TOWARDS SELF-AUTHENTICABLE WEARABLE
DEVICES
PRESENTED BY,
RASHA KAMAL
1
CONTENTS
 Abstract
 Introduction
 Related works and Technologies
 Protocols
 Requirements
 Application scenarios
 Authentications method
 Security evaluation
 Conclusion
 References
2
ABSTRACT
• communicate among themselves, but need to communicate
with other entities.
• Authentication is needed
• Existing system – limited to scenarios
• Authentication protocols – secure mutual end-to-end
authentication.
• Design uses point-to-point authentication protocols
• Finally – present Security evaluation
3
INTRODUTION
 Research estimates – continue growth in the near
futures
 wearable devices can hold a lot of useful information
 Due to wearable devices’ limited range of connectivity
 The use of other personal devices , to share this
information over longer distances must be possible.
 Because of the sensitive information wearable devices
may handle, information be protected from
unauthorized access or modification.
 Example - Pacemaker
4
INTRODUTION CONT...
 At present, solution exist for the problem of a
secure authentication service for wearable
devices
 In the later case, end-to-end authentication
between the wearable device and the remote
entity is not provided.
 First, the wearable device authenticates itself
with an intermediate device; Afterward the
intermediate device authenticates itself with
the remote entity
 Our design is based on a point-to-point
protocol
5
RELATD WORK AND TECHNOLOGIES
The most important Technologies
used in our proposed authentications
• Wearable Devices
• NFC
• Smart Cards
6
 Wearable Devices
• Idea – Add technology in everyday life
• Support short range connectivity
• Research – Focused on improving connectivity
range
 NFC
• Near field communication
• Technology, currently integrated in many mobile
devices
• simplify life’s common tasks such as making
transactions, exchanging digital content, or
connecting electronic devices.
• NFC operates – Radio frequency – 13.56MHz ,
Data transmission between – 106 to 424 kb/s
7
8
Smart Cards
• Smart cards are hardware devices
• To protect sensitive operations
• They can store sensitive information
securely and have cryptographic
capabilities.
• However, more recent works have
proposed using a smart card
• Card is able to take part in the
authentication process by itself.
• Functionality is based on the JavaCard
technology
9
PROTOCOLS
 POINT-TO-POINTPROTOCOL
• Data link protocol
• Provides - services (e.g., encapsulating
multiprotocol datagram's)
• PPP allows Extensible Authentication
Protocol (EAP)
10
EAP
• The Extensible Authentication Protocol is an
authentication framework
• It provides some common functions and
negotiation options of authentication methods
called EAP methods.
• Methods are based on the use of regular
passwords (EAP-MD5), the use of one-time
passwords (EAP-OTP), or the use of
certificates (EAP-TLS)
• Extended with new authentication
mechanisms.
11
IMPRINTING
• This mechanism attempts to solve the
problem of establishing trust between two
devices.
• It is based on the duckling imprinting
phase, that is, the process by which a
newborn duck establishes a pattern of
recognition for its parents.
• Imprinting consists of a secure
association established
• During this phase both devices share
something that allows identification
between these devices in the future.
12
 PROPOSED AUTHENTICATION
PROTOCOL
• A secure protocol for the mutual authentication of
wearable devices and any other network . This
protocol can work directly over a short-range
connection
• Secure imprinting mechanism , allows to
differentiate between trusted and untrusted
intermediate devices.
• Storage of different authentication credentials
(password, certificates, etc.) within the wearable
device.
• Inclusion of cryptographic and logical capabilities
within the wearable device, allowing it to make
decisions according to the sensitivity of
information 13
REQUIREMENTS
 Limited size - proposed solution should fit
inside a wearable device
 Necessity of providing the wearable device
with strong authentication capabilities-
cryptographic and logic operations.
 Credentials used to perform the
authentication - have storage capabilities.
 Use a short-range communication technology
14
APPLICATION SCENARIOS
15
WD-NFC-JCard wants to authenticate itself to a remote
server using a personal device with Internet connectivity
(e.g., a mobile phone) as an intermediate device.
Figure 2- System elements
Modes Of Operation
• Low security level
• Intermediate security level
• High security level
16Figure 3- Security level
ARCHITECTURE
 Wearable device needs to communicate with a
remote server over the Internet
 communication channel should be established
between the wearable device and the
intermediate device using the NFC protocol.
 forwarding the packets in both directions
between the wearable device and the remote
server
 This communication method is based on a
standalone supplicant
17
ARCHITECTURE CONT..
 Our proposed authentication protocol is
based on the EAP authentication protocol.
 EAP is an authentication framework
 EAP will be running within the WD-NFC-
JCard implies that the mobile device does not
need to understand the authentication
messages
 Only to forward the messages received in
both directions.
18
19
Figure – Proposed authentication architecture
AUTHENTICATION METHODS
 We used two different authentication
methods
 First, a method to authenticate the
intermediate device and the WD-NFC-
JCard is defined.
 Then a method to authenticate the
WD-NFC-JCard and the remote server
is defined.
20
Intermediate Device — WD-NFC-Jcard
Authentication
21
22
23
WD-NFC-JCard — Remote Server
Authentication
SECURITY EVALUATION
 The imprinting of the WD-NFC-JCard and
the intermediate device.
 Once imprinting process executed, devices
will share unique identifiable data between
them, allow - mutually authenticate
 WDAS – related to mutual authentication of
WD – NFC – Jcard and remote server
24
CONCLUSION
 we have presented an authentication
protocol for wearable devices
 Our proposed protocol is based on a
digital signature scheme
 Our proposed authentication protocol is
not only secure, but flexible enough to
provide different levels of protection
based on the sensitivity of the
information handled.
25
REFERENCES
 ABI Research, “Body Area Networks for Sports and Healthcare,” ABI
Research, Sci. Rep., 2012.
 Z. Zhang et al., “ECG-Cryptography and Authentication in Body
Area Networks,” IEEE Trans. Info. Tech. In Biomedicine, vol. 16, no.
6, Nov. 2012.
 M. Shin, “Secure Remote Health Monitoring with Unreliable Mobile
Devices,” J. Biomed. and Biotech., 2012.
 P. Urien and G. Pujolle, “EAP Smart Card Protocol,” IETF Internet
Draft 26, 2014.
 J. Torres, A. Izquierdo, and J. M. Sierra, “Advances in Network
Smart Cards Authentication,Computer Networks,”
 Computer Networks: The Int’l. J. Computer and Telecommun.
Networking, vol. 51, no. 9, 2007, pp. 2249–61
26

More Related Content

PPT
Wifi
PDF
1 importance of light weight authentication in iot
PDF
2 cyber security challenges in io t
PPSX
Unit 1.1
PDF
IoT Security in Action - Boston Sept 2015
PPTX
Security and Authentication of Internet of Things (IoT) Devices
PDF
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
PDF
1570272924-3
Wifi
1 importance of light weight authentication in iot
2 cyber security challenges in io t
Unit 1.1
IoT Security in Action - Boston Sept 2015
Security and Authentication of Internet of Things (IoT) Devices
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
1570272924-3

What's hot (18)

PDF
Ijarcet vol-2-issue-7-2307-2310
PDF
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
PDF
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PDF
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
PPTX
Digital Certificates and Secure Web Access
PDF
11. rfid security using mini des algorithm in deployment of bike renting system
PDF
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
PDF
Electronic Access Control Security / Безопасность электронных систем контроля...
PPT
Access control basics-2
PPT
IoT Security – Executing an Effective Security Testing Process
PDF
The 5 elements of IoT security
PPTX
Data center webinar_v2_1
PPTX
RAT - Kill or Get Killed! by Karan Bansal
PPTX
Null mumbai-iot-workshop
PDF
2 factor authentication 3 [compatibility mode]
PDF
www.ijerd.com
PDF
IoT and Blockchains - enhancing security and privacy
Ijarcet vol-2-issue-7-2307-2310
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
Ch12 Cryptographic Protocols and Public Key Infrastructure
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Digital Certificates and Secure Web Access
11. rfid security using mini des algorithm in deployment of bike renting system
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Electronic Access Control Security / Безопасность электронных систем контроля...
Access control basics-2
IoT Security – Executing an Effective Security Testing Process
The 5 elements of IoT security
Data center webinar_v2_1
RAT - Kill or Get Killed! by Karan Bansal
Null mumbai-iot-workshop
2 factor authentication 3 [compatibility mode]
www.ijerd.com
IoT and Blockchains - enhancing security and privacy
Ad

Similar to TOWARDS SELF-AUTHENTICABLE WEARABLE DEVICES (20)

PDF
Accessory authentication on NFC enabled product using three pass AES algorithm
PDF
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
PPTX
PDF
New design of lightweight authentication protocol in wearable technology
PPT
Authentication
PPTX
PDF
Wearing safe: Physical and informational security in the age of the wearable ...
PPT
Near Field Communication (NFC)
PPTX
Near field communication
PDF
Mobile Transaction Using Near Field Communication(NFC)
PDF
IRJET - Lightweight ECC based RFID Authentication Protocol
PDF
Near field communication
PPTX
Shradha maheshwari wearable computers 11-09-10
PPTX
Near field communication
PDF
PPT
NFC Basic Concepts
PPTX
Get yourself connected: Google Glass and the Internet of Bling
Accessory authentication on NFC enabled product using three pass AES algorithm
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
New design of lightweight authentication protocol in wearable technology
Authentication
Wearing safe: Physical and informational security in the age of the wearable ...
Near Field Communication (NFC)
Near field communication
Mobile Transaction Using Near Field Communication(NFC)
IRJET - Lightweight ECC based RFID Authentication Protocol
Near field communication
Shradha maheshwari wearable computers 11-09-10
Near field communication
NFC Basic Concepts
Get yourself connected: Google Glass and the Internet of Bling
Ad

Recently uploaded (20)

PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
Measurement Uncertainty and Measurement System analysis
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
mechattonicsand iotwith sensor and actuator
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
Feature types and data preprocessing steps
PDF
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
DOC
T Pandian CV Madurai pandi kokkaf illaya
PDF
Unit1 - AIML Chapter 1 concept and ethics
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PDF
Cryptography and Network Security-Module-I.pdf
PDF
Applications of Equal_Area_Criterion.pdf
PDF
Design of Material Handling Equipment Lecture Note
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Measurement Uncertainty and Measurement System analysis
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
MLpara ingenieira CIVIL, meca Y AMBIENTAL
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
August -2025_Top10 Read_Articles_ijait.pdf
Module 8- Technological and Communication Skills.pptx
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
distributed database system" (DDBS) is often used to refer to both the distri...
mechattonicsand iotwith sensor and actuator
First part_B-Image Processing - 1 of 2).pdf
Feature types and data preprocessing steps
UEFA_Embodied_Carbon_Emissions_Football_Infrastructure.pdf
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
T Pandian CV Madurai pandi kokkaf illaya
Unit1 - AIML Chapter 1 concept and ethics
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
Cryptography and Network Security-Module-I.pdf
Applications of Equal_Area_Criterion.pdf
Design of Material Handling Equipment Lecture Note

TOWARDS SELF-AUTHENTICABLE WEARABLE DEVICES

  • 2. CONTENTS  Abstract  Introduction  Related works and Technologies  Protocols  Requirements  Application scenarios  Authentications method  Security evaluation  Conclusion  References 2
  • 3. ABSTRACT • communicate among themselves, but need to communicate with other entities. • Authentication is needed • Existing system – limited to scenarios • Authentication protocols – secure mutual end-to-end authentication. • Design uses point-to-point authentication protocols • Finally – present Security evaluation 3
  • 4. INTRODUTION  Research estimates – continue growth in the near futures  wearable devices can hold a lot of useful information  Due to wearable devices’ limited range of connectivity  The use of other personal devices , to share this information over longer distances must be possible.  Because of the sensitive information wearable devices may handle, information be protected from unauthorized access or modification.  Example - Pacemaker 4
  • 5. INTRODUTION CONT...  At present, solution exist for the problem of a secure authentication service for wearable devices  In the later case, end-to-end authentication between the wearable device and the remote entity is not provided.  First, the wearable device authenticates itself with an intermediate device; Afterward the intermediate device authenticates itself with the remote entity  Our design is based on a point-to-point protocol 5
  • 6. RELATD WORK AND TECHNOLOGIES The most important Technologies used in our proposed authentications • Wearable Devices • NFC • Smart Cards 6
  • 7.  Wearable Devices • Idea – Add technology in everyday life • Support short range connectivity • Research – Focused on improving connectivity range  NFC • Near field communication • Technology, currently integrated in many mobile devices • simplify life’s common tasks such as making transactions, exchanging digital content, or connecting electronic devices. • NFC operates – Radio frequency – 13.56MHz , Data transmission between – 106 to 424 kb/s 7
  • 8. 8
  • 9. Smart Cards • Smart cards are hardware devices • To protect sensitive operations • They can store sensitive information securely and have cryptographic capabilities. • However, more recent works have proposed using a smart card • Card is able to take part in the authentication process by itself. • Functionality is based on the JavaCard technology 9
  • 10. PROTOCOLS  POINT-TO-POINTPROTOCOL • Data link protocol • Provides - services (e.g., encapsulating multiprotocol datagram's) • PPP allows Extensible Authentication Protocol (EAP) 10
  • 11. EAP • The Extensible Authentication Protocol is an authentication framework • It provides some common functions and negotiation options of authentication methods called EAP methods. • Methods are based on the use of regular passwords (EAP-MD5), the use of one-time passwords (EAP-OTP), or the use of certificates (EAP-TLS) • Extended with new authentication mechanisms. 11
  • 12. IMPRINTING • This mechanism attempts to solve the problem of establishing trust between two devices. • It is based on the duckling imprinting phase, that is, the process by which a newborn duck establishes a pattern of recognition for its parents. • Imprinting consists of a secure association established • During this phase both devices share something that allows identification between these devices in the future. 12
  • 13.  PROPOSED AUTHENTICATION PROTOCOL • A secure protocol for the mutual authentication of wearable devices and any other network . This protocol can work directly over a short-range connection • Secure imprinting mechanism , allows to differentiate between trusted and untrusted intermediate devices. • Storage of different authentication credentials (password, certificates, etc.) within the wearable device. • Inclusion of cryptographic and logical capabilities within the wearable device, allowing it to make decisions according to the sensitivity of information 13
  • 14. REQUIREMENTS  Limited size - proposed solution should fit inside a wearable device  Necessity of providing the wearable device with strong authentication capabilities- cryptographic and logic operations.  Credentials used to perform the authentication - have storage capabilities.  Use a short-range communication technology 14
  • 15. APPLICATION SCENARIOS 15 WD-NFC-JCard wants to authenticate itself to a remote server using a personal device with Internet connectivity (e.g., a mobile phone) as an intermediate device. Figure 2- System elements
  • 16. Modes Of Operation • Low security level • Intermediate security level • High security level 16Figure 3- Security level
  • 17. ARCHITECTURE  Wearable device needs to communicate with a remote server over the Internet  communication channel should be established between the wearable device and the intermediate device using the NFC protocol.  forwarding the packets in both directions between the wearable device and the remote server  This communication method is based on a standalone supplicant 17
  • 18. ARCHITECTURE CONT..  Our proposed authentication protocol is based on the EAP authentication protocol.  EAP is an authentication framework  EAP will be running within the WD-NFC- JCard implies that the mobile device does not need to understand the authentication messages  Only to forward the messages received in both directions. 18
  • 19. 19 Figure – Proposed authentication architecture
  • 20. AUTHENTICATION METHODS  We used two different authentication methods  First, a method to authenticate the intermediate device and the WD-NFC- JCard is defined.  Then a method to authenticate the WD-NFC-JCard and the remote server is defined. 20
  • 21. Intermediate Device — WD-NFC-Jcard Authentication 21
  • 22. 22
  • 23. 23 WD-NFC-JCard — Remote Server Authentication
  • 24. SECURITY EVALUATION  The imprinting of the WD-NFC-JCard and the intermediate device.  Once imprinting process executed, devices will share unique identifiable data between them, allow - mutually authenticate  WDAS – related to mutual authentication of WD – NFC – Jcard and remote server 24
  • 25. CONCLUSION  we have presented an authentication protocol for wearable devices  Our proposed protocol is based on a digital signature scheme  Our proposed authentication protocol is not only secure, but flexible enough to provide different levels of protection based on the sensitivity of the information handled. 25
  • 26. REFERENCES  ABI Research, “Body Area Networks for Sports and Healthcare,” ABI Research, Sci. Rep., 2012.  Z. Zhang et al., “ECG-Cryptography and Authentication in Body Area Networks,” IEEE Trans. Info. Tech. In Biomedicine, vol. 16, no. 6, Nov. 2012.  M. Shin, “Secure Remote Health Monitoring with Unreliable Mobile Devices,” J. Biomed. and Biotech., 2012.  P. Urien and G. Pujolle, “EAP Smart Card Protocol,” IETF Internet Draft 26, 2014.  J. Torres, A. Izquierdo, and J. M. Sierra, “Advances in Network Smart Cards Authentication,Computer Networks,”  Computer Networks: The Int’l. J. Computer and Telecommun. Networking, vol. 51, no. 9, 2007, pp. 2249–61 26