On the security of consumer wearable devices in the Internet of Things

Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.

[1]  Matjaz B. Juric,et al.  Inertial Sensor-Based Gait Recognition: A Review , 2015, Sensors.

[2]  P. Silburn,et al.  Wearable Sensor Use for Assessing Standing Balance and Walking Stability in People with Parkinson’s Disease: A Systematic Review , 2015, PloS one.

[3]  Adrian Burns,et al.  SHIMMER™ – A Wireless Sensor Platform for Noninvasive Biomedical Research , 2010, IEEE Sensors Journal.

[4]  Ryan J. Halter,et al.  A wearable system that knows who wears it , 2014, MobiSys.

[5]  Dominik Merli,et al.  Physical unclonable functions: devices for cryptostorage , 2013, TrustED '13.

[6]  Prem C. Pandey,et al.  A wearable inertial sensing device for fall detection and motion tracking , 2013, 2013 Annual IEEE India Conference (INDICON).

[7]  M. Porfiri,et al.  Gait Detection in Children with and without Hemiplegia Using Single-Axis Wearable Gyroscopes , 2013, PloS one.

[8]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[9]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[10]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[11]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[12]  Begonya Garcia-Zapirain,et al.  Gait Analysis Methods: An Overview of Wearable and Non-Wearable Systems, Highlighting Clinical Applications , 2014, Sensors.

[13]  Martin Boesgaard,et al.  Rabbit: A New High-Performance Stream Cipher , 2003, FSE.

[14]  Anirban Mahanti,et al.  Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case , 2016, ACNS.

[15]  Nahid Farhady Ghalaty,et al.  Digital fingerprints for low-cost platforms using MEMS sensors , 2013, WESS '13.

[16]  Anirban Mahanti,et al.  Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case , 2014, ArXiv.

[17]  Adeel Anjum,et al.  Innovative Solutions for Access Control Management , 2016 .

[18]  L. Piwek,et al.  The Rise of Consumer Health Wearables: Promises and Barriers , 2016, PLoS medicine.

[19]  Ramesh Karri,et al.  Sensor physical unclonable functions , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[20]  William E. Burr,et al.  Recommendation for Password-Based Key Derivation Part 1: Storage Applications , 2010 .

[21]  Charles E. Loeffler Detecting Gunshots Using Wearable Accelerometers , 2014, PloS one.

[22]  Gary Steri,et al.  Experimental Identification of Smartphones Using Fingerprints of Built-In Micro-Electro Mechanical Systems (MEMS) , 2016, Sensors.

[23]  R. Pappu,et al.  Physical One-Way Functions , 2002, Science.

[24]  Sherali Zeadally,et al.  Toward self-authenticable wearable devices , 2015, IEEE Wireless Communications.

[25]  Gabi Nakibly,et al.  Mobile Device Identification via Sensor Fingerprinting , 2014, ArXiv.

[26]  Wenyuan Xu,et al.  AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.

[27]  Imran Rashid,et al.  ICMetric-Based Secure Communication , 2016 .

[28]  Klaus D. McDonald-Maier,et al.  Securing Health Sensing Using Integrated Circuit Metric , 2015, Sensors.

[29]  John Lindstroem,et al.  Security challenges for wearable computing - a case study , 2007 .