Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2935643.2935647acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

CryptoCoP: Lightweight, Energy-efficient Encryption and Privacy for Wearable Devices

Published: 30 June 2016 Publication History

Abstract

As people use and interact with more and more wearables and IoT-enabled devices, their private information is being exposed without any privacy protections. However, the limited capabilities of IoT devices makes implementing robust privacy protections challenging. In response, we present CryptoCoP, an energy-efficient, content agnostic privacy and encryption protocol for IoT devices. Eavesdroppers cannot snoop on data protected by CryptoCoP or track users via their IoT devices. We evaluate CryptoCoP and show that the performance and energy overheads are viable in a wide variety of situations, and can be modified to trade off forward secrecy and energy consumption against required key storage on the device.

References

[1]
A RAPINIS, M., MANCINI, L., RITTER, E., AND RYAN, M. Privacy through pseudonymity in mobile telephony systems. In NDSS (2014).
[2]
BLUETOOTH SIG., I. Bluetooth low energy 4.1 standard.
[3]
DAS, A., PATHAK, P., CHUAH, C.-N., AND MOHAPATRA, P. Uncovering privacy leakage in ble network traffic of wearable fitness trackers. In Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications (HotMobile) (2016), ACM.
[4]
DEMEULENAER, G., GOSSET, FRAN C., STANDAERT, FRAN C.-X., AND PEREIRA, O. On the energy cost of communication and cryptography in wireless sensor networks. In IEEE International Conference on Wireless and Mobile Computing (WiMob)(Oct 2008), pp. 580--585.
[5]
FERGUSON, N., SCHNEIER, B., AND KOHNO, T. Cryptography Engineering. Wiley, 2010.
[6]
IETF. RFC 5246: The Transport Layer Security Protocol Version 1.2.
[7]
KRAVETS, R., TUNCAY, G., AND SUNDARAM, H. For your eyes only. In MCS(2015).
[8]
NIST. Federal information processing standards publication 197. Advanced Encryption Standard (AES), 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
[9]
NIST. NIST Special Publication 800--38A. Recommendation for Block Cipher Modes of Operation, 2001. http://csrc.nist.gov/publications/nistpubs/800--38a/sp800--38a.pdf.
[10]
OSVIK, D. A., BOS, J. W., STEFAN, D., AND CANRIGHT, D. Fast software AES encryption. In Fast Software Encryption. Springer Berlin Heidelberg, 2010, pp. 75--93.
[11]
RYAN, M. Bluetooth: With low energy comes low security. In 7th USENIX Workshop on Offensive Technologies(2013).
[12]
SPARK FUN. Ad8232 single lead heart rate monitor. https://www.sparkfun.com/products/12650.
[13]
STUDIO, S. Tiny ble. http://www.seeedstudio.com/wiki/BLE_Smurfs.
[14]
VUČINIĆ, M., TOURANCHEAU, B., ROUSSEAU, F., DUDA, A., DAMON, L., AND GUIZZETTI, R. OSCAR: Object security architecture for the internet of things. Ad Hoc Netw. 32, C (Sep 2015), 3--16.

Cited By

View all
  • (2024)Internet of robotic things for independent living: Critical analysis and future directionsInternet of Things10.1016/j.iot.2024.10112025(101120)Online publication date: Apr-2024
  • (2023)Analysis of security and privacy issues in wearables for minorsWireless Networks10.1007/s11276-022-03211-630:6(5437-5453)Online publication date: 8-Mar-2023
  • (2023)Energy-Positive Activity Recognition: Future DirectionsSelf-Powered Internet of Things10.1007/978-3-031-27685-9_8(145-151)Online publication date: 17-Jun-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WearSys '16: Proceedings of the 2016 Workshop on Wearable Systems and Applications
June 2016
38 pages
ISBN:9781450343268
DOI:10.1145/2935643
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 June 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bluetooth low energy
  2. wearable device security

Qualifiers

  • Research-article

Conference

MobiSys'16
Sponsor:

Acceptance Rates

WearSys '16 Paper Acceptance Rate 5 of 9 submissions, 56%;
Overall Acceptance Rate 28 of 36 submissions, 78%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)3
Reflects downloads up to 12 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Internet of robotic things for independent living: Critical analysis and future directionsInternet of Things10.1016/j.iot.2024.10112025(101120)Online publication date: Apr-2024
  • (2023)Analysis of security and privacy issues in wearables for minorsWireless Networks10.1007/s11276-022-03211-630:6(5437-5453)Online publication date: 8-Mar-2023
  • (2023)Energy-Positive Activity Recognition: Future DirectionsSelf-Powered Internet of Things10.1007/978-3-031-27685-9_8(145-151)Online publication date: 17-Jun-2023
  • (2022)Attacks on Resource-Constrained IoT Devices and Security SolutionsInternational Journal of Software Science and Computational Intelligence10.4018/IJSSCI.31094314:1(1-21)Online publication date: 7-Oct-2022
  • (2022)Managing Perceived Loneliness and Social-Isolation Levels for Older Adults: A Survey with Focus on Wearables-Based SolutionsSensors10.3390/s2203110822:3(1108)Online publication date: 1-Feb-2022
  • (2022)On the Security of Bluetooth Low Energy in Two Consumer Wearable Heart Rate Monitors/Sensing DevicesSensors10.3390/s2203098822:3(988)Online publication date: 27-Jan-2022
  • (2022)SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation MeasuresEmerging Information Security and Applications10.1007/978-3-030-93956-4_7(108-127)Online publication date: 12-Jan-2022
  • (2022)Crime and the Consumer Internet of ThingsThe Handbook of Security10.1007/978-3-030-91735-7_33(705-727)Online publication date: 23-Jun-2022
  • (2021)An overview of technologies and devices against COVID-19 pandemic diffusion: virus detection and monitoring solutionsInternational Journal on Smart Sensing and Intelligent Systems10.21307/ijssis-2021-00314:1(1-28)Online publication date: 11-Mar-2021
  • (2021)A Survey on Wearable Technology: History, State-of-the-Art and Current ChallengesComputer Networks10.1016/j.comnet.2021.108074193(108074)Online publication date: Jul-2021
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media