TY - JOUR
T1 - Smart Attacks against Intelligent Wearables in People-Centric Internet of Things
AU - Liu, Jiajia
AU - Sun, Wen
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/12
Y1 - 2016/12
N2 - The people-centric Internet of Things, as an essential part of the general IoT ecosystem, relies heavily on intelligent wearables to control and actuate the ambient/remote "things" according to the sensed information or collected instruction from the specific person. Intelligent wearables, although becoming increasingly prevalent and pervasive, are vulnerable to various cyber-attacks due to their intrinsic characteristics, which consequently brings up unprecedented security challenges in terms of privacy leakage, financial loss, and even malicious invasion of other connected IoT components and applications. Therefore, it is of great necessity to keep intelligent wearables reliable and trustworthy before being able to secure the core parts of IoT. Toward this end, we provide in this article a survey of available attack methodologies on intelligent wearables as well as the corresponding countermeasures, from the perspectives of data integrity, authenticity, and privacy.
AB - The people-centric Internet of Things, as an essential part of the general IoT ecosystem, relies heavily on intelligent wearables to control and actuate the ambient/remote "things" according to the sensed information or collected instruction from the specific person. Intelligent wearables, although becoming increasingly prevalent and pervasive, are vulnerable to various cyber-attacks due to their intrinsic characteristics, which consequently brings up unprecedented security challenges in terms of privacy leakage, financial loss, and even malicious invasion of other connected IoT components and applications. Therefore, it is of great necessity to keep intelligent wearables reliable and trustworthy before being able to secure the core parts of IoT. Toward this end, we provide in this article a survey of available attack methodologies on intelligent wearables as well as the corresponding countermeasures, from the perspectives of data integrity, authenticity, and privacy.
UR - http://www.scopus.com/inward/record.url?scp=85012980024&partnerID=8YFLogxK
U2 - 10.1109/MCOM.2016.1600553CM
DO - 10.1109/MCOM.2016.1600553CM
M3 - 文章
AN - SCOPUS:85012980024
SN - 0163-6804
VL - 54
SP - 44
EP - 49
JO - IEEE Communications Magazine
JF - IEEE Communications Magazine
IS - 12
M1 - 7786109
ER -