TY - GEN
T1 - A Cybersecurity Guide for Using Fitness Devices
AU - Bada, Maria
AU - von Solms, Basie
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2023
Y1 - 2023
N2 - The popularity of wearable devices is growing exponentially, with consumers using these for a variety of services. Fitness devices are currently offering new services such as shopping or buying train tickets using contactless payment. In addition, fitness devices are collecting a number of personal information such as body temperature, pulse rate, food habits and body weight, steps-distance travelled, calories burned and sleep stage. Although these devices can offer convenience to consumers, more and more reports are warning of the cybersecurity risks of such devices, and the possibilities for such devices to be hacked and used as springboards to other systems. Due to their wireless transmissions, these devices can potentially be vulnerable to a malicious attack allowing the data collected to be exposed. The vulnerabilities of these devices stem from lack of authentication, disadvantages of Bluetooth connections, location tracking as well as third party vulnerabilities. Guidelines do exist for securing such devices, but most of such guidance is directed towards device manufacturers or IoT providers, while consumers are often unaware of potential risks. The aim of this paper is to provide cybersecurity guidelines for users in order to take measures to avoid risks when using fitness devices.
AB - The popularity of wearable devices is growing exponentially, with consumers using these for a variety of services. Fitness devices are currently offering new services such as shopping or buying train tickets using contactless payment. In addition, fitness devices are collecting a number of personal information such as body temperature, pulse rate, food habits and body weight, steps-distance travelled, calories burned and sleep stage. Although these devices can offer convenience to consumers, more and more reports are warning of the cybersecurity risks of such devices, and the possibilities for such devices to be hacked and used as springboards to other systems. Due to their wireless transmissions, these devices can potentially be vulnerable to a malicious attack allowing the data collected to be exposed. The vulnerabilities of these devices stem from lack of authentication, disadvantages of Bluetooth connections, location tracking as well as third party vulnerabilities. Guidelines do exist for securing such devices, but most of such guidance is directed towards device manufacturers or IoT providers, while consumers are often unaware of potential risks. The aim of this paper is to provide cybersecurity guidelines for users in order to take measures to avoid risks when using fitness devices.
KW - Awareness
KW - Cybersecurity
KW - IoTs
KW - Privacy
KW - Risk
KW - Wearable devices
UR - http://www.scopus.com/inward/record.url?scp=85132996290&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-94285-4_3
DO - 10.1007/978-3-030-94285-4_3
M3 - Conference contribution
AN - SCOPUS:85132996290
SN - 9783030942847
T3 - EAI/Springer Innovations in Communication and Computing
SP - 35
EP - 45
BT - 5th International Conference on Safety and Security with IoT - SaSeIoT 2021
A2 - Nayyar, Anand
A2 - Paul, Anand
A2 - Tanwar, Sudeep
PB - Springer Science and Business Media Deutschland GmbH
T2 - 5th EAI International Conference on Safety and Security in Internet of Things, EAI SaSeIoT 2021
Y2 - 25 April 2021 through 25 April 2021
ER -