A Case Study Exploring Side-Channel Attacks On Pet Wearables
IoT has long since come to the pet industry resulting in a proliferation of data-intensive devices including tracking anything from activity, health, to location. The resulting 'Internet of Pets' is generating large volumes of animal data which, due to the close link between the digital pr...
Saved in:
| Published in: | IAENG international journal of computer science Vol. 48; no. 4; p. 878 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Hong Kong
International Association of Engineers
22.11.2021
|
| Subjects: | |
| ISSN: | 1819-656X, 1819-9224 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | IoT has long since come to the pet industry resulting in a proliferation of data-intensive devices including tracking anything from activity, health, to location. The resulting 'Internet of Pets' is generating large volumes of animal data which, due to the close link between the digital profile of companion animals held as pets (e.g., cats and dogs) and their caregivers holds significant security and privacy implications. In this case study we explore the vulnerability of such pet wearables to side-channel attacks, describing our implementation of an electromagnetic attack on a now discontinued dog activity tracker. We show how we were able to successfully exfiltrate data from the device during the Base64 encoding process and discuss what implications this holds for the security of these devices, given the lack of protection that animal data is afforded under extant existing data protection policy and legislation. |
|---|---|
| Bibliography: | ObjectType-Case Study-2 SourceType-Scholarly Journals-1 content type line 14 ObjectType-Feature-4 ObjectType-Report-1 ObjectType-Article-3 |
| ISSN: | 1819-656X 1819-9224 |