A honeypot system for wearable networks

A. M. Leonard, H. Cai, K. K. Venkatasubramanian, M. Ali, T. Eisenbarth

Abstract

Securing any information exchanged within a Body Area Network (BAN) from unauthorized tampering is essential to ensure that such systems are safe, and thus do no harm, to the people using them. Solutions for enabling information security in BANs require extensive use of cryptographic primitives that involve considerable performance overhead. Consequently, information security is typically not available in wearable technologies. We need adaptive security solutions that increase the level of security in the event of threats but otherwise impose minimal security overhead in order for them to viable for BANs. The first step in building adaptive security for BANs is to detect the threats. In this paper we propose a solution for detecting adversaries attacking the communication channel of a BAN called a wearable honeypot system. It works by communicating fake user health information between the base station and a set of designated decoy nodes in the BAN. Any alteration of this traffic, in content or arrival time, is considered adversarial tampering. A preliminary implementation of this wearable honeypot system demonstrates that it is effective in detecting a variety of communication attacks on a BAN.
OriginalspracheEnglisch
Titel2016 IEEE 37th Sarnoff Symposium
Seitenumfang3
Herausgeber (Verlag)IEEE
Erscheinungsdatum01.09.2016
Seiten199-201
ISBN (Print)978-1-5090-1541-2
ISBN (elektronisch)978-1-5090-1540-5
DOIs
PublikationsstatusVeröffentlicht - 01.09.2016
Veranstaltung2016 IEEE 37th Sarnoff Symposium - Newark, USA / Vereinigte Staaten
Dauer: 19.09.201621.09.2016

Fingerprint

Untersuchen Sie die Forschungsthemen von „A honeypot system for wearable networks“. Zusammen bilden sie einen einzigartigen Fingerprint.

Zitieren