Identification of Wearable Devices with Bluetooth

09/27/2018
by   Hidayet Aksu, et al.
0

With wearable devices such as smartwatches on the rise in the consumer electronics market, securing these wearables is vital. However, the current security mechanisms only focus on validating the user not the device itself. Indeed, wearables can be (1) unauthorized wearable devices with correct credentials accessing valuable systems and networks, (2) passive insiders or outsider wearable devices, or (3) information-leaking wearables devices. Fingerprinting via machine learning can provide necessary cyber threat intelligence to address all these cyber attacks. In this work, we introduce a wearable fingerprinting technique focusing on Bluetooth classic protocol, which is a common protocol used by the wearables and other IoT devices. Specifically, we propose a non-intrusive wearable device identification framework which utilizes 20 different Machine Learning (ML) algorithms in the training phase of the classification process and selects the best performing algorithm for the testing phase. Furthermore, we evaluate the performance of proposed wearable fingerprinting technique on real wearable devices, including various off-the-shelf smartwatches. Our evaluation demonstrates the feasibility of the proposed technique to provide reliable cyber threat intelligence. Specifically, our detailed accuracy results show on average 98.5 for identifying wearables using the Bluetooth classic protocol.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/04/2022

Device identification using optimized digital footprints

The rapidly increasing number of internet of things (IoT) and non-IoT de...
research
04/22/2020

Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices

In this paper, we investigate a potential security vulnerability associa...
research
07/24/2021

Breath to Pair (B2P): Respiration-Based Pairing Protocol for Wearable Devices

We propose Breath to Pair (B2P), a protocol for pairing and shared-key g...
research
07/18/2023

Discretization-based ensemble model for robust learning in IoT

IoT device identification is the process of recognizing and verifying co...
research
11/30/2018

Computational paper wrapping transforms non-stretchable 2D devices into wearable and conformable 3D devices

This study starts from the counter-intuitive question of how we can rend...
research
09/14/2021

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

The clear, social, and dark web have lately been identified as rich sour...
research
02/08/2023

A Multimodal Sensing Ring for Quantification of Scratch Intensity

An objective measurement of the debilitating symptom, chronic itch, is n...

Please sign up or login with your details

Forgot password? Click here to reset