Abstract
This paper examines the dynamic relationship between IoT cybersecurity and privacy concerns associated with wearable devices. IoT, with its exponential growth, presents both opportunities and challenges in terms of accessibility, integrity, availability, scalability, confidentiality, and interoperability. Cybersecurity concerns arise as diverse attack surfaces exploit vulnerabilities in IoT systems, necessitating robust defenses. In the field of wearable technology, these devices offer benefits like health data tracking and real-time communication. However, the adoption of these devices raises privacy concerns. The paper explores proposed solutions, including mechanisms for user-controlled data collection, the implementation of Virtual Trip Line (VTL) and virtual wall approaches, and increasing awareness through user manuals. Additionally, security alerts and data encryption technologies are proposed to mitigate the risk of data leakage.
Faculty Advisor/Mentor
Murat Kuzlu
Document Type
Paper
Disciplines
Information Security | Other Computer Sciences
DOI
10.25776/fzwq-2z41
Publication Date
12-1-2023
Upload File
wf_yes
Privacy Concerns and Proposed Solutions with IoT in Wearable Technology
This paper examines the dynamic relationship between IoT cybersecurity and privacy concerns associated with wearable devices. IoT, with its exponential growth, presents both opportunities and challenges in terms of accessibility, integrity, availability, scalability, confidentiality, and interoperability. Cybersecurity concerns arise as diverse attack surfaces exploit vulnerabilities in IoT systems, necessitating robust defenses. In the field of wearable technology, these devices offer benefits like health data tracking and real-time communication. However, the adoption of these devices raises privacy concerns. The paper explores proposed solutions, including mechanisms for user-controlled data collection, the implementation of Virtual Trip Line (VTL) and virtual wall approaches, and increasing awareness through user manuals. Additionally, security alerts and data encryption technologies are proposed to mitigate the risk of data leakage.