信息网络安全 ›› 2022, Vol. 22 ›› Issue (10): 98-107.doi: 10.3969/j.issn.1671-1122.2022.10.014

• 入选论文 • 上一篇    下一篇

智能穿戴设备的安全与隐私威胁研究

倪雪莉1,2(), 王群1,2, 梁广俊1,2   

  1. 1.江苏警官学院计算机信息与网络安全系,南京 210031
    2.江苏省电子数据取证分析工程研究中心,南京 210031
  • 收稿日期:2022-08-11 出版日期:2022-10-10 发布日期:2022-11-15
  • 通讯作者: 倪雪莉 E-mail:nixueli@jspi.edu.cn
  • 作者简介:倪雪莉(1990—),女,江苏,讲师,硕士,主要研究方向为信息安全、电子数据取证|王群(1971—),男,甘肃,教授,博士,主要研究方向为网络空间安全治理、电子数据取证|梁广俊(1982—),男,安徽,讲师,博士,主要研究方向为电子数据取证、网络空间安全
  • 基金资助:
    江苏省高校自然科学研究重大项目(20KJA520004);江苏省公安厅科技研究项目(2020KX008)

Research on Security and Privacy Threats of Smart Wearable Devices

NI Xueli1,2(), WANG Qun1,2, LIANG Guangjun1,2   

  1. 1. Department of Computer Information and Cyber Security, Jiangsu Police Institute, Nanjing 210031, China
    2. Jiangsu Electronic Data Forensics and Analysis Engineering Research Center, Nanjing 210031, China
  • Received:2022-08-11 Online:2022-10-10 Published:2022-11-15
  • Contact: NI Xueli E-mail:nixueli@jspi.edu.cn

摘要:

文章从设备架构和数据通信两方面研究了智能穿戴设备广泛存在的安全问题。以Apple Watch为例,基于智能手表上敏感数据的存储和传输方式,提出敏感数据的提取模型,该模型创新性地结合设备本机及配对设备来分析智能穿戴设备收集存储的敏感数据存在的安全风险。文章通过提取实例验证了模型的有效性,智能手表类穿戴计算设备不仅具有采集大量敏感数据的能力,且在数据存储和配对机制方面存在安全与隐私威胁。文章提出的模型及实验验证过程对进一步研究物联网环境下的各类智能终端设备安全具有重要意义。

关键词: 智能穿戴设备, 安全, 隐私, 数据提取模型, Apple Watch

Abstract:

This paper studied the widespread security problems of smart wearable devices from two aspects: device architecture and data communication. Taking Apple Watch as an example, this paper proposed an extraction model of sensitive data based on the storage and transmission mode of sensitive data on the smart watch. This model innovatively combined the device itself and paired device, analyzed the sensitive data collected and stored by smart wearable devices and the existing security risks. Finally, the feasibility and validity of the proposed model was confirmed through the experiments. Wearable computing devices not only have the ability to collect a large amount of sensitive data, but also have security and privacy threats in data storage and pairing mechanism. The proposed model and the process of experimental verification is of great significance for further research on the security of various intelligent terminal devices in the Internet of Things.

Key words: smart wearable devices, security, privacy, data extraction model, Apple Watch

中图分类号: