Toward Predicting Secure Environments for Wearable Devices

Wearable devices have become more common for the average consumer. As devices need to operate with low power, many devices use simplified security measures to secure the data during transmission. While Bluetooth, the primary method of communication, includes certain security measures as part of the format, they are insufficient to fully secure the connection and the data transmitted. Users must be made aware of the potential security threats to the information communicated by the wearable, as well as be empowered and engaged to protect it. In this paper, we propose a method of identifying insecure environments through crowdsourced data, allowing wearable consumers to deploy an application on their base system (e.g., a smart phone) that alerts when in the presence of a security threat. We examine two different machine learning methods for classifying the environment and interacting with the users, as well as evaluating the potential uses for both algorithms.

[1]  Yan Wang,et al.  Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN , 2016, AsiaCCS.

[2]  Jason I. Hong,et al.  Research Issues for Privacy in a Ubiquitously Connected World , 2014 .

[3]  R. F. Olanrewaju,et al.  A Secure Authentication Scheme for Bluetooth Connection , 2014, 2014 International Conference on Computer and Communication Engineering.

[4]  Joshua Saxe,et al.  CrowdSource: Automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model , 2014, 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE).

[5]  Rose F. Gamble,et al.  Imposing Security Awareness on Wearables , 2016, 2016 IEEE/ACM 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS).

[6]  Iku Ohama,et al.  A machine learning approach for lighting perception analysis via crowdsourcing , 2015, UbiComp/ISWC Adjunct.

[7]  Xinwen Fu,et al.  How privacy leaks from bluetooth mouse? , 2012, CCS '12.

[8]  Md. Sumon Shahriar,et al.  Urban Sensing and Smart Home Energy Optimisations: A Machine Learning Approach , 2015, IoT-App@SenSys.

[9]  Yee Whye Teh,et al.  Bayesian nonparametric crowdsourcing , 2014, J. Mach. Learn. Res..

[10]  Nicholas D. Lane,et al.  An Early Resource Characterization of Deep Learning on Wearables, Smartphones and Internet-of-Things Devices , 2015, IoT-App@SenSys.

[11]  Wolfgang Nejdl,et al.  When in Doubt Ask the Crowd: Employing Crowdsourcing for Active Learning , 2014, WIMS '14.

[12]  Theodora A. Varvarigou,et al.  Heating schedule management approach through decentralized knowledge diffusion in the context of social internet of things , 2015, Panhellenic Conference on Informatics.

[13]  Mike Ryan,et al.  Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.

[14]  Jia Wang,et al.  DaDianNao: A Machine-Learning Supercomputer , 2014, 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture.