets Sensitive Financial Information In-the-field troop movements, etc
What could happen to the user? User goes unconscious, device becomes
vulnerable User taken hostage, forced to access
sensitive data User becomes deceased, device taken by
enemies
![Page 5: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/5.jpg)
How to determine user status Wearable biometric patch transmits
heart beat data packets to mobile device Software interprets data and acts
according to set of predefined events Event triggers
Low heart rate for a given time Elevated heart rate for a given time Dramatic elevation of heart rate over short
time Timeout Disconnection
![Page 6: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/6.jpg)
Patch Simulator
Developed to duplicate heart beat data in controllable manner
Key features: Modular communication protocols to
allow for simple addition of proprietary communication channel if necessary
Displays summary of key information Scenario-based heart rate modification
![Page 7: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/7.jpg)
![Page 8: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/8.jpg)
![Page 9: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/9.jpg)
State Diagram
State Diagram
![Page 10: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/10.jpg)
State Definitions Locked State – Nothing done to data, but not
currently available to user multiple authentication required to unlock device
Safe State – Data is secure, cannot be easily recovered
Delete Data Encrypt Data Secure Delete / Wipe Data
Hard Reset – Device totally wiped, returned to factory settings
![Page 11: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/11.jpg)
Secure Mobile Computing in Action!
Demonstrate functionality of all elements of the system
![Page 12: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/12.jpg)
Future Work Implement Secure Mobile software as
background process Policy Controls in action unbeknownst to
user Integrate additional biometrics
Respiration Body Temperature
Optimize and increase robustness of checkHRChange() algorithm
![Page 13: Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates](https://reader036.vdocument.in/reader036/viewer/2022082610/56649da75503460f94a92b0f/html5/thumbnails/13.jpg)
Special Thanks to…
Dr. Alfred C. Weaver Andrew Jurik Paul Bui and Joel Coffman