A survey of wearable devices and challenges

S Seneviratne, Y Hu, T Nguyen, G Lan… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
As smartphone penetration saturates, we are witnessing a new trend in personal mobile
devices-wearable mobile devices or simply wearables as it is often called. Wearables come …

A survey of wearable biometric recognition systems

J Blasco, TM Chen, J Tapiador… - ACM Computing Surveys …, 2016 - dl.acm.org
The growing popularity of wearable devices is leading to new ways to interact with the
environment, with other smart devices, and with other people. Wearables equipped with an …

IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

Sensors for context-aware smart healthcare: A security perspective

E Batista, MA Moncusi, P López-Aguilar… - Sensors, 2021 - mdpi.com
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …

Wearable activity trackers: A survey on utility, privacy, and security

K Salehzadeh Niksirat, L Velykoivanenko… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, wearable activity trackers (WATs) have become increasingly popular.
However, despite many research studies in different fields (eg psychology, health, and …

A taxonomy on smart healthcare technologies: Security framework, case study, and future directions

S Chaudhary, R Kakkar, NK Jadav, A Nair… - Journal of …, 2022 - Wiley Online Library
There is a massive transformation in the traditional healthcare system from the specialist‐
centric approach to the patient‐centric approach by adopting modern and intelligent …

Anatomy of a vulnerable fitness tracking system: Dissecting the fitbit cloud, app, and firmware

J Classen, D Wegemer, P Patras, T Spink… - Proceedings of the ACM …, 2018 - dl.acm.org
Fitbit fitness trackers record sensitive personal information, including daily step counts, heart
rate profiles, and locations visited. By design, these devices gather and upload activity data …

Cybersecurity analysis of wearable devices: smartwatches passive attack

AG Silva-Trujillo, MJ González González… - Sensors, 2023 - mdpi.com
Wearable devices are starting to gain popularity, which means that a large portion of the
population is starting to acquire these products. This kind of technology comes with a lot of …

A survey on modality characteristics, performance evaluation metrics, and security for traditional and wearable biometric systems

A Sundararajan, AI Sarwat, A Pons - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Biometric research is directed increasingly toward Wearable Biometric Systems (WBS) for
user authentication and identification. However, prior to engaging in WBS research, how …

Breaking fitness records without moving: Reverse engineering and spoofing fitbit

H Fereidooni, J Classen, T Spink, P Patras… - Research in Attacks …, 2017 - Springer
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely
collect information about their exercising patterns. Smartphones push this health-related …