Please use this identifier to cite or link to this item:
Securing Wearables through the Creation of a Personal Fog
|Title:||Securing Wearables through the Creation of a Personal Fog|
|Keywords:||Cyber-Assurance for Internet of Things and Fog Computing Architectures|
Bluetooth, fog computing, privacy, security, wearable devices
|Issue Date:||03 Jan 2018|
|Abstract:||Increased reliance on wearables using Bluetooth requires additional security and privacy measures to protect these devices and personal data, regardless of device vendor. Most wearables lack the ability to monitor their communication connections and protect personal data without assistance. Attackers can force wearables to disconnect from base stations. When a wearable loses its connection to its base station, an attacker can connect to the wearable to steal stored personal data or await reconnection to the base station to eavesdrop on communications. If the base station inadvertently disconnects from the cloud serving a security-aware app, it would be unable to respond to a rapid change in the security of its current environment. We design a personal fog incorporating wearables, a base station, and the cloud that allows the wearable to be situationally aware and manage inter- and intra-fog communications, given local personal fogs with the same app.|
|Rights:||Attribution-NonCommercial-NoDerivatives 4.0 International|
|Appears in Collections:||Cyber-Assurance for Internet of Things and Fog Computing Architectures|
Please contact firstname.lastname@example.org if you need this content in an alternative format.
Items in ScholarSpace are protected by copyright, with all rights reserved, unless otherwise indicated.