44 research outputs found

    Authentication in systems with limited input capabilities

    Get PDF
    The popularity of smart devices—whether hand-held, wearable, or deployed in an environment—has risen sharply in recent years. Users want convenient, remote access on multiple devices to a multitude of services, from sending emails, to administering their smart home, to making mobile payments. These devices typically lack traditional input capabilities, such as a mouse and a keyboard, and their small form factor limits the ways in which users can interact with them. This presents new challenges for user authentication. Smart devices do, however, offer other sensors that can be leveraged to authenticate the user in non-standard ways. In particular, behavioural biometrics, such as gait and keystroke dynamics, which had once been rendered impractical before ubiquitous sensors became readily available, now present promising opportunities to authenticate users continuously without requiring any effort from the user. Smart devices also facilitate new forms of automatic de-authentication and mutual authentication in scenarios that were previously implausible. In this thesis, we focus primarily on the use of inertial sensors and the context of mobile payments. First, as mobile payment applications have become available on smartwatches, we show that inertial sensors on a smartwatch can be used to authenticate the user as he makes a payment. Furthermore, we perform gesture recognition on wrist motion data to infer whether such a payment was intentional (as opposed to accidental or as part of a relay attack). Second, motivated by a device with even fewer input capabilities, we explore the use of inertial sensors on a smart ring for authentication purposes. We demonstrate that finger (or wrist) motion data can be used to authenticate payments made with either a smartwatch or a smart ring and we show that the data can also be used to authenticate the user when knocking on a door for access control purposes. Third, we show that inertial sensors embedded in the handle of an electric vehicle charger can be used to authenticate the wielder and reduce the number of times that he is required to authorise a charging session manually on his smartphone. Last, motivated by the threats posed by malicious payment terminals and the growing need for specialised hardware, we design and evaluate a novel mobile payment system that uses a visual channel to achieve mutual authentication between a user and a generic terminal, where the terminal authenticates itself to the user before the user is asked to reveal any secret information

    A capability-oriented approach to assessing privacy risk in smart home ecosystems

    Get PDF
    Smart devices are increasingly ubiquitous; the multitude of risks they pose to user privacy continues to grow, but assessing such risks has proven difficult. In this paper, we discuss three factors which complicate the assessment of privacy risks in the context of the smart home. Firstly, smart devices are highly heterogeneous and hard to categorise, so top-down, taxonomy-oriented approaches to risk assessment do not fit well. Secondly, the threat landscape is vast, varied, and growing. Thirdly, the chief asset, personal information, is difficult to value-especially given that its value can be hugely affected by aggregation. To address these factors, we propose a novel, bottom-up approach in which the smart home ecosystem is reduced to its data-collecting capabilities (such as sensors and apps) and then privacy risk is assessed based on the information that the user exposes. We define a capability-oriented model which is system-neutral, extensible, and therefore well-suited to the fast-evolving nature of the smart home

    The effect of neoadjuvant chemotherapy and chemoradiotherapy on exercise capacity and outcome following upper gastrointestinal cancer surgery: an observational cohort study

    Get PDF
    Background: In 2014 approximately 21,200 patients were diagnosed with oesophageal and gastric cancer in England and Wales, of whom 37 % underwent planned curative treatments. Potentially curative surgical resection is associated with significant morbidity and mortality. For operable locally advanced disease, neoadjuvant chemotherapy (NAC) improves survival over surgery alone. However, NAC carries the risk of toxicity and is associated with a decrease in physical fitness, which may in turn influence subsequent clinical outcome. Lower levels of physical fitness are associated with worse outcome following major surgery in general and Upper Gastrointestinal Surgery (UGI) surgery in particular. Cardiopulmonary exercise testing (CPET) provides an objective assessment of physical fitness. The aim of this study is to test the hypothesis that NAC prior to upper gastrointestinal cancer surgery is associated with a decrease in physical fitness and that the magnitude of the change in physical fitness will predict mortality 1 year following surgery.Methods: This study is a multi-centre, prospective, blinded, observational cohort study of participants with oesophageal and gastric cancer scheduled for neoadjuvant cancer treatment (chemo- and chemoradiotherapy) and surgery. The primary endpoints are physical fitness (oxygen uptake at lactate threshold measured using CPET) and 1-year mortality following surgery; secondary endpoints include post-operative morbidity (Post-Operative Morbidity Survey (POMS)) 5 days after surgery and patient related quality of life (EQ-5D-5 L).Discussion: The principal benefits of this study, if the underlying hypothesis is correct, will be to facilitate better selection of treatments (e.g. NAC, Surgery) in patients with oesophageal or gastric cancer. It may also be possible to develop new treatments to reduce the effects of neoadjuvant cancer treatment on physical fitness. These results will contribute to the design of a large, multi-centre trial to determine whether an in-hospital exercise-training programme that increases physical fitness leads to improved overall survival.<br/

    Human Immunity and the Design of Multi-Component, Single Target Vaccines

    Get PDF
    BACKGROUND: Inclusion of multiple immunogens to target a single organism is a strategy being pursued for many experimental vaccines, especially where it is difficult to generate a strongly protective response from a single immunogen. Although there are many human vaccines that contain multiple defined immunogens, in almost every case each component targets a different pathogen. As a consequence, there is little practical experience for deciding where the increased complexity of vaccines with multiple defined immunogens vaccines targeting single pathogens will be justifiable. METHODOLOGY/PRINCIPAL FINDINGS: A mathematical model, with immunogenicity parameters derived from a database of human responses to established vaccines, was used to predict the increase in the efficacy and the proportion of the population protected resulting from addition of further immunogens. The gains depended on the relative protection and the range of responses in the population to each immunogen and also to the correlation of the responses between immunogens. In most scenarios modeled, the gain in overall efficacy obtained by adding more immunogens was comparable to gains obtained from a single immunogen through the use of better formulations or adjuvants. Multi-component single target vaccines were more effective at decreasing the proportion of poor responders than increasing the overall efficacy of the vaccine in a population. CONCLUSIONS/SIGNIFICANCE: Inclusion of limited number of antigens in a vaccine aimed at targeting a single organism will increase efficacy, but the gains are relatively modest and for a practical vaccine there are constraints that are likely to limit multi-component single target vaccines to a small number of key antigens. The model predicts that this type of vaccine will be most useful where the critical issue is the reduction in proportion of poor responders

    Inferring user height and improving impersonation attacks in mobile payments using a smartwatch

    No full text
    In this paper, we show that as a user makes mobile payments with a smartwatch, the height of the user can be inferred purely from inertial sensor data captured on the watch (with R 2 scores of up to 0.77). Besides unwanted information exposure, we also show that users of a similar height are more difficult to distinguish between in terms of their tap gesture data and that an attacker who chooses a victim of a similar height can improve the success chance of impersonation (by increasing the false acceptance rate by up to 20.6%)

    CableAuth: a biometric second factor authentication scheme for electric vehicle charging

    No full text
    Electric vehicle charging sessions can be authorised in different ways, ranging from smartphone applications to smart cards with unique identifiers that link the electric vehicle to the charging station. However, these methods do not provide strong authentication guarantees. In this paper, we propose a novel second factor authentication scheme to tackle this problem. We show that by using inertial sensor data collected from IMU sensors either embedded in the handle of the charging cable or on a separate smartwatch, users can be authenticated implicitly by behavioural biometrics as they unhook the cable from the charging station and plug it into their car at the start of a charging session. To validate the system, we conducted a user study (n=20) to collect data and we developed a suite of authentication models for which we achieve EERs of 0.06

    WatchAuth: user authentication and intent recognition in mobile payments using a smartwatch

    No full text
    In this paper, we show that the tap gesture, performed when a user ‘taps’ a smartwatch onto an NFC-enabled terminal to make a payment, is a biometric capable of implicitly authenticating the user and simultaneously recognising intent-to-pay. The proposed system can be deployed purely in software on the watch without requiring updates to payment terminals. It is agnostic to terminal type and position and the intent recognition portion does not require any training data from the user. To validate the system, we conduct a user study (n=16) to collect wrist motion data from users as they interact with payment terminals and to collect long-term data from a subset of them (n=9) as they perform daily activities. Based on this data, we identify optimum gesture parameters and develop authentication and intent recognition models, for which we achieve EERs of 0.08 and 0.04, respectively

    "Recreational use values for Victoria’s Parks"

    No full text
    Generalised travel-cost models were specified for the repeatable measurement of the economic value of recreation in Parks. Valuations of recreational use have been undertaken for approximately 30 metropolitan parks in Melbourne and 35 National Parks and other sites in rural Victoria. Zonal models were used and the distance ranges for each zone were set as variable parameters in a spreadsheet model. The distance from each postcode in Australia to the park was calculated using the longitude and latitude for the particular park, and for the centroid of each postcode. This specification enabled us to observe that the choice of distance ranges for each zone can have a substantial impact on the goodness of fit and on the implied level of consumer surplus per visit. The study has not been finalised and consequently few results are presented here. Nevertheless, the process of developing a generalised model and the preliminary results have caused the authors to be concerned about three aspects of travel-cost modelling, namely: 1. the allocation of consumer surplus between multiple destinations for those visitors who visited more than one destination during the trip that included the Park in question; 2. the choice of distance ranges for each postcode zone; and 3. the choice of functional form. Different approaches to each of these matters changes substantially the results obtained from the travel-cost modelling. The second aspect (distance ranges) appears not to have been addressed previously in the literature, and our approach to the first aspect (multiple destinations) may offer a new approach. Comments would be appreciated, particularly since this Study is yet to be completed. Readers are encouraged to email us: [email protected]
    corecore