Loading

USB Keyboard Security Unit
Wojciech Wodo1, Lucjan Hanzlik2, Konrad Zawada3
1Wojciech Wodo MSc, Wroclaw University of Technology, Faculty of Fundamental Problems of Technology, Wroclaw, Poland.
2Lucjan Hanzlik MSc, Wroclaw University of Technology, Faculty of Fundamental Problems of Technology, Wroclaw, Poland.
3Konrad Zawada BSc, Wroclaw University of Technology, Faculty of Electronics, Wroclaw, Poland.
Manuscript received on April 28, 2014. | Revised Manuscript received on May 03, 2014. | Manuscript published on May 05, 2014. | PP: 24-27 | Volume-4 Issue-2, May 2014. | Retrieval Number: B2182054214/2014©BEIESP
Open Access | Ethics and Policies | Cite
©The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/

Abstract: Every user has its specific rhythm of typing which could be used as a biometrics in order to build some kind of “footprint” – unique profile. If somebody gets to know this profile, legitimate user is endangered by tracking and being impersonated. That is the way typing rhythm must be protected. We designed a hardware-based device in order to protect the identity of the individual during usage of keyboard (typing). The unit is plugged between the keyboard and the personal computer and works as an interface modifying data on the fly in the model “man in the middle”. Thanks to these modifications, an adversary who eavesdrops communication between a legitimate user and workstation gets practically no information about the “keystroking identity” of user. The security unit is based on two microprocessors: AVR AT90USB1287 working as USB Host – simulating workstation and AVR Atmega88 working as USB Device – simulating virtual keyboard. In the paper we present technical details of the security unit including electronic schemes and PCB referring to previously designed protection algorithms and results of performed efficiency tests as well.
Keywords: Biometrics, security and privacy protection, microprocessors and microcomputers, user interfaces, human factors in software design.