Skip to main content
Top

2018 | OriginalPaper | Chapter

Survey on IMD and Wearable Devices Security Threats and Protection Methods

Authors : Jiaping Yu, Bingnan Hou

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, the developments in electronic science and technology have led to abundant new wearable devices and IMDs, but with the use of those devices increases, the concern about their security also becomes serious. In this paper, we give a survey on the security threat and protection method of IMD and wearable devices and compare those protection methods regarding different factors.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Arias, O., Wurm, J., Hoang, K., Jin, Y.: Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2015)CrossRef Arias, O., Wurm, J., Hoang, K., Jin, Y.: Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2015)CrossRef
2.
go back to reference Ly, K., Jin, Y.: Security studies on wearable fitness trackers. In: 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE (2016) Ly, K., Jin, Y.: Security studies on wearable fitness trackers. In: 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE (2016)
3.
go back to reference Nohara, K., Nozaki, Y., Yoshikawa, M.: Hardware Trojan for ultra-lightweight block cipher piccolo. In: 4th Global Conference on Consumer Electronics (GCCE), Arigato, pp. 202–203. IEEE (2015) Nohara, K., Nozaki, Y., Yoshikawa, M.: Hardware Trojan for ultra-lightweight block cipher piccolo. In: 4th Global Conference on Consumer Electronics (GCCE), Arigato, pp. 202–203. IEEE (2015)
4.
go back to reference Lotfy, K., Hale, M.L.: Assessing pairing and data exchange mechanism security in the wearable internet of things. In: International Conference on Mobile Services (MS), Hiroshima, pp. 25–32. IEEE (2016) Lotfy, K., Hale, M.L.: Assessing pairing and data exchange mechanism security in the wearable internet of things. In: International Conference on Mobile Services (MS), Hiroshima, pp. 25–32. IEEE (2016)
5.
go back to reference Nia, A.M., Sur-Kolay, S., Raghunathan, A., Jha, N.: Physiological information leakage: a new frontier in health information security. IEEE Trans. Emerg. Top. Comput. 4(3), 321–334 (2016)CrossRef Nia, A.M., Sur-Kolay, S., Raghunathan, A., Jha, N.: Physiological information leakage: a new frontier in health information security. IEEE Trans. Emerg. Top. Comput. 4(3), 321–334 (2016)CrossRef
6.
go back to reference Buttyan, L., Holczer, T.: Traffic analysis attacks and countermeasures in wireless body area sensor networks. In: 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, pp. 1–6. IEEE (2012) Buttyan, L., Holczer, T.: Traffic analysis attacks and countermeasures in wireless body area sensor networks. In: 2012 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), San Francisco, pp. 1–6. IEEE (2012)
7.
go back to reference Ruaro, A., Thaysen, J., Jakobsen, K.B.: Battery coupling impact on the antenna efficiency in a small wearable device. In: Antennas & Propagation Conference (LAPC), Loughborough, pp. 1–4. IEEE (2015) Ruaro, A., Thaysen, J., Jakobsen, K.B.: Battery coupling impact on the antenna efficiency in a small wearable device. In: Antennas & Propagation Conference (LAPC), Loughborough, pp. 1–4. IEEE (2015)
8.
go back to reference He, L., Yin, W.: Interference evaluation of bluetooth and IEEE 802.11b systems. In: Proceedings of the 4th International Conference on Microwave and Millimeter Wave Technology (ICMMT), pp. 931–934. IEEE (2014) He, L., Yin, W.: Interference evaluation of bluetooth and IEEE 802.11b systems. In: Proceedings of the 4th International Conference on Microwave and Millimeter Wave Technology (ICMMT), pp. 931–934. IEEE (2014)
9.
go back to reference Delail, B.A., Yeun, C.Y.: Recent advances of smart glass application security and privacy. In: 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, pp. 65–69. IEEE (2015) Delail, B.A., Yeun, C.Y.: Recent advances of smart glass application security and privacy. In: 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, pp. 65–69. IEEE (2015)
10.
go back to reference Lee, M., Lee, K., Shim, J., Cho, S., Choi, J.: Security threat on wearable services: empirical study using a commercial smartband. In: IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), Seoul, pp. 1–5. IEEE (2016) Lee, M., Lee, K., Shim, J., Cho, S., Choi, J.: Security threat on wearable services: empirical study using a commercial smartband. In: IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), Seoul, pp. 1–5. IEEE (2016)
11.
go back to reference Chen, M., Qian, Y., Chen, J., Hwang, K., Mao, S., Hu, L.: Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans. Cloud Comput. 1, 99 (2016) Chen, M., Qian, Y., Chen, J., Hwang, K., Mao, S., Hu, L.: Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans. Cloud Comput. 1, 99 (2016)
12.
go back to reference Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)CrossRef Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)CrossRef
13.
go back to reference Kim, J., Lee, B., Yoo, S.K.: Design of real-time encryption module for secure data protection of wearable healthcare devices. In: 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Osaka, pp. 2283–2286. IEEE (2013) Kim, J., Lee, B., Yoo, S.K.: Design of real-time encryption module for secure data protection of wearable healthcare devices. In: 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Osaka, pp. 2283–2286. IEEE (2013)
14.
go back to reference Zhou, J., Cao, Z., Dong, X., Lin, X.: PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J. Sel. Top. Sign. Proces. 9(7), 1332–1344 (2015)CrossRef Zhou, J., Cao, Z., Dong, X., Lin, X.: PPDM: a privacy-preserving protocol for cloud-assisted e-healthcare systems. IEEE J. Sel. Top. Sign. Proces. 9(7), 1332–1344 (2015)CrossRef
15.
go back to reference Haar, D.: CaNViS, a cardiac and neurological-based verification system that uses wearable sensors. In: Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), Moscow, pp. 99–104. IEEE (2015) Haar, D.: CaNViS, a cardiac and neurological-based verification system that uses wearable sensors. In: Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), Moscow, pp. 99–104. IEEE (2015)
16.
go back to reference Khan, R., Hasan, R., Xu, J.: SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices. In: 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), San Francisco, pp. 41–50. IEEE (2015) Khan, R., Hasan, R., Xu, J.: SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices. In: 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), San Francisco, pp. 41–50. IEEE (2015)
17.
go back to reference Yang, L., Wang, W., Zhang, Q.: VibID: user identification through Bio-Vibrometry. In: 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1–12. ACM/IEEE (2016) Yang, L., Wang, W., Zhang, Q.: VibID: user identification through Bio-Vibrometry. In: 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1–12. ACM/IEEE (2016)
18.
go back to reference Liu, J., Kwak, K.S.: Hybrid security mechanisms for wireless body area networks. In: 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN), Jeju Island, pp. 98–103. IEEE (2010) Liu, J., Kwak, K.S.: Hybrid security mechanisms for wireless body area networks. In: 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN), Jeju Island, pp. 98–103. IEEE (2010)
19.
go back to reference Truong, T., Luong, V., Tran, M., Duong, A.: Secure identity-based authentication scheme suitable for limited-resource devices. In: 12th International Conference on Computational Intelligence and Security (CIS), Wuxi, pp. 271–276. IEEE (2016) Truong, T., Luong, V., Tran, M., Duong, A.: Secure identity-based authentication scheme suitable for limited-resource devices. In: 12th International Conference on Computational Intelligence and Security (CIS), Wuxi, pp. 271–276. IEEE (2016)
20.
go back to reference Zheng, G., Shankaran, R., Orgun, M.A., Qiao, L., Saleem, K.: Ideas and challenges for securing wireless implantable medical devices: a review. IEEE Sens. J. 17(3), 562–576 (2017)CrossRef Zheng, G., Shankaran, R., Orgun, M.A., Qiao, L., Saleem, K.: Ideas and challenges for securing wireless implantable medical devices: a review. IEEE Sens. J. 17(3), 562–576 (2017)CrossRef
21.
go back to reference Chang, S., Jil, S., Shen, J., Liu, D., Tan, H.: A survey on key management for body sensor network. In: 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), pp. 217–221. IEEE (2015) Chang, S., Jil, S., Shen, J., Liu, D., Tan, H.: A survey on key management for body sensor network. In: 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), pp. 217–221. IEEE (2015)
23.
go back to reference Cai, Z., Wang, Z., Zheng, K., Cao, J.: A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Comput. 62(3), 417–427 (2013)MathSciNetCrossRef Cai, Z., Wang, Z., Zheng, K., Cao, J.: A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Comput. 62(3), 417–427 (2013)MathSciNetCrossRef
24.
go back to reference Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Securing display path for security-sensitive applications on mobile devices. Comput. Mater. Continua 55(1), 17–35 (2018) Cui, J., Zhang, Y., Cai, Z., Liu, A., Li, Y.: Securing display path for security-sensitive applications on mobile devices. Comput. Mater. Continua 55(1), 17–35 (2018)
Metadata
Title
Survey on IMD and Wearable Devices Security Threats and Protection Methods
Authors
Jiaping Yu
Bingnan Hou
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00021-9_9

Premium Partner