Recent Advances in Wearable Sensing Technologies
Abstract
:1. Introduction
- We present a comprehensive review of current advances in wearable sensing technologies;
- We describe recent developments in communication, services, security, and privacy technologies for wearables;
- We discuss some research opportunities and challenges that we need to address in the future for wearable sensing technologies.
2. Wearable Sensing Technologies
- A power unit. This component of the wearable sensor device provides the energy used by the wearable sensor device to operate. Some wearable devices may include rechargeable or nonrechargeable batteries and energy-harvesting technologies [43]. Table 2 presents different types of power-generating units that can be used.
- Sensors. These are electronic and microelectro-mechanical systems (MEMS) components that measure a physical quantity on the user (human-centric) or their surrounding environment (environmental). These sensors may be intrusive to the user (e.g., implanted in the body), with part of the wearable device worn by the user (e.g., smart fabrics [52] and photoplethysmography (PPG) sensors [53]), or carried around/worn by the user (e.g., location trackers [54]). Figure 6 shows a Venn diagram with wearable sensors grouped by type, and Table 3 describes each sensor.
- Processing/control unit. Based on the capabilities and/or design/objectives of the wearable, this component may perform basic calculations, filter data, or execute AI algorithms or control algorithms.
- Embedded storage media. Some wearable sensing devices have a flash-type storage media that stores sensor data for further analysis.
- Network interfaces. Using communication interfaces, a wearable sensor device may create a personal area network (PAN) with other wearable sensors, to communicate with a more powerful device such as a smart phone, or to directly forward data to a remote service.
- Actuators. Actuator components produce vibrations, sound, and visual cues (e.g., lights, screens, or heads-up displays) to notify the user about the device’s status. Some wearable sensing devices may not send data to a remote server/service, but they may provide automated feedback or execute an intrusive action on the user (e.g., an automatic defibrillator [55] and wearables for automated medication delivery [56,57] using microneedles) without the need for external systems, and some wearables provide information on a smartphone screen.
Energy Source | Description | Examples of Wearable Sensing Devices |
---|---|---|
Nonrechargeable batteries | Use of standard-size small or specialized-size batteries that power a wearable sensing device | Insulin pumps, cochlear implants/devices, implantable cardioverter defibrillators |
Rechargeable batteries | Lithium ion batteries that may be connected to an external power source to be recharged | Smart watches, smart phones, heart trackers, insulin pumps, digital stethoscopes [63], portable handheld ultrasound diagnostic devices [64] |
Solar-powered | Use of photovoltaic (PV) cells to recharge a battery that powers a wearable | Smart bracelets [65], smart watches, external wearables such as tracking devices, smart fabrics |
Radiofrequency (RF) | Use of antennas that extract energy from radio signals to recharge a battery or to power directly a wearable sensor | Radiofrequency identification (RFID) implants [66], bioelectronic stickers/tattoos [67] |
Movement and mechanical waves | Use of piezoelectric devices to extract energy from human movements [68] or mechanical waves such as wind or ultrasound to recharge a battery or to power a device [69] | Implantable medical devices [69], wrist wearables [70] |
Thermoelectric generators | Use of body heat to generate power to recharge a battery or to power directly a wearable sensor [71] | Biometric wearables and smart t-shirts for electrocardiogram monitoring [72] |
Sensor Type | Description/Application | Wearable Device Examples | Type of Collected Data |
---|---|---|---|
Smart fabrics (e-textiles) | Fabrics developed from traditional materials (e.g., cotton, polyester, nylon) combined with materials possessing electrical conductivity, or that can be embedded/uses to carry other sensors/electronic components. Some smart fabrics can detect the presence of chemical substances [73] | Zephyr compression shirt, Nadi X smart yoga pants | Human-centric |
Electrocardiogram (ECG) sensor | Measures the electrical impulses of the heart muscle. Usually placed in contact with the skin. May be used in conjunction with implantable cardioverter defibrillators. Provides heart pulse data | Shimmer3 ECG chest unit, Apple Watch Series 6 | Human-centric |
Near-field communication (NFC) | Enables communication at short distances (less than 10 cm). Used as a wearable payment sensor [74,75]. Can be used to detect proximity and infer location, and for multiple-factor authentication methods [76]. | NFC Ring, many smartphones, smartwaches | Human-centric |
Galvanic skin response (GSR) sensor | Measures skin conductivity. Used in wearables to recognize stress levels/emotional state of an individual [77]. | Empatica E4 wristband | Human-centric |
Photoplethysmography (PPG) sensor | Measures blood volume changes. These sensors illuminate the skin of a wearer and measure light absorption to determine human body variables including heart rate [78,79], blood oxygenation levels [80], and blood pressure when used in conjunction with an ECG sensor [81]. | Wellvue O2 Ring, pulse oximeters, most fitness bands and smart watches | Human-centric |
Electroencephalography (EEG) sensors | Measure electrical activity in the scalp of a user. These devices can be used to diagnose abnormal brain activity when used in healthcare applications [82] or to control devices through brain–computer interfaces (BCIs) [83]. | Emotiv EpocX | Human-centric |
Glucose monitors | Monitor blood glucose levels for people with diabetes. Devices can monitor glucose levels continuously or at a single moment in time [84]. | Dexcom G6 CGM | Human-centric |
Infrared (IR) sensor | Measures skin or ambient temperature. Temperature can be used to predict ovulation in female mammals. | Ava fertility tracker | Human-centric/environmental |
Accelerometer/gyroscope | Detects sudden accelerationmovement. Accelerometers can be used to detect and characterize human activities [85]. | Shimmer3 IMU, Samsung Galaxy Watch 3, activity trackers, smartphones | Human-centric/ Environmental |
Microphone | Detects sound. They can be used to detect health conditions, ambient sounds, activity, location contexts (e.g., being in a restaurant, hospital, home) [86]. | Eko CORE family of stethoscopes/stethoscope attachments | Human-centric/Environmental |
Location sensor | Tracks the locations/places where a user carrying a device with location may be [87]. Location sensors may be outdoor location or indoor location sensors and include technologies such as a global positioning system (GPS; United States), Galileo (European Space Agency), GLONASS (Russia), BeiDou (China) receivers, or the Navigation with Indian Constellation (India) systems. Indoor location technologies/sensors may include sonar-based, dead reckoning, Bluetooth low energy (BLE) beacons, among others [88]. | Game Golf GPS receiver, Jiobit, Pet tracker, smartphones, most smartwatches | Human-centric/Environmental |
Complementary Metal-Oxide Semiconductor (CMOS)/CCD imaging sensor | Takes photographs. When combined with AI, it may be used to detect objects and possibly recognize people’s identities without consent [89]. May be used to detect emotions in humans. | Iristick, Ray-Ban/Facebook Stories smart glasses, H1 head-mounted smart glasses, Microsoft HoloLens, Axon Body 2 body cameras, smartphones, | Human-centric/Environmental |
Radiofrequency identification (RFID) tags | Store information about its wearer. RFID can be active or passive and can be used to track assets [90]. RFID can be used for location-based systems and to estimate crowd size in crowd-management systems [91]. | 3M RFID tags, ARDES Injection needle with RFID chip for cats and dogs, smartphones | Human-centric/Environmental |
Laser emitter | Laser emitters are used to measure distances through light detection and ranging (LiDAR) and there are plans to be integrate them in future augmented reality (AR) glasses and smartphones [92]. A laser emitter can also be used for both acute and chronic pain management [93]. | CuraviPlus Laser Therapy Belt for Lower Back Pain, future smart AR glasses and smartphones | Human-centric/Environmental |
Ultrasound sensor | Detects objects in the proximity of a user/device [94]. Used also as an imaging sensor in handheld healthcare medical devices [64]. | WeWALK smart cane, UltraCane, SonoQue, and Clarius portable handheld ultrasound devices | Human-centric/Environmental |
Air quality sensor | Detects harmful gas concentrations/volatile components [95]. | Atmotube PRO, TZOA, Flow 2 by plume labs | Environmental |
Spectrometer | Separates and measures the spectral components reflected by a material. The light spectrum can be used to determine the components of the material [96]. | GoyaLab IndiGo modular visible spectrometer | Environmental |
Radiation sensor | Tracks ionizing [97] and nonionizing [98] radiation in the proximity of its wearer. | Instadose 2 Personal Radiation (X-ray) badge, Landauer RaySafe i3 Real-time Personal, Radiation Dosimetry, Landauee Tactical RadWatch | Environmental |
Barometric pressure sensor | Detects barometric (atmospheric) pressure. Can be used to detect movement, activity [99,100], and altitude. | Garmin Fenix 5X | Environmental |
Compass | Determines orientation and used for navigation | Most smartwatches | Environmental |
3. Communication Technologies for Wearable Sensing
4. Remote Service Technologies for Wearable Sensing
Type of System | Description | Examples of Systems |
---|---|---|
Location-based systems | Use location data to track, query, or provide a service based on location only [129]. | Smart Caddie, OneBusAway [130], Jiobit pet tracking system, Uber, Lyft |
Human-centric systems | Use sensors to monitor human-related physiological variables, activities and behaviors. Personal monitoring systems (e.g., fitness systems) and intelligent medical/healthcare systems fall into this category [131,132] | Fitbit Premium + Health, Garmin Connect, Samsung Health, Apple Healthkit |
Participatory/ crowdsensing systems | Use collaborative data collected from a crowd to estimate communal parameters of interest [133,134] such as traffic, pollution, noise levels and others [135]. Participatory/crowdsensing systems include systems for crowd management [91,136,137], emergency management [138], and recently COVID-19 epidemiological systems based on mobile phones and sensors [10,11]. | Crowdsync, COVIDNearby, CovidSens [139], MetroSense [140] |
Hybrid systems | Systems making use of the characteristics of more than one class/kind of system above. | PokemonGo |
5. Security and Privacy for Wearable Sensing
5.1. Security
Vulnerability | Description | Examples of Attacks |
---|---|---|
Limited physical security | Unauthorized physical access to a wearable device by an adversary without difficulty | Physically damaging a device, spoofing attacks [145,146], manipulation of a device’s context/environment to make the device malfunction or incorrectly collect/register data [148,149] |
Limited power | Wearable devices use batteries or energy harvesting techniques; attacks may drain their batteries and render them unusable | Battery exhaustion attacks [171] |
Weak encryption | Use of encryption protocols that may not sufficiently protect data sent by a wearable due to energy limitations, processing power limitations, and bad software engineering practices | Eavesdropping, injection, and denial of service (DoS) attacks in health monitoring devices [172] |
Weak authentication | Failure to authenticate a user, a wearable device, or data generated by a wearable due to energy, computational power, poor design, mode of use, or user interface constraints that may not allow the implementation of strong authentication protocols on a wearable device | Stealing, losing, or duplicating a physical token for a wearable device [173] |
Unnecessary open ports | Devices may keep operating system (OS) ports/network addresses that may be exploited in security attacks or privacy violations | Tracking of users using botnets and Bluetooth low energy (BLE) [174] |
Software vulnerabilities | Software may be implemented with errors or weak programming practices that make wearables vulnerable to security attacks; some of these weak practices include backdoors and errors during firmware updates | Attacks on fitness trackers during firmware updates [151] Logic bombs [175] |
5.2. Privacy
User Privacy Concern | Privacy Issue | Recently Proposed Solutions |
---|---|---|
Access control Location disclosure Social implications Discrete display and visual occlusion User’s fear Speech disclosure Right to forget | Context privacy | Virtual trip lines [196] Bubble sensing [197] Privacy bubbles [198] Virtual walls [199] |
Speech disclosure Social implications Facial recognition (identification) Surreptitious A/V recording User’s fears Location disclosure | Bystanders’ privacy | BlindSpot [200] Using IR to disable devices [201] Using Bluetooth to disable capturing device [202] Virtual Walls [199] Privacy-aware restricted areas [203] PrivacyEye [204] PrivacyVisor [205] PrivacyVisor III [206] Perturbed eyeglass frames [207] Respectful cameras [208] Negative face blurring [209] FacePET [210] I-Pic [211] |
Access control Location disclosure Social implications User’s fear Criminal abuse Social media sync Discrete display and visual occlusion Right to forget | External data-sharing privacy | k-anonymity [212] l-diversity [213] t-closeness [214] Differential privacy [215,216] Homomorphic encryption [217,218] |
6. Challenges and Research Opportunities for Wearable Sensing Technologies
6.1. Security
6.2. Privacy
6.3. 6G and Machine Learning at the Edge (Federated Learning)
6.4. Energy Harvesting and Management
6.5. Interoperability
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Abbreviations
cm | centimeter |
4G | Fourth-generation cellular networks |
5G | Fifth-generation cellular networks |
6G | Sixth-generation cellular network |
AAMI | Association for the Advancement of Medical Instrumentation |
API | Application Programming Interface |
A/V | Audio/Video |
AES | Advanced Encryption Standard |
AI | Artificial Intelligence |
ANSI | American National Standards Institute |
AR | Augmented Reality |
BAN | Body Area Network |
BCI | Brain-Computer Interfaces |
BLE | Bluetooth Low Energy |
CARES | U.S. Coronavirus Aid, Relief, and Economic Security Act |
CCD | Charged Coupled Device |
CLSI | Clinical & Laboratory Standards Institute |
CMOS | Complementary Metal-Oxide Semiconductor |
CNN | Convolutional Neural Network |
COVID-19 | Coronavirus Disease 2019 |
DApps | Distributed Apps |
DDoS | Distributed Denial of Service |
DL | Deep Learning |
DNN | Deep Neural Network |
DNS | Domain Name System |
DoS | Denial of Service |
DVR | Digital Video Recorder |
ECG | Electrocardiography |
EEG | Electroencephalography |
EHR | Electronic Health Record |
EJ | Exajoule |
EU | European Union |
FDA | Food and Drug Administration |
FL | Federated Learning |
GDPR | General Data Protection Regulation |
GLONASS | Global Navigation Satellite System |
GMM | Gaussian Mixture Model |
GPS | Global Positioning System |
GPU | Graphical Processing Unit |
GSR | Galvanic Skin Response |
HCS | Human-Centric Sensing |
HDFS | Hadoop Distributed File System |
HIPAA | Health Insurance Portability and Accountability Ac |
HITECH | Health Information Technology for Economic and Clinical Health |
IEC | International Electrotechnical Commission |
IEEE | Institute of Electrical and Electronics Engineers |
IoT | Internet of Things |
IT | Information Technology |
IR | InfraRed |
ISA | International Society of Automation |
ISO | International Organization for Standardization |
LAN | Local Area Network |
LBS | Location-Based Services |
LiDAR | Light Detection And Ranging |
LSTM | Long Short-Term Memory |
MAC | Medium Access Control |
MANET | Mobile Adhoc NETworks |
MEMS | Microelectromechanical Systems |
m-Health | Mobile Health |
MITM | Man In the Middle |
ML | Machine Learning |
MRF | Markov Random Field |
NFC | Near-Field Communication |
NN | Neural Network |
OS | Operating System |
PA-DSS | Payment Application Data Security Standard |
PAN | Personal Area Network |
PB | Petabytes |
PCA | Principal Component Analysis |
PCM | Phase-Change Memory |
PPG | Photoplethysmography |
PS/CS | Participatory/Crowdsensing Systems |
PV | Photovoltaic |
RF | Radiofrequency |
RFID | Radiofrequency Identification |
SARS-CoV-2 | Severe Acute Respiratory Syndrome Coronavirus 2 |
SQL | Structured Query Language |
SVM | Support Vector Machine |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TWS | True Wireless Stereo |
UL | UL Incorporated, previously known as Underwriters Laboratories |
USD | US Dollars |
USFDA | US Food and Drug Administration |
WLAN | Wireless Local Area Network |
WSN | Wireless Sensor Network |
WWAN | Wireless Wide Area Network |
References
- Hayward, J. Wearable Technology Forecasts 2021–2031. Available online: https://www.idtechex.com/en/research-report/wearable-technology-forecasts-2021-2031/839 (accessed on 26 September 2021).
- Gartner Forecasts Global Spending on Wearable Devices to Total $81.5 Billion in 2021. Available online: https://www.gartner.com/en/newsroom/press-releases/2021-01-11-gartner-forecasts-global-spending-on-wearable-devices-to-total-81-5-billion-in-2021 (accessed on 26 September 2021).
- Lee, L. Global TWS Hearables Market Tracker and Analysis: Q2 2021. Available online: https://report.counterpointresearch.com/posts/report_view/Emerging_Tech/2452 (accessed on 26 September 2021).
- De Sio, L.; Ding, B.; Focsan, M.; Kogermann, K.; Pascoal-Faria, P.; Petronela, F.; Mitchell, G.; Zussman, E.; Pierini, F. Personalized Reusable Face Masks with Smart Nano-Assisted Destruction of Pathogens for COVID-19: A Visionary Road. Chem. A Eur. J. 2021, 27, 6112–6130. [Google Scholar] [CrossRef]
- Razer. Project Hazel. Available online: https://www.razer.com/concepts/razer-project-hazel (accessed on 1 October 2021).
- UVMask. UVMask. Available online: https://uvmask.com/ (accessed on 1 October 2021).
- Trafton, A. New Face Mask Prototype Can Detect Covid-19 Infection. Available online: https://news.mit.edu/2021/face-mask-covid-19-detection-0628 (accessed on 1 October 2021).
- Nguyen, P.Q.; Soenksen, L.R.; Donghia, N.M.; Angenent-Mari, N.M.; de Puig, H.; Huang, A.; Lee, R.; Slomovic, S.; Galbersanini, T.; Lansberry, G.; et al. Wearable materials with embedded synthetic biology sensors for biomolecule detection. Nat. Biotechnol. 2021, 1–9. [Google Scholar] [CrossRef]
- Ahmed, N.; Michelin, R.A.; Xue, W.; Ruj, S.; Malaney, R.; Kanhere, S.S.; Seneviratne, A.; Hu, W.; Janicke, H.; Jha, S.K. A survey of COVID-19 contact tracing apps. IEEE Access 2020, 8, 134577–134601. [Google Scholar] [CrossRef]
- Drew, D.A.; Nguyen, L.H.; Steves, C.J.; Menni, C.; Freydin, M.; Varsavsky, T.; Sudre, C.H.; Cardoso, M.J.; Ourselin, S.; Wolf, J.; et al. Rapid implementation of mobile technology for real-time epidemiology of COVID-19. Science 2020, 368, 1362–1367. [Google Scholar] [CrossRef]
- Cho, H.; Ippolito, D.; Yu, Y.W. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arXiv 2020, arXiv:2003.11511. [Google Scholar]
- Wright, J.H.; Caudill, R. Remote treatment delivery in response to the COVID-19 pandemic. Psychother. Psychosom. 2020, 89, 1. [Google Scholar] [CrossRef] [PubMed]
- Markets&Markets. Knowledge Store Interactive Wearable Dashboard. Available online: https://www.mnmks.com/demo/pages/mega_trends/wearable (accessed on 28 September 2021).
- Marketwatch. Fitness Tracker Market 2021 Global impact of COVID-19 on Size, Share, Trends, Historical Analysis, Opportunities and Industry Segments Poised for Rapid Growth by 2026. Available online: https://tinyurl.com/bwrd6efb (accessed on 28 September 2021).
- Wearable Fitness Tracker Market Research Report by Display Type, by Device Type, by Operating System, by Distribution-Global Forecast to 2025—Cumulative Impact of COVID-19. Available online: https://www.yahoo.com/now/wearable-fitness-tracker-market-research-130900948.html (accessed on 28 September 2021).
- Secure Technology Alliance. Contactless Payments Resources. Available online: https://www.securetechalliance.org/activities-councils-contactless-payments-resources (accessed on 1 October 2021).
- Téllez, J.; Zeadally, S. Mobile Payment Systems: Secure Network Architectures and Protocols; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
- Bello, G.; Perez, A.J. Adapting financial technology standards to blockchain platforms. In Proceedings of the 2019 ACM Southeast Conference, Kennesaw, GA, USA, 18–20 April 2019; pp. 109–116. [Google Scholar]
- NFC Ring. Available online: https://nfcring.com/ (accessed on 28 September 2021).
- GVR. Fitness Tracker Market Size Worth $138.7 Billion By 2028|CAGR: 18.9%. Available online: https://tinyurl.com/bunfepdy (accessed on 28 September 2021).
- GVR. Wearable Payments Devices Market Size, Share & Trends Analysis Report by Device Type (Fitness Tracker, Smart Watches), by Technology, By Application, by Region, and Segment Forecasts, 2021–2028. Available online: https://www.grandviewresearch.com/industry-analysis/wearable-payments-devices-market (accessed on 28 September 2021).
- VMR. Fitness Tracker Market Size And Forecast. Available online: https://www.verifiedmarketresearch.com/product/fitness-tracker-market/ (accessed on 28 September 2021).
- Perez, A.J.; Labrador, M.A.; Barbeau, S.J. G-sense: A scalable architecture for global sensing and monitoring. IEEE Netw. 2010, 24, 57–64. [Google Scholar] [CrossRef]
- Lane, N.D.; Miluzzo, E.; Lu, H.; Peebles, D.; Choudhury, T.; Campbell, A.T. A survey of mobile phone sensing. IEEE Commun. Mag. 2010, 48, 140–150. [Google Scholar] [CrossRef]
- Christin, D.; Reinhardt, A.; Kanhere, S.S.; Hollick, M. A survey on privacy in mobile participatory sensing applications. J. Syst. Softw. 2011, 84, 1928–1946. [Google Scholar] [CrossRef]
- Lara, O.D.; Labrador, M.A. A survey on human activity recognition using wearable sensors. IEEE Commun. Surv. Tutor. 2012, 15, 1192–1209. [Google Scholar] [CrossRef]
- Khan, W.Z.; Xiang, Y.; Aalsalem, M.Y.; Arshad, Q. Mobile phone sensing systems: A survey. IEEE Commun. Surv. Tutor. 2012, 15, 402–427. [Google Scholar] [CrossRef]
- Macias, E.; Suarez, A.; Lloret, J. Mobile sensing systems. Sensors 2013, 13, 17292–17321. [Google Scholar] [CrossRef] [PubMed]
- Park, S.; Chung, K.; Jayaraman, S. Wearables: Fundamentals, advancements, and a roadmap for the future. In Wearable Sensors; Elsevier: Amsterdam, The Netherlands, 2014; pp. 1–23. [Google Scholar]
- Jaimes, L.G.; Vergara-Laurens, I.J.; Raij, A. A survey of incentive techniques for mobile crowd sensing. IEEE Internet Things J. 2015, 2, 370–380. [Google Scholar] [CrossRef]
- Merlo, A.; Migliardi, M.; Caviglione, L. A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 2015, 24, 77–90. [Google Scholar] [CrossRef]
- Bellekens, X.; Hamilton, A.; Seeam, P.; Nieradzinska, K.; Franssen, Q.; Seeam, A. Pervasive eHealth services a security and privacy risk awareness survey. In Proceedings of the 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), London, UK, 13–14 June 2016; pp. 1–4. [Google Scholar]
- Restuccia, F.; Das, S.K.; Payton, J. Incentive mechanisms for participatory sensing: Survey and research challenges. ACM Trans. Sens. Netw. (TOSN) 2016, 12, 1–40. [Google Scholar] [CrossRef]
- Hammerla, N.Y.; Halloran, S.; Plötz, T. Deep, Convolutional, and Recurrent Models for Human Activity Recognition Using Wearables. In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, New York, NY, USA, 9–15 July 2016; pp. 1–4. [Google Scholar]
- Seneviratne, S.; Hu, Y.; Nguyen, T.; Lan, G.; Khalifa, S.; Thilakarathna, K.; Hassan, M.; Seneviratne, A. A survey of wearable devices and challenges. IEEE Commun. Surv. Tutor. 2017, 19, 2573–2620. [Google Scholar] [CrossRef]
- Tana, J.; Forss, M.; Hellsten, T. The Use of Wearables in Healthcare–Challenges and Opportunities. Available online: https://www.theseus.fi/handle/10024/140584 (accessed on 5 October 2021).
- Qiu, H.; Wang, X.; Xie, F. A survey on smart wearables in the application of fitness. In Proceedings of the 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 15th International Conference on Pervasive Intelligence and Computing, 3rd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, USA, 6–10 November 2017; pp. 303–307. [Google Scholar]
- Perez, A.J.; Zeadally, S. Privacy issues and solutions for consumer wearables. Professional 2017, 20, 46–56. [Google Scholar] [CrossRef]
- Peake, J.M.; Kerr, G.; Sullivan, J.P. A critical review of consumer wearables, mobile applications, and equipment for providing biofeedback, monitoring stress, and sleep in physically active populations. Front. Physiol. 2018, 9, 743. [Google Scholar] [CrossRef]
- Dunn, J.; Runge, R.; Snyder, M. Wearables and the medical revolution. Pers. Med. 2018, 15, 429–448. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Commun. Surv. Tutor. 2019, 21, 2702–2733. [Google Scholar] [CrossRef]
- Van Der Linden, D.; Zamansky, A.; Hadar, I.; Craggs, B.; Rashid, A. Buddy’s wearable is not your buddy: Privacy implications of pet wearables. IEEE Secur. Priv. 2019, 17, 28–39. [Google Scholar] [CrossRef]
- Zeadally, S.; Shaikh, F.K.; Talpur, A.; Sheng, Q.Z. Design architectures for energy harvesting in the Internet of Things. Renew. Sustain. Energy Rev. 2020, 128, 109901. [Google Scholar] [CrossRef]
- Niknejad, N.; Ismail, W.B.; Mardani, A.; Liao, H.; Ghani, I. A comprehensive overview of smart wearables: The state of the art literature, recent advances, and future challenges. Eng. Appl. Artif. Intell. 2020, 90, 103529. [Google Scholar] [CrossRef]
- Díaz, S.; Stephenson, J.B.; Labrador, M.A. Use of wearable sensor technology in gait, balance, and range of motion analysis. Appl. Sci. 2020, 10, 234. [Google Scholar] [CrossRef] [Green Version]
- Dian, F.J.; Vahidnia, R.; Rahmati, A. Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: A Survey. IEEE Access 2020, 8, 69200–69211. [Google Scholar] [CrossRef]
- Svertoka, E.; Saafi, S.; Rusu-Casandra, A.; Burget, R.; Marghescu, I.; Hosek, J.; Ometov, A. Wearables for Industrial Work Safety: A Survey. Sensors 2021, 21, 3844. [Google Scholar] [CrossRef] [PubMed]
- Ometov, A.; Shubina, V.; Klus, L.; Skibińska, J.; Saafi, S.; Pascacio, P.; Flueratoru, L.; Gaibor, D.Q.; Chukhno, N.; Chukhno, O.; et al. A survey on wearable technology: History, state-of-the-art and current challenges. Comput. Netw. 2021, 193, 108074. [Google Scholar] [CrossRef]
- The Wearables Database. Available online: https://vandrico.com/wearables.html (accessed on 17 September 2021).
- Ramokapane, K.M.; van der Linden, D.; Zamansky, A. Does my dog really need a gadget? What can we learn from pet owners’ amotivations for using pet wearables? In Proceedings of the Sixth International Conference on Animal-Computer Interaction, Haifa, Israel, 12–14 November 2019; pp. 1–6. [Google Scholar]
- Kiourti, A.; Nikita, K.S. A review of in-body biotelemetry devices: Implantables, ingestibles, and injectables. IEEE Trans. Biomed. Eng. 2017, 64, 1422–1430. [Google Scholar] [CrossRef] [PubMed]
- Dias, T. Electronic Textiles: Smart Fabrics and Wearable Technology; Woodhead Publishing: Sawston, UK, 2015. [Google Scholar]
- Castaneda, D.; Esparza, A.; Ghamari, M.; Soltanpur, C.; Nazeran, H. A review on wearable photoplethysmography sensors and their potential future applications in health care. Int. J. Biosens. Bioelectron. 2018, 4, 195. [Google Scholar] [PubMed] [Green Version]
- Ghosh, S.; Bose, M.; Kudeshia, A. GPS and GSM Enabled Smart Blind Stick. In Proceedings of the International Conference on Communication, Circuits, and Systems 2020, Bhubaneswar, Odisha, India, 16–20 October 2020; pp. 179–185. [Google Scholar]
- Eckart, R.E.; Kinney, K.G.; Belnap, C.M.; Le, T.D. Ventricular fibrillation refractory to automatic internal cardiac defibrillator in Fabry’s disease. Cardiology 2000, 94, 208–212. [Google Scholar] [CrossRef]
- Prausnitz, M.R.; Langer, R. Transdermal drug delivery. Nat. Biotechnol. 2008, 26, 1261–1268. [Google Scholar] [CrossRef] [PubMed]
- Sharma, R.; Singh, D.; Gaur, P.; Joshi, D. Intelligent automated drug administration and therapy: Future of healthcare. Drug Deliv. Transl. Res. 2021, 1–25. [Google Scholar]
- Ericsson. Ericsson Mobility Report. Available online: https://www.ericsson.com/en/mobility-report (accessed on 17 September 2021).
- BlueBite. The State of NFC in 2021. Available online: https://www.bluebite.com/nfc/nfc-usage-statistics (accessed on 1 October 2021).
- Stables, J. Wearables Popularity Soars in 2020—And Huawei Is the Big Winner. Available online: https://www.wareable.com/news/wearables-popularity-soars-in-2020-8322 (accessed on 1 October 2021).
- Statistica. Unit Sales of True Wireless Hearables Worldwide from 2018 to 2021. Available online: https://www.statista.com/statistics/985608/worldwide-sales-volume-true-wireless-hearables/ (accessed on 1 October 2021).
- Henriksen, A.; Mikalsen, M.H.; Woldaregay, A.Z.; Muzny, M.; Hartvigsen, G.; Hopstock, L.A.; Grimsgaard, S. Using fitness trackers and smartwatches to measure physical activity in research: Analysis of consumer wrist-worn wearables. J. Med. Internet Res. 2018, 20, e9157. [Google Scholar] [CrossRef]
- Vasudevan, R.S.; Horiuchi, Y.; Torriani, F.J.; Cotter, B.; Maisel, S.M.; Dadwal, S.S.; Gaynes, R.; Maisel, A.S. Persistent Value of the Stethoscope in the Age of COVID-19. Am. J. Med. 2020, 133, 1143–1150. [Google Scholar] [CrossRef]
- Hammond, R. A Pilot Study on the Validity and Reliability of Portable Ultrasound Assessment of Swallowing with Dysphagic Patients. Master’s Thesis, University of Canterbury, Canterbury, Australia, 2019. [Google Scholar]
- Jokic, P.; Magno, M. Powering smart wearable systems with flexible solar energy harvesting. In Proceedings of the 2017 IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, MD, USA, 28–31 May 2017; pp. 1–4. [Google Scholar]
- Aubert, H. RFID technology for human implant devices. Comptes Rendus Phys. 2011, 12, 675–683. [Google Scholar] [CrossRef] [Green Version]
- Alberto, J.; Leal, C.; Fernandes, C.; Lopes, P.A.; Paisana, H.; de Almeida, A.T.; Tavakoli, M. Fully untethered battery-free biomonitoring electronic tattoo with wireless energy harvesting. Sci. Rep. 2020, 10, 1–11. [Google Scholar] [CrossRef] [PubMed]
- González, J.L.; Rubio, A.; Moll, F. Human powered piezoelectric batteries to supply power to wearable electronic devices. Int. J. Soc. Mater. Eng. Resour. 2002, 10, 34–40. [Google Scholar] [CrossRef]
- Radziemski, L.; Makin, I.R.S. In vivo demonstration of ultrasound power delivery to charge implanted medical devices via acute and survival porcine studies. Ultrasonics 2016, 64, 1–9. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Manjarres, J.; Pardo, M. An Energy Logger for Kinetic-Powered Wrist-Wearable Systems. Electronics 2020, 9, 487. [Google Scholar] [CrossRef] [Green Version]
- Francioso, L.; De Pascali, C.; Farella, I.; Martucci, C.; Cretì, P.; Siciliano, P.; Perrone, A. Flexible thermoelectric generator for ambient assisted living wearable biometric sensors. J. Power Sources 2011, 196, 3239–3243. [Google Scholar] [CrossRef]
- Hyland, M.; Hunter, H.; Liu, J.; Veety, E.; Vashaee, D. Wearable thermoelectric generators for human body heat harvesting. Appl. Energy 2016, 182, 518–524. [Google Scholar] [CrossRef] [Green Version]
- Castano, L.M.; Flatau, A.B. Smart fabric sensors and e-textile technologies: A review. Smart Mater. Struct. 2014, 23, 053001. [Google Scholar] [CrossRef]
- Ondrus, J.; Pigneur, Y. An assessment of NFC for future mobile payment systems. In Proceedings of the International Conference on the Management of Mobile Business (ICMB 2007), Toronto, ON, Canada, 9–11 July 2007; p. 43. [Google Scholar]
- Kulkarni, R. Near Field Communication (NFC) Technology and Its Application. Techno-Societal 2021, 2020, 745–751. [Google Scholar]
- Wilder, V.T.; Gao, Y.; Wang, S.P.; Perez, A.J. Multi-Factor Stateful Authentication using NFC, and Mobile Phones. In Proceedings of the 2019 SoutheastCon, Huntsville, AL, USA, 11–14 April 2019; pp. 1–6. [Google Scholar]
- Picard, R.W.; Vyzas, E.; Healey, J. Toward machine emotional intelligence: Analysis of affective physiological state. IEEE Trans. Pattern Anal. Mach. Intell. 2001, 23, 1175–1191. [Google Scholar] [CrossRef] [Green Version]
- Hwang, S.; Seo, J.; Jebelli, H.; Lee, S. Feasibility analysis of heart rate monitoring of construction workers using a photoplethysmography (PPG) sensor embedded in a wristband-type activity tracker. Autom. Constr. 2016, 71, 372–381. [Google Scholar] [CrossRef]
- Perez, A.J.; Rivera-Morales, K.G.; Labrador, M.A.; Vergara-Laurens, I. HR-auth: Heart rate data authentication using consumer wearables. In Proceedings of the 2018 IEEE/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft), Gothenburg, Sweden, 27–28 May 2018; pp. 88–89. [Google Scholar]
- Lee, H.; Kim, E.; Lee, Y.; Kim, H.; Lee, J.; Kim, M.; Yoo, H.J.; Yoo, S. Toward all-day wearable health monitoring: An ultralow-power, reflective organic pulse oximetry sensing patch. Sci. Adv. 2018, 4, eaas9530. [Google Scholar] [CrossRef] [Green Version]
- Fortino, G.; Giampà, V. PPG-based methods for non invasive and continuous blood pressure measurement: An overview and development issues in body sensor networks. In Proceedings of the 2010 IEEE International Workshop on Medical Measurements and Applications, Ottawa, ON, Canada, 30 April–1 May 2010; pp. 10–13. [Google Scholar]
- Lau-Zhu, A.; Lau, M.P.; McLoughlin, G. Mobile EEG in research on neurodevelopmental disorders: Opportunities and challenges. Dev. Cogn. Neurosci. 2019, 36, 100635. [Google Scholar] [CrossRef]
- Abiri, R.; Borhani, S.; Sellers, E.W.; Jiang, Y.; Zhao, X. A comprehensive review of EEG-based brain–computer interface paradigms. J. Neural Eng. 2019, 16, 011001. [Google Scholar] [CrossRef] [PubMed]
- The Juvenile Diabetes Research Foundation Continuous Glucose Monitoring Study Group. Continuous glucose monitoring and intensive treatment of type diabetes. N. Engl. J. Med. 2008, 359, 1464–1476. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Lara, O.D.; Pérez, A.J.; Labrador, M.A.; Posada, J.D. Centinela: A human activity recognition system based on acceleration and vital sign data. Pervasive Mob. Comput. 2012, 8, 717–729. [Google Scholar] [CrossRef]
- Laput, G.; Ahuja, K.; Goel, M.; Harrison, C. Ubicoustics: Plug-and-play acoustic activity recognition. In Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology, Berlin, Germany, 14–17 October 2018; pp. 213–224. [Google Scholar]
- Labrador, M.A.; Perez, A.J.; Wightman, P.M. Location-Based Information Systems: Developing Real-Time Tracking Applications; CRC Press: Boca Raton, FL, USA, 2010. [Google Scholar]
- Basiri, A.; Lohan, E.S.; Moore, T.; Winstanley, A.; Peltola, P.; Hill, C.; Amirian, P.; e Silva, P.F. Indoor location based services challenges, requirements and usability of current solutions. Comput. Sci. Rev. 2017, 24, 1–12. [Google Scholar] [CrossRef] [Green Version]
- Perez, A.J.; Zeadally, S.; Griffith, S. Bystanders’ privacy. IT Prof. 2017, 19, 61–65. [Google Scholar] [CrossRef]
- Weinstein, R. RFID: A technical overview and its application to the enterprise. IT Prof. 2005, 7, 27–33. [Google Scholar] [CrossRef]
- Perez, A.J.; Zeadally, S. A communication architecture for crowd management in emergency and disruptive scenarios. IEEE Commun. Mag. 2019, 57, 54–60. [Google Scholar] [CrossRef]
- Stein, S.; Lidar Is One of the iPhone and iPad’s Coolest Tricks. Here’s What Else It Can Do. Available online: https://www.cnet.com/tech/mobile/lidar-is-one-of-the-iphone-ipad-coolest-tricks-its-only-getting-better/ (accessed on 17 September 2021).
- White, P.F.; Lazo, O.L.E.; Galeas, L.; Cao, X. Use of electroanalgesia and laser therapies as alternatives to opioids for acute and chronic pain management. F1000Research 2017, 6, 2161. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Asad, S.; Mooney, B.; Ahmad, I.; Huber, M.; Clark, A. Object detection and sensory feedback techniques in building smart cane for the visually impaired: An overview. In Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments (PETRA), Corfu, Greece, 30 June–3 July 2020; pp. 1–7. [Google Scholar]
- Mendez, D.; Perez, A.J.; Labrador, M.A.; Marron, J.J. P-sense: A participatory sensing system for air pollution monitoring and control. In Proceedings of the 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Seattle, WA, USA, 21–25 March 2011; pp. 344–347. [Google Scholar]
- Das, A.J.; Wahi, A.; Kothari, I.; Raskar, R. Ultra-portable, wireless smartphone spectrometer for rapid, non-destructive testing of fruit ripeness. Sci. Rep. 2016, 6, 1–8. [Google Scholar] [CrossRef] [Green Version]
- Dhanekar, S.; Rangra, K. Wearable Dosimeters for Medical and Defence Applications: A State of the Art Review. Adv. Mater. Technol. 2021, 6, 2000895. [Google Scholar] [CrossRef]
- Vanveerdeghem, P.; Van Torre, P.; Thielens, A.; Knockaert, J.; Joseph, W.; Rogier, H. Compact personal distributed wearable exposimeter. IEEE Sens. J. 2015, 15, 4393–4401. [Google Scholar] [CrossRef] [Green Version]
- Masse, F.; Gonzenbach, R.; Paraschiv-Ionescu, A.; Luft, A.R.; Aminian, K. Wearable barometric pressure sensor to improve postural transition recognition of mobility-impaired stroke patients. IEEE Trans. Neural Syst. Rehabil. Eng. 2016, 24, 1210–1217. [Google Scholar] [CrossRef] [Green Version]
- Makma, J.; Thanapatay, D.; Isshiki, T.; Chinrungrueng, J.; Thiemjarus, S. Enhancing Accelerometer-based Human Activity Recognition with Relative Barometric Pressure Signal. In Proceedings of the 2021 18th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), Chiang Mai, Thailand, 19–22 May 2021; pp. 529–532. [Google Scholar]
- Seyedi, M.; Kibret, B.; Lai, D.T.; Faulkner, M. A survey on intrabody communications for body area network applications. IEEE Trans. Biomed. Eng. 2013, 60, 2067–2079. [Google Scholar] [CrossRef]
- Zeadally, S.; Siddiqui, F.; Baig, Z. 25 years of Bluetooth technology. Future Internet 2019, 11, 194. [Google Scholar] [CrossRef] [Green Version]
- Negra, R.; Jemili, I.; Belghith, A. Wireless body area networks: Applications and technologies. Procedia Comput. Sci. 2016, 83, 1274–1281. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.H.; Huang, X.; Vidojkovic, M.; Ba, A.; Harpe, P.; Dolmans, G.; de Groot, H. A 1.9 nJ/b 2.4 GHz multistandard (Bluetooth Low Energy/Zigbee/IEEE802. 15.6) transceiver for personal/body-area networks. In Proceedings of the 2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers, San Francisco, CA, USA, 17–21 February 2013; pp. 446–447. [Google Scholar]
- Kwak, K.S.; Ullah, S.; Ullah, N. An overview of IEEE 802.15. 6 standard. In Proceedings of the 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010), Rome, Italy, 7–10 November 2010; pp. 1–6. [Google Scholar]
- Coskun, V.; Ozdenizci, B.; Ok, K. A survey on near field communication (NFC) technology. Wirel. Pers. Commun. 2013, 71, 2259–2294. [Google Scholar] [CrossRef]
- Company, T.S. Sensium Wireless Vitals Monitoring. Available online: https://www.sensium.co.uk/us/ (accessed on 17 September 2021).
- ANT Basics. Available online: https://www.thisisant.com/developer/ant/ant-basics/ (accessed on 17 September 2021).
- NFC Market. Available online: https://www.marketsandmarkets.com/Market-Reports/near-field-communication-nfc-market-520.html (accessed on 1 October 2021).
- Gabriel, S.; Lau, R.; Gabriel, C. The dielectric properties of biological tissues: III. Parametric models for the dielectric spectrum of tissues. Phys. Med. Biol. 1996, 41, 2271. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Suda, T.; Moore, M.; Nakano, T.; Egashira, R.; Enomoto, A.; Hiyama, S.; Moritani, Y. Exploratory research on molecular communication between nanomachines. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), Washington, DC, USA, 25–29 June 2005; Volume 25, p. 29. [Google Scholar]
- Pierobon, M.; Akyildiz, I.F. A physical end-to-end model for molecular communication in nanonetworks. IEEE J. Sel. Areas Commun. 2010, 28, 602–611. [Google Scholar] [CrossRef]
- Farsad, N.; Yilmaz, H.B.; Eckford, A.; Chae, C.B.; Guo, W. A comprehensive survey of recent advancements in molecular communication. IEEE Commun. Surv. Tutor. 2016, 18, 1887–1919. [Google Scholar] [CrossRef] [Green Version]
- Galluccio, L.; Melodia, T.; Palazzo, S.; Santagati, G.E. Challenges and implications of using ultrasonic communications in intra-body area networks. In Proceedings of the 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS), Courmayeur, Italy, 9–11 January 2012; pp. 182–189. [Google Scholar]
- Carroll, R.; Cnossen, R.; Schnell, M.; Simons, D. Continua: An interoperable personal healthcare ecosystem. IEEE Pervasive Comput. 2007, 6, 90–94. [Google Scholar] [CrossRef]
- Lee, Y.F. An interoperability solution for legacy healthcare devices. IT Prof. 2015, 17, 51–57. [Google Scholar] [CrossRef]
- Co, S. Samsung Galaxy Watch Silver 4G. Available online: https://www.samsung.com/us/mobile/wearables/smartwatches/galaxy-watch–46mm–silver–lte–sm-r805uzsaxar/ (accessed on 17 September 2021).
- Fraga-Lamas, P.; Fernández-Caramés, T.M.; Suárez-Albela, M.; Castedo, L.; González-López, M. A review on internet of things for defense and public safety. Sensors 2016, 16, 1644. [Google Scholar] [CrossRef] [Green Version]
- Hu, X.; Chu, T.H.; Chan, H.C.; Leung, V.C. Vita: A crowdsensing-oriented mobile cyber-physical system. IEEE Trans. Emerg. Top. Comput. 2013, 1, 148–165. [Google Scholar] [CrossRef]
- Ismail, L.; Materwala, H.; Zeadally, S. Lightweight blockchain for healthcare. IEEE Access 2019, 7, 149935–149951. [Google Scholar] [CrossRef]
- Lin, C.; He, D.; Zeadally, S.; Huang, X.; Liu, Z. Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Technol. (TOIT) 2021, 21, 1–21. [Google Scholar] [CrossRef]
- Lu, Y.; Tang, Q.; Wang, G. Zebralancer: Private and anonymous crowdsourcing system atop open blockchain. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2–5 July 2018; pp. 853–865. [Google Scholar]
- Chatzopoulos, D.; Gujar, S.; Faltings, B.; Hui, P. Privacy preserving and cost optimal mobile crowdsensing using smart contracts on blockchain. In Proceedings of the 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Chengdu, China, 9–12 October 2018; pp. 442–450. [Google Scholar]
- Huang, J.; Kong, L.; Kong, L.; Liu, Z.; Liu, Z.; Chen, G. Blockchain-based crowd-sensing System. In Proceedings of the 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China, 15–17 August 2018; pp. 234–235. [Google Scholar]
- Zhu, S.; Cai, Z.; Hu, H.; Li, Y.; Li, W. zkCrowd: A hybrid blockchain-based crowdsourcing platform. IEEE Trans. Ind. Inform. 2019, 16, 4196–4205. [Google Scholar] [CrossRef]
- Kadadha, M.; Otrok, H.; Mizouni, R.; Singh, S.; Ouali, A. SenseChain: A blockchain-based crowdsensing framework for multiple requesters and multiple workers. Future Gener. Comput. Syst. 2020, 105, 650–664. [Google Scholar] [CrossRef]
- Kurt Peker, Y.; Rodriguez, X.; Ericsson, J.; Lee, S.J.; Perez, A.J. A cost analysis of internet of things sensor data storage on blockchain via smart contracts. Electronics 2020, 9, 244. [Google Scholar] [CrossRef] [Green Version]
- Fu, Y.; Soman, C. Real-time Data Infrastructure at Uber. In Proceedings of the 2021 International Conference on Management of Data, Virtual Event, China, 20–25 June 2021; pp. 2503–2516. [Google Scholar]
- Barbeau, S.J.; Perez, R.A.; Labrador, M.A.; Perez, A.J.; Winters, P.L.; Georggi, N.L. A location-aware framework for intelligent real-time mobile applications. IEEE Pervasive Comput. 2010, 10, 58–67. [Google Scholar] [CrossRef]
- Barbeau, S.J.; Borning, A.; Watkins, K. OneBusAway multi-region–rapidly expanding mobile transit apps to new cities. J. Public Trans. 2014, 17, 15–34. [Google Scholar] [CrossRef] [Green Version]
- Srivastava, M.; Abdelzaher, T.; Szymanski, B. Human-centric sensing. Philos. Trans. R. Soc. Math. Phys. Eng. Sci. 2012, 370, 176–197. [Google Scholar] [CrossRef] [PubMed]
- Colomo-Palacios, R.; Gómez-Pulido, J.A.; Pérez, A.J. Intelligent Health Services Based on Biomedical Smart Sensors. Appl. Sci. 2020, 10, 8497. [Google Scholar] [CrossRef]
- Burke, J.A.; Estrin, D.; Hansen, M.; Parker, A.; Ramanathan, N.; Reddy, S.; Srivastava, M.B. Participatory sensing. In Proceedings of the Workshop on World-Sensor-Web (WSW’06) at SenSys’06, Boulder, CO, USA, 31 October–3 November 2006; pp. 1–5. [Google Scholar]
- Boukhechba, M.; Barnes, L.E. Swear: Sensing using wearables. Generalized human crowdsensing on smartwatches. In Proceedings of the International Conference on Applied Human Factors and Ergonomics, San Diego, CA, USA, 16–20 July 2020; pp. 510–516. [Google Scholar]
- Mun, M.; Reddy, S.; Shilton, K.; Yau, N.; Burke, J.; Estrin, D.; Hansen, M.; Howard, E.; West, R.; Boda, P. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, Krakow, Poland, 22–25 June 2009; pp. 55–68. [Google Scholar]
- Yamin, M.; Ades, Y. Crowd management with RFID and wireless technologies. In Proceedings of the 2009 First International Conference on Networks & Communications, Chennai, India, 27–29 December 2009; pp. 1–4. [Google Scholar]
- Franke, T.; Lukowicz, P.; Blanke, U. Smart crowds in smart cities: Real life, city scale deployments of a smartphone based participatory crowd management platform. J. Internet Serv. Appl. 2015, 6, 1–19. [Google Scholar] [CrossRef] [Green Version]
- El Khatib, R.F.; Zorba, N.; Hassanein, H.S. Rapid sensing-based emergency detection: A sequential approach. Comput. Commun. 2020, 159, 222–230. [Google Scholar] [CrossRef]
- Rashid, M.T.; Wang, D. CovidSens: A vision on reliable social sensing for COVID-19. Artif. Intell. Rev. 2021, 54, 1–25. [Google Scholar] [CrossRef]
- Eisenman, S.B.; Lane, N.D.; Miluzzo, E.; Peterson, R.A.; Ahn, G.S.; Campbell, A.T. Metrosense project: People-centric sensing at scale. In Proceedings of the Workshop on World-Sensor-Web (WSW’06) at SenSys’06, Boulder, CO, USA, 31 October–3 November 2006; pp. 1–5. [Google Scholar]
- Balalaie, A.; Heydarnoori, A.; Jamshidi, P. Microservices architecture enables devops: Migration to a cloud-native architecture. IEEE Softw. 2016, 33, 42–52. [Google Scholar] [CrossRef] [Green Version]
- Al-Debagy, O.; Martinek, P. A comparative review of microservices and monolithic architectures. In Proceedings of the 2018 IEEE 18th International Symposium on Computational Intelligence and Informatics (CINTI), Budapest, Hungary, 21–22 November 2018; pp. 149–154. [Google Scholar]
- Ebert, C.; Gallardo, G.; Hernantes, J.; Serrano, N. DevOps. IEEE Softw. 2016, 33, 94–100. [Google Scholar] [CrossRef]
- Perez, A.J.; Zeadally, S.; Cochran, J. A review and an empirical analysis of privacy policy and notices for consumer Internet of things. Secur. Priv. 2018, 1, e15. [Google Scholar] [CrossRef] [Green Version]
- Kapadia, A.; Kotz, D.; Triandopoulos, N. Opportunistic sensing: Security challenges for the new paradigm. In Proceedings of the 2009 First International Communication Systems and Networks and Workshops, Bangalore, India, 5–10 January 2009; pp. 1–10. [Google Scholar]
- Gilbert, P.; Cox, L.P.; Jung, J.; Wetherall, D. Toward trustworthy mobile sensing. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, Annapolis, MD, USA, 22–23 February 2010; pp. 31–36. [Google Scholar]
- Rahman, M.; Carbunar, B.; Banik, M. Fit and vulnerable: Attacks and defenses for a health monitoring device. arXiv 2013, arXiv:1304.5672. [Google Scholar]
- Shoukry, Y.; Martin, P.; Yona, Y.; Diggavi, S.; Srivastava, M. Pycra: Physical challenge-response authentication for active sensors under spoofing attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; pp. 1004–1015. [Google Scholar]
- Perez, A.J.; Zeadally, S.; Jabeur, N. Investigating security for ubiquitous sensor networks. Procedia Comput. Sci. 2017, 109, 737–744. [Google Scholar] [CrossRef]
- Liu, J.; Sun, W. Smart attacks against intelligent wearables in people-centric internet of things. IEEE Commun. Mag. 2016, 54, 44–49. [Google Scholar] [CrossRef]
- Rieck, J. Attacks on fitness trackers revisited: A case-study of unfit firmware security. arXiv 2016, arXiv:1604.03313. [Google Scholar]
- Xu, F.; Qin, Z.; Tan, C.C.; Wang, B.; Li, Q. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proceedings of the 2011 Proceedings IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 1862–1870. [Google Scholar]
- Yan, W.; Hylamia, S.; Voigt, T.; Rohner, C. PHY-IDS: A physical-layer spoofing attack detection system for wearable devices. In Proceedings of the 6th ACM Workshop on Wearable Systems and Applications, Toronto, ON, Canada, 19 June 2020; pp. 1–6. [Google Scholar]
- Mendez, D.; Labrador, M.; Ramachandran, K. Data interpolation for participatory sensing systems. Pervasive Mob. Comput. 2013, 9, 132–148. [Google Scholar] [CrossRef]
- Mendez, D.; Labrador, M.A. On sensor data verification for participatory sensing systems. J. Netw. 2013, 8, 576. [Google Scholar] [CrossRef]
- Bordel, B.; Alcarria, R.; Robles, T.; Sánchez-Picot, Á. Stochastic and information theory techniques to reduce large datasets and detect cyberattacks in Ambient Intelligence Environments. IEEE Access 2018, 6, 34896–34910. [Google Scholar] [CrossRef]
- Bordel, B.; Alcarria, R.; Robles, T.; Iglesias, M.S. Data authentication and anonymization in IoT scenarios and future 5G networks using chaotic digital watermarking. IEEE Access 2021, 9, 22378–22398. [Google Scholar] [CrossRef]
- Perez, A.J.; Zeadally, S.; Jabeur, N. Security and privacy in ubiquitous sensor networks. J. Inf. Process. Syst. 2018, 14, 286–308. [Google Scholar]
- Chandola, V.; Banerjee, A.; Kumar, V. Anomaly detection: A survey. ACM Comput. Surv. (CSUR) 2009, 41, 1–58. [Google Scholar] [CrossRef]
- Trinh, H.D.; Giupponi, L.; Dini, P. Urban anomaly detection by processing mobile traffic traces with LSTM neural networks. In Proceedings of the 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Boston, MA, USA, 10–13 June 2019; pp. 1–8. [Google Scholar]
- Pelati, A.; Meo, M.; Dini, P. A Semi-supervised Method to Identify Urban Anomalies through LTE PDCCH Fingerprinting. In Proceedings of the ICC 2021-IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar]
- Zhang, M.; Li, T.; Yu, Y.; Li, Y.; Hui, P.; Zheng, Y. Urban anomaly analytics: Description, detection and prediction. IEEE Trans. Big Data 2020. [Google Scholar] [CrossRef]
- Vallina-Rodriguez, N.; Crowcroft, J. ErdOS: Achieving energy savings in mobile OS. In Proceedings of the Sixth International Workshop on MobiArch, Bethesda, MD, USA, 28 June 2011; pp. 37–42. [Google Scholar]
- Kang, S.; Lee, J.; Jang, H.; Lee, H.; Lee, Y.; Park, S.; Park, T.; Song, J. Seemon: Scalable and energy-efficient context monitoring framework for sensor-rich mobile environments. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, Breckenridge, CO, USA, 17–20 June 2008; pp. 267–280. [Google Scholar]
- Dong, M.; Zhong, L. Self-constructive high-rate system energy modeling for battery-powered mobile systems. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, Bethesda, MD, USA, 28 June–1 July 2011; pp. 335–348. [Google Scholar]
- Mittal, R.; Kansal, A.; Chandra, R. Empowering developers to estimate app energy consumption. In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Istanbul, Turkey, 22–26 August 2012; pp. 317–328. [Google Scholar]
- Min, C.; Lee, Y.; Yoo, C.; Kang, S.; Choi, S.; Park, P.; Hwang, I.; Ju, Y.; Choi, S.; Song, J. PowerForecaster: Predicting smartphone power impact of continuous sensing applications at pre-installation time. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, Seoul, South Korea, 1–4 November 2015; pp. 31–44. [Google Scholar]
- Ma, X.; Huang, P.; Jin, X.; Wang, P.; Park, S.; Shen, D.; Zhou, Y.; Saul, L.K.; Voelker, G.M. eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. In Proceedings of the 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13), Lombard, IL, USA, 2–5 April 2013; pp. 57–70. [Google Scholar]
- Xu, F.; Liu, Y.; Li, Q.; Zhang, Y. V-edge: Fast self-constructive power modeling of smartphones based on battery voltage dynamics. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), Lombard, IL, USA, 2–5 April 2013; pp. 43–55. [Google Scholar]
- Pathak, A.; Jindal, A.; Hu, Y.C.; Midkiff, S.P. What is keeping my phone awake? Characterizing and detecting no-sleep energy bugs in smartphone apps. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Low Wood Bay Lake District, UK, 25–29 June 2012; pp. 267–280. [Google Scholar]
- Martin, T.; Hsiao, M.; Ha, D.; Krishnaswami, J. Denial-of-service attacks on battery-powered mobile computers. In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications, Orlando, FL, USA, 14–17 March 2004; pp. 309–318. [Google Scholar]
- Newaz, A.K.M.; Sikder, A.K.; Rahman, M.A.; Uluagac, A.S. A survey on security and privacy issues in modern healthcare systems. arXiv 2020, arXiv:2005.07359. [Google Scholar]
- Bianchi, A.; Oakley, I. Wearable authentication: Trends and opportunities. Inf. Technol. 2016, 58, 255–262. [Google Scholar] [CrossRef]
- Issoufaly, T.; Tournoux, P.U. BLEB: Bluetooth Low Energy Botnet for large scale individual tracking. In Proceedings of the 2017 1st International Conference on Next Generation Computing Applications (NextComp), Reduit, Mauritius, 19–21 September 2017; pp. 115–120. [Google Scholar]
- Medina, R.P.; Neundorfer, E.B.; Chouchane, R.; Perez, A. PRAST: Using Logic Bombs to Exploit the Android Permission Model and a Module Based Solution. In Proceedings of the 2018 13th International Conference on Malicious and Unwanted Software (MALWARE), Nantucket, MA, USA, 22–24 October 2018; pp. 1–8. [Google Scholar]
- Zhang, Q.; Liang, Z. Security analysis of bluetooth low energy based smart wristbands. In Proceedings of the 2017 2nd International Conference on Frontiers of Sensors Technologies (ICFST), Shenzhen, China, 14–16 April 2017; pp. 421–425. [Google Scholar]
- Fereidooni, H.; Classen, J.; Spink, T.; Patras, P.; Miettinen, M.; Sadeghi, A.R.; Hollick, M.; Conti, M. Breaking fitness records without moving: Reverse engineering and spoofing fitbit. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, Atlanta, GA, USA, 18–20 September 2017; pp. 48–69. [Google Scholar]
- AV-Test. Seven Fitness Wristbands and the Apple Watch in a Security Check. Available online: https://www.av-test.org/en/news/seven-fitness-wristbands-and-the-apple-watch-in-a-security-check-2016 (accessed on 5 October 2021).
- Goyal, R.; Dragoni, N.; Spognardi, A. Mind the tracker you wear: A security analysis of wearable health trackers. In Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, 4–8 April 2016; pp. 131–136. [Google Scholar]
- Sellahewa, H.; Ibrahim, N.; Zeadally, S. Biometric Authentication for Wearables. In Biometric-Based Physical and Cybersecurity Systems; Springer: Berlin/Heidelberg, Germany, 2019; pp. 355–386. [Google Scholar]
- Ometov, A.; Petrov, V.; Bezzateev, S.; Andreev, S.; Koucheryavy, Y.; Gerla, M. Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Netw. 2019, 33, 82–88. [Google Scholar] [CrossRef]
- Ligatti, J.; Cetin, C.; Engram, S.; Subils, J.B.; Goldgof, D. Coauthentication. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, Limassol, Cyprus, 8–12 April 2019; pp. 1906–1915. [Google Scholar]
- Corn, B.; Perez, A.J.; Ruiz, A.; Cetin, C.; Ligatti, J. An Evaluation of the Power Consumption of Coauthentication as a Continuous User Authentication Method in Mobile Systems. In Proceedings of the 2020 ACM Southeast Conference, Tampa, FL, USA, 2–4 April 2020; pp. 268–271. [Google Scholar]
- Robles-Cordero, A.M.; Zayas, W.J.; Peker, Y.K. Extracting the security features implemented in a bluetooth le connection. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018; pp. 2559–2563. [Google Scholar]
- Becker, J.K.; Li, D.; Starobinski, D. Tracking Anonymized Bluetooth Devices. In Proceedings of the 2019 Privacy Enhancing Technologies, Stockholm, Sweden, 16–20 July 2019; pp. 50–65. [Google Scholar]
- Knackmuß, J.; Möller, T.; Pommerien, W.; Creutzburg, R. Security risk of medical devices in IT networks-the case of an infusion pump unit. Proc. Spie Int. Soc. Opt. Eng. 2015, 9411. [Google Scholar] [CrossRef]
- Krasner, H. The Cost of Poor Software Quality in the US: A 2020 Report. Available online: https://www.it-cisq.org/the-cost-of-poor-software-quality-in-the-us-a-2020-report.htm (accessed on 5 October 2021).
- Ramač, R.; Mandić, V.; Taušan, N.; Rios, N.; Freire, S.; Pérez, B.; Castellanos, C.; Correal, D.; Pacheco, A.; Lopez, G.; et al. Prevalence, Common Causes and Effects of Technical Debt: Results from a Family of Surveys with the IT Industry. arXiv 2021, arXiv:2109.13771. [Google Scholar]
- Kruchten, P.; Nord, R.L.; Ozkaya, I. Technical debt: From metaphor to theory and practice. IEEE Softw. 2012, 29, 18–21. [Google Scholar] [CrossRef]
- Applegate, S. The Dawn of Kinetic Cyber. In Proceedings of the 2013 5th International Conference on Cyber Conflict, Tallinn, Estonia, 4–7 June 2013; pp. 1–15. [Google Scholar]
- Camara, C.; Peris-Lopez, P.; De Fuentes, J.M.; Marchal, S. Access control for implantable medical devices. IEEE Trans. Emerg. Top. Comput. 2020. [Google Scholar] [CrossRef]
- Corbin, B.A. When “Things” Go Wrong: Redefining Liability for the Internet of Medical Things. SCL Rev. 2019, 71, 1. [Google Scholar]
- Zeadally, S.; Badra, M. Privacy in a Digital, Networked World: Technologies, Implications and Solutions; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
- Motti, V.G.; Caine, K. Users’ privacy concerns about wearables. In Proceedings of the International Conference on Financial Cryptography and Data Security, San Juan, PR, USA, 30 January 2015; pp. 231–244. [Google Scholar]
- Perez, A.J.; Zeadally, S. PEAR: A privacy-enabled architecture for crowdsensing. In Proceedings of the International Conference on Research in Adaptive and Convergent Systems, Krakow, Poland, 20–23 September 2017; pp. 166–171. [Google Scholar]
- Hoh, B.; Gruteser, M.; Herring, R.; Ban, J.; Work, D.; Herrera, J.C.; Bayen, A.M.; Annavaram, M.; Jacobson, Q. Virtual trip lines for distributed privacy-preserving traffic monitoring. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, Breckenridge, CO, USA, 17–20 June 2008; pp. 15–28. [Google Scholar]
- Lu, H.; Lane, N.; Eisenman, S.; Campbell, A. Bubble-sensing: A new paradigm for binding a sensing task to the physical world using mobile phones. In Proceedings of the Workshop on Mobile Devices and Urban Sensing, St. Louis, MO, USA, 22–24 April 2008; pp. 1–8. [Google Scholar]
- Christin, D.; López, P.S.; Reinhardt, A.; Hollick, M.; Kauer, M. Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications. Inf. Secur. Tech. Rep. 2013, 17, 105–116. [Google Scholar] [CrossRef]
- Kapadia, A.; Henderson, T.; Fielding, J.J.; Kotz, D. Virtual walls: Protecting digital privacy in pervasive environments. In Proceedings of the International Conference on Pervasive Computing, White Plains, NY, USA, 19–23 March 2007; pp. 162–179. [Google Scholar]
- Truong, K.N.; Patel, S.N.; Summet, J.W.; Abowd, G.D. Preventing camera recording by designing a capture-resistant environment. In Proceedings of the International Conference on Ubiquitous Computing, Tokyo, Japan, 11–14 September 2005; pp. 73–86. [Google Scholar]
- Tiscareno, V.; Johnson, K.; Lawrence, C. Systems and Methods for Receiving Infrared Data with a Camera Designed to Detect Images Based on Visible Light. US Patent 8,848,059, 30 September 2014. [Google Scholar]
- Wagstaff, J. Using Bluetooth to Disable Camera Phones. Available online: http://www.loosewireblog.com/2004/09/using_bluetooth.html (accessed on 17 September 2021).
- Blank, P.; Kirrane, S.; Spiekermann, S. Privacy-aware restricted areas for unmanned aerial systems. IEEE Secur. Priv. 2018, 16, 70–79. [Google Scholar] [CrossRef]
- Steil, J.; Koelle, M.; Heuten, W.; Boll, S.; Bulling, A. Privaceye: Privacy-preserving head-mounted eye tracking using egocentric scene image and eye movement features. In Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications, Denver, CO, USA, 25–28 June 2019; pp. 1–10. [Google Scholar]
- Yamada, T.; Gohshi, S.; Echizen, I. Use of invisible noise signals to prevent privacy invasion through face recognition from camera images. In Proceedings of the 20th ACM International Conference on MULTIMEDIA, Nara, Japan, 29 October–2 November 2012; pp. 1315–1316. [Google Scholar]
- Yamada, T.; Gohshi, S.; Echizen, I. Privacy visor: Method based on light absorbing and reflecting properties for preventing face image detection. In Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics, Manchester, UK, 13–16 October 2013; pp. 1572–1577. [Google Scholar]
- Sharif, M.; Bhagavatula, S.; Bauer, L.; Reiter, M.K. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the 2016 ACM Sigsac Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 1528–1540. [Google Scholar]
- Schiff, J.; Meingast, M.; Mulligan, D.K.; Sastry, S.; Goldberg, K. Respectful cameras: Detecting visual markers in real-time to address privacy concerns. In Protecting Privacy in Video Surveillance; Springer: Berlin/Heidelberg, Germany, 2009; pp. 65–89. [Google Scholar]
- Ye, T.; Moynagh, B.; Albatal, R.; Gurrin, C. Negative faceblurring: A privacy-by-design approach to visual lifelogging with google glass. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, Shanghai, China, 3–7 November 2014; pp. 2036–2038. [Google Scholar]
- Perez, A.J.; Zeadally, S.; Matos Garcia, L.Y.; Mouloud, J.A.; Griffith, S. FacePET: Enhancing bystanders’ facial privacy with smart wearables/internet of things. Electronics 2018, 7, 379. [Google Scholar] [CrossRef] [Green Version]
- Aditya, P.; Sen, R.; Druschel, P.; Joon Oh, S.; Benenson, R.; Fritz, M.; Schiele, B.; Bhattacharjee, B.; Wu, T.T. I-pic: A platform for privacy-compliant image capture. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, Singapore, 26–30 June 2016; pp. 235–248. [Google Scholar]
- Samarati, P. Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 2001, 13, 1010–1027. [Google Scholar] [CrossRef] [Green Version]
- Machanavajjhala, A.; Kifer, D.; Gehrke, J.; Venkitasubramaniam, M. l-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 2007, 1, 3–es. [Google Scholar] [CrossRef]
- Li, N.; Li, T.; Venkatasubramanian, S. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey, 11–15 April 2007; pp. 106–115. [Google Scholar]
- Dwork, C. Differential privacy: A survey of results. In Proceedings of the International Conference on Theory and Applications of Models of Computation, Xi’an, China, 25–29 May 2008; pp. 1–19. [Google Scholar]
- Dwork, C.; Roth, A. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 2014, 9, 211–407. [Google Scholar] [CrossRef]
- Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 31 May–2 June 2009; pp. 169–178. [Google Scholar]
- Acar, A.; Aksu, H.; Uluagac, A.S.; Conti, M. A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput. Surv. (CSUR) 2018, 51, 1–35. [Google Scholar] [CrossRef]
- Palen, L.; Salzman, M.; Youngs, E. Going wireless: Behavior & practice of new mobile phone users. In Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work, Philadelphia, PA, USA, 2–6 December 2000; pp. 201–210. [Google Scholar]
- Denning, T.; Dehlawi, Z.; Kohno, T. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In Proceedings of the 2014 SIGCHI Conference on Human Factors in Computing Systems, Toronto, ON, Canada, 26 April–1 May 2014; pp. 2377–2386. [Google Scholar]
- Hoyle, R.; Templeman, R.; Armes, S.; Anthony, D.; Crandall, D.; Kapadia, A. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Seattle, WA, USA, 13–17 September 2014; pp. 571–582. [Google Scholar]
- Zhang, S.; Feng, Y.; Das, A.; Bauer, L.; Cranor, L.F.; Sadeh, N. Understanding people’s privacy attitudes towards video analytics technologies. In Proceedings of the FTC PrivacyCon 2020, Washington, DC, USA, 21 July 2020; pp. 1–18. [Google Scholar]
- Hoyle, R.; Stark, L.; Ismail, Q.; Crandall, D.; Kapadia, A.; Anthony, D. Privacy norms and preferences for photos posted online. ACM Trans. Comput. Hum. Interact. (TOCHI) 2020, 27, 1–27. [Google Scholar] [CrossRef]
- Ahmad, I.; Farzan, R.; Kapadia, A.; Lee, A.J. Tangible privacy: Towards user-centric sensor designs for bystander privacy. Proc. ACM Hum. Comput. Interact. 2020, 4, 1–28. [Google Scholar] [CrossRef]
- Wang, Y.; Xia, H.; Yao, Y.; Huang, Y. Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in The US. Proc. Priv. Enhancing Technol. 2016, 2016, 172–190. [Google Scholar] [CrossRef] [Green Version]
- Chang, V.; Chundury, P.; Chetty, M. Spiders in the sky: User perceptions of drones, privacy, and security. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, USA, 6–11 May 2017; pp. 6765–6776. [Google Scholar]
- Perez, A.J.; Zeadally, S.; Griffith, S.; Garcia, L.Y.M.; Mouloud, J.A. A User Study of a Wearable System to Enhance Bystanders’ Facial Privacy. IoT 2020, 1, 198–217. [Google Scholar] [CrossRef]
- Hatuka, T.; Toch, E. Being visible in public space: The normalisation of asymmetrical visibility. Urban Stud. 2017, 54, 984–998. [Google Scholar] [CrossRef]
- De Capitani Di Vimercati, S.; Foresti, S.; Livraga, G.; Samarati, P. Data privacy: Definitions and techniques. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 2012, 20, 793–817. [Google Scholar] [CrossRef] [Green Version]
- Abadi, M.; Chu, A.; Goodfellow, I.; McMahan, H.B.; Mironov, I.; Talwar, K.; Zhang, L. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 308–318. [Google Scholar]
- Hassija, V.; Chamola, V.; Bajpai, B.C.; Zeadally, S. Security issues in implantable medical devices: Fact or fiction? Sustain. Cities Soc. 2020, 102552. [Google Scholar] [CrossRef]
- Xu, T.; Wendt, J.B.; Potkonjak, M. Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, USA, 3–6 November 2014; pp. 417–423. [Google Scholar]
- Sequeiros, J.B.; Chimuco, F.T.; Samaila, M.G.; Freire, M.M.; Inácio, P.R. Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design. ACM Comput. Surv. (CSUR) 2020, 53, 1–32. [Google Scholar] [CrossRef] [Green Version]
- Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the mirai botnet. In Proceedings of the 26th USENIX Security Symposium (USENIX SECURITY 17), Vancouver, BC, Canada, 16–18 August 2017; pp. 1093–1110. [Google Scholar]
- Sadeh, N.; Acquisti, A.; Breaux, T.D.; Cranor, L.F.; McDonald, A.M.; Reidenberg, J.R.; Smith, N.A.; Liu, F.; Russell, N.C.; Schaub, F.; et al. The Usable Privacy Policy Project. 2013. Available online: http://ra.adm.cs.cmu.edu/anon/usr0/ftp/home/anon/isr2013/CMU-ISR-13-119.pdf (accessed on 5 October 2021).
- Goddard, M. The EU General Data Protection Regulation (GDPR): European regulation that has a global impact. Int. J. Mark. Res. 2017, 59, 703–705. [Google Scholar] [CrossRef]
- Giordani, M.; Polese, M.; Mezzavilla, M.; Rangan, S.; Zorzi, M. Toward 6G networks: Use cases and technologies. IEEE Commun. Mag. 2020, 58, 55–61. [Google Scholar] [CrossRef]
- Zhang, Z.; Xiao, Y.; Ma, Z.; Xiao, M.; Ding, Z.; Lei, X.; Karagiannidis, G.K.; Fan, P. 6G wireless networks: Vision, requirements, architecture, and key technologies. IEEE Veh. Technol. Mag. 2019, 14, 28–41. [Google Scholar] [CrossRef]
- Li, T.; Sahu, A.K.; Talwalkar, A.; Smith, V. Federated learning: Challenges, methods, and future directions. IEEE Signal Process. Mag. 2020, 37, 50–60. [Google Scholar]
- Niknam, S.; Dhillon, H.S.; Reed, J.H. Federated learning for wireless communications: Motivation, opportunities, and challenges. IEEE Commun. Mag. 2020, 58, 46–51. [Google Scholar] [CrossRef]
- Rieke, N.; Hancox, J.; Li, W.; Milletari, F.; Roth, H.R.; Albarqouni, S.; Bakas, S.; Galtier, M.N.; Landman, B.A.; Maier-Hein, K.; et al. The future of digital health with federated learning. NPJ Digit. Med. 2020, 3, 1–7. [Google Scholar] [CrossRef]
- Huynh, L.N.; Lee, Y.; Balan, R.K. Deepmon: Mobile gpu-based deep learning framework for continuous vision applications. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, Niagara Falls, NY, USA, 19–23 June 2017; pp. 82–95. [Google Scholar]
- Wang, Y.; Wang, J.; Zhang, W.; Zhan, Y.; Guo, S.; Zheng, Q.; Wang, X. A survey on deploying mobile deep learning applications: A systemic and technical perspective. Digit. Commun. Netw. 2021. [Google Scholar] [CrossRef]
- Joshi, V.; Le Gallo, M.; Haefeli, S.; Boybat, I.; Nandakumar, S.R.; Piveteau, C.; Dazzi, M.; Rajendran, B.; Sebastian, A.; Eleftheriou, E. Accurate deep neural network inference using computational phase-change memory. Nat. Commun. 2020, 11, 1–13. [Google Scholar] [CrossRef]
- Smil, V. Embodied energy: Mobile devices and cars [Numbers Don’t Lie]. IEEE Spectr. 2016, 53, 26. [Google Scholar] [CrossRef] [Green Version]
- Leontief, W. Input-Output Economics; Oxford University Press: Oxford, UK, 1986. [Google Scholar]
- Humar, I.; Ge, X.; Xiang, L.; Jo, M.; Chen, M.; Zhang, J. Rethinking energy efficiency models of cellular networks with embodied energy. IEEE Netw. 2011, 25, 40–49. [Google Scholar] [CrossRef]
- Bello, G.; Perez, A.J. On the Application of Financial Security Standards in Blockchain Platforms. In Blockchain Cybersecurity, Trust and Privacy; Choo, K.K.R., Dehghantanha, A., Parizi, R.M., Eds.; Springer: Cham, Switzerland, 2020; pp. 247–267. [Google Scholar] [CrossRef]
- PCI. Payment Application Data Security Standard. Available online: https://www.pcisecuritystandards.org/minisite/en/pa-dss-v2-0.php (accessed on 1 October 2021).
- Landi, H. Google Closes $2.1B Acquisition of Fitbit as Justice Department Probe Continues. Available online: https://www.fiercehealthcare.com/tech/google-closes-2-1b-acquisition-fitbit-as-justice-department-probe-continues (accessed on 1 October 2021).
- Virgin Pulse Support. Available online: https://virginpulse.zendesk.com/hc/en-us/categories/200339624-DEVICES-APPS (accessed on 1 October 2021).
- Appenzeller, A. Privacy and Patient Involvement in e-Health Worldwide: An International Analysis. In Proceedings of the 2020 Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory, Karlsruhe, Germany, 27–31 July 2020; pp. 1–17. [Google Scholar]
- Häyrinen, K.; Saranto, K.; Nykänen, P. Definition, structure, content, use and impacts of electronic health records: A review of the research literature. Int. J. Med Inform. 2008, 77, 291–304. [Google Scholar] [CrossRef]
- U.S. Food and & Drug Administration: Medical Devices. Available online: https://www.fda.gov/medical-devices (accessed on 1 October 2021).
- FDA. Content of Premarket Submissions for Management of Cybersecurity in Medical Devices. Available online: https://www.fda.gov/regulatory-information/search-fda-guidance-documents/content-premarket-submissions-management-cybersecurity-medical-devices-0 (accessed on 28 September 2021).
- Jennings, K. The Billionaire Who Controls Your Medical Records. Available online: https://www.forbes.com/sites/katiejennings/2021/04/08/billionaire-judy-faulkner-epic-systems/ (accessed on 1 October 2021).
- Commonwell Health Alliance. Available online: https://www.commonwellalliance.org/ (accessed on 1 October 2021).
- H.R. 748-CARES Act. Available online: https://www.congress.gov/bill/116th-congress/house-bill/748/ (accessed on 1 October 2021).
- United States Core Data for Interoperability (USCDI). Available online: https://www.healthit.gov/isa/united-states-core-data-interoperability-uscdi (accessed on 1 October 2021).
References | Year | Title | Remarks |
---|---|---|---|
[24] | 2010 | A survey of mobile phone sensing | Review of applications and architectures for smartphone sensing in human-centric and participatory sensing systems. No mention of wearables |
[25] | 2011 | A survey on privacy in mobile participatory sensing applications | Review of privacy mechanisms for smartphone-based crowdsensing systems. No mention of wearables. |
[26] | 2012 | A survey on human activity recognition using wearable sensors | Review of machine learning (ML) models to classify activities using wearables. Review does not include deep learning (DL) systems. |
[27] | 2012 | Mobile phone sensing systems: A survey | Review of mobile-smartphone-based sensing applications in participatory/crowdsensing settings. Mentions two systems that, as of 2012,used electrocardiogram (ECG) sensors. |
[28] | 2013 | Mobile sensing systems | Review of mobile sensing systems based on smartphones and their communication architectures. Provides short review on security. |
[29] | 2014 | Wearables: Fundamentals, advancements, and a roadmap for the future | Review of wearable technology as of 2014 with a focus on sensors and applications. Does not review security or privacy issues. |
[30] | 2015 | A survey of incentive techniques for mobile crowd sensing | Review of monetary and nonmonetary incentives mechanisms for mobile crowdsensing systems based on smartphones. Incentives are important in crowdsensing to recruit participants to collect data. |
[31] | 2015 | A survey on energy-aware security mechanisms | Reviews energy-aware security mechanisms for WSNs, mobile devices (focus on smartphones), and network nodes as of 2015. Review does not mention wearables. |
[32] | 2016 | Pervasive eHealth services a security and privacy risk awareness survey | Presents risk awareness and perception for eHealth wearables using Amazon Mechanical Turk. |
[33] | 2016 | Incentive mechanisms for participatory sensing: Survey and research challenges | Review of application-specific and general-purpose incentive mechanisms for mobile crowdsensing systems based on smartphones. |
[34] | 2016 | Deep, convolutional, and recurrent models for human activity recognition using wearables | Reviews and evaluates of deep learning methods for human activity recognition. |
[35] | 2017 | A survey of wearable devices and challenges | Review focuses on consumer wearables available as of 2017. Work also addresses security, power, task offloading, and machine learning. Work does not address privacy issues. |
[36] | 2017 | The use of wearables in healthcare–challenges and opportunities | Reviews applications of wearables in healthcare from the application perspective. |
[37] | 2017 | A survey on smart wearables in the application of fitness | Review of wearables available as of 2017 in the context of fitness. Work does not address security, privacy, power, or ML in wearable systems. |
[17] | 2017 | Mobile payment systems: secure network architectures and protocols | Describes architectures and protocols to enable mobile payments. From the device perspective, it focuses on mobile phones. No mention of wearables. |
[38] | 2018 | Privacy issues and solutions for consumer wearables | Review of privacy issues in consumer wearables. Work does not address power or machine learning. |
[39] | 2018 | A critical review of consumer wearables, mobile applications, and equipment for providing biofeedback, monitoring stress, and sleep in physically active populations | Review of the utilization of consumer wearables for stress and sleep monitoring. No privacy or security issues mentioned in the paper. |
[40] | 2018 | Wearables and the medical revolution | Reviews the utilization of wearables for medical use (m-Health). No privacy or security issues reviewed in the paper. |
[41] | 2019 | Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations | Review of security issues and solutions in Internet of Things (IoT) systems. Review does not mention wearables. |
[42] | 2019 | Buddy’s wearable is not your buddy: Privacy implications of pet wearables | Review of privacy issues and possible privacy violations or privacy leakages to owners of pets (pet parents) by having their pets use wearables. |
[43] | 2020 | Design architectures for energy harvesting in the Internet of Things | Reviews power and energy harvesting techniques for Internet of Things (IoT) devices including wearable devices. |
[44] | 2020 | A comprehensive overview of smart wearables: The state of the art literature, recent advances, and future challenges | Bibliographic review of published works related to wearable devices. This work reviews published works from 2010 to 2019 (before the COVID-19 pandemic). |
[45] | 2020 | Use of wearable sensor technology in gait, balance, and range of motion analysis | Review of wearables and ML systems with a focus on gait analysis. |
[46] | 2020 | Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: A Survey | Review of sensors and applications of wearables before the COVID-19 pandemic. This work does not review security, privacy, or ML. |
[9] | 2020 | A survey of COVID-19 contact tracing apps | Reviews contact tracing apps developed during the COVID-19 pandemic. |
[47] | 2021 | Wearables for Industrial Work Safety: A Survey | Review of wearables in the context of industrial settings. Work focuses on applications of wearables for industry. |
[48] | 2021 | A survey on wearable technology: History, state-of-the-art and current challenges | Review provides a comprehensive historical review of wearables devices. Reports on applications and some aspects of security and privacy. |
Privacy Concern | Description |
---|---|
Social implications | Unawareness by a network of friends regarding data being collected about them |
Criminal abuse | Fear that wearable data will be used by criminals to harass a user |
Facial recognition | Association and recognition of a bystander to a place or a situation where the bystander would not wish to be recognized by others |
Access control | Fear of users of third-party service providers sharing data without consent |
Social media sync | Immediate publishing or sharing by the wearable device without the knowledge of the user |
Discrete display and visual occlusion | Notifications/information of users that might be seen by bystanders who should not have access |
Right to forget | The user’s wish to delete collected data that he or she wants to forget |
User fears: surveillance and sousveillance | Continuous tracking of user activities that might make the user feel that no matter what they do, everything is recorded |
Speech disclosure | Capturing speech that a user or bystanders would not want to record or share |
Surreptitious A/V recording | Recording of video without permission that might affect bystanders |
Location disclosure | Fear of sharing a location inadvertently to third parties that should not have access |
FDA Date | FDA Number | Organization | Organization Designation/Date | Standard |
---|---|---|---|---|
7 June 2021 | 13-119 | ANSI ISA | 62443-4-1-2018 | Security for industrial automation and control systems Part 4-1: Product security development life-cycle requirements. |
7 June 2021 | 13-118 | IEEE | Std 11073-40102:2020 | Health informatics-Device interoperability. Part 40102: Foundational-Cybersecurity-Capabilities for mitigation. |
7 June 2021 | 13-117 | IEEE | Std 11073-40101-2020 | Health informatics-Device interoperability Part 40101: Foundational-Cybersecurity-Processes for vulnerability assessment. |
6 July 2020 | 13-115 | IEC IEEE ISO | 29119-1 First edition 2013-09-01 | Software and systems engineering-Software testing-Part 1: Concepts and definitions |
6 July 2020 | 13-114 | IEEE | Std 11073-10101-2019 | Health informatics-Point-of-care medical device communication. Part 10101: Nomenclature |
23 December 2019 | 13-112 | AAMI | TIR97:2019 | Principles for medical device security-Postmarket risk management for device manufacturers |
15 July 2019 | 13-109 | AAMI ANSI UL | 2800-1: 2019 | (American National Standard) Standard for Safety for Medical Device Interoperability |
7 June 2018 | 13-104 | ANSI UL | 2900-2-1 First Edition 2017 | Standard for Safety Software Cybersecurity for Network-Connectable Products Part 2-1: Particular Requirements for Network Connectable Components of Healthcare and Wellness Systems |
4 December 2017 | 13-103 | IEC | TR 80001-2-9 Edition 1.0 2017-01 | Application of risk management for IT-networks incorporating medical devices-Part 2-9: Application guidance-guidance for use of security assurance cases to demonstrate confidence in IEC TR 80001-2-2 security capabilities |
4 December 2017 | 13-102 | IEC | TR 80001-2-8 Edition 1.0 2016-05 | Application of risk management for IT-networks incorporating medical devices-Part 2-8: Application guidance-guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
21 August 2017 | 13-97 | IEC | 82304-1 Edition 1.0 2016-10 | Health software-Part 1: General requirements for product safety |
21 August 2017 | 13-96 | ANSI UL | 2900-1 First Edition 2017 | Standard for Safety Standard for Software Cybersecurity Network-Connectable Products Part 1: General Requirements |
23 December 2016 | 13-85 | CLSI | AUTO11-A2 | Information Technology Security of In Vitro Diagnostic Instruments and Software Systems; Approved Standard-Second Edition |
27 June 2016 | 13-83 | AAMI | TIR57:2016 | Principles for medical device security-Risk management. |
14 August 2015 | 13-78 | IEC ISO | 30111 First edition 2013-11-01 | Information technology-Security techniques-Vulnerability handling processes |
14 August 2015 | 13-77 | IEC ISO | 29147 First edition 2014-02-15 | Information technology-Security techniques-Vulnerability disclosure |
27 January 2015 | 13-70 | IEC | TR 80001-2-5 Edition 1.0 2014-12 | Application of risk management for IT-networks incorporating medical devices-Part 2-5: Application guidance-Guidance on distributed alarm systems |
6 August 2013 | 13-62 | IEC | TR 62443-3-1 Edition 1.0 2009-07 | Industrial communication networks-Network and system security-Part 3-1: Security technologies for industrial automation and control systems |
6 August 2013 | 13-61 | IEC | 62443-2-1 Edition 1.0 2010-11 | Industrial communication networks-Network and system security-Part 2-1: Establishing an industrial automation and control system security program |
6 August 2013 | 13-60 | IEC | TS 62443-1-1 Edition 1.0 2009-07 | Industrial communication networks-Network and system security-Part 1-1: Terminology concepts and models |
6 August 2013 | 13-44 | IEC | TR 80001-2-3 Edition 1.0 2012-07 | Application of risk management for IT Networks incorporating medical devices-Part 2-3: Guidance for wireless networks |
6 August 2013 | 13-42 | IEC | TR 80001-2-2 Edition 1.0 2012-07 | Application of risk management for IT Networks incorporating medical devices-Part 2-2: Guidance for the disclosure and communication of medical device security needs risks and controls |
6 August 2013 | 13-38 | IEC | 80001-1 Edition 1.0 2010-10 | Application of risk management for IT-networks incorporating medical devices-Part 1: Roles responsibilities and activities |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Perez, A.J.; Zeadally, S. Recent Advances in Wearable Sensing Technologies. Sensors 2021, 21, 6828. https://doi.org/10.3390/s21206828
Perez AJ, Zeadally S. Recent Advances in Wearable Sensing Technologies. Sensors. 2021; 21(20):6828. https://doi.org/10.3390/s21206828
Chicago/Turabian StylePerez, Alfredo J., and Sherali Zeadally. 2021. "Recent Advances in Wearable Sensing Technologies" Sensors 21, no. 20: 6828. https://doi.org/10.3390/s21206828
APA StylePerez, A. J., & Zeadally, S. (2021). Recent Advances in Wearable Sensing Technologies. Sensors, 21(20), 6828. https://doi.org/10.3390/s21206828