{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:29:23Z","timestamp":1774801763801,"version":"3.50.1"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T00:00:00Z","timestamp":1481068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2016,12,22]]},"abstract":"<jats:p>Analyzing the security of Wearable Internet-of-Things (WIoT) devices is considered a complex task due to their heterogeneous nature. In addition, there is currently no mechanism that performs security testing for WIoT devices in different contexts. In this article, we propose an innovative security testbed framework targeted at wearable devices, where a set of security tests are conducted, and a dynamic analysis is performed by realistically simulating environmental conditions in which WIoT devices operate. The architectural design of the proposed testbed and a proof-of-concept, demonstrating a preliminary analysis and the detection of context-based attacks executed by smartwatch devices, are presented.<\/jats:p>","DOI":"10.1145\/2981546","type":"journal-article","created":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T20:36:23Z","timestamp":1481142983000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Advanced Security Testbed Framework for Wearable IoT Devices"],"prefix":"10.1145","volume":"16","author":[{"given":"Shachar","family":"Siboni","sequence":"first","affiliation":[{"name":"Ben-Gurion University of the Negev, Israel"}]},{"given":"Asaf","family":"Shabtai","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Israel"}]},{"given":"Nils O.","family":"Tippenhauer","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Jemin","family":"Lee","sequence":"additional","affiliation":[{"name":"Daegu Gyeongbuk Institute of Science and Technology, Daegu, South Korea"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Israel; Singapore University of Technology and Design, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,12,7]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Retrieved","author":"Almasy John","year":"2015","unstructured":"John Almasy . 2015 . How do wearables fit in your enterprise ? Retrieved November 28, 2015 from http:\/\/blogs.unisys.com\/mobility\/how-do-wearables-fit-in-your-enterprise\/. John Almasy. 2015. How do wearables fit in your enterprise? Retrieved November 28, 2015 from http:\/\/blogs.unisys.com\/mobility\/how-do-wearables-fit-in-your-enterprise\/."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/876883.879878"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523501.2523506"},{"key":"e_1_2_1_5_1","volume-title":"Video. Retrieved","year":"2014","unstructured":"Bitdefender. 2014 . Bitdefender research exposes plain-text android wearable devices communication . Video. Retrieved November 28, 2015 from https:\/\/www.youtube.com\/watch?t&equals;1498V&equals;utVnrq5uCuM. Bitdefender. 2014. Bitdefender research exposes plain-text android wearable devices communication. Video. Retrieved November 28, 2015 from https:\/\/www.youtube.com\/watch?t&equals;1498V&equals;utVnrq5uCuM."},{"key":"e_1_2_1_6_1","volume-title":"Retrieved","author":"Blum Brent","year":"2015","unstructured":"Brent Blum . 2015 a. Are your wearables safe from cyber-security threats ? Retrieved November 28, 2015 from https:\/\/www.accenture.com\/us-en\/blogs\/blogs-are-your-wearables-safe-from-cyber-security-threats. Brent Blum. 2015a. Are your wearables safe from cyber-security threats? Retrieved November 28, 2015 from https:\/\/www.accenture.com\/us-en\/blogs\/blogs-are-your-wearables-safe-from-cyber-security-threats."},{"key":"e_1_2_1_7_1","volume-title":"Retrieved","author":"Blum Brent","year":"2015","unstructured":"Brent Blum . 2015 b. How to protect your wearables implementation from cyber-security threats . Retrieved November 28, 2015 from https:\/\/www.accenture.com\/us-en\/blogs\/blogs-how-to-protect-your-wearables-implementation-from-cyber-security-threats. Brent Blum. 2015b. How to protect your wearables implementation from cyber-security threats. Retrieved November 28, 2015 from https:\/\/www.accenture.com\/us-en\/blogs\/blogs-how-to-protect-your-wearables-implementation-from-cyber-security-threats."},{"key":"e_1_2_1_8_1","volume-title":"Retrieved","author":"Brandon John","year":"2014","unstructured":"John Brandon . 2014 . Wearable devices pose threats to privacy and security . Retrieved November 28, 2015 http:\/\/www.foxnews.com\/tech\/2014\/06\/18\/wearable-devices-pose-threats-to-privacy-and-security.html. John Brandon. 2014. Wearable devices pose threats to privacy and security. Retrieved November 28, 2015 http:\/\/www.foxnews.com\/tech\/2014\/06\/18\/wearable-devices-pose-threats-to-privacy-and-security.html."},{"key":"e_1_2_1_9_1","volume-title":"Retrieved","author":"Briodagh Ken","year":"2015","unstructured":"Ken Briodagh . 2015 . Wearable security is a matter of establishing standards . Retrieved November 28, 2015 from http:\/\/www.iotevolutionworld.com\/m2m\/articles\/401623-wearable-security-a-matter-establishing-standards.htm. Ken Briodagh. 2015. Wearable security is a matter of establishing standards. Retrieved November 28, 2015 from http:\/\/www.iotevolutionworld.com\/m2m\/articles\/401623-wearable-security-a-matter-establishing-standards.htm."},{"key":"e_1_2_1_10_1","unstructured":"Gerald Combs. 2007. Wireshark--A network protocol analyzer. https:\/\/www.wireshark.org\/.  Gerald Combs. 2007. Wireshark--A network protocol analyzer. https:\/\/www.wireshark.org\/."},{"key":"e_1_2_1_11_1","volume-title":"Retrieved","author":"Cooper Charles","year":"2015","unstructured":"Charles Cooper . 2015 . Latest security challenges: Wearables . Retrieved November 28, 2015 from http:\/\/theartofthehack.com\/latest-security-challenge-wearables\/. Charles Cooper. 2015. Latest security challenges: Wearables. Retrieved November 28, 2015 from http:\/\/theartofthehack.com\/latest-security-challenge-wearables\/."},{"key":"e_1_2_1_12_1","volume-title":"Security analysis of wearable fitness devices (fitbit)","author":"Cyr Britt","year":"2015","unstructured":"Britt Cyr , Webb Horn , Daniela Miao , and Michael Specter . 2014. Security analysis of wearable fitness devices (fitbit) . Massachusetts Institute of Technology (MIT) . Retrieved November 29, 2015 from https:\/\/courses.csail.mit.edu\/6.857\/2014\/files\/17-cyrbritt-webbhorn-specter-dmiao-hacking-fitbit.pdf. Britt Cyr, Webb Horn, Daniela Miao, and Michael Specter. 2014. Security analysis of wearable fitness devices (fitbit). Massachusetts Institute of Technology (MIT). Retrieved November 29, 2015 from https:\/\/courses.csail.mit.edu\/6.857\/2014\/files\/17-cyrbritt-webbhorn-specter-dmiao-hacking-fitbit.pdf."},{"key":"e_1_2_1_13_1","volume-title":"Retrieved","author":"Donohue Brian","year":"2014","unstructured":"Brian Donohue . 2014 . Same security threats, different devices: Wearables and watchables . Retrieved November 28, 2015 from https:\/\/blog.kaspersky.com\/same_security_threats_new_devices\/6015\/. Brian Donohue. 2014. Same security threats, different devices: Wearables and watchables. Retrieved November 28, 2015 from https:\/\/blog.kaspersky.com\/same_security_threats_new_devices\/6015\/."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2012.6399701"},{"key":"e_1_2_1_15_1","volume-title":"Retrieved","author":"Goodin Dan","year":"2015","unstructured":"Dan Goodin . 2015 . Police body cams found pre-installed with notorious conficker worm . Retrieved November 28, 2015 from http:\/\/arstechnica.com\/security\/2015\/11\/police-body-cams-found-pre-installed-with-notorious-conficker-worm\/. Dan Goodin. 2015. Police body cams found pre-installed with notorious conficker worm. Retrieved November 28, 2015 from http:\/\/arstechnica.com\/security\/2015\/11\/police-body-cams-found-pre-installed-with-notorious-conficker-worm\/."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2015.23"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"e_1_2_1_19_1","volume-title":"Retrieved","author":"Hammond Teena","year":"2014","unstructured":"Teena Hammond . 2014 . The scary truth about data security with wearables . Retrieved November 28, 2015 from http:\/\/www.techrepublic.com\/article\/the-scary-truth-about-data-security-with-wearables\/. Teena Hammond. 2014. The scary truth about data security with wearables. Retrieved November 28, 2015 from http:\/\/www.techrepublic.com\/article\/the-scary-truth-about-data-security-with-wearables\/."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobihealth.2014.257440"},{"key":"e_1_2_1_21_1","unstructured":"William John Holden. 2015. PIPS -- The Pamn IP Scanner: A wrapper for nmap cross-compiled for ARM android. https:\/\/github.com\/wjholden\/PIPS\/tree\/master\/app\/src\/main\/java\/com\/wjholden\/nmap.  William John Holden. 2015. PIPS -- The Pamn IP Scanner: A wrapper for nmap cross-compiled for ARM android. https:\/\/github.com\/wjholden\/PIPS\/tree\/master\/app\/src\/main\/java\/com\/wjholden\/nmap."},{"key":"e_1_2_1_22_1","volume-title":"Retrieved","year":"2015","unstructured":"iTrust. 2015 . Cyber security patrol (CSP) . Retrieved November 29, 2015 from http:\/\/itrust.sutd.edu. sg\/research\/projects\/cyber-security-patrol\/. iTrust. 2015. Cyber security patrol (CSP). Retrieved November 29, 2015 from http:\/\/itrust.sutd.edu. sg\/research\/projects\/cyber-security-patrol\/."},{"key":"e_1_2_1_23_1","volume-title":"Retrieved","author":"Jain Khyati","year":"2015","unstructured":"Khyati Jain . 2015 . Ransomware attacks threaten wearable devices and internet of things . Retrieved November 28, 2015 from http:\/\/thehackernews.com\/2015\/08\/ransomware-android-smartwatch.html. Khyati Jain. 2015. Ransomware attacks threaten wearable devices and internet of things. Retrieved November 28, 2015 from http:\/\/thehackernews.com\/2015\/08\/ransomware-android-smartwatch.html."},{"key":"e_1_2_1_24_1","volume-title":"Retrieved","author":"Labs Kaspersky","year":"2014","unstructured":"Kaspersky Labs . 2014 . Wear the danger: Kaspersky lab experts warn of security risks facing wearable connected devices . Retrieved November 28, 2015 from http:\/\/www.kaspersky.com\/au\/about\/news\/virus\/2014\/wear-the-danger. Kaspersky Labs. 2014. Wear the danger: Kaspersky lab experts warn of security risks facing wearable connected devices. Retrieved November 28, 2015 from http:\/\/www.kaspersky.com\/au\/about\/news\/virus\/2014\/wear-the-danger."},{"key":"e_1_2_1_25_1","volume-title":"Joong Hwa Lee, and David Wagner","author":"Lee Linda","year":"2015","unstructured":"Linda Lee , Serge Egelman , Joong Hwa Lee, and David Wagner . 2015 . Risk perceptions for wearable devices. arXiv preprint arXiv:1504.05694 (2015). Linda Lee, Serge Egelman, Joong Hwa Lee, and David Wagner. 2015. Risk perceptions for wearable devices. arXiv preprint arXiv:1504.05694 (2015)."},{"key":"e_1_2_1_26_1","volume-title":"Retrieved","author":"Lennon Mike","year":"2015","unstructured":"Mike Lennon . 2015 . All smartwatches vulnerable to attack: HP study . Retrieved November 28, 2015 from http:\/\/www.securityweek.com\/all-smartwatches-vulnerable-attack-hp-study. Mike Lennon. 2015. All smartwatches vulnerable to attack: HP study. Retrieved November 28, 2015 from http:\/\/www.securityweek.com\/all-smartwatches-vulnerable-attack-hp-study."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2010.61"},{"key":"e_1_2_1_28_1","volume-title":"4th International Forum on Applied Wearable Computing (IFAWC). 1--8. VDE","author":"Lindstr\u00f6m John","year":"2007","unstructured":"John Lindstr\u00f6m . 2007 . Security challenges for wearable computing-a case study. In 2007 4th International Forum on Applied Wearable Computing (IFAWC). 1--8. VDE , 2007. John Lindstr\u00f6m. 2007. Security challenges for wearable computing-a case study. In 2007 4th International Forum on Applied Wearable Computing (IFAWC). 1--8. VDE, 2007."},{"key":"e_1_2_1_29_1","volume-title":"Retrieved","author":"Locke Clayton","year":"2014","unstructured":"Clayton Locke . 2014 . Top 3 security tips for wearable devices . Retrieved November 28, 2015 from http:\/\/www.intelligentenvironments.com\/info-centre\/blog\/top-3-security-tips-for-wearable-devices. Clayton Locke. 2014. Top 3 security tips for wearable devices. Retrieved November 28, 2015 from http:\/\/www.intelligentenvironments.com\/info-centre\/blog\/top-3-security-tips-for-wearable-devices."},{"key":"e_1_2_1_30_1","unstructured":"Gordon Lyon. 2009. Nmap-Free security scanner for network exploration and security audits. https:\/\/nmap.org\/.  Gordon Lyon. 2009. Nmap-Free security scanner for network exploration and security audits. https:\/\/nmap.org\/."},{"key":"e_1_2_1_31_1","first-page":"89","article-title":"Outsmarting proctors with smartwatches: A case study on wearable computing security","volume":"8437","author":"Migicovsky Alex","year":"2014","unstructured":"Alex Migicovsky , Zakir Durumeric , Jeff Ringenberg , and J. Alex Halderman . 2014 . Outsmarting proctors with smartwatches: A case study on wearable computing security . In Financial Cryptography and Data Security , 8437 , 89 -- 96 . Springer Berlin. 2014. Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg, and J. Alex Halderman. 2014. Outsmarting proctors with smartwatches: A case study on wearable computing security. In Financial Cryptography and Data Security, 8437, 89--96. Springer Berlin. 2014.","journal-title":"Financial Cryptography and Data Security"},{"key":"e_1_2_1_32_1","volume-title":"Retrieved","author":"Nguyen Peter","year":"2014","unstructured":"Peter Nguyen . 2014 . Wearable tech and personal security breaches: 6 things to know . Retrieved November 28, 2015 from http:\/\/blog.hotspotshield.com\/2014\/12\/16\/wearable-tech-and-personal-security-breaches\/. Peter Nguyen. 2014. Wearable tech and personal security breaches: 6 things to know. Retrieved November 28, 2015 from http:\/\/blog.hotspotshield.com\/2014\/12\/16\/wearable-tech-and-personal-security-breaches\/."},{"key":"e_1_2_1_33_1","unstructured":"Offensive Security. 2016. Kali linux--an advanced penetration testing linux distribution used for penetration testing ethical hacking and network security assessments. https:\/\/www.kali.org\/.  Offensive Security. 2016. Kali linux--an advanced penetration testing linux distribution used for penetration testing ethical hacking and network security assessments. https:\/\/www.kali.org\/."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2390034"},{"key":"e_1_2_1_35_1","volume-title":"Retrieved","author":"Puckett Jenna","year":"2014","unstructured":"Jenna Puckett . 2014 . How to prevent wearable devices from ruining your information security . Retrieved November 28, 2015 from http:\/\/www.fiercecio.com\/story\/how-prevent-wearable-devices-ruining-your-information-security\/2014-11-25. Jenna Puckett. 2014. How to prevent wearable devices from ruining your information security. Retrieved November 28, 2015 from http:\/\/www.fiercecio.com\/story\/how-prevent-wearable-devices-ruining-your-information-security\/2014-11-25."},{"key":"e_1_2_1_36_1","volume-title":"Retrieved","author":"Rogers Marc","year":"2013","unstructured":"Marc Rogers . 2013 . Hacking the internet of things for good . Retrieved November 28, 2015 from https:\/\/blog.lookout.com\/blog\/2013\/07\/17\/hacking-the-internet-of-things-for-good\/. Marc Rogers. 2013. Hacking the internet of things for good. Retrieved November 28, 2015 from https:\/\/blog.lookout.com\/blog\/2013\/07\/17\/hacking-the-internet-of-things-for-good\/."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2008.4711235"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan1030217"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"e_1_2_1_40_1","volume-title":"Retrieved","author":"Tolentino Mellisa","year":"2013","unstructured":"Mellisa Tolentino . 2013 . 4 Security Challenges for Fitbit, Google Glass + Other Wearable Devices . Retrieved November 28, 2015 from http:\/\/siliconangle.com\/blog\/2013\/05\/30\/4-security-challenges-for-fitbit-google-glass-other-wearable-devices\/. Mellisa Tolentino. 2013. 4 Security Challenges for Fitbit, Google Glass + Other Wearable Devices. Retrieved November 28, 2015 from http:\/\/siliconangle.com\/blog\/2013\/05\/30\/4-security-challenges-for-fitbit-google-glass-other-wearable-devices\/."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIME.2009.142"},{"key":"e_1_2_1_42_1","volume-title":"Retrieved","author":"Upton David","year":"2014","unstructured":"David Upton . 2014 . 5 essential wearable tech security tips . Retrieved November 28, 2015 from http:\/\/betanews.com\/2014\/12\/09\/5-essential-wearable-tech-security-tips\/. David Upton. 2014. 5 essential wearable tech security tips. Retrieved November 28, 2015 from http:\/\/betanews.com\/2014\/12\/09\/5-essential-wearable-tech-security-tips\/."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2981546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2981546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:29Z","timestamp":1750273649000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2981546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,7]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12,22]]}},"alternative-id":["10.1145\/2981546"],"URL":"https:\/\/doi.org\/10.1145\/2981546","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,7]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}