Data Security and Raw Data Access of Contemporary Mobile Sensor Devices

被引:1
|
作者
Handel, Till [1 ]
Schreiber, Max [1 ]
Rothmaler, Katrin [1 ]
Ivanova, Galina [1 ]
机构
[1] Inst Appl Informat, Goerdelerring 9, D-04109 Leipzig, Germany
关键词
mHealth; Wearable; Security; Bluetooth Bio-sensor; Mobile;
D O I
10.1007/978-981-10-9035-6_73
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Mobile sensor devices have made a great leap in terms of popularity and proliferation amongst the public in recent years, being used for a wide variety of lifestyle, fitness and health applications. This makes them very attractive for scientists and users who are interested in the actual bio and environmental data these devices measure, what they are capable of and their limitations. However manufacturers like to limit access to such data, storing it on their own private servers, only giving customers access to the results of their often very specific and limited analyses. The underlying filtering methods, algorithms and training sets are virtually never disclosed. Mobile sensor devices use various Bluetooth-protocols like RFCOMM and GATT to transfer data onto a smartphone or tablet. And there is the crux of the matter: Hardly any of the manufacturers encrypt their connection, because that would take precious processing and battery power as well as more resources in development. This paper describes how to access raw bio-data on a selection of wearable and stationary sensor devices using nothing but a contemporary Android-smartphone and a PC. A detailed example of how to access such a device is given. In empirical tests three out of four devices showed a total lack of effective security measures. From the combined experience of accessing several mobile sensor devices a generalized approach was formulated. Finally a shortlist of simple methods that should prevent abusive exploits is given in the hope that future devices will show improved data security in particular for health-relevant applications that deal with sensitive information.
引用
收藏
页码:397 / 400
页数:4
相关论文
共 50 条
  • [1] Energy Efficiency of Raw Sensor Data Collection on Mobile Devices
    Tihu, Mircea-Gabriel
    Telbis, Daniel-George
    Babau, Cristian-Nicolae
    Marcu, Marius
    [J]. 2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2016, : 371 - 375
  • [2] Mobile Devices and Corporate Data Security
    Markelj, Blaz
    Bernik, Igor
    [J]. INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES, 2012, 6 (01): : 97 - 104
  • [3] Data Security Evaluation for Mobile Android Devices
    Khokhlov, Igor
    Reznik, Leon
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 154 - 160
  • [4] Research and Application of Data Security for Mobile Devices
    Zhang, Xiandi
    Yang, Feng
    Liu, Zhongqiang
    Wang, Zhenzhi
    Wang, Kaiyi
    [J]. COMPUTER AND COMPUTING TECHNOLOGIES IN AGRICULTURE IV, PT 3, 2011, 346 : 46 - 56
  • [5] Biometrics Data Security Techniques for Portable Mobile Devices
    S. Roy
    S. Matloob
    A. Seetharam
    A. Rameshbabu
    W. C. O’Dell
    W. I. Davis
    [J]. INAE Letters, 2017, 2 (3): : 123 - 131
  • [6] Sensor data collection using heterogeneous mobile devices
    Jayaraman, Prern Prakash
    Zaslavsky, Arkady
    Delsing, Jerker
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 161 - +
  • [7] Logging User Activities and Sensor Data on Mobile Devices
    Woerndl, Wolfgang
    Manhardt, Alexander
    Schulze, Florian
    Prinz, Vivian
    [J]. ANALYSIS OF SOCIAL MEDIA AND UBIQUITOUS DATA, 2011, 6904 : 1 - 19
  • [8] Self-Encryption Scheme for Data Security in Mobile Devices
    Chen, Yu
    Ku, Wei-Shinn
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 850 - +
  • [9] Security model for the protection of sensitive and confidential data on mobile devices
    Asghar, M. Tayyab
    Riaz, Muhammad
    Ahmad, Jamil
    Safdar, Sohail
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 198 - +
  • [10] Data security in unattended wireless sensor networks with mobile sinks
    Liu, Zhihong
    Ma, Jianfeng
    Park, Youngho
    Xiang, Shangrong
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (13): : 1131 - 1146