Skip to main content

The Security and Privacy Protection Framework for Wearable Devices

  • Conference paper
  • First Online:
Design, Operation and Evaluation of Mobile Communications (HCII 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13337))

Included in the following conference series:

Abstract

Although wearable devices have high potential in the emerging scenarios, these scenarios face many security and privacy challenges. It is because of the inherent openness of wearable devices limitation of the network, terminal resource and the technology. This brings a lot of obstacles to design of security and privacy protection solutions in wearable device and network. However traditional security and privacy protection method do not fit in these emerging scenarios. Security and privacy issues have gradually become a huge challenge for emerging wearable device applications. Therefore, the design of application security and privacy protection scheme of wearable devices has been widely concerned and focused by academia and industry.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Management of Data Breaches Involving Sensitive Personal Information (SPI). Va.gov. Washington, DC: Department OF Veterans Affairs. 6 January 2012. Archived from the original on 26 May 2015. Accessed 25 May 2015

    Google Scholar 

  2. Stevens, G.: Data Security Breach Notification Laws (PDF), 10 April 2012. fas.org. Accessed 8 June 2017

    Google Scholar 

  3. Greene, S.S.: Security Program and Policies: Principles and Practices, p. 349. Pearson IT Certification, Indianapolis, IN, US (2014). ISBN 978-0-7897-5167-6. OCLC 897789345

    Google Scholar 

  4. Personal Data. General Data Protection Regulation (GDPR). Retrieved 23 October 2020

    Google Scholar 

  5. Personal Data. https://gdpr-info.eu/art-4-gdpr/

  6. Nokhbeh, R.: A study of web privacy policies across industries. J. Inf. Priv. Secur. 13, 169–185 (2017)

    Google Scholar 

  7. See a list (non exhaustive) of privacy related standardization initiatives in IPEN wiki: https://ipen.trialog.com/wiki/Wiki_for_Privacy_Standards#Privacy_Standards

  8. Jasmontaite, L., Kamara, I., Zanfir-Fortuna, G., Leucci, S.: Implementation of Data Protection by Design and by Default: Framing guiding principles into applicable rules. EDPL, vol. 4 (2018). forthcoming

    Google Scholar 

  9. Data protection authorities and their organisations (WP29, EDPB) will provide appropriate guidance on implementation of the GDPR provisions

    Google Scholar 

  10. Kranzberg, M.: Technology and history: “Kranzberg’s Laws.” Technol. Cult. 27(3), 544–560 (1986)

    Article  Google Scholar 

  11. Rannenberg, K.: ISO/IEC standardization of identity management and privacy technologies. Datenschutz und Datensicherheit - DuD 35(1), 27–29 (2011). https://doi.org/10.1007/s11623-011-0008-z

    Article  Google Scholar 

  12. Lee, S., Kim, J., Shon, T.: User privacy-enhanced security architecture for home area network of Smartgrid. Multimedia Tools Appl. 75(20), 12749–12764 (2016). https://doi.org/10.1007/s11042-016-3252-2

    Article  Google Scholar 

  13. Iversen, E.J., Vedel, T., Werle, R.: Standardization and the democratic design of information and communication technology. Knowl. Technol. Pol. 17, 104–126 (2004). https://doi.org/10.1007/s12130-004-1027-y

    Article  Google Scholar 

  14. Fal’, O.M.: Standardization in information technology security. Cybern. Syst. Anal. 53(1), 78–82 (2017). https://doi.org/10.1007/s10559-017-9908-8

    Article  Google Scholar 

  15. see: https://www.rug.nl/research/research-data-management/data_protection-gdpr/data-protection-impact-assessment/protection-goals

  16. see: https://www.iso.org/isoiec-27001-information-security.html

  17. ISO/IEC 27001 International Information Security Standard published. bsigroup.com. BSI. Accessed 21 2020

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongwei Gu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cui, Y., Gu, Z., Sun, L., Tang, H., Cui, L. (2022). The Security and Privacy Protection Framework for Wearable Devices. In: Salvendy, G., Wei, J. (eds) Design, Operation and Evaluation of Mobile Communications. HCII 2022. Lecture Notes in Computer Science, vol 13337. Springer, Cham. https://doi.org/10.1007/978-3-031-05014-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-05014-5_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-05013-8

  • Online ISBN: 978-3-031-05014-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics