Abstract
In recent years, the developments in electronic science and technology have led to abundant new wearable devices and IMDs, but with the use of those devices increases, the concern about their security also becomes serious. In this paper, we give a survey on the security threat and protection method of IMD and wearable devices and compare those protection methods regarding different factors.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Arias, O., Wurm, J., Hoang, K., Jin, Y.: Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2015)
Ly, K., Jin, Y.: Security studies on wearable fitness trackers. In: 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE (2016)
Nohara, K., Nozaki, Y., Yoshikawa, M.: Hardware Trojan for ultra-lightweight block cipher piccolo. In: 4th Global Conference on Consumer Electronics (GCCE), Arigato, pp. 202–203. IEEE (2015)
Lotfy, K., Hale, M.L.: Assessing pairing and data exchange mechanism security in the wearable internet of things. In: International Conference on Mobile Services (MS), Hiroshima, pp. 25–32. IEEE (2016)
Nia, A.M., Sur-Kolay, S., Raghunathan, A., Jha, N.: Physiological information leakage: a new frontier in health information security. IEEE Trans. Emerg. Top. Comput. 4(3), 321–334 (2016)
Buttyan, L., Holczer, T.: Traffic analysis attacks and countermeasures in wireless body area sensor networks. In: 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, pp. 1–6. IEEE (2012)
Ruaro, A., Thaysen, J., Jakobsen, K.B.: Battery coupling impact on the antenna efficiency in a small wearable device. In: Antennas & Propagation Conference (LAPC), Loughborough, pp. 1–4. IEEE (2015)
He, L., Yin, W.: Interference evaluation of bluetooth and IEEE 802.11b systems. In: Proceedings of the 4th International Conference on Microwave and Millimeter Wave Technology (ICMMT), pp. 931–934. IEEE (2014)
Delail, B.A., Yeun, C.Y.: Recent advances of smart glass application security and privacy. In: 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, pp. 65–69. IEEE (2015)
Lee, M., Lee, K., Shim, J., Cho, S., Choi, J.: Security threat on wearable services: empirical study using a commercial smartband. In: IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), Seoul, pp. 1–5. IEEE (2016)
Chen, M., Qian, Y., Chen, J., Hwang, K., Mao, S., Hu, L.: Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans. Cloud Comput. 1, 99 (2016)
Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)
Kim, J., Lee, B., Yoo, S.K.: Design of real-time encryption module for secure data protection of wearable healthcare devices. In: 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Osaka, pp. 2283–2286. IEEE (2013)
Zhou, J., Cao, Z., Dong, X., Lin, X.: PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J. Sel. Top. Sign. Proces. 9(7), 1332–1344 (2015)
Haar, D.: CaNViS, a cardiac and neurological-based verification system that uses wearable sensors. In: Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), Moscow, pp. 99–104. IEEE (2015)
Khan, R., Hasan, R., Xu, J.: SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices. In: 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), San Francisco, pp. 41–50. IEEE (2015)
Yang, L., Wang, W., Zhang, Q.: VibID: user identification through Bio-Vibrometry. In: 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1–12. ACM/IEEE (2016)
Liu, J., Kwak, K.S.: Hybrid security mechanisms for wireless body area networks. In: 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN), Jeju Island, pp. 98–103. IEEE (2010)
Truong, T., Luong, V., Tran, M., Duong, A.: Secure identity-based authentication scheme suitable for limited-resource devices. In: 12th International Conference on Computational Intelligence and Security (CIS), Wuxi, pp. 271–276. IEEE (2016)
Zheng, G., Shankaran, R., Orgun, M.A., Qiao, L., Saleem, K.: Ideas and challenges for securing wireless implantable medical devices: a review. IEEE Sens. J. 17(3), 562–576 (2017)
Chang, S., Jil, S., Shen, J., Liu, D., Tan, H.: A survey on key management for body sensor network. In: 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), pp. 217–221. IEEE (2015)
Lamkin, P.: Wearable tech market to be worth $34 billion by 2020. https://www.forbes.com/sites/paullamkin/2016/02/17/wearable-tech-market-to-be-worth-34-billion-by-2020/#13bb51433cb5. Accessed 17 Feb 2016
Cai, Z., Wang, Z., Zheng, K., Cao, J.: A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Comput. 62(3), 417–427 (2013)
Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Securing display path for security-sensitive applications on mobile devices. Comput. Mater. Continua 55(1), 17–35 (2018)
Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., Wang, G.: Security and privacy in the medical internet of things. Secur. Commun. Netw. 2018, 5978636 (2018). https://doi.org/10.1155/2018/5978636
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Yu, J., Hou, B. (2018). Survey on IMD and Wearable Devices Security Threats and Protection Methods. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-00021-9_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00020-2
Online ISBN: 978-3-030-00021-9
eBook Packages: Computer ScienceComputer Science (R0)