Cybersecurity of wearable devices: an experimental analysis and a vulnerability assessment method

被引:12
|
作者
Langone, Matteo [1 ]
Setola, Roberto [1 ]
Lopez, Javier [2 ]
机构
[1] Univ Campus Biomed Rome, Via Alvaro del Portillo 21, Rome, Italy
[2] Univ Malaga, Campus Teatinos S-n, E-29071 Malaga, Spain
来源
2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2 | 2017年
关键词
SECURITY; INTERNET; THINGS;
D O I
10.1109/COMPSAC.2017.96
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The widespread diffusion of the Internet of Things (IoT) is introducing a huge number of Internet-connected devices in our daily life. Mainly, wearable devices are going to have a large impact on our lifestyle, especially in a healthcare scenario. In this framework, it is fundamental to secure exchanged information between these devices. Among other factors, it is important to take into account the link between a wearable device and a smart unit (e.g., smartphone). This connection is generally obtained via specific wireless protocols such as Bluetooth Low Energy (BLE): the main topic of this work is to analyse the security of this communication link. In this paper we expose, via an experimental campaign, a methodology to perform a vulnerability assessment (VA) on wearable devices communicating with a smartphone. In this way, we identify several security issues in a set of commercial wearable devices.
引用
收藏
页码:304 / 309
页数:6
相关论文
共 50 条
  • [41] Teaching and Learning IoT Cybersecurity and Vulnerability Assessment with Shodan through Practical Use Cases
    Fernandez-Carames, Tiago M.
    Fraga-Lamas, Paula
    SENSORS, 2020, 20 (11)
  • [42] Ensemble Learning Method for Human Identification in Wearable Devices
    Bastos, Lucas
    Martins, Bruno
    Medeiros, Iago
    Neto, Augusto
    Zeadally, Sherali
    Rosario, Denis
    Cerqueira, Eduardo
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 1052 - 1057
  • [43] An Experimental Study of Electrostatic Discharge Immunity Testing for Wearable Devices
    Ishida, Takeshi
    Nitta, Shuichi
    Xiao, Fengchao
    Kami, Yoshio
    Fujiwara, Osamu
    2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2015, : 839 - 842
  • [44] The vulnerability assessment method of karst groundwater
    Zou, Sheng-Zhang
    Li, Lu-Juan
    Lu, Hai-Ping
    Liu, Qin-Qin
    Su, Chun-Tian
    Zhu, Dan-Ni
    Acta Geoscientica Sinica, 2014, 35 (02) : 262 - 268
  • [45] THE VULNERABILITY ASSESSMENT METHOD OF RAILWAY NETWORK
    Wang Wei
    Liu Jun
    Li Haiying
    Jiang Xi
    PROCEEDINGS OF THE ASME JOINT RAIL CONFERENCE, VOL 1: RAILROAD INFRASTRUCTURE ENGINEERING SAFETY, SECURITY AND ENVIRONMENT, 2010, : 461 - 465
  • [46] OPTIMIZATION OF HIERARCHICAL VULNERABILITY ASSESSMENT METHOD
    Liu Rui
    Yan Danfeng
    Lin Fan
    Yang Fangchun
    PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2009, : 458 - 462
  • [47] An assessment method for highway network vulnerability
    El-Rashidy, Rawia Ahmed
    Grant-Muller, Susan M.
    JOURNAL OF TRANSPORT GEOGRAPHY, 2014, 34 : 34 - 43
  • [48] GNSS Vulnerability Analysis and Assessment
    Zhao, Xin
    Zhan, Xingqun
    Liu, Xuan
    Li, SheJun
    JOURNAL OF AERONAUTICS ASTRONAUTICS AND AVIATION, 2014, 46 (01): : 11 - 19
  • [49] A Constraint-Driven Assessment of Operating Systems for Wearable Devices
    Amorim, Vicente J. P.
    Delabrida, Saul
    Oliveira, Ricardo A. R.
    2016 VI BRAZILIAN SYMPOSIUM ON COMPUTING SYSTEMS ENGINEERING (SBESC 2016), 2016, : 150 - 155
  • [50] Quality Assessment of Single-Channel EEG for Wearable Devices
    Grosselin, Fanny
    Navarro-Sune, Xavier
    Vozzi, Alessia
    Pandremmenou, Katerina
    Fallani, Fabrizio De Vico
    Attal, Yohan
    Chavez, Mario
    SENSORS, 2019, 19 (03):