Wearable IoT Security and Privacy: A Review from Technology and Policy Perspective

  • Onyeka D’Mello
  • Mathilde Gelin
  • Fatma Ben Khelil
  • Rojen Erik Surek
  • Huihui ChiEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 878)


The continuing increase in the number of Internet of Things (IoT) devices around the world calls for the need to assess privacy and security vulnerabilities of IoT devices. In this paper, we discuss the extent to which individuals and organizations have utilized the IoT-enabled devices to connect and share data. We also explain the different types of security loopholes that need urgent attention along with other ethical issues that arise from IoT devices. While major application of the IoT is its incorporation into wearable technology, we review its current practices and implications. Moreover, this paper also highlights some of the legal policies and regulations, their values, and challenges regarding data privacy. Finally, we discuss various data analytics solutions for cyber-security coupled with their value and the challenges.


Internet of Things (IoT) Cyber-security Wearables Security and privacy concerns Regulations Policies Data analytics Predictive analytics Big data 


  1. 1.
    Ashton, K.: That Internet of Things thing. RFID J. 22(7), 97–114 (2009)Google Scholar
  2. 2.
    Ching, K.W., Singh, M.M.: Wearable technology devices security and privacy vulnerability analysis. Int. J. Netw. Secur. Appl. 8, 19–30 (2016)Google Scholar
  3. 3.
    De Rossi, D.: Electroactive fabrics and wearable biomonitoring devices. Autex Res. J. 3(4), 6 (2003)Google Scholar
  4. 4.
    Fernandez, P.: Wearable technology: beyond augmented reality. Libr. Hi Tech News 31(9), (2014)Google Scholar
  5. 5.
    Gangan, S.: A review of man-in-the-middle attacks. arXiv preprint arXiv:1504.02115 (2015)
  6. 6.
    Granger, S.: Social engineering fundamentals, part I: hacker tactics. Secur. Focus 18 (2001)Google Scholar
  7. 7.
    Hadnagy, C.: Social Engineering: The Art of Human Hacking. Wiley, Hoboken (2010)Google Scholar
  8. 8.
    Hiremath, S., Yang, G., Mankodiya, K.: Wearable Internet of Things: concept, architectural components and promises for person-centered healthcare. In: 2014 EAI 4th International Conference on Wireless Mobile Communication and Healthcare (Mobihealth), pp. 304–307. IEEE (2014)Google Scholar
  9. 9.
    Hilts, A., Parsons, C., Knockel, J.: Every step you fake: a comparative analysis of fitness tracker privacy and security. Open Eff. Rep. 76 (2016)Google Scholar
  10. 10.
    Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the Internet of Things. In: IEEE World Congress, pp. 21–28 (2015)Google Scholar
  11. 11.
    Kibirige, G.W., Sanga, C.: A survey on detection of sinkhole attack in wireless sensor network. arXiv preprint arXiv:1505.01941 (2015)
  12. 12.
    Kim, D., Park, S., Choi, K., Kim, Y.: BurnFit: analyzing and exploiting wearable devices. In: Kim, H., Choi, D. (eds.) WISA 2015. LNCS, vol. 9503, pp. 227–239. Springer, Cham (2016). Scholar
  13. 13.
    Li, S., Xu, L.: Securing the Internet of Things. Syngress, Rockland (2017)Google Scholar
  14. 14.
    Manogaran, G., Lopez, D., Thota, C., Abbas, K.M., Pyne, S., Sundarasekar, R.: Big data analytics in healthcare Internet of Things. In: Qudrat-Ullah, H., Tsasis, P. (eds.) Innovative Healthcare Systems for the 21st Century. UCS, pp. 263–284. Springer, Cham (2017). Scholar
  15. 15.
    Marrington, A., Kerr, D., Gammack, J.: Managing Security Issues and the Hidden Dangers of Wearable Technologies, 1st edn, pp. 21–22. IGI Publishing, Hershey (2016)Google Scholar
  16. 16.
    Meyer, U., Wetzel, S.: A man-in-the-middle attack on UMTS. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 90–97. ACM, October 2004Google Scholar
  17. 17.
    Piramuthu, S., Zhou, W.: RFID and Sensor Network Automation in the Food Industry: Ensuring Quality and Safety Through Supply Chain Visibility. Wiley, Hoboken (2016)CrossRefGoogle Scholar
  18. 18.
    Rahman, M., Carbunar, B., Banik, M.: Fit and vulnerable: attacks and defenses for a health monitoring device. arXiv preprint arXiv:1304.5672 (2013)
  19. 19.
    Rieck, J.: Attacks on fitness trackers revisited: a case-study of unfit firmware security. arXiv preprint arXiv:1604.03313 (2016)
  20. 20.
    Romanosky, S., Acquisti, A., Sharp, R.: Data breaches and identity theft: when is mandatory disclosure optimal? (2010)Google Scholar
  21. 21.
    Saif, I.: Cyber Risk in an Internet of Things World. Deloitte, New York (2017)Google Scholar
  22. 22.
    Sonar, K., Upadhyay, H.: A survey: DDOS attack on Internet of Things. Int. J. Eng. Res. Dev. 10(11), 58–63 (2014)Google Scholar
  23. 23.
    Tehrani, K., Michael, A.: Wearable technology and wearable devices: everything you need to know. Wearable Devices Mag. (2014)Google Scholar
  24. 24.
    Thibaud, M., Chi, H., Zhou, W., Piramuthu, S.: Internet of Things (IoT) in high-risk environment, health and safety (EHS) industries: a comprehensive review. Decis. Support Syst. 108, 79–95 (2018)CrossRefGoogle Scholar
  25. 25.
    Townsend, M., Le Quoc, T., Kapoor, G., Hu, H., Zhou, W., Piramuthu, S.: Real-time business data acquisition: how frequent is frequent enough? Inf. Manag. 55, 422–429 (2017)CrossRefGoogle Scholar
  26. 26.
    Tu, Y.J., Zhou, W., Piramuthu, S.: Identifying RFID-embedded objects in pervasive healthcare applications. Decis. Support Syst. 46(2), 586–593 (2009)CrossRefGoogle Scholar
  27. 27.
    Vidalis, S., Angelopoulou, O.: Assessing identity theft in the Internet of Things. IT Converg. Pract. (INPRA) 2(1), 15–21 (2014)Google Scholar
  28. 28.
    Wang, Z., Hu, H., Zhou, W.: RFID enabled knowledge-based precast construction supply chain. Comput.-Aided Civil Infrastruct. Eng. 32, 499–514 (2017)CrossRefGoogle Scholar
  29. 29.
    Zhou, W.: RFID and item-level information visibility. Eur. J. Oper. Res. 198(1), 252–258 (2009)MathSciNetCrossRefGoogle Scholar
  30. 30.
    Zhou, W., Kapoor, G., Piramuthu, S.: RFID-enabled item-level product information revelation. Eur. J. Inf. Syst. 18(6), 570–577 (2009)CrossRefGoogle Scholar
  31. 31.
    Zhou, W., Yoon, E.J., Piramuthu, S.: Varying levels of RFID tag ownership in supply chains. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2011. LNCS, vol. 7046, pp. 228–235. Springer, Heidelberg (2011). Scholar
  32. 32.
    Zhou, W., Piramuthu, S.: Consumer preference and service quality management with RFID. Ann. Oper. Res. 216(1), 35–51 (2014)CrossRefGoogle Scholar
  33. 33.
    Zhou, W., Piramuthu, S.: Security/privacy of wearable fitness tracking IoT devices. In: 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1–5. IEEE, June 2014Google Scholar
  34. 34.
    Zhou, W., Piramuthu, S.: Information relevance model of customized privacy for IoT. J. Bus. Ethics 131(1), 19–30 (2015)CrossRefGoogle Scholar
  35. 35.
    Zhou, W., Piramuthu, S.: IoT and supply chain traceability. In: Doss, R., Piramuthu, S., Zhou, W. (eds.) FNSS 2015. CCIS, vol. 523, pp. 156–165. Springer, Cham (2015). Scholar
  36. 36.
    Zhou, W., Piramuthu, S.: Effects of ticket-switching on inventory management: actual vs. information system-based data. Decis. Support Syst. 77, 31–40 (2015)CrossRefGoogle Scholar
  37. 37.
    Zhou, W., Piramuthu, S.: Effect of ticket-switching on inventory and shelf-space allocation. Decis. Support Syst. 69, 31–39 (2015)CrossRefGoogle Scholar
  38. 38.
    Zhou, W., Piramuthu, S., Chu, F., Chu, C.: RFID-enabled flexible warehousing. Decis. Support Syst. 98, 99–112 (2017)CrossRefGoogle Scholar
  39. 39.
    Zhou, W., Piramuthu, S.: IoT security perspective of a flexible healthcare supply chain. Inf. Technol. Manag., 1–13 (2017)Google Scholar
  40. 40.
    Zhou, W., Piramuthu, S.: Identification shrinkage in inventory management: an RFID-based solution. Ann. Oper. Res. 258(2), 285–300 (2017)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Onyeka D’Mello
    • 1
  • Mathilde Gelin
    • 1
  • Fatma Ben Khelil
    • 1
  • Rojen Erik Surek
    • 1
  • Huihui Chi
    • 1
    • 2
    Email author
  1. 1.MSc Big Data and Business AnalyticsESCP EuropeParisFrance
  2. 2.Department of Information and Operations ManagementESCP EuropeParisFrance

Personalised recommendations