Wearables and Cybersecurity: Navigating the Threat Landscape

被引:2
作者
Hora, Ayushi [1 ]
Kulkarni, Prasanna [1 ]
机构
[1] Symbiosis Int Deemed Univ, Symbiosis Inst Digital & Telecom Management, Pune, Maharashtra, India
来源
2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024 | 2024年
关键词
Wearable devices; Internet of Things (IoT); Cybersecurity; Vulnerabilities;
D O I
10.1109/ICSCSS60660.2024.10625662
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The development of wearable devices, like smartwatches and fitness trackers, transformed how people interact with technology and adopt it across various domains. However, individuals must not overlook the threat they encounter using these devices. As modern civilisation is increasingly predicated on electronic technology, securing these devices from cyber-attacks is a complex problem. The rising popularity of wearable devices has raised serious concerns about their cybersecurity vulnerabilities and attack vectors, mainly due to the sensitive personal information they collect and store. With this perspective, this research study reviews the architecture of IoT systems, the types and characteristics of wearable devices and their connection to the IoT systems. It analyses cybersecurity risks such as unauthorised access to data, device tampering, and malicious software or firmware. The study discusses the various attack vectors targeted at these vulnerabilities regarding Bluetooth, Wi-Fi, and physical attacks. Thus, the challenge in wearable device cybersecurity lies in safeguarding personal data stored within these devices against unauthorised access and tampering. It concludes that the security flaws of wearable devices need to be minimised by improving the present software and designs. This paper emphasises the need for consistent research and analysis to ensure wearable devices are not vulnerable to emerging cyber security risks. It further brings out the need for concerted action amongst all the stakeholders.
引用
收藏
页码:563 / 567
页数:5
相关论文
共 25 条
[1]  
Ageed Z., 2023, Cloud Analysis for Machine Learning Methods Implementation Based on IoT, Information Systems, and Web Technology, V1, P664, DOI [10.17605/OSF.IO/B68WU, DOI 10.17605/OSF.IO/B68WU]
[2]   Wearable Devices for Remote Monitoring of Heart Rate and Heart Rate Variability-What We Know and What Is Coming [J].
Alugubelli, Navya ;
Abuissa, Hussam ;
Roka, Attila .
SENSORS, 2022, 22 (22)
[3]  
Arthur C., 2013, The Guardian 17-Jul
[4]   Analysis of Consumer IoT Device Vulnerability Quantification Frameworks [J].
Baho, Samira A. ;
Abawajy, Jemal .
ELECTRONICS, 2023, 12 (05)
[5]   Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey [J].
Barua, Arup ;
Al Alamin, Md Abdullah ;
Hossain, Md Shohrab ;
Hossain, Ekram .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 :251-281
[6]  
Bentham's Gaze, 2016, A Privacy Enhancing Architecture for Secure Wearable Devices
[7]  
Cavoukian A, 2011, Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era, DOI [10.4018/978-1-61350-501-4.ch007, DOI 10.4018/978-1-61350-501-4.CH007]
[8]  
Ching K.W., 2016, Int. J. Netw. Secur. Its Appl., V8, P19, DOI 10.5121/ijnsa.2016.8302
[9]   Intrusion detection systems for IoT-based smart environments: a survey [J].
Elrawy, Mohamed Faisal ;
Awad, Ali Ismail ;
Hamed, Hesham F. A. .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2018, 7
[10]   An empirical study of wearable technology acceptance in healthcare [J].
Gao, Yiwen ;
Li, He ;
Luo, Yan .
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2015, 115 (09) :1704-1723