Cybersecurity of wearable devices: an experimental analysis and a vulnerability assessment method

被引:12
|
作者
Langone, Matteo [1 ]
Setola, Roberto [1 ]
Lopez, Javier [2 ]
机构
[1] Univ Campus Biomed Rome, Via Alvaro del Portillo 21, Rome, Italy
[2] Univ Malaga, Campus Teatinos S-n, E-29071 Malaga, Spain
关键词
SECURITY; INTERNET; THINGS;
D O I
10.1109/COMPSAC.2017.96
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The widespread diffusion of the Internet of Things (IoT) is introducing a huge number of Internet-connected devices in our daily life. Mainly, wearable devices are going to have a large impact on our lifestyle, especially in a healthcare scenario. In this framework, it is fundamental to secure exchanged information between these devices. Among other factors, it is important to take into account the link between a wearable device and a smart unit (e.g., smartphone). This connection is generally obtained via specific wireless protocols such as Bluetooth Low Energy (BLE): the main topic of this work is to analyse the security of this communication link. In this paper we expose, via an experimental campaign, a methodology to perform a vulnerability assessment (VA) on wearable devices communicating with a smartphone. In this way, we identify several security issues in a set of commercial wearable devices.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 50 条
  • [21] A Quantitative Risk Assessment Framework for the Cybersecurity of Networked Medical Devices
    Van Devender, Maureen S.
    McDonald, Jeffrey Todd
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 402 - 411
  • [22] Wearable ESM: Differences in the Experience Sampling Method across Wearable Devices
    Hernandez, Javier
    McDuff, Daniel
    Infante, Christian
    Maes, Pattie
    Quigley, Karen
    Picard, Rosalind
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION WITH MOBILE DEVICES AND SERVICES (MOBILEHCI'16), 2016, : 195 - 205
  • [23] Security Vulnerability Analysis Assessment Method of Power Information Network
    Zhao, Yong-bin
    Zhang, Tao
    Zhang, Bo
    Hou, Jun
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 372 - 380
  • [24] Vulnerability assessment method for domino effects analysis in chemical clusters
    Huang, Kongxing
    Chen, Guohua
    Khan, Faisal
    PROCESS SAFETY AND ENVIRONMENTAL PROTECTION, 2022, 164 : 539 - 554
  • [25] Analysis of the Development Trend of Wearable Devices
    Yang, Yu-bing
    Liu, Ya-xia
    INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS AND ELECTRONIC ENGINEERING (CMEE 2016), 2016,
  • [26] Vulnerability Assessment and Defense Technology for Smart Home Cybersecurity Considering Pricing Cyberattacks
    Liu, Yang
    Hu, Shiyan
    Ho, Tsung-Yi
    2014 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2014, : 183 - 190
  • [27] Application of Rank-Weight Methods to Blockchain Cybersecurity Vulnerability Assessment Framework
    Gourisetti, Sri Nikhil Gupta
    Mylrea, Michael
    Patangia, Hirak
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 206 - 213
  • [28] Robust Assessment of ECG Signal Quality for Wearable Devices
    Shi, Yuanho
    Han, Ning
    Li, Peiyao
    Yang, Zhicheng
    Yuan, Qian
    Du, Yongsheng
    Lan, Ke
    Zheng, Jiewen
    Cao, Desen
    Zhang, Zhengbo
    2019 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI), 2019, : 399 - 401
  • [29] Assessment of Distance Measurement with Selected Wearable Devices in Telemonitoring
    Schneider, Zachary E.
    Shahbazian, Joseph
    Krishnan, Shankar M.
    2016 32ND SOUTHERN BIOMEDICAL ENGINEERING CONFERENCE (SBEC), 2016, : 5 - 6
  • [30] Research and Application of Risk Assessment Method for Automotive Cybersecurity
    Ji, Haojie
    Yu, Haiyang
    Wang, Yinghui
    Peng, Jing
    CICTP 2021: ADVANCED TRANSPORTATION, ENHANCED CONNECTION, 2021, : 1535 - 1544