Heartbeat password

Scientists from the Binghamton University in New York have explored with using a person's heartbeat as a password for encrypting and then decrypting personal data.

Researchers say that each person possesses a unique electrocardiograph (ECG), which just like fingerprints and iris, can be used for authentication.

Electrocardiography (ECG or EKG*) is the process of recording the electrical activity of the heart over a period of time using electrodes placed on the skin. These electrodes detect the tiny electrical changes on the skin that arise from the heart muscle's electrophysiologic pattern of depolarizing during each heartbeat.
- Wikipedia

We've all seen ECG measurements, being often used in movies to show a person's pulsating heart, or signal someone's death.

Binghamton researchers say that systems can be created that use these generally stable ECG measurements as keys for encrypting data and storing data.

Basically, scientists are proposing to replace random data (entropy) or static encryption keys with ECGs and use these unique parameters to secure a person's data.

ECGs require less computing power

Researchers cite the high computational costs of supporting proper entropy and encryption using classic techniques. While most home computers and web servers can handle these operations, IoT and smart devices don't have the processing power to deal with these calculations. Hence, most of them can't support encryption and end up exposing data.

Using an ECG-based biometrics solution simplifies the implementation details, making this a viable solution for smart healthcare devices.

Scientists say that a patient's data and personal files could be immediately encrypted and managed via a central healthcare data storage server as soon as the patient's heartbeat is acquired. This should, in theory, safeguard the data from any intruder who can't reproduce the user's unique ECG.

A doctor could just press a biometrics sensor against a patient's skin for a few seconds and immediately access patient files.

"The ECG signal is one of the most important and common physiological parameters collected and analyzed to understand a patient's’ health," said Zhanpeng Jin, assistant professor in the Department of Electrical and Computer Engineering at the Thomas J. Watson School of Engineering and Applied Science at Binghamton University.

"While ECG signals are collected for clinical diagnosis and transmitted through networks to electronic health records, we strategically reused the ECG signals for the data encryption," Jin added. "Through this strategy, the security and privacy can be enhanced while minimum cost will be added."

Some questions remain

But as much as using ECG signals for passwords makes sense, researchers admit that there are a few problems left to iron out.

First of all, ECGs change due to age, illness, or injury, a problem which researchers still haven't found a way to solve.

Second, if ECGs aren't rolled out as passwords for all sorts of online services and only used to safely store medical records, what happens to the encrypted data (medical records) after the patient dies?

Third is the same question that has plagued all other biometrics systems. Regular text-based passwords can be changed within seconds when exposed in a data breach. What happens when a person's ECG footprint leaks online, and anyone can reproduce it? How does a person protect all the information he encrypted using his heartbeat?

Prof. Jin probably had to face this last question before, since he was previously involved in research that explored using a person's unique brainprint instead of traditional passwords for access to computers and other facilities.

The research team's findings have been presented at the IEEE Global Communications Conference (GLOBECOM 2016) held in Washington, in December 2016. Their research is titled " A Robust and Reusable ECG-based Authentication and Data Encryption Scheme for eHealth Systems."

Related Articles:

Passwords are Costing Your Organization Money - How to Minimize Those Costs

Decade-old Linux ‘wall’ bug helps make fake SUDO prompts, steal passwords

Misconfigured Firebase instances leaked 19 million plaintext passwords

Hacked WordPress sites use visitors' browsers to hack other sites

Facebook and Instagram outage logs out users, passwords not working