Philadelphia Live News

collapse
Home / Daily News Analysis / Earbud sensors can authenticate users by their heartbeat, study finds

Earbud sensors can authenticate users by their heartbeat, study finds

May 24, 2026  Twila Rosenbaum  5 views
Earbud sensors can authenticate users by their heartbeat, study finds

In an era where digital security increasingly relies on biometrics, a new study presents a novel method: using the wearer's own heartbeat as a continuous authentication signal. Researchers have built a system called AccLock that identifies a person by the tiny vibrations their heartbeat creates inside the ear canal. The signal comes from an accelerometer—a sensor already present in many wireless earbuds—eliminating the need for additional hardware. The goal is to keep verifying that the person wearing the device is the legitimate user long after the initial unlock, addressing a persistent weakness in current security models.

How AccLock Works

Each heartbeat sends a small mechanical pulse through the body. In the ear, that pulse manifests as a ballistocardiogram (BCG) signal, which an accelerometer can detect. AccLock processes the raw motion data, filters out noise, and extracts features tied to the wearer’s cardiac pattern. These features are then compared to a registered template. If the match is close enough, the session remains trusted; if it drifts, the session is revoked.

The registration process requires about six minutes of sitting still, though the team reports usable accuracy with as little as two minutes of enrollment data. Each authentication decision uses a four-second window, with a sliding step that updates the trust state roughly every half second. This fast refresh rate is essential for continuous authentication: if the earbud is removed or the user changes, the system can respond within seconds.

Reported Accuracy and Testing

The headline numbers from a 33-person study are promising. Across various conditions—sitting, lying down, light head movement, and even loud music playback—AccLock kept error rates in the low single digits (around 3% equal error rate). The system performed consistently across older and younger users, men and women, and individuals with common heart conditions such as bradycardia, tachycardia, coronary heart disease, and premature beats.

The most critical test for security was the handoff scenario: when the legitimate wearer removes the earbud and someone else puts it on. AccLock caught the handoff within a few seconds in almost every trial. This demonstrates the core value of continuous biometric authentication—preventing session hijacking after initial access is granted.

Where It Struggles

While AccLock works well for stationary activities like desk work, its performance degrades with movement. Walking noticeably reduced accuracy, and running broke the system almost completely. Talking also caused problems because jaw motion and shifting contact with the ear produce vibrations in the same frequency range as the heartbeat. The team found that including some talking samples during enrollment helped recover part of that loss, but not entirely.

Long-term drift is another concern. Accuracy held steady for about six weeks but started slipping by week eight. The authors attribute this to gradual changes in earbud fit, posture, and user behavior. They propose a background refresh routine using high-confidence samples to keep the profile current, but the study only ran for two months. What happens at six months or a year remains unknown.

A small subset of users consistently produced worse results than others, likely due to anatomical differences affecting how the earbud sits in the ear. Until this gap can be addressed, any deployment would need a fallback method for individuals the system cannot read accurately.

The Hardware Limitation

The prototype used a custom 3D-printed earbud with a standard commercial accelerometer sampling at 100 Hz. This sampling rate is critical because the BCG signal contains fine details that require decent temporal resolution. However, current consumer earbuds—like Apple AirPods—only expose heavily downsampled motion data to third‑party developers, typically around 25 Hz. The team managed to get AccLock running on AirPods by using a lightweight retraining step, but error rates roughly doubled, from about 3% to 7%. This is still workable for some applications, but it depends entirely on whether vendors choose to expose raw accelerometer data to developers.

Spoof Resistance and Security Considerations

Most consumer biometrics—face, voice, fingerprints—are vulnerable to well-known spoofing attacks using photos, deepfake audio, videos, or silicone replicas. A BCG signal is harder to capture from a distance and harder to replay because it arises from the wearer’s own cardiac mechanics inside the ear canal. The researchers emphasize this physiological origin as the basis for spoof resistance.

However, it is important to note what was not tested. The 33-person study did not evaluate active adversaries attempting to inject vibrations, replay a captured BCG stream, or reconstruct a target’s cardiac signature from other sensor data (e.g., from a smartwatch). Continuous biometric streaming over Bluetooth Low Energy (BLE) also raises privacy concerns that the paper does not address. Any production deployment would need a thorough security and privacy review.

The Persistent Problem of Session Hijacking

The fundamental flaw in most biometric login systems is that they authenticate the user only once, at the start of a session, and then trust never expires. An attacker who grabs an unlocked phone, unlocked workstation, or unlocked earbud inherits all access. Passive biometrics that run quietly in the background cost the user nothing and can revoke trust the moment the wearer changes. AccLock is one of the first published designs to achieve this using a sensor that already ships in mainstream earbuds, without requiring any speaker output or user action.

The accuracy numbers are competitive with other passive biometric proposals (e.g., gait analysis, EEG, or photoplethysmography from wearables), the energy overhead is small, and the failure modes are documented. Whether this technology ever reaches a shipping product depends largely on whether earbud vendors decide to expose raw accelerometer data to developers—something they currently do not offer.

For now, AccLock serves as a useful data point on where continuous authentication research is heading: away from explicit gestures and shared secrets, toward signals the body produces on its own. Future work will likely focus on improving robustness to movement, addressing anatomical variability, and hardening the system against adversarial attacks.


Source: Help Net Security News


Share:

Your experience on this site will be improved by allowing cookies Cookie Policy