A Cybersecurity Guide for Using Fitness Devices

05/06/2021
by   Maria Bada, et al.
0

The popularity of wearable devices is growing exponentially, with consumers using these for a variety of services. Fitness devices are currently offering new services such as shopping or buying train tickets using contactless payment. In addition, fitness devices are collecting a number of personal information such as body temperature, pulse rate, food habits and body weight, steps-distance travelled, calories burned and sleep stage. Although these devices can offer convenience to consumers, more and more reports are warning of the cybersecurity risks of such devices, and the possibilities for such devices to be hacked and used as springboards to other systems. Due to their wireless transmissions, these devices can potentially be vulnerable to a malicious attack allowing the data collected to be exposed. The vulnerabilities of these devices stem from lack of authentication, disadvantages of Bluetooth connections, location tracking as well as third party vulnerabilities. Guidelines do exist for securing such devices, but most of such guidance is directed towards device manufacturers or IoT providers, while consumers are often unaware of potential risks. The aim of this paper is to provide cybersecurity guidelines for users in order to take measures to avoid risks when using fitness devices.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/28/2022

One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware

Currently, the development of IoT firmware heavily depends on third-part...
research
03/01/2022

Privacy of Fitness Applications and Consent Management in Blockchain

The rapid advances in fitness wearable devices are redefining privacy ar...
research
09/08/2022

Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices

IoT devices are present in many, especially corporate and sensitive, net...
research
04/25/2023

IMUPoser: Full-Body Pose Estimation using IMUs in Phones, Watches, and Earbuds

Tracking body pose on-the-go could have powerful uses in fitness, mobile...
research
02/08/2022

Predicting and Visualizing Daily Mood of People Using Tracking Data of Consumer Devices and Services

Users can easily export personal data from devices (e.g., weather statio...
research
05/11/2021

Blocking without Breaking: Identification and Mitigation of Non-Essential IoT Traffic

Despite the prevalence of Internet of Things (IoT) devices, there is lit...
research
08/01/2023

Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case

Media reports show an alarming increase of data breaches at providers of...

Please sign up or login with your details

Forgot password? Click here to reset