Researchers from CSIRO’s Data61 have developed new technology which uses the way a person walks, their gait, to power wearable devices. The technology also has the potential to be used as a new authentication method, which could replace passwords, pins or fingerprints.
Rather than looking at an individual’s unique movements as a form of authentication, researchers at CSIRO’s Data61 have developed a prototype wearable device to capture how an individual’s unique energy generation pattern can be used as a form of authentication.
Small sensors called accelerometers can currently be used to capture an individual’s gait in terms of motion and velocity. However, this reduces the battery life of wearable devices and has prevented gait authentication from becoming more widely adopted.
Researchers from CSIRO’s Data61 have overcome this by combining gait recognition with a technique called kinetic energy harvesting (KEH), which translates a person’s motion into electrical energy and improves battery life.
“By applying both techniques we have developed a way to achieve two goals at once – powering devices and the ability to verify a person’s identity using a wearable device by capturing the energy generated from the way they walk,” Researcher at Data61 Sara Khalifa said.
To test how secure KEH gait authentication is, the researchers conducted a trial on 20 users. Data was collected from each user using two different settings from various environments. Users walked in several environments including indoor on carpet and outdoor on grass and asphalt terrains to capture the natural gait changes over time and surfaces.
The trial showed that KEH-Gait can achieve an authentication accuracy of 95 per cent and reduce energy consumption by 78 per cent, compared to conventional accelerometer-based authentication techniques.
The KEH-Gait system was also tested against ‘attackers’ who attempted to imitate an individual’s motions. The analysis found only 13 out of 100 imposter trials were wrongfully accepted by the system as genuine trials.
Group Leader of the Networks Research Group at Data61 Professor Dali Kafaar said there were benefits to the KEH-Gait approach compared to passwords, pins, signatures and finger prints.
“Firstly, it is convenient because as we walk around each day our gait can be sampled continuously and verified without us having to manually adjust anything,” Professor Kafaar said.
“Secondly, it’s more secure than passwords because the way we walk is difficult to mimic. Since the KEH-gait keeps authenticating the user continuously, it collects a significant amount of information about our movements, making it difficult to imitate or hack unlike guessing passwords or pin codes.”
Wearable technology presents an opportunity to explore new authentication methods based on our movements.
“With many of us already tracking our health using wearable devices there is a great opportunity to explore new authentication methods based on our movements,” Professor Kafaar said.
The market wearable devices is booming. According to a recent report, about 55 per cent of Australians own one and the global market for personable wearable devices is expected to reach US$150-billion by 2026.
Alongside KEH-Gait sampling, CSIRO’s Data61’s privacy and authentication research team is exploring other more secure and implicit continuous authentication techniques such as unique breathing patterns and distinctive behavioural biometrics from the way users innately interact with their devices.
Learn more:Using your gait to power and secure devices
The Latest on: Continuous authentication techniques
Bracing for Tomorrow's Threats with Behavioral Analytics
on April 19, 2018 at 5:12 am
This can be seen with the recent explosion of cryptocurrencies, attackers capitalized on this new-found revenue source by quickly inventing Monero-specific techniques focused ... enhances visibility through continuous network monitoring and increases ... […]
6 Ways AI Is Improving the Digital Workplace
on April 13, 2018 at 5:18 am
As AI takes on more of the work we do, continuous learning and a willingness to develop ... secure and transparent recognition, authentication and access management capabilities,” George Brostoff, CEO of SensibleVision, said. He explained that one ... […]
Farm management software market illuminated by new report
on April 10, 2018 at 11:19 pm
Continuous technological ... the multi-factor authentication market are significantly focusing on strategic mergers and acquisitions for deeper geographical penetration. The report also implements primary and secondary research techniques for gathering ... […]
Advanced Authentication Market is expected to reach a USD 7 Billion by Forecast to 2023
on March 22, 2018 at 7:19 am
Nowadays, cyber-criminal activities are increasing such as hacking of identity badges, and numeric pins, resulted in developing authentication techniques such as OTP (one-time password) authentication, phone-based authentication, and biometrics. […]
SecureAuth Reveals First-Ever Adaptive and Continuous Authentication Product Using Behavioral Biometric Technology
on February 23, 2016 at 3:59 pm
In a world where threats are constant, behavioral biometrics provide continuous authentication that is 97 ... the current state of the industry and how advanced adaptive authentication techniques like behavioral biometrics can help protect an ... […]
via Google News and Bing News