Wearables and Cybersecurity: Navigating the Threat Landscape

被引:1
|
作者
Hora, Ayushi [1 ]
Kulkarni, Prasanna [1 ]
机构
[1] Symbiosis Int Deemed Univ, Symbiosis Inst Digital & Telecom Management, Pune, Maharashtra, India
关键词
Wearable devices; Internet of Things (IoT); Cybersecurity; Vulnerabilities;
D O I
10.1109/ICSCSS60660.2024.10625662
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The development of wearable devices, like smartwatches and fitness trackers, transformed how people interact with technology and adopt it across various domains. However, individuals must not overlook the threat they encounter using these devices. As modern civilisation is increasingly predicated on electronic technology, securing these devices from cyber-attacks is a complex problem. The rising popularity of wearable devices has raised serious concerns about their cybersecurity vulnerabilities and attack vectors, mainly due to the sensitive personal information they collect and store. With this perspective, this research study reviews the architecture of IoT systems, the types and characteristics of wearable devices and their connection to the IoT systems. It analyses cybersecurity risks such as unauthorised access to data, device tampering, and malicious software or firmware. The study discusses the various attack vectors targeted at these vulnerabilities regarding Bluetooth, Wi-Fi, and physical attacks. Thus, the challenge in wearable device cybersecurity lies in safeguarding personal data stored within these devices against unauthorised access and tampering. It concludes that the security flaws of wearable devices need to be minimised by improving the present software and designs. This paper emphasises the need for consistent research and analysis to ensure wearable devices are not vulnerable to emerging cyber security risks. It further brings out the need for concerted action amongst all the stakeholders.
引用
收藏
页码:563 / 567
页数:5
相关论文
共 50 条
  • [1] Navigating the Cybersecurity Landscape
    Purkiss, Dave
    Giles, Tony
    JOURNAL AWWA, 2024, 116 (07): : 50 - 52
  • [2] Navigating the Cybersecurity Landscape
    Purkiss, Dave
    Giles, Tony
    Journal - American Water Works Association, 1600, 116 (07): : 50 - 52
  • [3] The Pivotal Role of Al in Navigating the Cybersecurity Landscape
    Putrus, Robert
    ISACA Journal, 2024, 4 : 24 - 29
  • [4] Optimising AI models for intelligence extraction in the life cycle of Cybersecurity Threat Landscape generation
    Zacharis, Alexandros
    Gavrila, Razvan
    Patsakis, Constantinos
    Douligeris, Christos
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 90
  • [5] Navigating the Insider Threat Tool Landscape: Low Cost Technical Solutions to Jump Start an Insider Threat Program
    Spooner, Derrick
    Silowash, George
    Costa, Daniel
    Albrethsen, Michael
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 247 - 257
  • [6] Is Quantum Computing a Cybersecurity Threat?
    Denning, Dorothy E.
    AMERICAN SCIENTIST, 2019, 107 (02) : 83 - 85
  • [7] An Exploration of Disinformation as a Cybersecurity Threat
    Caramancion, Kevin Matthe
    2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 440 - 444
  • [8] Cybersecurity Confronting the Threat of Shadow IT
    Prince, Brian
    FORBES, 2014, 194 (05): : 136 - +
  • [9] Electromagnetic Warfare and the Cybersecurity Threat
    Pinou, Damianos
    Chy, Rien
    Hayajneh, Thaier
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 669 - 674
  • [10] Navigating cybersecurity training: A comprehensive review
    Qawasmeh, Saif Al-Dean
    Alqahtani, Ali Abdullah S.
    Khan, Muhammad Khurram
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123