Skip to main content

Wearable IoT Security and Privacy: A Review from Technology and Policy Perspective

  • Conference paper
  • First Online:
Future Network Systems and Security (FNSS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 878))

Included in the following conference series:

Abstract

The continuing increase in the number of Internet of Things (IoT) devices around the world calls for the need to assess privacy and security vulnerabilities of IoT devices. In this paper, we discuss the extent to which individuals and organizations have utilized the IoT-enabled devices to connect and share data. We also explain the different types of security loopholes that need urgent attention along with other ethical issues that arise from IoT devices. While major application of the IoT is its incorporation into wearable technology, we review its current practices and implications. Moreover, this paper also highlights some of the legal policies and regulations, their values, and challenges regarding data privacy. Finally, we discuss various data analytics solutions for cyber-security coupled with their value and the challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Morgan, S. (2017), Top 5 Cybersecurity facts, figures and statistics for 2017, CSO.

  2. 2.

    Wood, P. (2016). 2016 Symantec Internet Security Threat Report, https://www.symantec.com.

  3. 3.

    Top Five Implantable Wearables. Technowize. Retrieved 25 November 2017, from https://www.technowize.com/top-five-implantable-wearables/.

  4. 4.

    Gordon, K. Statistics & Facts on Wearable Technology. The Statistical Technology. Retrieved 2017-11-18, from https://www.statista.com/topics/1556/wearable-technology/.

  5. 5.

    “Understanding Wearable Technology – Aspencor Tech”. Aspencor Tech. Aspencor Tech. from http://medgizmo.info/news/understanding-wearable-technology.

  6. 6.

    Self-tracking technologies in the workplace: Quantifying health, behavior and productivity, Human Resource Management International Digest, 25(5), 10–12, Retrieved from http://www.emeraldinsight.com/.

  7. 7.

    McCabe, B. Privacy concerns about the monetization of Big Data, Linked In.

  8. 8.

    Abel, R. (2015, June 10). Europol arrest dozens for a scam that laundered six million euro, SC Media. https://www.scmagazine.com/europol-arrest-dozens-for-a-scam-that-laundered-six-million-euro/article/534058/.

  9. 9.

    Reform of Data EU Protection Rules, Building a European Area of Justice. Retrieved from http://ec.europa.eu/justice/data-protection/reform/index_en.htm.

References

  1. Ashton, K.: That Internet of Things thing. RFID J. 22(7), 97–114 (2009)

    Google Scholar 

  2. Ching, K.W., Singh, M.M.: Wearable technology devices security and privacy vulnerability analysis. Int. J. Netw. Secur. Appl. 8, 19–30 (2016)

    Google Scholar 

  3. De Rossi, D.: Electroactive fabrics and wearable biomonitoring devices. Autex Res. J. 3(4), 6 (2003)

    Google Scholar 

  4. Fernandez, P.: Wearable technology: beyond augmented reality. Libr. Hi Tech News 31(9), (2014)

    Google Scholar 

  5. Gangan, S.: A review of man-in-the-middle attacks. arXiv preprint arXiv:1504.02115 (2015)

  6. Granger, S.: Social engineering fundamentals, part I: hacker tactics. Secur. Focus 18 (2001)

    Google Scholar 

  7. Hadnagy, C.: Social Engineering: The Art of Human Hacking. Wiley, Hoboken (2010)

    Google Scholar 

  8. Hiremath, S., Yang, G., Mankodiya, K.: Wearable Internet of Things: concept, architectural components and promises for person-centered healthcare. In: 2014 EAI 4th International Conference on Wireless Mobile Communication and Healthcare (Mobihealth), pp. 304–307. IEEE (2014)

    Google Scholar 

  9. Hilts, A., Parsons, C., Knockel, J.: Every step you fake: a comparative analysis of fitness tracker privacy and security. Open Eff. Rep. 76 (2016)

    Google Scholar 

  10. Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the Internet of Things. In: IEEE World Congress, pp. 21–28 (2015)

    Google Scholar 

  11. Kibirige, G.W., Sanga, C.: A survey on detection of sinkhole attack in wireless sensor network. arXiv preprint arXiv:1505.01941 (2015)

  12. Kim, D., Park, S., Choi, K., Kim, Y.: BurnFit: analyzing and exploiting wearable devices. In: Kim, H., Choi, D. (eds.) WISA 2015. LNCS, vol. 9503, pp. 227–239. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31875-2_19

    Chapter  Google Scholar 

  13. Li, S., Xu, L.: Securing the Internet of Things. Syngress, Rockland (2017)

    Google Scholar 

  14. Manogaran, G., Lopez, D., Thota, C., Abbas, K.M., Pyne, S., Sundarasekar, R.: Big data analytics in healthcare Internet of Things. In: Qudrat-Ullah, H., Tsasis, P. (eds.) Innovative Healthcare Systems for the 21st Century. UCS, pp. 263–284. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55774-8_10

    Chapter  Google Scholar 

  15. Marrington, A., Kerr, D., Gammack, J.: Managing Security Issues and the Hidden Dangers of Wearable Technologies, 1st edn, pp. 21–22. IGI Publishing, Hershey (2016)

    Google Scholar 

  16. Meyer, U., Wetzel, S.: A man-in-the-middle attack on UMTS. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 90–97. ACM, October 2004

    Google Scholar 

  17. Piramuthu, S., Zhou, W.: RFID and Sensor Network Automation in the Food Industry: Ensuring Quality and Safety Through Supply Chain Visibility. Wiley, Hoboken (2016)

    Book  Google Scholar 

  18. Rahman, M., Carbunar, B., Banik, M.: Fit and vulnerable: attacks and defenses for a health monitoring device. arXiv preprint arXiv:1304.5672 (2013)

  19. Rieck, J.: Attacks on fitness trackers revisited: a case-study of unfit firmware security. arXiv preprint arXiv:1604.03313 (2016)

  20. Romanosky, S., Acquisti, A., Sharp, R.: Data breaches and identity theft: when is mandatory disclosure optimal? (2010)

    Google Scholar 

  21. Saif, I.: Cyber Risk in an Internet of Things World. Deloitte, New York (2017)

    Google Scholar 

  22. Sonar, K., Upadhyay, H.: A survey: DDOS attack on Internet of Things. Int. J. Eng. Res. Dev. 10(11), 58–63 (2014)

    Google Scholar 

  23. Tehrani, K., Michael, A.: Wearable technology and wearable devices: everything you need to know. Wearable Devices Mag. (2014)

    Google Scholar 

  24. Thibaud, M., Chi, H., Zhou, W., Piramuthu, S.: Internet of Things (IoT) in high-risk environment, health and safety (EHS) industries: a comprehensive review. Decis. Support Syst. 108, 79–95 (2018)

    Article  Google Scholar 

  25. Townsend, M., Le Quoc, T., Kapoor, G., Hu, H., Zhou, W., Piramuthu, S.: Real-time business data acquisition: how frequent is frequent enough? Inf. Manag. 55, 422–429 (2017)

    Article  Google Scholar 

  26. Tu, Y.J., Zhou, W., Piramuthu, S.: Identifying RFID-embedded objects in pervasive healthcare applications. Decis. Support Syst. 46(2), 586–593 (2009)

    Article  Google Scholar 

  27. Vidalis, S., Angelopoulou, O.: Assessing identity theft in the Internet of Things. IT Converg. Pract. (INPRA) 2(1), 15–21 (2014)

    Google Scholar 

  28. Wang, Z., Hu, H., Zhou, W.: RFID enabled knowledge-based precast construction supply chain. Comput.-Aided Civil Infrastruct. Eng. 32, 499–514 (2017)

    Article  Google Scholar 

  29. Zhou, W.: RFID and item-level information visibility. Eur. J. Oper. Res. 198(1), 252–258 (2009)

    Article  MathSciNet  Google Scholar 

  30. Zhou, W., Kapoor, G., Piramuthu, S.: RFID-enabled item-level product information revelation. Eur. J. Inf. Syst. 18(6), 570–577 (2009)

    Article  Google Scholar 

  31. Zhou, W., Yoon, E.J., Piramuthu, S.: Varying levels of RFID tag ownership in supply chains. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2011. LNCS, vol. 7046, pp. 228–235. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25126-9_33

    Chapter  Google Scholar 

  32. Zhou, W., Piramuthu, S.: Consumer preference and service quality management with RFID. Ann. Oper. Res. 216(1), 35–51 (2014)

    Article  Google Scholar 

  33. Zhou, W., Piramuthu, S.: Security/privacy of wearable fitness tracking IoT devices. In: 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1–5. IEEE, June 2014

    Google Scholar 

  34. Zhou, W., Piramuthu, S.: Information relevance model of customized privacy for IoT. J. Bus. Ethics 131(1), 19–30 (2015)

    Article  Google Scholar 

  35. Zhou, W., Piramuthu, S.: IoT and supply chain traceability. In: Doss, R., Piramuthu, S., Zhou, W. (eds.) FNSS 2015. CCIS, vol. 523, pp. 156–165. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-19210-9_11

    Chapter  Google Scholar 

  36. Zhou, W., Piramuthu, S.: Effects of ticket-switching on inventory management: actual vs. information system-based data. Decis. Support Syst. 77, 31–40 (2015)

    Article  Google Scholar 

  37. Zhou, W., Piramuthu, S.: Effect of ticket-switching on inventory and shelf-space allocation. Decis. Support Syst. 69, 31–39 (2015)

    Article  Google Scholar 

  38. Zhou, W., Piramuthu, S., Chu, F., Chu, C.: RFID-enabled flexible warehousing. Decis. Support Syst. 98, 99–112 (2017)

    Article  Google Scholar 

  39. Zhou, W., Piramuthu, S.: IoT security perspective of a flexible healthcare supply chain. Inf. Technol. Manag., 1–13 (2017)

    Google Scholar 

  40. Zhou, W., Piramuthu, S.: Identification shrinkage in inventory management: an RFID-based solution. Ann. Oper. Res. 258(2), 285–300 (2017)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huihui Chi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

D’Mello, O., Gelin, M., Khelil, F.B., Surek, R.E., Chi, H. (2018). Wearable IoT Security and Privacy: A Review from Technology and Policy Perspective. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2018. Communications in Computer and Information Science, vol 878. Springer, Cham. https://doi.org/10.1007/978-3-319-94421-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94421-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94420-3

  • Online ISBN: 978-3-319-94421-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics