Please use this identifier to cite or link to this item:

Securing Wearables through the Creation of a Personal Fog

File Size Format  
paper0696.pdf 1.27 MB Adobe PDF View/Open

Item Summary

Title:Securing Wearables through the Creation of a Personal Fog
Authors:Walter, Charles
Riley, Ian
Gamble, Rose
Keywords:Cyber-Assurance for Internet of Things and Fog Computing Architectures
Bluetooth, fog computing, privacy, security, wearable devices
Date Issued:03 Jan 2018
Abstract:Increased reliance on wearables using Bluetooth requires additional security and privacy measures to protect these devices and personal data, regardless of device vendor. Most wearables lack the ability to monitor their communication connections and protect personal data without assistance. Attackers can force wearables to disconnect from base stations. When a wearable loses its connection to its base station, an attacker can connect to the wearable to steal stored personal data or await reconnection to the base station to eavesdrop on communications. If the base station inadvertently disconnects from the cloud serving a security-aware app, it would be unable to respond to a rapid change in the security of its current environment. We design a personal fog incorporating wearables, a base station, and the cloud that allows the wearable to be situationally aware and manage inter- and intra-fog communications, given local personal fogs with the same app.
Pages/Duration:10 pages
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections: Cyber-Assurance for Internet of Things and Fog Computing Architectures

Please email if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons