FB pixel

Do self-driving cars dream of authentication protocols?

Categories Industry Insights
 

This is a guest post by Jonas Lamis, VP of Marketing at Nok Nok Labs.

William Gibson is known for his quip, “The future is already here, it’s just not evenly distributed.”. From my house in Palo Alto, CA, you can see that future bright as day. Every 15 minutes or so, a funny looking electric two seater dome-car will hum by. I mean literally hum. They must have embedded some sort of hum generator in the cars because otherwise they would be quiet as a cockroach. It’s like a bug – VW Beetle specifically – and a Star Wars pod racer hooked up and produced the future of human transportation.

These Googlecars may need significant further testing before we summon them to ferry us around town, but it’s in the cards. Current projections have the first large scale self-driving projects rolling out to consumers in less than 5 years. Tesla, also a neighbor here in Palo Alto, already has 50,000 vehicles outfitted with level 3 autonomy capabilities in use by human drivers around the world, just with the autonomy curtailed.

One of the main problems facing autonomous cars is what’s called the Trolley Problem.

Watch: The Trolley Problem in 90 seconds

In our version of the problem, we ponder how the car decides which path to take when both options involve bad choices? Faced with either a sure collision with a pedestrian, or running off the road and over the cliff, which choice would the car make? Why did it make that choice? Is that choice congruent with the choice that the human passenger would want it to make? Or should it be congruent with the programmer’s ethical perspective? And importantly, how do we assure that the decisions made by the car are in fact the decisions that have been agreed to. How do we trust that the car has not been hacked and it’s driving behavior changed without the rider’s knowledge.

All sorts of connected devices will be “coming alive” in the next decade. And they will all face the risk of hacking and “artificial ethical corruption”. Robo-pets and prosthetics, juicers and toilet censors, vehicles of every kind. Appliances, HVAC, homes, buildings and cities. 10 years from now, many things we interact with will have artificial brains, and they’ll be doing their best to customize that interaction, personalize that result, or minimize the amount of cognitive load we humans will need to invest to get stuff done.

As artificial intelligence makes its way into human-oriented systems, the risks associated with hacking become more and more tangible. It’s one thing to have your password stolen and your credentials used to make purchases at Home Depot. It’s an entirely different threat model when a hacked autonomous car could kidnap your kid and hold him/her for bitcoin ransom at an unknown location.

With more automation comes the need for seamless, ambient two-way authentication. That robo-uber needs to know that it’s really me it is picking up. Likewise, I need to know that it is really the (uncorrupted) service that I am expecting.

There is no room for traditional passwords at each automated interaction, and the risk of untethered machine to machine decisionmaking is too great. Biometrics and other protocols that offer proof of identity, coupled with encryption methods that keep those identities off centralized servers offers the foundation upon which trust of our connected devices will be built.

At night when I turn out the lights, I can still hear the hum of those Googlecars as they cruise down my street. While I drift off to dream of a connected future, those cars seem to always be awake.

DISCLAIMER: BiometricUpdate.com blogs are submitted content. The views expressed in this blog are that of the author, and don’t necessarily reflect the views of BiometricUpdate.com.

Article Topics

 |   |   |   | 

Latest Biometrics News

 

Indonesia digital transformation gets boost from UNDP, National Economic Council

In Indonesia, the National Economic Council (DEN) and the United Nations Development Programme (UNDP) Indonesia have signed a Statement of…

 

Here comes the age check: BU Podcast talks age assurance with AVPA’s Iain Corby

 Like it or not, age assurance is going mainstream. As regulators in the UK and Europe begin enforcing new…

 

Keyless’ ‘Zero-Knowledge Biometrics’ enable crypto wallet to meet MFA requirements

Swiss-licensed crypto wallet Relai has integrated biometric authentication from Keyless for logins, account recovery and account deletion. Keyless’ privacy-preserving authentication…

 

CBP biometric expansion at US borders moves ahead with new global entry plans

As the Trump administration doubles down on biometric surveillance at U.S. borders, Customs and Border Protection (CBP) is preparing for…

 

New Oloid privacy architecture to protect enterprise biometrics unveiled

Many enterprises scrambling to adopt biometrics to defend against fraud are struggling to ensure regulatory compliance and the trust of…

 

Biometrics top consumer choice to fend off AI fraud in finance

Veriff’s latest “The Future of Finance” report reveals that online identity verification fraud in financial services has surged with the…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events