Cyber Security Risks in Wearable Devices

Furkejuvvon:
Bibliográfalaš dieđut
Publikašuvnnas:International Conference on Cyber Warfare and Security (Mar 2025), p. 709
Váldodahkki: Vargas, Stacey
Eará dahkkit: Lewis, Durig
Almmustuhtton:
Academic Conferences International Limited
Fáttát:
Liŋkkat:Citation/Abstract
Full Text
Full Text - PDF
Fáddágilkorat: Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!

MARC

LEADER 00000nab a2200000uu 4500
001 3202191297
003 UK-CbPIL
035 |a 3202191297 
045 2 |b d20250301  |b d20250331 
084 |a 142229  |2 nlm 
100 1 |a Vargas, Stacey  |u Department of Physics and Astronomy, Virginia Military Institute, Lexington, USA 
245 1 |a Cyber Security Risks in Wearable Devices 
260 |b Academic Conferences International Limited  |c Mar 2025 
513 |a Conference Proceedings 
520 3 |a The growing popularity of wearable devices, particularly for medical and fitness applications, has increased reliance on these technologies for tracking biometric data. These devices typically transmit data in multiple stages, beginning with Bluetooth Low Energy (BLE) connectivity, followed by transmission to internet-enabled devices, and ultimately to cloud storage. Each communication step introduces potential cybersecurity vulnerabilities. Understanding the functionality of wearable devices, the data transmission process, and the associated cyber risks, is crucial to safeguarding users against cyberattacks. This paper explores the types of sensors used in wearables, the data transmission workflow, and the cybersecurity challenges involved. It also discusses potential preventative measures to mitigate these risks. 
610 4 |a TechTarget 
653 |a Network security 
653 |a Virtual private networks 
653 |a Tracking devices 
653 |a Biometrics 
653 |a Communication 
653 |a Cloud computing 
653 |a Sensors 
653 |a Workflow 
653 |a Firmware 
653 |a Cybersecurity 
653 |a Wearable technology 
653 |a Wearable computers 
653 |a Devices 
653 |a Data transmission 
653 |a Connectivity 
653 |a Data encryption 
653 |a Literature reviews 
653 |a Blood 
653 |a Internet of Things 
653 |a Prevention programs 
653 |a Internet 
653 |a Popularity 
653 |a Storage 
653 |a Computer mediated communication 
653 |a Risk 
653 |a Tracking 
653 |a Telecommunications 
700 1 |a Lewis, Durig  |u Department of Physics and Astronomy, Virginia Military Institute, Lexington, USA 
773 0 |t International Conference on Cyber Warfare and Security  |g (Mar 2025), p. 709 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3202191297/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3202191297/fulltext/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3202191297/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch