Encryption-based Security in Wearable Devices

被引:1
作者
Budzik, Adriano [1 ]
Srivastava, Gautam [1 ]
Baza, Mohamed [2 ]
机构
[1] Brandon Univ, Dept Math & Comp Sci, Brandon, MB, Canada
[2] Coll Charleston, Dept Comp Sci, Charleston, SC 29401 USA
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
关键词
wearable devices; security; encryption;
D O I
10.1109/CCNC51644.2023.10059824
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wearable devices have become common accessories used in tracking fitness data or augmenting daily smartphone usage. However, not all manufacturers of inexpensive wearable devices have done sufficient work to protect the privacy of their users. Some devices have shown vulnerabilities that allow attackers to obtain data stored on a locked device. In this paper, we examine using ASCON, a set of lightweight cryptographic algorithms, to enhance security of wearable devices by encrypting locally stored data.
引用
收藏
页数:6
相关论文
共 16 条
[1]  
Amiri W. A., 2020, CONSUM COMM NETWORK, P1, DOI DOI 10.1109/ccnc46108.2020.9045674
[2]  
Baza M., 2020, Connected and Autonomous Vehicles in Smart Cities
[3]  
Baza M., 2021, IEEE T VEHICULAR TEC
[4]  
Baza M., 2020, PROC IEEE 91TH VEHIC
[5]   A Blockchain-based Energy Trading Scheme for Electric Vehicles [J].
Baza, Mohamed ;
Amer, Ramy ;
Rasheed, Amar ;
Srivastava, Gautam ;
Mahmoud, Mohamed ;
Alasmary, Waleed .
2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,
[6]   B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain [J].
Baza, Mohamed ;
Lasla, Noureddine ;
Mahmoud, Mohamed M. E. A. ;
Srivastava, Gautam ;
Abdallah, Mohamed .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02) :1214-1229
[7]   Lightweight Cryptography: A Solution to Secure IoT [J].
Dhanda, Sumit Singh ;
Singh, Brahmjit ;
Jindal, Poonam .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (03) :1947-1980
[8]   Is the data on your wearable device secure? An Android Wear smartwatch case study [J].
Do, Quang ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
SOFTWARE-PRACTICE & EXPERIENCE, 2017, 47 (03) :391-403
[9]  
Dobraunig C., 2016, Ascon v1. 2. Submission to the CAESAR Competition
[10]   Static analysis for discovering IoT vulnerabilities [J].
Ferrara, Pietro ;
Mandal, Amit Kr ;
Cortesi, Agostino ;
Spoto, Fausto .
INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (01) :71-88