Abstract

This paper examines the dynamic relationship between IoT cybersecurity and privacy concerns associated with wearable devices. IoT, with its exponential growth, presents both opportunities and challenges in terms of accessibility, integrity, availability, scalability, confidentiality, and interoperability. Cybersecurity concerns arise as diverse attack surfaces exploit vulnerabilities in IoT systems, necessitating robust defenses. In the field of wearable technology, these devices offer benefits like health data tracking and real-time communication. However, the adoption of these devices raises privacy concerns. The paper explores proposed solutions, including mechanisms for user-controlled data collection, the implementation of Virtual Trip Line (VTL) and virtual wall approaches, and increasing awareness through user manuals. Additionally, security alerts and data encryption technologies are proposed to mitigate the risk of data leakage.

Faculty Advisor/Mentor

Murat Kuzlu

Document Type

Paper

Disciplines

Information Security | Other Computer Sciences

DOI

10.25776/fzwq-2z41

Publication Date

12-1-2023

Upload File

wf_yes

Share

COinS
 

Privacy Concerns and Proposed Solutions with IoT in Wearable Technology

This paper examines the dynamic relationship between IoT cybersecurity and privacy concerns associated with wearable devices. IoT, with its exponential growth, presents both opportunities and challenges in terms of accessibility, integrity, availability, scalability, confidentiality, and interoperability. Cybersecurity concerns arise as diverse attack surfaces exploit vulnerabilities in IoT systems, necessitating robust defenses. In the field of wearable technology, these devices offer benefits like health data tracking and real-time communication. However, the adoption of these devices raises privacy concerns. The paper explores proposed solutions, including mechanisms for user-controlled data collection, the implementation of Virtual Trip Line (VTL) and virtual wall approaches, and increasing awareness through user manuals. Additionally, security alerts and data encryption technologies are proposed to mitigate the risk of data leakage.