670 Hits in 3.7 sec

An Empirical Research on the Investment Strategy of Stock Market based on Deep Reinforcement Learning model

Yuming Li, Pin Ni, Victor Chang
2019 Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk  
With usage of big data and development of advanced technology, smart wearable devices have come to market with multifunction.  ...  Third, some smart wearable companies take priority of multifunction of devices rather than data safety. Based on these problems, different entities should take on responsibilities.  ...  Security Safeguards Principle of the guidelines (Werle & Palm, 2009 ) has demonstrated that smart wearable companies should protect personal information from other illegal access from hackers.  ... 
doi:10.5220/0007722000520058 dblp:conf/complexis/LiN019 fatcat:3qamsvj6vbauhckuoxfxq3mm5u

Friend or Foe?

Chen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, Bo Liu
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
Results demonstrate that such a technique can achieve 80% accuracy with only one try and more than 90% accuracy with three tries, which to our knowledge, is the first technique that reveals personal PINs  ...  leveraging wearable devices without the need for labeled training data and contextual information.  ...  In this work, we study the possible personal secret leakage in a very common scenario that people wear wrist-worn wearable devices while using key-based security systems, such as ATM machines, password  ... 
doi:10.1145/2897845.2897847 dblp:conf/ccs/WangGWCL16 fatcat:hug7iqrl2fa3jajrju2u3qhxpm

WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables

Chen Wang, Jian Liu, Xiaonan Guo, Yan Wang, Yingying Chen
2019 IEEE INFOCOM 2019 - IEEE Conference on Computer Communications  
We present a passcode inference system, WristSpy, which examines to what extent the user's PIN/pattern during the mobile payment could be revealed from a single wrist-worn wearable device under different  ...  Mobile payment has drawn considerable attention due to its convenience of paying via personal mobile devices at anytime and anywhere, and passcodes (i.e., PINs or patterns) are the first choice of most  ...  Currently, the proposed passcode leakage requires to obtain the raw sensor data from the wearable devices to launch attack.  ... 
doi:10.1109/infocom.2019.8737633 dblp:conf/infocom/WangLG0C19 fatcat:uo5lp6zxqfcrrjponxqaryfjbu

Side-channel attacks on mobile and wearable systems

Ani Nahapetian
2016 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)  
This paper describes a variety of side-channel attacks on mobile and wearable computing systems, exposing vulnerabilities in their system and software architectures.  ...  Mobile devices commonly have access to personal information (including saved passwords, login information, and email access), location information (including GPS data, daily schedules), and now with wearable  ...  In the case of PIN inference, differentiating a '1' keystroke from a '2' keystroke for example.  ... 
doi:10.1109/ccnc.2016.7444763 dblp:conf/ccnc/Nahapetian16 fatcat:36xl2yxzmzc5rmh5eyzdj6s7ay

Wearable Technology Devices Security and Privacy Vulnerability Analysis

Ke Wan Ching, Manmeet Mahinderjit Singh
2016 International journal of network security and its applications  
security and privacy vulnerabilities on wearable devices is presented.  ...  However, wearable technology is not mature yet in term of device security and privacy acceptance of the public.  ...  However, as wearables making more and more use of user personal data -from fitness stats to health records, security should be put into a high priority.  ... 
doi:10.5121/ijnsa.2016.8302 fatcat:v2wugxfoyzbgdhxfto7fove6hq

A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch

Liming Fang, Minghui Li, Lu Zhou, Hanyi Zhang, Chunpeng Ge
2019 Sensors  
A smart watch is a kind of emerging wearable device in the Internet of Things. The security and privacy problems are the main obstacles that hinder the wide deployment of smart watches.  ...  In FPAS, we leverage the identity-based authentication scheme to protect the devices from malicious connection and policy-based access control for data privacy preservation.  ...  Abbreviations The following abbreviations are used in this manuscript: IoT Internet of Things PIN Personal identification number MAC Media access control UUID Universally-unique identifier CP-ABE Cipher-policy  ... 
doi:10.3390/s19092109 fatcat:v35k5o5hirdhzfigsj6dcmmco4

Proposed Enhanced Security on Face Recognition Technology for Mobile Devices

2022 Advances in Machine Learning & Artificial Intelligence  
In this paper, we are proposing a way to enhance the security on face recognition for mobile devices by connecting the mobile device to the other wearable device in order to increase security on face recognition  ...  As mentioned above issues, they are still having a leakage about the security of information stored in the device according to their working algorithm.  ...  Hung Lin believes that, it was difficult to forge, since biometric systems identify a person by biological characteristics, though some other researchers found that there was more leakage [3] .  ... 
doi:10.33140/amlai.03.01.02 fatcat:clf56j5rnjbyflluq3lc72t6am

Resonance-based Secure Pairing for Wearables [article]

Wei Wang, Lin Yang, Qian Zhang
2018 arXiv   pre-print
Securely pairing wearables with another device is the key to many promising applications.  ...  This paper presents Touch-And-Guard (TAG), a system that uses hand touch as an intuitive manner to establish a secure connection between a wristband wearable and the touched device.  ...  the wearable or device.  ... 
arXiv:1805.08609v1 fatcat:ylzs64fxmjabxctz5rk7nwupbe

Hidden Indicator Based PIN-Entry Method Using Audio Signals

Hwajeong Seo, Howon Kim
2017 Journal of information and communication convergence engineering  
In this paper, we revisit the state-of-art radio channel based bimodal PIN-entry method and analyze the information leakage from the previous method by exploiting the sight tracking attacks.  ...  PIN-entry interfaces have high risks to leak secret values if the malicious attackers perform shoulder-surfing attacks with advanced monitoring and observation devices.  ...  If the PIN information is delivered from the user's devices to service servers in an encrypted format, the adversaries cannot extract confidential information from the network's packets.  ... 
doi:10.6109/jicce.2017.15.2.91 dblp:journals/jicce/SeoK17 fatcat:vvw4kuwlw5d2lc63oq5jz5yxdy

On the Security of Bluetooth Low Energy in Two Consumer Wearable Heart Rate Monitors/Sensing Devices

Yeṣem Kurt Kurt Peker, Gabriel Bello, Alfredo J. Perez
2022 Sensors  
chest wearable) and a BLE keyboard to explore which security features in the BLE standards are implemented in the devices.  ...  In this study, we analyze the security features available in Bluetooth LE standards and evaluate the features implemented in two BLE wearable devices (a Fitbit heart rate wristband and a Polar heart rate  ...  in all the studied devices), and, in the case of the Polar H7 heart rate chest wearable and the Bluebyte keyboard, allowing the collection of data on a third-party device broadcasted from the wearables  ... 
doi:10.3390/s22030988 pmid:35161734 pmcid:PMC8839540 fatcat:zztsqjc7ljfwjhfhwe4pvugl3a

Secured ATM Transaction Using SteganoPIN

M. Priyanka
2017 International Journal for Research in Applied Science and Engineering Technology  
Users generally use the same personalized identification number (PIN) for multiple systems and in various sessions.  ...  Direct PIN entries are extremely at risk of shoulder-surfing attacks as attackers can effectively observe PIN entry with hidden cameras.  ...  Personalized Identification Number Entry Security Issues Personal identification numbers (PINs), generally constructed and memorized, are widely used as numerical passwords for user authentication or numerous  ... 
doi:10.22214/ijraset.2017.8333 fatcat:nu4uui3nsbhp5cyu6bx65yw4mm

From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges

Tanesh Kumar, Madhusanka Liyanage, An Braeken, Ijaz Ahmad, Mika Ylianttila
2017 2017 European Conference on Networks and Communications (EuCNC)  
Several companies/service providers are using consumer's personal and location information from their gadgets, to draft critical decisions without concerning them and that can eventually effect on their  ...  Every individual in this digital era wants the autonomy and control over their personal data, however this is not completely achievable in the real world.  ...  Consequently, ethical laws are needed in order to limit the functionality of gadgets and wearable devices at public places.  ... 
doi:10.1109/eucnc.2017.7980650 dblp:conf/eucnc/KumarLBAY17 fatcat:oucfejutmjfc3d4t54unvlv6ma

A Cybersecurity Guide for Using Fitness Devices [article]

Maria Bada, Basie von Solms
2021 arXiv   pre-print
The popularity of wearable devices is growing exponentially, with consumers using these for a variety of services.  ...  The vulnerabilities of these devices stem from lack of authentication, disadvantages of Bluetooth connections, location tracking as well as third party vulnerabilities.  ...  Personal Data Collection by Fitness Devices Different models of wearable devices are offered to consumers from different companies.  ... 
arXiv:2105.02933v1 fatcat:uovtbenqvjd3bomqg7ikpbpepm

The Acceptance Intention of Consumers for a Dynamic Payment Mechanism for Health Insurance Coverage

Chie-Bein Chen, Wen-Tsung Wu, Chen-Hua You
2017 Economics World  
This study uses the Decomposed Theory of Planned Behavior as the research basis, and through the designed questionnaire, investigates the health data gathered from wearable devices and uses big data to  ...  by wearable devices on our bodies.  ...  Google Fit allows wearable devices to measure blood pressure, heart rate, and other personal activity data, and upload these data into Google's cloud server.  ... 
doi:10.17265/2328-7144/2017.04.010 fatcat:62wj5htvm5hzta2psf7nnyv4ve

Examining the Design, Manufacturing, and Analytics of Smart Wearables

Ximena Lopez, Kahkashan Afrin, Bimal Nepal
2020 Medical Devices & Sensors  
Wearable devices can also cause electrical shocks from current leakage (J. H. Kim et al., 2010) .  ...  and PINs.  ... 
doi:10.1002/mds3.10087 fatcat:kkb27plerzhcxo2daeshr7hani
« Previous Showing results 1 — 15 out of 670 results