Abstract

Although a reliable implementation of a smartwatch-based gait biometric system would usher in a new era of transparent authentication, the creation of such a system would not be without its own ethical problems. A primary problem of passwords is that users tend to reuse a small set of passwords (or, more realistically a single password; a primary responsibility (at least in the eyes of the commercial cybersecurity world) of biometrics is to replace these systems for that very reason (among others). The problem with an effective gait biometric system-much like many other forms of biometrics-is that once a user's training data is provided to the system that system can effectively impersonate that user; in essence, “reuse” is unavoidable. Thus, it becomes the responsibility of those designing gait biometric systems to create systems that are resistant to replay-style attacks. Similarly, work has to be done to ensure that the sensitive data collected from the smartwatch's sensors is not left in memory (where it could be recovered forensically or by a malicious application); much as traditional systems work to secure passwords. Gait biometrics might be the future of transparent authentication, but that does not allow conventional cybersecurity wisdom to be forgotten.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.