Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling

12/06/2018
by   Suin Kang, et al.
0

As smart bands make life more convenient and provide a positive lifestyle, many people are now using them. Since smart bands deal with private information, security design and implementation for smart band system become necessary. To make a trustworthy smart band, we must derive the security requirements of the system first, and then design the system satisfying the security requirements. In this paper, we apply threat modeling techniques such as Data Flow Diagram, STRIDE, and Attack Tree to the smart band system to identify threats and derive security requirements accordingly. Through threat modeling, we found the vulnerabilities of the smart band system and successfully exploited smart bands with them. To defend against these threats, we propose security measures and verify that they are secure by using Scyther which is a tool for automatic verification of security protocol.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/10/2023

BLE Protocol in IoT Devices and Smart Wearable Devices: Security and Privacy Threats

Bluetooth Low Energy (BLE) has become the primary transmission media due...
research
03/06/2023

A Systematic Approach to Automotive Security

We propose a holistic methodology for designing automotivesystems that c...
research
06/05/2023

Sustainable Adaptive Security

With software systems permeating our lives, we are entitled to expect th...
research
02/16/2023

PACMAN Attack: A Mobility-Powered Attack in Private 5G-Enabled Industrial Automation System

3GPP has introduced Private 5G to support the next-generation industrial...
research
04/23/2023

A Review On Game Theory With Smart Grid Security

Smart grid is the modern two way mechanism combining the power grid, con...
research
10/06/2022

Threat Repair with Optimization Modulo Theories

We propose a model-based procedure for automatically preventing security...
research
02/17/2023

Beware of Pickpockets: A Practical Attack against Blocking Cards

Today, we rely on contactless smart cards to perform several critical op...

Please sign up or login with your details

Forgot password? Click here to reset