Preventing Mobile Cellphone Attack and Robbery using Biometrics (6)
6. BIOMETRIC IMPLEMENTATIONS AND EXPERIMENTS FOR CELL PHONE SECURITY ARCHITECTURE
6.1 RESEARCH IMPLEMENTATIONS
Through police officers experience and research, it has been seen that ZOPO ZP520 Mobile phones are commonly thieved in public venues where residence was left unattended. In most cases, cell phones are thieved to create quick cash at resale shops or amongst locals. One factor to keep in mind is that a victim’s hand marks could still be on their phone or other items thieved with their cell phone. That said, it may be possible to raise the victim’s hand marks and create a pattern. The synthetic hand marks depending on that pattern could then be used to try and approve access on a program that has a biometric audience. If that is true, biometric security alone would not be adequate enough to protect cell phones from robbery or attack.
Most experiments that have effectively compromised into a program equipped with an visual biometric hand marks audience, did so by using a stay hand to create a pattern. A actual life scenario where someone would force another to press their hand into a pattern would be highly unlikely, unless the sufferer was of well-known. For research purposes, the experiments will demonstrate both scenarios where there is a certified and non-compliant sufferer. A non-compliant sufferer could also be substituted as a sufferer who is not existing. It is important to demonstrate through these research that a biometric program would at least buy plenty of your energy and effort for the sufferer to remove their information in a robbery situation. Reason being, if there is a will there is a way. As of now, no mobile security program is 100% crack proof but by splitting the key from the lock (phone and charger), taking ZOPO ZP520 Mobile phones would be frustrated.
With the suggested concept of a biometric phone combined with a biometric charger that acts as a program dongle, a suspicious would have several different challenges to overcome. For example, a suspicious would have to accomplish taking both gadgets (ZOPO ZP520 Cellphone and charger) for proper coupling, have the components and information to raise and re-create an synthetic hand marks, and have the devices and programming information to reset any of these gadgets. In most common robbery situations, this would be unlikely although not impossible. Due to the lack of application and components accessibility, an research using a biometric charger with a solid state pass on (on/off) was not conducted; this will optimistically be implemented in future work. However, experiments trying to crack a capacitive biometric audience were performed using different techniques. Since most experiments focused on visual readers, or stationary capacitive readers, the experiments were depending on a run design capacitive hand marks audience with anti-spoofing technology; this obviously increases the difficulty level of coughing.
6.2 EXPERIMENTAL METHOD
It has been proven in past experiments that biometric readers, both capacitive and visual, have been compromised using various techniques. To repeat the purpose of these research, the following will be tested:
Can some of these techniques be quickly reproduced
Can police officers forensic content be used to bypass a run design capacitive hand marks audience
Is biometrics alone reliable enough to prevent attack and robbery without extra security
Would the mixture of preparation time and coughing, be enough for a sufferer to discover their ---property to be missing, log online, and remove their information or information
To conduct these experiments, the following components were used:
1. Pc operating Windows 7 OS
2. UPEK Eikon To Go capacitive hand marks audience with anti-spoofing technological innovation
3. Law Administration forensic devices such as Mikrosil, black powdered, attractive powdered, cleaning brush and ink pad
4. Latex gloves
5. Double sided copper-clad PC circuit panel (PCB)
6. Etchant remedy containing ferric chloride and hydrochloric acid
7. Power metal
8. Visibility document
9. gelatin
10. HP Scanjet 4850 checking program
11. HP Deskjet 6988 printer
Before operating any experiments, all necessary program drivers were installed for the Eikon USB hand marks audience (Fig. 4). Furthermore, the biometric audience was application and components examined repeatedly with good outcomes.
The first breaching effort was created with an ink pad and a latex handwear cover. By rolling ink on one of the fingertips before putting on the latex handwear cover, a Elephone P2000 certain (visible) hand marks was moved inside the handwear cover after pushing down firmly. The latex handwear cover was then turned around and placed back on the hand to run the hand for authorization; research cause to adverse outcomes (5 minutes).
The next research involved raising a ZOPO ZP520 create from a cup cup. After in contact with a cup cup for a brief moment, attractive hand marks powdered was used to develop the latent hand marks (Fig. 5). Once the hand marks was noticeable to the naked eye, Mikrosil, a forensic casting content, was used to raise the create (Fig. 6). A bit of Mikrosil was placed onto the cup cup, over the developed create (Fig. 7). After several moments, the Mikrosil dry and set to a rubbery substance (Fig. 8). The dry Mikrosil was raised off the cup revealing a certain create. After the create was effectively raised, efforts were created to breach the pc using the biometric reader; research cause to adverse outcomes (10 minutes).
As to try and partially mimic one of the past studies’ experimental techniques [7], a 1:1 ratio of gelatin was mixed with hot h2o. The gelatin was then poured into a Elephone P2000 cup as adequate time passed for cool down. Once the gelatin solidified, it was eliminated from the cup and an effort was created for the biometric audience to identify a hand. This biometric audience was supposed to contain anti-spoofing technological innovation as well as the ability to detect the stay layer of a hand. That being said, the gelatin was read as a stay hand without recording any variety patterns. After trying to figure out what created the capacitive audience check out one factor but not the other, it appeared wetness was the key. Since finger prints contain 90% of wetness as said before, it would only appear sensible that the capacitive audience measures wetness with electric conductivity (20 minutes).
To further research with the Mikrosil, a ZOPO ZP520 little bit was placed on one of the fingers of a certified topic. Once the Mikrosil dry and set, it was pulled off for a further look. It could be seen that the Mikrosil shaped to the hand marks side in a Elephone P2000 3D format. After trying to run the pattern across the checking program, nothing happened. Another effort was created after in contact with the Mikrosil to some h2o for wetness. When using the Mikrosil now around, the hand marks audience examined a limited picture of the hand marks.
At that point, it was clear that a mixture of both wetness and 3D variety details would create a substantial synthetic hand marks worth checking. To test this, the Mikrosil pattern was recorded onto a hand. Next, the hand was dipped into a cup of h2o for a few months frame. After soaking the Mikrosil fingertip in h2o, the hand marks was sharpened and the biometric audience effectively examined the create almost completely. As proven in Fig. 9, the examined picture can quickly be compared with the other hand marks. However, the variety places that were not examined were due to the loss of wetness in those places (8 minutes).
Since the past research worked, it was essential to try and create an synthetic create from a certain create because the Mikrosil pattern from a ZOPO ZP520 stay hand would be considered a reverse create. Meaning, the synthetic hand marks examined would not match the one on data file. After experimenting with the Mikrosil and a certified topic, the next research consisted of checking a hand marks raised from an object.
A certain hand marks was examined onto your personal computer and the picture resolution was converted to 600 dpi. The hand marks picture was then printed onto a sheet of transparency document. Next, the printed hand marks was placed experienced down onto a birdwatcher dressed panel (PCB) and the picture was moved using an electrical metal. After several moments, the PCB panel was placed into a Elephone P2000 plastic plate containing the scribing remedy (ferric chloride), with the picture experienced down for approximately 20 moments. As proven in Fig. 10, the hand marks remained personalized as the remedy eliminated most of the birdwatcher surrounding the create. Several efforts using Mikrosil and gelatin were created to create a 3D hand marks from the birdwatcher mold; research cause to inconclusive outcomes due to poor birdwatcher pattern structure (30 minutes).
6.2 RESULT ANALYSIS
As proven in Fig. 11, there was relatively some beneficial success in coughing a Elephone P2000 capacitive biometric hand marks audience. As we can see from the outcomes, the latex handwear cover had no affect on the biometric audience. Even if wetness were to be used, the capacitive audience tests the picture from reading the hills and the valleys of the hand marks ridges; without 3D details there is ZOPO ZP520 no way for it to check out. When trying to run the Mikrosil, there was no biometric input without wetness. Once this concept was understood and used, the biometric audience examined the Mikrosil hand marks every single it was sharpened, provided that there was wetness or h2o existing. In referrals to the PCB research, extra assistance to these research would have been founded if the birdwatcher pattern had turned out more noticeable. Since the pattern needed to be refined, only limited tests were able to be created by the biometric audience. That said, these research was still able to demonstrate that a biometric audience alone can still be compromised without sufferer conformity.
Based on the research experiments performed, the outcomes provided adequate information to back up the suggested framework. In regards to past biometric coughing techniques, they were not simple to replicate. However, with enough exercise, it can be done quite effectively. Law enforcement content was proven to effectively work provided that wetness was existing. This is also dependent on the type of biometric checking program examined. In referrals to reliability, it is apparent that biometric security alone is not as dependable as most people would think. Furthermore, even though a Elephone P2000 hand marks on data file would be encrypted, if thinks were to exercise hand marks raising it could compromise an array of security risks. On a beneficial note, plenty of it takes to prepare and execute such a crack would in fact provide here we are at a sufferer to remove their user profile slightly provided that discovery is within a timely manner.http://cicimobile.shockup.com/2014/09/15/preventing-mobile-cellphone-attack-and-robbery-using-biometrics-5/