Content area
Full text
Abstract: The growing popularity of wearable devices, particularly for medical and fitness applications, has increased reliance on these technologies for tracking biometric data. These devices typically transmit data in multiple stages, beginning with Bluetooth Low Energy (BLE) connectivity, followed by transmission to internet-enabled devices, and ultimately to cloud storage. Each communication step introduces potential cybersecurity vulnerabilities. Understanding the functionality of wearable devices, the data transmission process, and the associated cyber risks, is crucial to safeguarding users against cyberattacks. This paper explores the types of sensors used in wearables, the data transmission workflow, and the cybersecurity challenges involved. It also discusses potential preventative measures to mitigate these risks.
Keywords: Wearable devices, Cybersecurity, Biometric data, Bluetooth low energy, Internet of Things (loT), Cloud storage
1. Introduction
The number of Americans using wearable devices (WD), such as smartwatches or fitness trackers, continues to grow at rapid rates. According to a survey sponsored by the National Institute of Health almost one in three Americans uses a wearable device to track their health data (National Heart, Lung, and Blood Institute 2023). A wearable device is unique to an individual user and is defined as any electronic device that can be attached to the body or clothing to monitor and collect data (TechTarget). These devices can collect data ranging from health statistics such as body temperature, blood oxygen, and heartrate to information on the individual's location. The information is synchronized with the WD and can be shared with a company or service provider through an app. Most wearable devices connect to smartphones or internet-ready devices using Bluetooth Low Energy (BLE). As its name suggests, BLE is designed to transfer small amounts of data with minimal power consumption, which is beneficial when trying to preserve battery lifetime (Balasubramanian et al, 2020). However, as with any type of connectivity, a device using BLE is susceptible to cybersecurity threats. In most wearables, once data is transferred from the WD to an internet-capable device, the data is shared with a cloud server using cellular or Wi-Fi networks, adding additional layers of vulnerability. These risks are substantial, and thus additional research is needed to identify vulnerabilities and mitigate potential threats. This paper aims to provide an overview of wearable devices, the data transmission process, the...




