A Case Study Exploring Side-Channel Attacks On Pet Wearables

IoT has long since come to the pet industry resulting in a proliferation of data-intensive devices including tracking anything from activity, health, to location. The resulting 'Internet of Pets' is generating large volumes of animal data which, due to the close link between the digital pr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IAENG international journal of computer science Jg. 48; H. 4; S. 878
Hauptverfasser: Levina, Alla, Varyukhin, Vladimir, Kaplun, Dmitry, Zamansky, Anna, van der Linden, Dirk
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Hong Kong International Association of Engineers 22.11.2021
Schlagworte:
ISSN:1819-656X, 1819-9224
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:IoT has long since come to the pet industry resulting in a proliferation of data-intensive devices including tracking anything from activity, health, to location. The resulting 'Internet of Pets' is generating large volumes of animal data which, due to the close link between the digital profile of companion animals held as pets (e.g., cats and dogs) and their caregivers holds significant security and privacy implications. In this case study we explore the vulnerability of such pet wearables to side-channel attacks, describing our implementation of an electromagnetic attack on a now discontinued dog activity tracker. We show how we were able to successfully exfiltrate data from the device during the Base64 encoding process and discuss what implications this holds for the security of these devices, given the lack of protection that animal data is afforded under extant existing data protection policy and legislation.
Bibliographie:ObjectType-Case Study-2
SourceType-Scholarly Journals-1
content type line 14
ObjectType-Feature-4
ObjectType-Report-1
ObjectType-Article-3
ISSN:1819-656X
1819-9224