Encryption-based Security in Wearable Devices

被引:1
作者
Budzik, Adriano [1 ]
Srivastava, Gautam [1 ]
Baza, Mohamed [2 ]
机构
[1] Brandon Univ, Dept Math & Comp Sci, Brandon, MB, Canada
[2] Coll Charleston, Dept Comp Sci, Charleston, SC 29401 USA
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
关键词
wearable devices; security; encryption;
D O I
10.1109/CCNC51644.2023.10059824
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wearable devices have become common accessories used in tracking fitness data or augmenting daily smartphone usage. However, not all manufacturers of inexpensive wearable devices have done sufficient work to protect the privacy of their users. Some devices have shown vulnerabilities that allow attackers to obtain data stored on a locked device. In this paper, we examine using ASCON, a set of lightweight cryptographic algorithms, to enhance security of wearable devices by encrypting locally stored data.
引用
收藏
页数:6
相关论文
共 16 条
  • [1] Amiri W.A., 2020, 2020 IEEE 17 ANN CON, P1, DOI DOI 10.1109/CCNC46108.2020.9045674
  • [2] Baza M., 2020, CONNECTED AUTONOMOUS
  • [3] Baza M., 2021, IEEE T VEHICULAR TEC
  • [4] Baza M., 2020, PROC IEEE 91TH VEHIC
  • [5] A Blockchain-based Energy Trading Scheme for Electric Vehicles
    Baza, Mohamed
    Amer, Ramy
    Rasheed, Amar
    Srivastava, Gautam
    Mahmoud, Mohamed
    Alasmary, Waleed
    [J]. 2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,
  • [6] B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain
    Baza, Mohamed
    Lasla, Noureddine
    Mahmoud, Mohamed M. E. A.
    Srivastava, Gautam
    Abdallah, Mohamed
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1214 - 1229
  • [7] Lightweight Cryptography: A Solution to Secure IoT
    Dhanda, Sumit Singh
    Singh, Brahmjit
    Jindal, Poonam
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (03) : 1947 - 1980
  • [8] Is the data on your wearable device secure? An Android Wear smartwatch case study
    Do, Quang
    Martini, Ben
    Choo, Kim-Kwang Raymond
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2017, 47 (03) : 391 - 403
  • [9] Dobraunig C., 2016, Ascon v1. 2. Submission to the CAESAR Competition
  • [10] Static analysis for discovering IoT vulnerabilities
    Ferrara, Pietro
    Mandal, Amit Kr
    Cortesi, Agostino
    Spoto, Fausto
    [J]. INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (01) : 71 - 88