Tasneem Durid, Derar Eleyan, A. Eleyan, T. Bejaoui, M. Jazzar
{"title":"健身器材中的网络安全——系统文献综述","authors":"Tasneem Durid, Derar Eleyan, A. Eleyan, T. Bejaoui, M. Jazzar","doi":"10.1109/SmartNets58706.2023.10215903","DOIUrl":null,"url":null,"abstract":"Wearable devices are becoming increasingly popular, with users adopting them for a wide range of purposes. For example, fitness equipment can now perform new functions such as shopping or purchasing train tickets using contactless payments. Furthermore, fitness trackers gather a variety of personal data, including body temperature, pulse rate, eating habits, body weight, steps, distance travelled, calories burned, and sleep stage. Although these devices can be helpful to customers, more and more publications are warning about the cybersecurity threats they pose and the potential for them to be hijacked and used as launching grounds for other systems. Furthermore, because of their wireless broadcasts, these devices might be vulnerable to a malicious attack, exposing the data they gather. In addition, these devices are vulnerable due to a lack of authentication, Bluetooth connection difficulties, location monitoring, and third-party vulnerabilities. The purpose of this article is to offer consumers cybersecurity recommendations so that they may take precautions when using fitness devices.","PeriodicalId":301834,"journal":{"name":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cybersecurity in Fitness Devices-A Systematic Literature Review\",\"authors\":\"Tasneem Durid, Derar Eleyan, A. Eleyan, T. Bejaoui, M. Jazzar\",\"doi\":\"10.1109/SmartNets58706.2023.10215903\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wearable devices are becoming increasingly popular, with users adopting them for a wide range of purposes. For example, fitness equipment can now perform new functions such as shopping or purchasing train tickets using contactless payments. Furthermore, fitness trackers gather a variety of personal data, including body temperature, pulse rate, eating habits, body weight, steps, distance travelled, calories burned, and sleep stage. Although these devices can be helpful to customers, more and more publications are warning about the cybersecurity threats they pose and the potential for them to be hijacked and used as launching grounds for other systems. Furthermore, because of their wireless broadcasts, these devices might be vulnerable to a malicious attack, exposing the data they gather. In addition, these devices are vulnerable due to a lack of authentication, Bluetooth connection difficulties, location monitoring, and third-party vulnerabilities. The purpose of this article is to offer consumers cybersecurity recommendations so that they may take precautions when using fitness devices.\",\"PeriodicalId\":301834,\"journal\":{\"name\":\"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SmartNets58706.2023.10215903\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Smart Applications, Communications and Networking (SmartNets)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartNets58706.2023.10215903","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cybersecurity in Fitness Devices-A Systematic Literature Review
Wearable devices are becoming increasingly popular, with users adopting them for a wide range of purposes. For example, fitness equipment can now perform new functions such as shopping or purchasing train tickets using contactless payments. Furthermore, fitness trackers gather a variety of personal data, including body temperature, pulse rate, eating habits, body weight, steps, distance travelled, calories burned, and sleep stage. Although these devices can be helpful to customers, more and more publications are warning about the cybersecurity threats they pose and the potential for them to be hijacked and used as launching grounds for other systems. Furthermore, because of their wireless broadcasts, these devices might be vulnerable to a malicious attack, exposing the data they gather. In addition, these devices are vulnerable due to a lack of authentication, Bluetooth connection difficulties, location monitoring, and third-party vulnerabilities. The purpose of this article is to offer consumers cybersecurity recommendations so that they may take precautions when using fitness devices.