Skip to main content

Survey on IMD and Wearable Devices Security Threats and Protection Methods

  • Conference paper
  • First Online:
  • 1662 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11068))

Abstract

In recent years, the developments in electronic science and technology have led to abundant new wearable devices and IMDs, but with the use of those devices increases, the concern about their security also becomes serious. In this paper, we give a survey on the security threat and protection method of IMD and wearable devices and compare those protection methods regarding different factors.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Arias, O., Wurm, J., Hoang, K., Jin, Y.: Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2015)

    Article  Google Scholar 

  2. Ly, K., Jin, Y.: Security studies on wearable fitness trackers. In: 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE (2016)

    Google Scholar 

  3. Nohara, K., Nozaki, Y., Yoshikawa, M.: Hardware Trojan for ultra-lightweight block cipher piccolo. In: 4th Global Conference on Consumer Electronics (GCCE), Arigato, pp. 202–203. IEEE (2015)

    Google Scholar 

  4. Lotfy, K., Hale, M.L.: Assessing pairing and data exchange mechanism security in the wearable internet of things. In: International Conference on Mobile Services (MS), Hiroshima, pp. 25–32. IEEE (2016)

    Google Scholar 

  5. Nia, A.M., Sur-Kolay, S., Raghunathan, A., Jha, N.: Physiological information leakage: a new frontier in health information security. IEEE Trans. Emerg. Top. Comput. 4(3), 321–334 (2016)

    Article  Google Scholar 

  6. Buttyan, L., Holczer, T.: Traffic analysis attacks and countermeasures in wireless body area sensor networks. In: 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, pp. 1–6. IEEE (2012)

    Google Scholar 

  7. Ruaro, A., Thaysen, J., Jakobsen, K.B.: Battery coupling impact on the antenna efficiency in a small wearable device. In: Antennas & Propagation Conference (LAPC), Loughborough, pp. 1–4. IEEE (2015)

    Google Scholar 

  8. He, L., Yin, W.: Interference evaluation of bluetooth and IEEE 802.11b systems. In: Proceedings of the 4th International Conference on Microwave and Millimeter Wave Technology (ICMMT), pp. 931–934. IEEE (2014)

    Google Scholar 

  9. Delail, B.A., Yeun, C.Y.: Recent advances of smart glass application security and privacy. In: 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, pp. 65–69. IEEE (2015)

    Google Scholar 

  10. Lee, M., Lee, K., Shim, J., Cho, S., Choi, J.: Security threat on wearable services: empirical study using a commercial smartband. In: IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), Seoul, pp. 1–5. IEEE (2016)

    Google Scholar 

  11. Chen, M., Qian, Y., Chen, J., Hwang, K., Mao, S., Hu, L.: Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans. Cloud Comput. 1, 99 (2016)

    Google Scholar 

  12. Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)

    Article  Google Scholar 

  13. Kim, J., Lee, B., Yoo, S.K.: Design of real-time encryption module for secure data protection of wearable healthcare devices. In: 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Osaka, pp. 2283–2286. IEEE (2013)

    Google Scholar 

  14. Zhou, J., Cao, Z., Dong, X., Lin, X.: PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J. Sel. Top. Sign. Proces. 9(7), 1332–1344 (2015)

    Article  Google Scholar 

  15. Haar, D.: CaNViS, a cardiac and neurological-based verification system that uses wearable sensors. In: Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), Moscow, pp. 99–104. IEEE (2015)

    Google Scholar 

  16. Khan, R., Hasan, R., Xu, J.: SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices. In: 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), San Francisco, pp. 41–50. IEEE (2015)

    Google Scholar 

  17. Yang, L., Wang, W., Zhang, Q.: VibID: user identification through Bio-Vibrometry. In: 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1–12. ACM/IEEE (2016)

    Google Scholar 

  18. Liu, J., Kwak, K.S.: Hybrid security mechanisms for wireless body area networks. In: 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN), Jeju Island, pp. 98–103. IEEE (2010)

    Google Scholar 

  19. Truong, T., Luong, V., Tran, M., Duong, A.: Secure identity-based authentication scheme suitable for limited-resource devices. In: 12th International Conference on Computational Intelligence and Security (CIS), Wuxi, pp. 271–276. IEEE (2016)

    Google Scholar 

  20. Zheng, G., Shankaran, R., Orgun, M.A., Qiao, L., Saleem, K.: Ideas and challenges for securing wireless implantable medical devices: a review. IEEE Sens. J. 17(3), 562–576 (2017)

    Article  Google Scholar 

  21. Chang, S., Jil, S., Shen, J., Liu, D., Tan, H.: A survey on key management for body sensor network. In: 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), pp. 217–221. IEEE (2015)

    Google Scholar 

  22. Lamkin, P.: Wearable tech market to be worth $34 billion by 2020. https://www.forbes.com/sites/paullamkin/2016/02/17/wearable-tech-market-to-be-worth-34-billion-by-2020/#13bb51433cb5. Accessed 17 Feb 2016

  23. Cai, Z., Wang, Z., Zheng, K., Cao, J.: A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Comput. 62(3), 417–427 (2013)

    Article  MathSciNet  Google Scholar 

  24. Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Securing display path for security-sensitive applications on mobile devices. Comput. Mater. Continua 55(1), 17–35 (2018)

    Google Scholar 

  25. Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., Wang, G.: Security and privacy in the medical internet of things. Secur. Commun. Netw. 2018, 5978636 (2018). https://doi.org/10.1155/2018/5978636

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jiaping Yu or Bingnan Hou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, J., Hou, B. (2018). Survey on IMD and Wearable Devices Security Threats and Protection Methods. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00021-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00020-2

  • Online ISBN: 978-3-030-00021-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics