首页> 外文学位 >The Personal Fog: An Architecture for Limiting Wearable Security Vulnerabilities
【24h】

The Personal Fog: An Architecture for Limiting Wearable Security Vulnerabilities

机译:个人雾:限制可穿戴安全漏洞的体系结构

获取原文
获取原文并翻译 | 示例

摘要

Wearable computing devices have become ubiquitous in daily life, with fitness and health trackers embedded in watches that also serve as payment devices to smart headphones or hearables that can also be used for language translation. Wearables constantly and consistently collect data from their users and their surroundings, transmitting that data back to a base station or mobile device for aggregation. The data is often sent by the base station to a cloud service for storage and analysis. The cloud service provides feedback to the base station, which is used by multiple applications for insight into the user's health and habits. Wearables rely on Bluetooth for their communication protocol, allowing them to send data quickly and with minimal power needed for the transmission. Unfortunately, with ubiquity comes security concerns of which the average user may be unaware. These concerns must be addressed to ensure wearables are not subject to traditional attack vectors, such as eavesdropping, Man-in-the-Middle, Denial of Service, and phishing, all of which are possible with Bluetooth devices. Because wearables are designed to be worn at all times, a user can unwittingly move from a secure to insecure environment where an attack is imminent. Though there has been research in general Bluetooth security, traditional attack vectors have not been examined in depth or in relation to each other within the wearable context. There are two main reasons for this lack of research. First, it is difficult to analyze current consumer wearables because of their proprietary designs. Beyond eavesdropping on the communication, there are minimal techniques that can be deployed to determine the response to an attack or a mitigation strategy, which must be performed through the base station. Second, wearables are only now emerging with more computational power. Thus, the wearables cannot make decisions regarding their security status independently, limiting the protection mechanisms that can be implemented.;This dissertation defines the design, implementation, and evaluation of a personal fog architecture and testbed, which allows for examining these attack vectors from local device, environmental, and social situational awareness perspectives. The testbed simulates near-future wearables with the additional processing power that is needed for fog computing. It demonstrates the ability of the personal fog to adapt to insecure environments and protect user data from being intercepted. An application is created to run on the simulated base stations and wearables that exploits the multi-layered architecture of the personal fog to increase security awareness for all connected devices. In addition, the application increases situational and social awareness of security vulnerabilities through a technique called fostering, which allows personal fogs to communicate with each other to inform those in their vicinity of potential insecurities. The testbed is used to demonstrate the extent to which this architecture and application combine to protect a user from security attacks using self-adaptation and social situational awareness. As a side effect of this research, the constructed testbed constructed can analyze Bluetooth wearable security threats and be extended to develop additional responses to security vulnerabilities as they arise.
机译:可穿戴计算设备已在日常生活中变得无处不在,手表中嵌入了健身和健康跟踪器,这些跟踪器也可用作智能耳机或可听物的支付设备,也可用于语言翻译。可穿戴设备不断且一致地从用户及其周围环境收集数据,然后将该数据发送回基站或移动设备进行汇总。数据通常由基站发送到云服务以进行存储和分析。云服务向基站提供反馈,多个应用程序使用该反馈来洞察用户的健康状况和习惯。可穿戴设备依靠蓝牙作为其通信协议,从而使它们能够以最小的传输功率快速发送数据。不幸的是,伴随着普遍性而来的是普通用户可能不了解的安全问题。必须解决这些问题,以确保可穿戴设备不受传统的攻击手段的影响,例如窃听,中间人,拒绝服务和网络钓鱼,而所有这些都可以通过蓝牙设备实现。由于可穿戴设备设计为始终可穿戴,因此用户可以在不安全的环境中不知不觉地从即将发生攻击的安全环境转移。尽管已经对一般的蓝牙安全性进行了研究,但是在可穿戴环境中尚未深入研究传统的攻击向量或彼此之间是否存在关联。缺乏研究的主要原因有两个。首先,由于它们的专有设计,很难分析当前的消费者可穿戴设备。除了窃听通信之外,还可以使用最少的技术来确定对攻击或缓解策略的响应,这些技术必须通过基站执行。其次,可穿戴设备现在才以更大的计算能力出现。因此,可穿戴设备无法独立决定其安全状态,从而限制了可以实施的保护机制。本文定义了个人雾架构和测试平台的设计,实现和评估,从而可以从本地检查这些攻击媒介设备,环境和社会情境意识的观点。该测试台具有雾计算所需的附加处理能力,可以模拟近日可穿戴设备。它演示了个人迷雾适应不安全环境并保护用户数据免遭拦截的能力。创建了一个在模拟的基站和可穿戴设备上运行的应用程序,该应用程序利用了个人迷雾的多层体系结构来提高所有连接设备的安全意识。此外,该应用程序通过一种称为“培育”的技术来增强情境和社会对安全漏洞的意识,该技术可使人为雾彼此通信,以告知附近人员潜在的不安全感。该测试平台用于演示此体系结构和应用程序结合在一起的程度,以利用自适应和社交情境意识保护用户免受安全攻击。作为这项研究的副作用,构建的构建的测试平台可以分析蓝牙可穿戴安全威胁,并可以扩展以针对出现的安全漏洞做出其他响应。

著录项

  • 作者

    Walter, Charles William.;

  • 作者单位

    The University of Tulsa.;

  • 授予单位 The University of Tulsa.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2018
  • 页码 228 p.
  • 总页数 228
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号