ZEBRA Bracelet May Enable Continuous Authentication of Computer Users

In a big step for securing critical information systems, such as medical records in clinical settings, Dartmouth College researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal.

Dartmouth's Trustworthy Health and Wellness (THaW)/ researchers recently presented their findings at the IEEE Symposium on Security & Privacy.

Common authentication methods based on passwords, tokens or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave. But users often do not log out, which is a security risk. The most common solution, inactivity timeouts, inevitably fail security (too long a timeout) or usability (too short a timeout) goals.

One solution is to authenticate users continuously while they are using the terminal and automatically log them out when they leave. Several solutions are based on user proximity, but these are insufficient: they confirm whether the user is nearby but not whether the user is actually using the terminal. Other proposed solutions based on behavioral biometrics (e.g., keystroke dynamics) may not be reliable, as a recent study suggests.

To address this problem, Shrirang Mare, a Dartmouth computer science Ph.D. student, developed an approach called Zero-Effort Bilateral Recurring Authentication, or ZEBRA. In ZEBRA, a user wears a bracelet with a built-in accelerometer, gyroscope and radio on his or her dominant wrist; such bracelets are commonly sold as fitness devices. When the user interacts with a computer terminal, the bracelet records the wrist movement, processes it and sends it to the terminal. The terminal compares the wrist movement with the inputs it receives from the user via keyboard and mouse and confirms the continued presence of the user only if they correlate. Because the bracelet is on the same hand that provides inputs to the terminal, the accelerometer and gyroscope data and input events received by the terminal should correlate because their source is the same – the user's hand movement.

In experiments, ZEBRA performed continuous authentication with 85 percent accuracy in verifying the correct user and identified all adversaries within 11 seconds. For a different threshold that trades security for usability, ZEBRA correctly verified 90 percent of users and identified all adversaries within 50 seconds. Thus, ZEBRA can recognize (in under a minute) when an unauthorized person steps in to use the terminal if the original user has stepped away from the terminal. This kind of quick reaction can prevent mistakes – such as clinical staff accidentally entering information into the wrong patient's medical record – or inappropriate behavior, such as a bystander examining personal medical information or financial data by taking advantage of a computer left open by an authorized user.

"In this work, we focused on the deauthentication problem for desktop computers because we were motivated by associated problems faced by healthcare professionals in hospitals," says the study's senior author Professor David Kotz. "It would be natural to extend ZEBRA to mobile devices, such as smartphones or tablet computers, and we believe this is possible despite some different challenges."

In principle, ZEBRA could also be extended to other devices such as TV remotes, game controllers or medical devices – any device where the user provides frequent inputs with his or her hand. For these devices, however, the application may be more for improving usability than security. For example, if the TV remote could identify who is holding it, it could provide personalized functionality, which could lead to a better user experience. Identifying who is using a particular medical device or sensor could help provide a secure user-attestation that is useful for healthcare professionals.

Source: http://dartmouth.edu/


  1. Hitoshi Anatomi Hitoshi Anatomi Japan says:

    Auto-authentication is what we cannot achieve with the passwords but we can so easily achieve with the likes of electronic tattoos and swallowed chips.

    We know that the function of having someone else login to our phone/tablet/PC on our behalf while we are unconscious is already realized by biometrics as shown in

    But with the likes of electronic tattoos and hypodermic or swallowed microchips, we can expect the third persons to login to our accounts on our behalf a bit more gently and silently.  The third persons would not have to behave very carefully not to wake us up.  All that they have to do is just placing our PC/tablet/phone in the vicinity of our unconscious bodies.  Then they would have a freehand over our accounts on our behalf.

    Some people, for whom convenience is the top priority, might regard this as a proof that the passwords have the fatal drawbacks.  I am, however, of the view that this tells us how critical it is to involve the confirmation of the users’ volition to make the login for identity authentication.

The opinions expressed here are the views of the writer and do not necessarily reflect the views and opinions of AZoSensors.com.

Tell Us What You Think

Do you have a review, update or anything you would like to add to this news story?

Leave your feedback
Your comment type
Azthena logo

AZoM.com powered by Azthena AI

Your AI Assistant finding answers from trusted AZoM content

Azthena logo with the word Azthena

Your AI Powered Scientific Assistant

Hi, I'm Azthena, you can trust me to find commercial scientific answers from AZoNetwork.com.

A few things you need to know before we start. Please read and accept to continue.

  • Use of “Azthena” is subject to the terms and conditions of use as set out by OpenAI.
  • Content provided on any AZoNetwork sites are subject to the site Terms & Conditions and Privacy Policy.
  • Large Language Models can make mistakes. Consider checking important information.

Great. Ask your question.

While we only use edited and approved content for Azthena answers, it may on occasions provide incorrect responses. Please confirm any data provided with the related suppliers or authors. We do not provide medical advice, if you search for medical information you must always consult a medical professional before acting on any information provided.

Your questions, but not your email details will be shared with OpenAI and retained for 30 days in accordance with their privacy principles.

Please do not ask questions that use sensitive or confidential information.

Read the full Terms & Conditions.