skip to main content
10.1145/2897035.2897038acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Imposing security awareness on wearables

Published:14 May 2016Publication History

ABSTRACT

Bluetooth reliant devices are increasingly proliferating into various industry and consumer sectors as part of a burgeoning wearable market that adds convenience and awareness to everyday life. Relying primarily on a constantly changing hop pattern to reduce data sniffing during transmission, wearable devices routinely disconnect and reconnect with their base station (typically a cell phone), causing a connection repair each time. These connection repairs allow an adversary to determine what local wearable devices are communicating to what base stations. In addition, data transmitted to a base station as part of a wearable app may be forwarded onward to an awaiting web API even if the base station is in an insecure environment (e.g. a public Wi-Fi). In this paper, we introduce an approach to increase the security and privacy associated with using wearable devices by imposing transmission changes given situational awareness of the base station. These changes are asserted via policy rules based on the sensor information from the wearable devices collected and aggregated by the base system. The rules are housed in an application on the base station that adapts the base station to a state in which it prevents data from being transmitted by the wearable devices without disconnecting the devices. The policies can be updated manually or through an over the air update as determined by the user.

References

  1. http://www.idc.com/getdoc.jsp?containerId=prUS25519615Google ScholarGoogle Scholar
  2. Hunt, A. 2015. Experts: Wearable tech tests our privacy limits. The Cincinnati Enquirer, (Feb. 5, 2015).Google ScholarGoogle Scholar
  3. Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. 2012. Android Permissions: User Attention, Comprehension, and Behavior. In Symp. on Usable Privacy and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Egelman, S., Kannavara, R., and Chow, R. 2015. Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. In CHI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lin, J., Amini, S., Hong, J., Sadeh, N., Lindqvist, J., and Zhang, J. 2012. Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy through Crowdsourcing. In Ubicomp. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Harbach, M., Zezschwitz, E. v., Fichtner, A., Luca, A. D., and Smith, M. 2014. It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception. In Symp. on Usable Privacy and Security, pp. 213--230.Google ScholarGoogle Scholar
  7. Ashford, W. 2015. IoT benefits and privacy not mutually exclusive, says industry expert. ComputerWeekly.com. (April 30, 2015).Google ScholarGoogle Scholar
  8. Liu, X., Zhou, Z., Diao, W., Li, Z., and Zhang, K. 2015. When Good Becomes Evil: Keystroke Inference with Smartwatch. In 22nd ACM SIGSAC Conf. on Computer and Communications Security, pp. 1273--1285. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Wang, H., Lai, T. T.-T., and Choudhury, R. R. 2015. MoLe: Motion Leaks through Smartwatch Sensors. In 21st Annual Int'l Conference on Mobile Computing and Networking, pp. 155--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lin, J., Liu, B., Sadeh, N., and Hong, J. 2014. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In Symp. On Usable Privacy & Sec.Google ScholarGoogle Scholar
  11. An Architectural Blueprint for Autonomic Computing, IBM, 2006Google ScholarGoogle Scholar
  12. Akpakpan, N. 2013. Bluetooth Medical Devices: Moving from Passive to Connected Health, HIT Consultant.Google ScholarGoogle Scholar
  13. https://www.nymi.comGoogle ScholarGoogle Scholar
  14. Bluetooth Special Interest Group, Core Version 4.2, 2014.Google ScholarGoogle Scholar
  15. https://lacklustre.net/projects/crackle/Google ScholarGoogle Scholar
  16. Ryan, M. 2013. Bluetooth: with low energy comes low security. In 7th USENIX conference on Offensive Technologies. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Pan, X., Ling, Z., Pingley, A., Yu, W., Zhang, N., and Fu, X. 2012. How privacy leaks from Bluetooth mouse? In ACM Conference on Computer and Communications Security, pp. 1013--1015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Diallo, A., Al-Khateeb, W., Olanrewaju, R., and Sado, F. 2014. A Secure Authentication Scheme for Bluetooth Connection. In Int'l Conf. Computer and Communication Eng., pp.60--63 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Oka, D., Furue, T., Langenhop, L., and Nishimura, T. 2014. Survey of Vehicle IoT Bluetooth Devices, In 7th Int'l Conf. on Service-Oriented Computing and Applications, pp. 260--264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Available at - https://play.google.com/store/apps/details?id=com.tecit.datareader.android.getblue.fullGoogle ScholarGoogle Scholar
  21. Li, Q., Cao, G., and Porta, T. 2014. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing. IEEE Transactions on Dependable and Secure Computing, 11(2), 115--129. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Hong, J. 2015. Research Issues for Privacy in a Ubiquitously Connected World, NITRD Research Strategy on Privacy.Google ScholarGoogle Scholar
  23. MbientLab, "MetaWear API Documentation," Accessed March 1, 2015. Available: http://docs.mbientlab.com/.Google ScholarGoogle Scholar
  24. Hale, M., Lofty, K., Gamble, R., Walter, C., and Lin, J. 2014. Developing a platform to evaluate the security of wearable devices. In Int'l Conf. on Mobile Systems.Google ScholarGoogle Scholar

Index Terms

  1. Imposing security awareness on wearables

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SEsCPS '16: Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems
        May 2016
        71 pages
        ISBN:9781450341714
        DOI:10.1145/2897035

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 May 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Upcoming Conference

        ICSE 2025

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader