Abstract
Although wearable devices have high potential in the emerging scenarios, these scenarios face many security and privacy challenges. It is because of the inherent openness of wearable devices limitation of the network, terminal resource and the technology. This brings a lot of obstacles to design of security and privacy protection solutions in wearable device and network. However traditional security and privacy protection method do not fit in these emerging scenarios. Security and privacy issues have gradually become a huge challenge for emerging wearable device applications. Therefore, the design of application security and privacy protection scheme of wearable devices has been widely concerned and focused by academia and industry.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Management of Data Breaches Involving Sensitive Personal Information (SPI). Va.gov. Washington, DC: Department OF Veterans Affairs. 6 January 2012. Archived from the original on 26 May 2015. Accessed 25 May 2015
Stevens, G.: Data Security Breach Notification Laws (PDF), 10 April 2012. fas.org. Accessed 8 June 2017
Greene, S.S.: Security Program and Policies: Principles and Practices, p. 349. Pearson IT Certification, Indianapolis, IN, US (2014). ISBN 978-0-7897-5167-6. OCLC 897789345
Personal Data. General Data Protection Regulation (GDPR). Retrieved 23 October 2020
Personal Data. https://gdpr-info.eu/art-4-gdpr/
Nokhbeh, R.: A study of web privacy policies across industries. J. Inf. Priv. Secur. 13, 169–185 (2017)
See a list (non exhaustive) of privacy related standardization initiatives in IPEN wiki: https://ipen.trialog.com/wiki/Wiki_for_Privacy_Standards#Privacy_Standards
Jasmontaite, L., Kamara, I., Zanfir-Fortuna, G., Leucci, S.: Implementation of Data Protection by Design and by Default: Framing guiding principles into applicable rules. EDPL, vol. 4 (2018). forthcoming
Data protection authorities and their organisations (WP29, EDPB) will provide appropriate guidance on implementation of the GDPR provisions
Kranzberg, M.: Technology and history: “Kranzberg’s Laws.” Technol. Cult. 27(3), 544–560 (1986)
Rannenberg, K.: ISO/IEC standardization of identity management and privacy technologies. Datenschutz und Datensicherheit - DuD 35(1), 27–29 (2011). https://doi.org/10.1007/s11623-011-0008-z
Lee, S., Kim, J., Shon, T.: User privacy-enhanced security architecture for home area network of Smartgrid. Multimedia Tools Appl. 75(20), 12749–12764 (2016). https://doi.org/10.1007/s11042-016-3252-2
Iversen, E.J., Vedel, T., Werle, R.: Standardization and the democratic design of information and communication technology. Knowl. Technol. Pol. 17, 104–126 (2004). https://doi.org/10.1007/s12130-004-1027-y
Fal’, O.M.: Standardization in information technology security. Cybern. Syst. Anal. 53(1), 78–82 (2017). https://doi.org/10.1007/s10559-017-9908-8
see: https://www.iso.org/isoiec-27001-information-security.html
ISO/IEC 27001 International Information Security Standard published. bsigroup.com. BSI. Accessed 21 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Cui, Y., Gu, Z., Sun, L., Tang, H., Cui, L. (2022). The Security and Privacy Protection Framework for Wearable Devices. In: Salvendy, G., Wei, J. (eds) Design, Operation and Evaluation of Mobile Communications. HCII 2022. Lecture Notes in Computer Science, vol 13337. Springer, Cham. https://doi.org/10.1007/978-3-031-05014-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-05014-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-05013-8
Online ISBN: 978-3-031-05014-5
eBook Packages: Computer ScienceComputer Science (R0)