Equipped with sensors that are capable of collecting physiological and environmental data continuously, wearable technologies have the potential to become a valuable component of personalized healthcare and health management. However, in addition to the potential benefits of wearable devices, the widespread and continuous use of wearables also poses many privacy challenges. In some instances, users may not be aware of the risks associated with wearable devices, while in other cases, users may be aware of the privacy-related risks, but may be unable to negotiate complicated privacy settings to meet their needs and preferences. This lack of awareness could have an adverse impact on users in the future, even becoming a “skeleton in the closet.” In this work, we conducted 32 semi-structured interviews to understand how users perceive privacy in wearable computing. Results suggest that user concerns toward wearable privacy have different levels of variety ranging from no concern to highly concerned. In addition, while user concerns and benefits are similar among participants in our study, these variablesshould be investigated more extensively for the development of privacy enhanced wearable technologies.
- Byron Lowens, Vivian G. Motti, and Kelly E. Caine. Wearable Privacy: Skeletons in the Data Closet. Proceedings of IEEE International Conference on Healthcare Informatics (ICHI). Park City, UT, 2017, pp. 295-304. DOI: 10.1109/ICHI.2017.29
Byron presenting his paper, “Wearable Privacy: Skeletons in the Data Closet” at ICHI 2017
Abstract: In this work, we attempt to determine whether the contextual information of a participant can be used to predict whether the participant will respond to a particular EMA trigger. We use a publicly available dataset for our work, and find that by using basic contextual features about the participant’s activity, conversation status, audio, and location, we can predict if an EMA triggered at a particular time will be answered with a precision of 0.647, which is significantly higher than a baseline precision of 0.41. Using this knowledge, the researchers conducting field studies can efficiently schedule EMAs and achieve higher response rates.
Varun Mishra, Byron Lowens, Sarah Lord, Kelly Caine, and David Kotz. Investigating Contextual Cues As Indicators for EMA Delivery. In Proceedings of the International Workshop on Smart & Ambient Notification and Attention Management (UbiTtention), pages 935-940, September 2017. ACM. DOI 10.1145/3123024.3124571.
Taylor Hardin presented a poster at ACM MobiSys conference this week, about some clever new ideas for protecting the memory inside an MSP430 when mutually-untrusted apps have to share the same small memory. Abstract below.
Taylor Hardin explains his work to attendees at MobiSys.
David Harmon ’17 develops and evaluates a novel protocol for secure transfer of sensor data from an Amulet to a smartphone, in this Senior Honors Thesis released as a Dartmouth Computer Science Technical Report.
Abstract. The authenticity, confidentiality, and integrity of data streams from wearable healthcare devices are critical to patients, researchers, physicians, and others who depend on this data to measure the effectiveness of treatment plans and clinical trials. Many forms of mHealth data are highly sensitive; in the hands of unintended parties such data may reveal indicators of a patient’s disorder, disability, or identity. Furthermore, if a malicious party tampers with the data, it can affect the diagnosis or treatment of patients, or the results of a research study. Although existing network protocols leverage encryption for confidentiality and integrity, network-level encryption does not provide end-to-end security from the device, through the smartphone and database, to downstream data consumers. In this thesis we provide a new open protocol that provides end-to-end authentication, confidentiality, and integrity for healthcare data in such a pipeline.
We present and evaluate a prototype implementation to demonstrate this protocol’s feasibility on low-power wearable devices, and present a case for the system’s ability to meet critical security properties under a specific adversary model and trust assumptions.
Advisor: David Kotz.
George Boateng, M.S., reports on new Amulet research in his Master’s thesis, available as a Dartmouth Computer Science Technical Report.
Abstract. Physical activity helps reduce the risk of cardiovascular disease, hypertension and obesity. The ability to monitor a person’s daily activity level can inform self-management of physical activity and related interventions. For older adults with obesity, the importance of regular, physical activity is critical to reduce the risk of long-term disability. In this work, we present ActivityAware, an application on the Amulet wrist-worn device that monitors the daily activity levels (low, moderate and vigorous) of older adults in real-time. The app continuously collects acceleration data on the Amulet, classifies the current activity level, updates the day’s accumulated time spent at that activity level, displays the results on the screen and logs summary data for later analysis.
The app implements an activity-level detection model we developed using a Linear Support Vector Machine (SVM). We trained our model using data from a user study, where subjects performed common physical activities (sit, stand, lay down, walk and run). We obtained accuracies up to 99.2% and 98.5% with 10-fold cross validation and leave-one-subject-out (LOSO) cross-validation respectively. We ran a week-long field study to evaluate the utility, usability and battery life of the ActivityAware system where 5 older adults wore the Amulet as it monitored their activity level. The utility evaluation showed that the app was somewhat useful in achieving the daily physical activity goal. The usability feedback showed that the ActivityAware system has the potential to be used by people for monitoring their activity levels. Our energy-efficiency evaluation revealed a battery life of at least 1 week before needing to recharge. The results are promising, indicating that the app may be used for activity-level monitoring by individuals or researchers for epidemiological studies, and eventually for the development of interventions that could improve the health of older adults.
Advisors: David Kotz, Ryan Halter, John Batsis
Congratulations to Emily Greene, an undergraduate in the Amulet group, who received Honorable Mention for the NCWIT Collegiate Award from the National Center for Women & Information Technology (NCWIT). Emily is spending this week at the NCWIT Summit on Women and IT in Tucson, Arizona.
Here is her video submission, which describes a cryptographically-supported mechanism for selective sharing of streams of mHealth data, such as those that would be produced by Amulet applications.
This presentation was captured and shared by the University of Washington when Professor David Kotz visited to present the Amulet project in a CS department colloquium, early in December 2016.
Today at the ACM Conference on Embedded Networked Sensor Systems (SenSys 2016) the Amulet team presented a paper about the design and evaluation of the Amulet platform – watch a video of the talk. We also unveiled a video overview of the platform and its capabilities. Check out the specs below the photo.
Indeed, we are pleased to share the Amulet hardware and software, open-source on GitHub, under a generous license that allows free use by the research community. We encourage you to download the details, fabricate your own Amulet wearable, and let us know what you think!
I’m pleased to share a new paper that we’ll be presenting next month at the Workshop on Mobile Medical Applications – Design and Development (WMMADD) at SenSys in Memphis.
Abstract: Interest in using mobile technologies for health-related applications (mHealth) has increased. However, none of the available mobile platforms provide the essential properties that are needed by these applications. An mHealth platform must be (i) secure; (ii) provide high availability; and (iii) allow for the deployment of multiple third-party mHealth applications that share access to an individual’s devices and data. Smartphones may not be able to provide property (ii) because there are activities and situations in which an individual may not be able to carry them (e.g., while in a contact sport). A low-power wearable device can provide higher availability, remaining attached to the user during most activities. Furthermore, some mHealth applications require integrating multiple on-body or near-body devices, some owned by a single individual, but others shared with multiple individuals. In this paper, we propose a secure system architecture for a low-power bracelet that can run multiple applications and manage access to shared resources in a body-area mHealth network. The wearer can install a personalized mix of third-party applications to support the monitoring of multiple medical conditions or wellness goals, with strong security safeguards. Our preliminary implementation and evaluation supports the hypothesis that our approach allows for the implementation of a resource monitor on far less power than would be consumed by a mobile device running Linux or Android. Our preliminary experiments demonstrate that our secure architecture would enable applications to run for several weeks on a small wearable device without recharging.
Andrés Molina-Markham, Ronald Peterson, Joseph Skinner, Tianlong Yun, Bhargav Golla, Kevin Freeman, Travis Peters, Jacob Sorber, Ryan Halter, David Kotz. Amulet: A secure architecture for mHealth applications for low-power wearable devices. In Proceedings of the Workshop on Mobile Medical Applications – Design and Development (WMMADD), November 2014. [PDF]