Securing the Future: Cybersecurity Challenges in Wearable Devices
Downloads
Wearable devices, such as smartwatches, fitness trackers and medical monitors, have become essential to our day-to-day lives. They offer incredible benefits, making it easier to track our health and stay connected to the world. This kind of technology comes with a lot of advantages, as it simplifies different tasks people do daily. However, this convenience comes with significant cybersecurity risks. Because of the collected data, cybercriminals are starting to target the devices. This article will present the challenges faced to keep wearable technology secure. The paper examines the multiple cyber threats that the devices encounter, like malware, phishing and vulnerabilities in wireless connectivity. Also, the paper presents a software framework that is specifically built to offer uninterrupted security monitoring for wearable devices. The platform employs a complete strategy to tackle security challenges, encompassing intrusion detection and prevention, efficient vulnerability management, and prompt security patching.
Downloads
A. J. Mills, R. T. Watson, L. Pitt and J. Kietzmann, "Wearing safe: Physical and informational security in the age of the wearable device," Business Horizons, vol. 59, no. 6, pp. 615-622, 2016.
F. Blow, Y.-H. Hu and M. A. Hoppa, "A Study on Vulnerabilities and Threats to Wearable Devices," The Colloquium for Information Systems Security Education, vol. 7, no. 1, 2020.
K. W. Ching and M. M. Singh, "Wearable Technology Devices Security and Privacy Vulnerability Analysis," International Journal of Network Security & Its Applications (IJNSA), vol. 8, no. 3, pp. 19-30, 2016.
A. G. Silva-Trujillo, M. J. González González, L. P. Rocha Pérez and L. J. García Villalba, "Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack," Sensors, 2023.
S. Rauch, "What Is Zero-trust Security? A Handy Guide," Simplilearn, 26 Feb 2023. [Online]. Available: https://www.simplilearn.com/tutorials/cyber-security-tutorial/zero-trust-security.
"NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers," NIST, 24 August 2023. [Online]. Available: https://www.nist.gov/news-events/news/2023/08/nist-standardize-encryption-algorithms-can-resist-attack-quantum-computers.
F.-Z. Marcos, "Biometric security technology," Aerospace and Electronic Systems Magazine, pp. 15-26, 2006.
S. Saleem, S. Ullah and K. S. Kwak, "A study of IEEE 802.15.2 Security Framework for Wireless Body Area Network," Sensors, pp. 1383-1395, 2011.
A. Bianchi and I. Oakley, "Wearable Authentication: Trends and Opportunities," IT- Information Technology, vol. 58, no. 5, pp. 225-262, 2016.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," IEEE Comm. Mag, vol. 40, pp. 102-114, 2002.
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks," Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113-127, 2003.
M. Syafrizal, S. R. Selamat and N. A. Zakaria, "Analysis of Cybersecurity Standard and Framework Components," International Journal of Communication Networks and Information Security (IJCNIS), vol. 12, no. 3, pp. 417-432, 2020.
H. Landi, "Fitbit, Apple user data exposed in breach impacting 61M fitness tracker records," Fierce Healthcare, 13 Sep 2021. [Online]. Available: https://www.fiercehealthcare.com/digital-health/chutes-ladders-nyc-health-appoints-inaugural-decarbonization-officer-uber-health.
J. McKeon, "61M Fitbit, Apple Users Had Data Exposed in Wearable Device Data Breach," Intelligent Healthcare Media is a division of TechTarget, [Online]. Available: https://healthitsecurity.com/news/61m-fitbit-apple-users-had-data-exposed-in-wearable-device-data-breach.
H. A. Junqueira, "Different types of wearable technology," ResearchGate, [Online]. Available: https://www.researchgate.net/figure/Different-types-of-wearable-technology_fig5_322261039.




