A Case Study Exploring Side-Channel Attacks On Pet Wearables

A. Levina*, V. Varyukhin, D. Kaplun, A. Zamansky, Dirk van der Linden

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)
62 Downloads (Pure)

Abstract

IoT has long since come to the pet industry resulting in a proliferation of data-intensive devices including tracking anything from activity, health, to location. The resulting ‘Internet of Pets’ is generating large volumes of animal data which, due to the close link between the digital profile of companion animals held as pets (e.g., cats and dogs) and their caregivers holds significant security and privacy implications. In this case study we explore the vulnerability of such pet wearables to side-channel attacks, describing our implementation of an electromagnetic attack on a now discontinued dog activity tracker. We show how we were able to successfully exfiltrate data from the device during the Base64 encoding process and discuss what implications this holds for the security of these devices, given the lack of protection that animal data is afforded under extant existing data protection policy and legislation.

Original languageEnglish
Article numberIJCS_48_4_04
Pages (from-to)878-883
Number of pages6
JournalIAENG International Journal of Computer Science
Volume48
Issue number4
Early online date22 Nov 2021
Publication statusPublished - Dec 2021

Keywords

  • Base64 encoding algorithm
  • Bluetooth
  • Electromagnetic attack
  • Pet wearables
  • Side-channel attack
  • Traces

Fingerprint

Dive into the research topics of 'A Case Study Exploring Side-Channel Attacks On Pet Wearables'. Together they form a unique fingerprint.

Cite this