Security and Privacy Analysis of Wearable Health Device
Title | Security and Privacy Analysis of Wearable Health Device |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Zhang, C., Shahriar, H., Riad, A. B. M. K. |
Conference Name | 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) |
Keywords | authorisation, Biomedical monitoring, Bluetooth, Bluetooth networking, Bluetooth pairing process, bluetooth security, composability, Computer crime, data privacy, Data security, dieting formula, eating constraint, fitbit, Google Glass, hacker, Health Care, health monitor system, health tracker devices, Human Behavior, human health parameter monitoring, Jawbone, malicious attack, mobile computing, mobile devices, mobile health, mobile wearable health devices, privacy, privacy breach, privacy features, privacy risk, pubcrawl, resilience, Resiliency, security, security analysis, security risk, security vulnerability, sensitive data information, sensitive information, Servers, telecommunication security, user data security, user sleeping arrangements, wearable devices, wearables security |
Abstract | Mobile wearable health devices have expanded prevalent usage and become very popular because of the valuable health monitor system. These devices provide general health tips and monitoring human health parameters as well as generally assisting the user to take better health of themselves. However, these devices are associated with security and privacy risk among the consumers because these devices deal with sensitive data information such as users sleeping arrangements, dieting formula such as eating constraint, pulse rate and so on. In this paper, we analyze the significant security and privacy features of three very popular health tracker devices: Fitbit, Jawbone and Google Glass. We very carefully analyze the devices' strength and how the devices communicate and its Bluetooth pairing process with mobile devices. We explore the possible malicious attack through Bluetooth networking by hacker. The outcomes of this analysis show how these devices allow third parties to gain sensitive information from the device exact location that causes the potential privacy breach for users. We analyze the reasons of user data security and privacy are gained by unauthorized people on wearable devices and the possible challenge to secure user data as well as the comparison of three wearable devices (Fitbit, Jawbone and Google Glass) security vulnerability and attack type. |
DOI | 10.1109/COMPSAC48688.2020.00044 |
Citation Key | zhang_security_2020 |
- security
- mobile computing
- mobile devices
- mobile health
- mobile wearable health devices
- privacy
- privacy breach
- privacy features
- Privacy Risk
- pubcrawl
- resilience
- Resiliency
- malicious attack
- Security analysis
- security risk
- security vulnerability
- sensitive data information
- sensitive information
- Servers
- telecommunication security
- user data security
- user sleeping arrangements
- Wearable devices
- dieting formula
- authorisation
- Biomedical monitoring
- Bluetooth
- Bluetooth networking
- Bluetooth pairing process
- bluetooth security
- composability
- Computer crime
- data privacy
- Data Security
- wearables security
- eating constraint
- fitbit
- Google Glass
- Hacker
- health care
- health monitor system
- health tracker devices
- Human behavior
- human health parameter monitoring
- Jawbone