BibTex RIS Cite

How Secure is Your Smart Watch?

Year 2016, Volume: 5 Issue: 4, 90 - 95, 01.12.2016

Abstract

The Internet of Things IoT is a network of devices, vehicles, buildings and other items which are able to collect and exchange data. IoT devices are furnished with technologies such as electronics, software, sensors, actuators, and network connectivity in order to function as desired. A smart watch can be considered as an IoT device as they are equipped by almost all necessary technologies. In essence, smart watches are effectively wearable computers with communications and sensing capabilities. Many mobile apps run over smart watches using a mobile operating system. However, as the other IoT devices they are subject to security issues. In this paper, by surveying and reporting the security concerns and issues at smart watches, we aim to raise awareness on this matter. We also propose a road map for a more secure smart watch platform by defining the responsible actors and their responsibilities.

References

  • J. Granjal, M. Edmundo, and J. Silva. "Security for the internet of things: a survey of existing protocols and open research issues.", IEEE Communications Surveys & Tutorials , pp., 2015.
  • IDC Press Release, “IDC forecasts worldwide shipments of wearables to surpass 200 million in 2019, driven by strong https://www.idc.com/getdoc.jsp?containerId=prUS4084 6515, Latest Access Time for the website is July, 2016.
  • J. Phillips, “The 10 most likely sensors in a 10-sensor Apple http://www.pcworld.com/article/2366126/the-10-most- likely-sensors-in-a-10-sensor-apple-smartwatch.html, Latest Access Time for the website is July, 2016.
  • R. Temple and J. Naziri, “40 best Android wear apps in 2016”, http://www.techradar.com/news/wearables/best-android- wear-smartwatch-apps-2015-1281065, Time for the website is July, 2016. Techradar, Latest Access
  • D. Bursky, “Wireless connectivity lets smart watch users communicate http://www.digikey.com/en/articles/techzone/2014/oct/w ireless-connectivity-lets-smart-watch-users- communicate-and-monitor-themselves, Latest Access Time for the website is July, 2014. themselves ”,
  • H. Wang, T. Lai, and R. Choudhury, "Mole: Motion leaks through smartwatch sensors" , 21st Annual International Conference on Mobile Computing and Networking. ACM, 2015.
  • B. Cha et al., "Design of micro-payment to strengthen security by 2 factor authentication with mobile & wearable devices", Advanced Science and Technology Letters, Vol.109, pp.28-32, 2015. [8] A. Razaque assessment." 2016 Applications and Technology Conference (LISAT). IEEE, 2016. "Pebble Long Island Systems,
  • HP Fortify, “Internet of Things security study: Smart watches”, http://go.saas.hpe.com/fod/internet-of-things, Latest Access Time for the website is July 2016.
  • K. Haataja and P. Toivanen. "Two practical man-in-the- middle attacks on Bluetooth secure simple pairing and countermeasures." IEEE Communications , Vol. 9, Issue 1, pp. 384-392, 2010. Transactions on Wireless
  • A. Maiti et al., "(Smart) watch your taps: side-channel keystroke inference attacks using smartwatches" , ACM International Symposium on Wearable Computers , ACM, 2015.
  • K. Steck and T. Hansheng "Transformation of the digital watch: The evolution and what it signals" , IEEE Consumer Electronics Magazine, Vol. 5, Issue 1, pp. 89- 92, 2016.
  • I. Baggili et al., "Watch what you wear: preliminary forensic analysis of smart watches ", 10th International Conference on Availability, Reliability and Security (ARES), 2015.
  • X. Liu et al., "When good becomes evil: Keystroke inference with smart watch", 22nd ACM SIGSAC Conference on Computer and Communications Security , ACM, 2015.
  • A. Maiti et al. "Smartwatch-Based keystroke inference attacks mechanisms", Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security . ACM, 2016. context-aware protection
  • E. Casilari and A. Miguel, "Analysis of a hybrid Android system for fall detection" , Technical report, Repositorio Institucional Universidad De Málaga, http://riuma.uma.es/xmlu i/handle/10630/11293, 2016.
  • E. Casilari and M. Oviedo-Jiménez. "Automatic fall detection system based on the combined use of a smartphone and a smartwatch" , PloS One, Volume 10, Issue11, 2015.
  • D. Genoud, C. Vincent and J. Torrent, "Soft Fall Detection Using Machine Learning in Wearable Devices", IEEE Advanced Information Networking and Applications (AINA), 2016.
  • [19] C. Pham, "MobiRAR: Real-time human activity recognition using mobile devices ", Knowledge and Systems Engineering (KSE), 2015 Seventh International Conference on, IEEE, 2015.
  • [20] M. Karakaya, A. Bostan and E. Gökçay, “How Secure is Your Smart Watch?”, Proceedings of 9th International Conference on Information Security and Cryptology (ISCTURKEY 2016), pp.138-145, Ankara, Turkey, October 25-26, 2016
There are 19 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Murat Karakaya This is me

Atila Bostan This is me

Erhan Gökçay This is me

Publication Date December 1, 2016
Published in Issue Year 2016 Volume: 5 Issue: 4

Cite

IEEE M. Karakaya, A. Bostan, and E. Gökçay, “How Secure is Your Smart Watch?”, IJISS, vol. 5, no. 4, pp. 90–95, 2016.