Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems

Hang Cai, Tianlong Yun, Josiah Hester, Krishna K. Venkatasubramanian

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Wearable Internet-of-Things (WIoT) environments have demonstrated great potential in a broad range of applications in healthcare and well-being. Security is essential for WIoT environments. Lack of security in WIoTs not only harms user privacy, but may also harm the user's safety. Though devices in the WIoT can be attacked in many ways, in this paper we focus on adversaries who mount what we call sensor-hijacking attacks, which prevent the constituent medical devices from accurately collecting and reporting the user's health state (e.g., reporting old or wrong physiological measurements). In this paper we outline some of our experiences in implementing a data-driven security solution for detecting sensor-hijacking attack on a secure wearable internet-of-things (WIoT) base station called the Amulet. Given the limited capabilities (computation, memory, battery power) of the Amulet platform, implementing such a security solution is quite challenging and presents several trade-offs with respect to detection accuracy and resources requirements. We conclude the paper with a list of insights into what capabilities constrained WIoT platforms should provide developers so as to make the inclusion of data-driven security primitives in such systems.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE 37th International Conference on Distributed Computing Systems Workshops, ICDCSW 2017
EditorsJoao E. Ferreira, Teruo Higashino, Aibek Musaev
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages199-204
Number of pages6
ISBN (Electronic)9781538632925
DOIs
StatePublished - Jul 13 2017
Event37th IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2017 - Atlanta, United States
Duration: Jun 5 2017Jun 8 2017

Publication series

NameProceedings - IEEE 37th International Conference on Distributed Computing Systems Workshops, ICDCSW 2017

Other

Other37th IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2017
CountryUnited States
CityAtlanta
Period6/5/176/8/17

Keywords

  • Data-driven security solution
  • Resource constrained
  • Wearable IoT

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems

Fingerprint Dive into the research topics of 'Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems'. Together they form a unique fingerprint.

  • Cite this

    Cai, H., Yun, T., Hester, J., & Venkatasubramanian, K. K. (2017). Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems. In J. E. Ferreira, T. Higashino, & A. Musaev (Eds.), Proceedings - IEEE 37th International Conference on Distributed Computing Systems Workshops, ICDCSW 2017 (pp. 199-204). [7979817] (Proceedings - IEEE 37th International Conference on Distributed Computing Systems Workshops, ICDCSW 2017). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICDCSW.2017.15