Skip to main content

WheelLogger: Driver Tracing Using Smart Watch

  • Conference paper
  • First Online:
Information Security Applications (WISA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10763))

Included in the following conference series:

  • 1134 Accesses

Abstract

Location-related data is one of the most sensitive data for user privacy. Theft of location-related information on mobile device poses serious threats to users. Even though the extant confirmation of permissions feature on modern smart devices can prevent direct leakage of information from location-related sensors, recent research has shown that leakage of location-related information is possible through indirect, side-channel attacks. In this paper, we show that the travel path of a vehicle can be inferred without acknowledging the user using a zero-permission smart watch application. The sensor we used in our experiment is the accelerometer sensor on Apple Watch. We find that a targeted user can be traced with 83% accuracy. We suggest that our approach may be used to successfully attack other smart phone devices because it was successful on Apple Watch, which is considered as the most constrained device in the market. This result shows that the zero-permission application on a smart watch, if manipulated adequately, can transform into a high-threat malware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Apple: API Reference: CMAccelerometerData. https://developer.apple.com/reference/coremotion/cmaccelerometerdata. Accessed 16 Aug 2016

  2. Berrut, J.-P., Trefethen, L.N.: Barycentric lagrange interpolation. SIAM Rev. 46(3), 501–517 (2004)

    Article  MathSciNet  Google Scholar 

  3. Halliday, D., Resnick, R., Walker, J.: Principles of Physics. Wiley, Hoboken (2011)

    MATH  Google Scholar 

  4. Hua, J., Shen, Z., Zhong, S.: We can track you if you take the metro: tracking metro riders using accelerometers on smartphones. arXiv:1505.05958 (2015)

  5. Fawaz, K., Shin, K.G.: Location privacy protection for smartphone users. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS 2014, pp. 239–250 (2014)

    Google Scholar 

  6. Maiti, A., Jadliwala, M., He, J., Bilogrevic, I.: (Smart)watch your taps: side-channel keystroke inference attacks using Smartwatches. In: The 2015 ACM International Symposium, pp. 27–30 (2015)

    Google Scholar 

  7. Michalevsky, Y., Boneh, D., Nakibly, G.: Gyrophone: recognizing speech from gyroscope signals. In: Proceedings of the 23rd USENIX Security Symposium (2014)

    Google Scholar 

  8. OpenStreetMap: OpenStreetMap Project. https://www.openstreetmap.org/. Accessed 16 Aug 2016

  9. Narain, S., Sanatinia, A., Noubir, G.: Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks (2014)

    Google Scholar 

  10. Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: Inferring user routes and locations using zero-permission mobile sensors. In: Symposium on Security and Privacy (2016)

    Google Scholar 

  11. Savitzky, A., Golay, M.J.E.: Smoothing and differentiation of data by simplified least squares procedures. In: Analytical chemistry, pp. 1627–1639 (1964)

    Article  Google Scholar 

  12. Senate Judiciary Committee: S.2270-Location Privacy Protection Act of 2015 (2015). https://www.congress.gov/bill/114th-congress/senate-bill/2270. Accessed 16 Aug 2016

  13. Stewart, J.: Calculus. Cengage Learning, Boston (2015)

    MATH  Google Scholar 

  14. Wang, H., Lai, T., Choudhury, R.R.: MoLe: motion leaks through smartwatch sensors. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (2015)

    Google Scholar 

  15. Michalevsky, Y., Schulman, A., Veerapandian, G.A., Boneh, D., Nakibly, G.: PowerSpy: location tracking using mobile device power analysis. In: Proceedings of the 24th USENIX Conference on Security Symposium, pp. 785–800, August 2015

    Google Scholar 

Download references

Acknowledgement

This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (R7117-17-0161, Anomaly detection framework for autonomous vehicles).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong Hoon Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Park, J.Y., Yun, J.P., Lee, D.H. (2018). WheelLogger: Driver Tracing Using Smart Watch. In: Kang, B., Kim, T. (eds) Information Security Applications. WISA 2017. Lecture Notes in Computer Science(), vol 10763. Springer, Cham. https://doi.org/10.1007/978-3-319-93563-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93563-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93562-1

  • Online ISBN: 978-3-319-93563-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics