skip to main content
10.1145/3139937.3139939acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Public Access

Cleartext Data Transmissions in Consumer IoT Medical Devices

Published:03 November 2017Publication History

ABSTRACT

This paper introduces a method to capture network traffic from medical IoT devices and automatically detect cleartext information that may reveal sensitive medical conditions and behaviors. The research follows a three-step approach involving traffic collection, cleartext detection, and metadata analysis. We analyze four popular consumer medical IoT devices, including one smart medical device that leaks sensitive health information in cleartext. We also present a traffic capture and analysis system that seamlessly integrates with a home network and offers a user-friendly interface for consumers to monitor and visualize data transmissions of IoT devices in their homes.

References

  1. Noah Apthorpe. 2016. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic Workshop on Data and Algorithmic Transparency.Google ScholarGoogle Scholar
  2. United States Census Bureau. 2003. Frequently Occurring Surnames from the Census 2000. (2003). https://www.census.gov/topics/population/genealogy/data/2000_surnames.htmlGoogle ScholarGoogle Scholar
  3. Seunghun Cha and Hyoungshick Kim. 2017. Detecting encrypted traffic: a machine learning approach. Vol. 10144. Springer, Cham. Information Security Applications.Google ScholarGoogle Scholar
  4. Federal Trade Commission. 2016. Internet of Things: Privacy & Security in a Connected World FTC Staff Report.Google ScholarGoogle Scholar
  5. Bogdan et al Copos. 2016. Is Anybody Home? Inferring Activity From Smart Home Network Traffic IEEE Security and Privacy Workshops.Google ScholarGoogle Scholar
  6. Dimiter Dimitrov. 2016. Medical Internet of Things and Big Data in Healthcare. Healthc Inform Res, Vol. 3, 22 (7 2016), 156--163.Google ScholarGoogle ScholarCross RefCross Ref
  7. Nick Feamster. 2016. Who Will Secure the Internet of Things? https://freedom-to-tinker.com/2016/01/19/who-will-secure-the-internet-of-things/. (2016).Google ScholarGoogle Scholar
  8. Grance Tim McCallister, Erika and Karen Scarfone. 2010. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Special Publication, Vol. 122, 800 (4 2010), 2.Google ScholarGoogle Scholar
  9. Brian Mosley. 2017. NSF Funded IoT Security Research Excites at the 2017 CNSF Exhibition. http://cra.org/govaffairs/blog/2017/05/2017-cnsf-exhibition/. (2017).Google ScholarGoogle Scholar
  10. United States Department of Health and Human Services Office for Civil Rights. n.d.. Summary of the HIPAA Privacy Rule. ( n.d.). https://www.hhs.gov/hipaa/for-professionals/privacy/index.htmlGoogle ScholarGoogle Scholar
  11. United States Department of Health and Human Services Office for Civil Rights. n.d.. Summary of the HIPAA Security Rule. ( n.d.). https://www.hhs.gov/hipaa/for-professionals/security/index.htmlGoogle ScholarGoogle Scholar
  12. Rothenberg, Mikel A. Sell, Rebecca and Charles F. Chapman, 2012. Dictionary of Medical Terms. Vol. Vol. 6. Barron's Educational Series.Google ScholarGoogle Scholar
  13. Vijay et al Srinivasan. 2008. Protecting your daily in-home activity information from a wireless snooping attack Proceedings of the 10th international conference on Ubiquitous computing. ACM, New York, 202--211.Google ScholarGoogle Scholar

Index Terms

  1. Cleartext Data Transmissions in Consumer IoT Medical Devices

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy
        November 2017
        90 pages
        ISBN:9781450353960
        DOI:10.1145/3139937

        Copyright © 2017 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 November 2017

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        IoTS&P '17 Paper Acceptance Rate12of30submissions,40%Overall Acceptance Rate12of30submissions,40%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader