Location

Hilton Waikoloa Village, Hawaii

Event Website

http://www.hicss.hawaii.edu

Start Date

1-4-2017

End Date

1-7-2017

Description

Wearable devices have become more common for the average consumer. As devices need to operate with low power, many devices use simplified security measures to secure the data during transmission. While Bluetooth, the primary method of communication, includes certain security measures as part of the format, they are insufficient to fully secure the connection and the data transmitted. Users must be made aware of the potential security threats to the information communicated by the wearable, as well as be empowered and engaged to protect it. In this paper, we propose a method of identifying insecure environments through crowdsourced data, allowing wearable consumers to deploy an application on their base system (e.g., a smart phone) that alerts when in the presence of a security threat. We examine two different machine learning methods for classifying the environment and interacting with the users, as well as evaluating the potential uses for both algorithms.

Share

COinS
 
Jan 4th, 12:00 AM Jan 7th, 12:00 AM

Toward Predicting Secure Environments for Wearable Devices

Hilton Waikoloa Village, Hawaii

Wearable devices have become more common for the average consumer. As devices need to operate with low power, many devices use simplified security measures to secure the data during transmission. While Bluetooth, the primary method of communication, includes certain security measures as part of the format, they are insufficient to fully secure the connection and the data transmitted. Users must be made aware of the potential security threats to the information communicated by the wearable, as well as be empowered and engaged to protect it. In this paper, we propose a method of identifying insecure environments through crowdsourced data, allowing wearable consumers to deploy an application on their base system (e.g., a smart phone) that alerts when in the presence of a security threat. We examine two different machine learning methods for classifying the environment and interacting with the users, as well as evaluating the potential uses for both algorithms.

http://aisel.aisnet.org/hicss-50/da/iot/3