What are the potential security issues with wearable smart devices? On

Source: Internet
Author: User



With the advent of the Internet of everything/internet of things, a growing number of new electronic products for consumers to choose from, wearable smart devices are among them, and they are gaining popularity at an alarming rate. What is wearable smart device? As the name implies, it is the equipment that people can wear in their daily life. In addition to the famous Google Glass, more common are fitness recorders, smart watches and so on.

The function of these wearable smart devices is generally to record the activity function data of the body. or display the contents of other device outputs. The two uses can also cross each other, making life more colorful for users.

In the next two articles. Let's explore the possible attacks and risks on wearable smart devices, but be aware that these are just theoretical or conceptual guesses, not what has happened, so whether these crises will occur in the future is still unknown. It depends on how the electronics market will evolve in the future. It depends on whether the criminals have other more lucrative targets. Our aim is not to intimidate users into avoiding these new products. It's about encouraging manufacturers to incorporate security into their products from the start.

Watermark/2/text/ahr0cdovl2jsb2cuy3nkbi5uzxqvaxf1c2hp/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70 /gravity/southeast ">

Three main types of wearable smart devices

1. INPUT type:

Such devices record the user's personal data at all time and without delay. such as fitness recorder, it will help users record pace, distance, energy consumption, calories, heartbeat, GPS positioning and so on.

These devices typically store the data on the device before uploading it to the phone or PC, and finally sync to the user's cloud account to keep the history and display the statistical chart. According to this trend, there will be some medical devices that can monitor the health status (such as body temperature, blood oxygen concentration, etc.) in the future.

Watermark/2/text/ahr0cdovl2jsb2cuy3nkbi5uzxqvaxf1c2hp/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/dissolve/70 /gravity/southeast ">

2, Output Type:

Such devices receive data from other devices (such as mobile phones), most typically smart watches. These devices can display text, execute programs to improve convenience, and the information they display is usually from the network and is passed through an intermediary device (a mobile phone).

3, input and output type:

The way these devices work is to get data--filtering data--to display information. Google Glass, for example, is that it has cameras that capture real-world imagery and can project data into the user's eyes. These devices can add some extra information to the real world, making the user's daily experience even better.

In addition to Google Glass, there are some slightly simpler devices that can also serve as "input-and-output" work, with access to user profiles (such as pace, distance, etc.) and the ability to display content from paired phones.

We can now roughly classify wearable smart devices in this way, but their overall trend is in the direction of "input-output consolidation". Because manufacturers want to provide a lot of other value, such as the fitness recorder can also have text messaging, map function or can receive other information.

Wearable smart devices from an information security perspective

From the point of view of information security, we are very hard to say which type of device is more secure than the other. This is due to the assumption that hackers want to attack them. The difference is only in the way of attack will be different. The more features a device has, the greater the likelihood of being attacked. That's what this looks like. The "Input-output" device is the most targeted and most likely to be compromised.

Just, can't say they must be unsafe. Because security depends on the design of the device and "past performance". The so-called "past performance" refers to how many times it has been attacked before and unharmed. In terms of new devices. Hackers may need more time to test them. Only, with the development of time, the equipment will be more mature. And hackers will fully grasp the internal workings of these devices, which is no longer safe, because in the past.

Copyright notice: This article blog original articles, blogs, without consent, may not be reproduced.

What are the potential security issues with wearable smart devices? On

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.