Dartmouth Researchers Design Bracelet to Strengthen Health IT Security

Sept. 24, 2014
A bracelet designed by Dartmouth University researchers could prove to be a big step for securing critical information systems, such as medical records in clinical settings.

A bracelet designed by Dartmouth University researchers could prove to be a big step for securing critical information systems, such as medical records in clinical settings.

The new approach to computer security aims to authenticate users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal.

Shrirang Mare, a Dartmouth computer science Ph.D. student, developed an approach called Zero-Effort Bilateral Recurring Authentication (ZEBRA). In ZEBRA, a user wears a bracelet with a built-in accelerometer, gyroscope and radio on his or her dominant wrist; such bracelets are commonly sold as fitness devices. When the user interacts with a computer terminal, the bracelet records the wrist movement, processes it and sends it to the terminal. The terminal compares the wrist movement with the inputs it receives from the user via keyboard and mouse and confirms the continued presence of the user only if they correlate. Because the bracelet is on the same hand that provides inputs to the terminal, the accelerometer and gyroscope data and input events received by the terminal should correlate because their source is the same—the user's hand movement.

In experiments, ZEBRA performed continuous authentication with 85 percent accuracy in verifying the correct user and identified all adversaries within 11 seconds, Dartmouth officials reported. For a different threshold that trades security for usability, ZEBRA correctly verified 90 percent of users and identified all adversaries within 50 seconds.

Thus, ZEBRA can recognize (in under a minute) when an unauthorized person steps in to use the terminal if the original user has stepped away from the terminal. This kind of quick reaction can prevent mistakes—such as clinical staff accidentally entering information into the wrong patient's medical record—or inappropriate behavior, such as a bystander examining personal medical information or financial data by taking advantage of a computer left open by an authorized user, the report’s authors concluded.

“In this work, we focused on the deauthentication problem for desktop computers because we were motivated by associated problems faced by healthcare professionals in hospitals,” senior study author David Kotz, said in a statement.

Common authentication methods based on passwords, tokens or fingerprints perform one-time authentication and rely on users to log out from the computer terminal when they leave. But users often do not log out, which is a security risk. The most common solution, inactivity timeouts, inevitably fail security (too long a timeout) or usability (too short a timeout) goals, the study’s authors said.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...