Wearable devices and privacy risks: a literature review

Authors

DOI:

https://doi.org/10.26439/interfases2022.n016.6119

Keywords:

wearable devices, risks, privacy, security, controls

Abstract

Currently, the use of wearable devices is booming: both children and adults have incorporated this type of device in addition to cell phones into their day-to-day lives, which today are another extension of the human being. This research reviews what wearable devices are, their use, and the risks they imply for the user in terms of privacy and security. The risk identification and control methodology was chosen from the results of a scoping review in the relevant literature.

Downloads

Download data is not yet available.

References

Almusaylim, Z. A., & Zaman, N. (2018). A review on smart home present state and challenges: Linked to context-awareness Internet of Things (IoT). Wireless Network, 25, 3193-3204. https://doi.org/10.1007/s11276-018-1712-5

Altawy, R., & Youssef, A. M. (2016). Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices. IEEE Access, 4, 959-979. https://doi.org/10.1109/access.2016.2521727

Argentina Cibersegura. (2020). ¿Qué es la privacidad en internet? https://www.argentinacibersegura.org/admin/resources/files/consejos/33/Gu%C3%ADa_sobre_Privacidad.pdf

Arksey, H., & O’Malley, L. (2005). Scoping studies: Towards a methodological framework. International Journal of Social Research Methodology, 8(1), 19-32. https://doi.org/10.1080/1364557032000119616

Cyr, B., Horn, W., Miao, D., & Specter, M. A. (2014). Security analysis of wearable fitness devices (Fitbit). Massachusetts Institute of Technology, 1. https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2015/03/20082016/17-cyrbritt-webbhorn-specter-dmiao-hacking-fitbit.pdf

Dziubinski, K., & Bandai, M. (2020). Your neighbor knows what you’re doing: Defending smart home IoT device traffic from privacy LAN attacks. En L. Barolli, F. Amato, F. Moscato, T. Enokido & M. Takizawa (Eds.), Web, Artificial Intelligence and Network Applications. WAINA 2020 (pp. 526-534). Springer. https://doi.org/10.1007/978-3-030-44038-1_48

Feal, Á., Calciati, P., Vallina-Rodriguez, N., Troncoso, C., & Gorla, A. (2020). Angel or devil? A privacy study of mobile parental control apps. Proceedings on Privacy Enhancing Technologies, 2, 314-335. https://doi.org/10.2478/popets-2020-0029

Fernández-Caramés, T., & Fraga-Lamas, P. (2018). Towards the internet of smart clothing: A review on IoT wearables and garments for creating intelligent connected e-textiles. Electronics, 7(12), 405. https://doi.org/10.3390/electronics7120405

Girma, A. (2018). Analysis of security vulnerability and analytics of Internet of Things (IOT) platform. En S. Latifi (Ed.), Information Technology - New Generations. 15th International Conference on Information Technology (pp. 101-104). Springer. https://doi.org/10.1007/978-3-319-77028-4_16

González, C. A. (2020). Introducción a la minería de datos. Universidad de Valladolid.

Grant, M. J., & Booth, A. (2009). A typology of reviews: An analysis of 14 review types and associated methodologies. Health Information & Libraries Journal, 26(2), 91-108. https://doi.org/10.1111/j.1471-1842.2009.00848.x

Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645-1660. https://doi. org/10.1016/j.future.2013.01.010

Hale, M. L., Lotfy, K., Gamble, R. F., Walter, C., & Lin, J. (2019). Developing a platform to evaluate and assess the security of wearable devices. Digital Communications and Networks, 5(3), 147-159. https://doi.org/10.1016/j.dcan.2018.10.009

Hui, S., Wang, Z., Hou, X., Wang, X., Wang, H., Li, Y., & Jin, D. (2021). Systematically quantifying IoT privacy leakage in mobile networks. IEEE Internet of Things Journal, 8(9), 7115-7125. DOI: 10.1109/JIOT.2020.3038639

ISACA Madrid Chapter. (2010). Certified in Risk and Information Systems Control (CRISC).

Klopfenstein, L. C., Delpriori, S., Aldini, A., & Bogliolo, A. (2019). “Worth one minute”: An anonymous rewarding platform for crowd-sensing systems. Journal of Communications and Networks, 21(5), 509-520. https://doi.org/10.1109/jcn.2019.000051

Laricchia, F. (2022). Wearables unit shipments worldwide by vendor from 1st quarter 2014 to 4th quarter 2021. Statista.

Lee, Y., Yang, W., & Kwon, T. (2018). Data transfusion: Pairing wearable devices and its implication on security for Internet of Things. IEEE Access, 6, 48994-49006. https://doi.org/10.1109/access.2018.2859046

Liao, B., Ali, Y., Nazir, S., He, L., & Khan, H. U. (2020). Security analysis of IoT devices by using mobile computing: A systematic literature review. IEEE Access, 8, 120331-120350. https://doi.org/10.1109/access.2020.3006358

Nmap. (2022). Free security scanner for network exploration and security audits. https://nmap.org/

OpenVAS. (2022). A framework for vulnerability scanning and vulnerability management. http://openvas.org/

Organización Internacional de Normalización. (2015). Sistemas de gestión de calidad (ISO 9000:2015). https://www.iso.org/obp/ui/es/#iso:std:iso:9000:ed-4:v1:es

Organización Internacional de Normalización. (2018). Gestión del riesgo (ISO 31000:2018). https://www.iso.org/obp/ui#iso:std:iso:31000:ed-2:v1:es

Peters, M. D., Godfrey, C. M., Khalil, H., McInerney, P., Parker, D., & Soares, C. B. (2015). Guidance for conducting systematic scoping reviews. International Journal of Evidence-Based Healthcare, 13(3), 141-146. https://doi.org/10.1097/XEB.0000000000000050

Reardon, J., Feal, Á., Wijesekera, P., Elazari, A., Vallina-Rodriguez, N., & Egelman, S. (2019). 50 ways to leak your data: An exploration of apps’ circumvention of the android permissions system. USENIX. https://www.usenix.org/conference/usenixsecurity19/presentation/reardon

Seneviratne, S., Hu, Y., Nguyen, T., Lan, G., Khalifa, S., Thilakarathna, K., … Seneviratne, A. (2017). A survey of wearable devices and challenges. IEEE Communications Surveys & Tutorials, 19(4), 2573-2620. https://doi.org/10.1109/comst.2017.2731979

Solera-Cotanilla, S., Fúster, J., Pérez, J., Palacios, R., Vega-Barbas, M., Álvarez-Campana, M., & López, G. (2022). Análisis de problemas de seguridad y privacidad en wearables usados por menores. En Actas de las VII Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2022) (pp. 209-215). https://www.researchgate.net/publication/361972187_Analisis_de_Problemas_de_Seguridad_y_Privacidad_en_Wearables_Usados_por_Menores

Spil, T. A. M., Romijnders, V., Sundaram, D., Wickramasinghe, N., & Kijl, B. (2021). Are serious games too serious? Diffusion of wearable technologies and the creation of a diffusion of serious games model. International Journal of Information Management, 58. https://doi.org/10.1016/j.ijinfomgt.2020.102202

Tomaz, A. E. B., Nascimento, J. C. D., Hafid, A. S., & De Souza, J. N. (2020). Preserving privacy in mobile health systems using non-interactive zero-knowledge proof and blockchain. IEEE Access, 8, 204441-204458. https://doi.org/10.1109/access.2020.3036811

Torre, I., Sanchez, O. R., Koceva, F., & Adorni, G. (2018). Supporting users to take informed decisions on privacy settings of personal devices. Personal and Ubiquitous Computing, 22, 345-364. https://doi.org/10.1007/s00779-017-1068-3

Tseng, T. W., Wu, C. T., & Lai, F. (2019). Threat analysis for wearable health devices and environment monitoring Internet of Things integration system. IEEE Access, 7, 144983-144994. https://doi.org/10.1109/access.2019.2946081

Udoh, E. S., & Alkharashi, A. (2016). Privacy risk awareness and the behavior of smartwatch users: A case study of Indiana University students. En 2016 Future Technologies Conference (FTC) (pp. 926-931). https://doi.org/10.1109/ftc.2016.7821714

Wireshark. (2022). A network protocol analyzer. https://www.wireshark.org/

Wells, S. (2019, 17 de julio). How Fitbits, other bluetooth devices make us vulnerable to tracking. The Brink. https://www.bu.edu/articles/2019/fitbit-bluetooth-vulnerability/

Wu, M., & Luo, J. (2019). Wearable technology applications in healthcare: A literature review. HIMSS. https://www.himss.org/resources/wearable-technology-applications-healthcare-literature-review

Xue, Y. (2019). A review on intelligent wearables: Uses and risks. Human Behavior and Emerging Technologies, 1(4), 287-294. https://doi.org/10.1002/hbe2.173

Published

2022-12-23

Issue

Section

Review papers

How to Cite

Wearable devices and privacy risks: a literature review. (2022). Interfases, 16(016), 215-230. https://doi.org/10.26439/interfases2022.n016.6119