Abstract
The continuing increase in the number of Internet of Things (IoT) devices around the world calls for the need to assess privacy and security vulnerabilities of IoT devices. In this paper, we discuss the extent to which individuals and organizations have utilized the IoT-enabled devices to connect and share data. We also explain the different types of security loopholes that need urgent attention along with other ethical issues that arise from IoT devices. While major application of the IoT is its incorporation into wearable technology, we review its current practices and implications. Moreover, this paper also highlights some of the legal policies and regulations, their values, and challenges regarding data privacy. Finally, we discuss various data analytics solutions for cyber-security coupled with their value and the challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Morgan, S. (2017), Top 5 Cybersecurity facts, figures and statistics for 2017, CSO.
- 2.
Wood, P. (2016). 2016 Symantec Internet Security Threat Report, https://www.symantec.com.
- 3.
Top Five Implantable Wearables. Technowize. Retrieved 25 November 2017, from https://www.technowize.com/top-five-implantable-wearables/.
- 4.
Gordon, K. Statistics & Facts on Wearable Technology. The Statistical Technology. Retrieved 2017-11-18, from https://www.statista.com/topics/1556/wearable-technology/.
- 5.
“Understanding Wearable Technology – Aspencor Tech”. Aspencor Tech. Aspencor Tech. from http://medgizmo.info/news/understanding-wearable-technology.
- 6.
Self-tracking technologies in the workplace: Quantifying health, behavior and productivity, Human Resource Management International Digest, 25(5), 10–12, Retrieved from http://www.emeraldinsight.com/.
- 7.
McCabe, B. Privacy concerns about the monetization of Big Data, Linked In.
- 8.
Abel, R. (2015, June 10). Europol arrest dozens for a scam that laundered six million euro, SC Media. https://www.scmagazine.com/europol-arrest-dozens-for-a-scam-that-laundered-six-million-euro/article/534058/.
- 9.
Reform of Data EU Protection Rules, Building a European Area of Justice. Retrieved from http://ec.europa.eu/justice/data-protection/reform/index_en.htm.
References
Ashton, K.: That Internet of Things thing. RFID J. 22(7), 97–114 (2009)
Ching, K.W., Singh, M.M.: Wearable technology devices security and privacy vulnerability analysis. Int. J. Netw. Secur. Appl. 8, 19–30 (2016)
De Rossi, D.: Electroactive fabrics and wearable biomonitoring devices. Autex Res. J. 3(4), 6 (2003)
Fernandez, P.: Wearable technology: beyond augmented reality. Libr. Hi Tech News 31(9), (2014)
Gangan, S.: A review of man-in-the-middle attacks. arXiv preprint arXiv:1504.02115 (2015)
Granger, S.: Social engineering fundamentals, part I: hacker tactics. Secur. Focus 18 (2001)
Hadnagy, C.: Social Engineering: The Art of Human Hacking. Wiley, Hoboken (2010)
Hiremath, S., Yang, G., Mankodiya, K.: Wearable Internet of Things: concept, architectural components and promises for person-centered healthcare. In: 2014 EAI 4th International Conference on Wireless Mobile Communication and Healthcare (Mobihealth), pp. 304–307. IEEE (2014)
Hilts, A., Parsons, C., Knockel, J.: Every step you fake: a comparative analysis of fitness tracker privacy and security. Open Eff. Rep. 76 (2016)
Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the Internet of Things. In: IEEE World Congress, pp. 21–28 (2015)
Kibirige, G.W., Sanga, C.: A survey on detection of sinkhole attack in wireless sensor network. arXiv preprint arXiv:1505.01941 (2015)
Kim, D., Park, S., Choi, K., Kim, Y.: BurnFit: analyzing and exploiting wearable devices. In: Kim, H., Choi, D. (eds.) WISA 2015. LNCS, vol. 9503, pp. 227–239. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31875-2_19
Li, S., Xu, L.: Securing the Internet of Things. Syngress, Rockland (2017)
Manogaran, G., Lopez, D., Thota, C., Abbas, K.M., Pyne, S., Sundarasekar, R.: Big data analytics in healthcare Internet of Things. In: Qudrat-Ullah, H., Tsasis, P. (eds.) Innovative Healthcare Systems for the 21st Century. UCS, pp. 263–284. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55774-8_10
Marrington, A., Kerr, D., Gammack, J.: Managing Security Issues and the Hidden Dangers of Wearable Technologies, 1st edn, pp. 21–22. IGI Publishing, Hershey (2016)
Meyer, U., Wetzel, S.: A man-in-the-middle attack on UMTS. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 90–97. ACM, October 2004
Piramuthu, S., Zhou, W.: RFID and Sensor Network Automation in the Food Industry: Ensuring Quality and Safety Through Supply Chain Visibility. Wiley, Hoboken (2016)
Rahman, M., Carbunar, B., Banik, M.: Fit and vulnerable: attacks and defenses for a health monitoring device. arXiv preprint arXiv:1304.5672 (2013)
Rieck, J.: Attacks on fitness trackers revisited: a case-study of unfit firmware security. arXiv preprint arXiv:1604.03313 (2016)
Romanosky, S., Acquisti, A., Sharp, R.: Data breaches and identity theft: when is mandatory disclosure optimal? (2010)
Saif, I.: Cyber Risk in an Internet of Things World. Deloitte, New York (2017)
Sonar, K., Upadhyay, H.: A survey: DDOS attack on Internet of Things. Int. J. Eng. Res. Dev. 10(11), 58–63 (2014)
Tehrani, K., Michael, A.: Wearable technology and wearable devices: everything you need to know. Wearable Devices Mag. (2014)
Thibaud, M., Chi, H., Zhou, W., Piramuthu, S.: Internet of Things (IoT) in high-risk environment, health and safety (EHS) industries: a comprehensive review. Decis. Support Syst. 108, 79–95 (2018)
Townsend, M., Le Quoc, T., Kapoor, G., Hu, H., Zhou, W., Piramuthu, S.: Real-time business data acquisition: how frequent is frequent enough? Inf. Manag. 55, 422–429 (2017)
Tu, Y.J., Zhou, W., Piramuthu, S.: Identifying RFID-embedded objects in pervasive healthcare applications. Decis. Support Syst. 46(2), 586–593 (2009)
Vidalis, S., Angelopoulou, O.: Assessing identity theft in the Internet of Things. IT Converg. Pract. (INPRA) 2(1), 15–21 (2014)
Wang, Z., Hu, H., Zhou, W.: RFID enabled knowledge-based precast construction supply chain. Comput.-Aided Civil Infrastruct. Eng. 32, 499–514 (2017)
Zhou, W.: RFID and item-level information visibility. Eur. J. Oper. Res. 198(1), 252–258 (2009)
Zhou, W., Kapoor, G., Piramuthu, S.: RFID-enabled item-level product information revelation. Eur. J. Inf. Syst. 18(6), 570–577 (2009)
Zhou, W., Yoon, E.J., Piramuthu, S.: Varying levels of RFID tag ownership in supply chains. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2011. LNCS, vol. 7046, pp. 228–235. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25126-9_33
Zhou, W., Piramuthu, S.: Consumer preference and service quality management with RFID. Ann. Oper. Res. 216(1), 35–51 (2014)
Zhou, W., Piramuthu, S.: Security/privacy of wearable fitness tracking IoT devices. In: 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1–5. IEEE, June 2014
Zhou, W., Piramuthu, S.: Information relevance model of customized privacy for IoT. J. Bus. Ethics 131(1), 19–30 (2015)
Zhou, W., Piramuthu, S.: IoT and supply chain traceability. In: Doss, R., Piramuthu, S., Zhou, W. (eds.) FNSS 2015. CCIS, vol. 523, pp. 156–165. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-19210-9_11
Zhou, W., Piramuthu, S.: Effects of ticket-switching on inventory management: actual vs. information system-based data. Decis. Support Syst. 77, 31–40 (2015)
Zhou, W., Piramuthu, S.: Effect of ticket-switching on inventory and shelf-space allocation. Decis. Support Syst. 69, 31–39 (2015)
Zhou, W., Piramuthu, S., Chu, F., Chu, C.: RFID-enabled flexible warehousing. Decis. Support Syst. 98, 99–112 (2017)
Zhou, W., Piramuthu, S.: IoT security perspective of a flexible healthcare supply chain. Inf. Technol. Manag., 1–13 (2017)
Zhou, W., Piramuthu, S.: Identification shrinkage in inventory management: an RFID-based solution. Ann. Oper. Res. 258(2), 285–300 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
D’Mello, O., Gelin, M., Khelil, F.B., Surek, R.E., Chi, H. (2018). Wearable IoT Security and Privacy: A Review from Technology and Policy Perspective. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2018. Communications in Computer and Information Science, vol 878. Springer, Cham. https://doi.org/10.1007/978-3-319-94421-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-94421-0_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94420-3
Online ISBN: 978-3-319-94421-0
eBook Packages: Computer ScienceComputer Science (R0)