Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method
Title | Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Langone, M., Setola, R., Lopez, J. |
Conference Name | 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) |
Date Published | jul |
Keywords | Biomedical monitoring, Bluetooth, bluetooth low energy, body area networks, cybersecurity, Human Behavior, Internet of Things, Internet of Things (IoT), Internet-connected devices, privacy, Protocols, pubcrawl, resilience, Resiliency, Scalability, security, security of data, smart phones, smartphone, vulnerability assessment method, wearable devices, wearables security, Wireless communication, wireless protocols, Wireless sensor networks |
Abstract | The widespread diffusion of the Internet of Things (IoT) is introducing a huge number of Internet-connected devices in our daily life. Mainly, wearable devices are going to have a large impact on our lifestyle, especially in a healthcare scenario. In this framework, it is fundamental to secure exchanged information between these devices. Among other factors, it is important to take into account the link between a wearable device and a smart unit (e.g., smartphone). This connection is generally obtained via specific wireless protocols such as Bluetooth Low Energy (BLE): the main topic of this work is to analyse the security of this communication link. In this paper we expose, via an experimental campaign, a methodology to perform a vulnerability assessment (VA) on wearable devices communicating with a smartphone. In this way, we identify several security issues in a set of commercial wearable devices. |
URL | https://ieeexplore.ieee.org/document/8029946/ |
DOI | 10.1109/COMPSAC.2017.96 |
Citation Key | langone_cybersecurity_2017 |
- resilience
- wireless sensor networks
- wireless protocols
- Wireless communication
- wearables security
- Wearable devices
- vulnerability assessment method
- smartphone
- smart phones
- security of data
- security
- Scalability
- Resiliency
- Biomedical monitoring
- pubcrawl
- Protocols
- privacy
- Internet-connected devices
- Internet of Things (IoT)
- Internet of Things
- Human behavior
- Cybersecurity
- body area networks
- bluetooth low energy
- Bluetooth