Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems
Title | Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Cai, H., Yun, T., Hester, J., Venkatasubramanian, K. K. |
Conference Name | 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW) |
Keywords | Amulet platform, Base stations, Batteries, Biomedical monitoring, Data-driven security solution, data-driven security solutions, Electrocardiography, feature extraction, Human Behavior, Internet of Things, privacy, pubcrawl, resilience, Resiliency, Resource constrained, resource-constrained wearable IoT systems, Scalability, security, security of data, sensor-hijacking attacks, Training, wearable Internet-of-Things, Wearable IoT, wearables security, WIoT environments |
Abstract | Wearable Internet-of-Things (WIoT) environments have demonstrated great potential in a broad range of applications in healthcare and well-being. Security is essential for WIoT environments. Lack of security in WIoTs not only harms user privacy, but may also harm the user's safety. Though devices in the WIoT can be attacked in many ways, in this paper we focus on adversaries who mount what we call sensor-hijacking attacks, which prevent the constituent medical devices from accurately collecting and reporting the user's health state (e.g., reporting old or wrong physiological measurements). In this paper we outline some of our experiences in implementing a data-driven security solution for detecting sensor-hijacking attack on a secure wearable internet-of-things (WIoT) base station called the Amulet. Given the limited capabilities (computation, memory, battery power) of the Amulet platform, implementing such a security solution is quite challenging and presents several trade-offs with respect to detection accuracy and resources requirements. We conclude the paper with a list of insights into what capabilities constrained WIoT platforms should provide developers so as to make the inclusion of data-driven security primitives in such systems. |
URL | https://ieeexplore.ieee.org/document/7979817/ |
DOI | 10.1109/ICDCSW.2017.15 |
Citation Key | cai_deploying_2017 |
- resilience
- WIoT environments
- wearables security
- Wearable IoT
- wearable Internet-of-Things
- Training
- sensor-hijacking attacks
- security of data
- security
- Scalability
- resource-constrained wearable IoT systems
- Resource constrained
- Resiliency
- Amulet platform
- pubcrawl
- privacy
- Internet of Things
- Human behavior
- feature extraction
- Electrocardiography
- data-driven security solutions
- Data-driven security solution
- Biomedical monitoring
- batteries
- Base stations