| Literature DB >> 34696040 |
Alfredo J Perez1, Sherali Zeadally2.
Abstract
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health conditions. We review recent advances in the area of wearable sensing technologies, focusing on aspects such as sensor technologies, communication infrastructures, service infrastructures, security, and privacy. We also review the use of consumer wearables during the coronavirus disease 19 (COVID-19) pandemic caused by the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), and we discuss open challenges that must be addressed to further improve the efficacy of wearable sensing systems in the future.Entities:
Keywords: COVID-19; Internet of Things; SARS-CoV-2; crowdsensing; energy; financial technology; fitness; m-health; mobile payments; privacy; security; sensing; smartphones; wearables
Mesh:
Year: 2021 PMID: 34696040 PMCID: PMC8541055 DOI: 10.3390/s21206828
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Consumer wearables device market share (2019–2022).
Figure 2Wearable services market value.
Summary of survey works in mobile and wearable sensing.
| References | Year | Title | Remarks |
|---|---|---|---|
| [ | 2010 |
| Review of applications and architectures for smartphone sensing in human-centric and participatory sensing systems. No mention of wearables |
| [ | 2011 |
| Review of privacy mechanisms for smartphone-based crowdsensing systems. No mention of wearables. |
| [ | 2012 |
| Review of machine learning (ML) models to classify activities using wearables. Review does not include deep learning (DL) systems. |
| [ | 2012 |
| Review of mobile-smartphone-based sensing applications in participatory/crowdsensing settings. Mentions two systems that, as of 2012,used electrocardiogram (ECG) sensors. |
| [ | 2013 |
| Review of mobile sensing systems based on smartphones and their communication architectures. Provides short review on security. |
| [ | 2014 |
| Review of wearable technology as of 2014 with a focus on sensors and applications. Does not review security or privacy issues. |
| [ | 2015 |
| Review of monetary and nonmonetary incentives mechanisms for mobile crowdsensing systems based on smartphones. Incentives are important in crowdsensing to recruit participants to collect data. |
| [ | 2015 |
| Reviews energy-aware security mechanisms for WSNs, mobile devices (focus on smartphones), and network nodes as of 2015. Review does not mention wearables. |
| [ | 2016 |
| Presents risk awareness and perception for eHealth wearables using Amazon Mechanical Turk. |
| [ | 2016 |
| Review of application-specific and general-purpose incentive mechanisms for mobile crowdsensing systems based on smartphones. |
| [ | 2016 |
| Reviews and evaluates of deep learning methods for human activity recognition. |
| [ | 2017 |
| Review focuses on consumer wearables available as of 2017. Work also addresses security, power, task offloading, and machine learning. Work does not address privacy issues. |
| [ | 2017 |
| Reviews applications of wearables in healthcare from the application perspective. |
| [ | 2017 |
| Review of wearables available as of 2017 in the context of fitness. Work does not address security, privacy, power, or ML in wearable systems. |
| [ | 2017 |
| Describes architectures and protocols to enable mobile payments. From the device perspective, it focuses on mobile phones. No mention of wearables. |
| [ | 2018 |
| Review of privacy issues in consumer wearables. Work does not address power or machine learning. |
| [ | 2018 |
| Review of the utilization of consumer wearables for stress and sleep monitoring. No privacy or security issues mentioned in the paper. |
| [ | 2018 |
| Reviews the utilization of wearables for medical use (m-Health). No privacy or security issues reviewed in the paper. |
| [ | 2019 |
| Review of security issues and solutions in Internet of Things (IoT) systems. Review does not mention wearables. |
| [ | 2019 |
| Review of privacy issues and possible privacy violations or privacy leakages to owners of pets (pet parents) by having their pets use wearables. |
| [ | 2020 |
| Reviews power and energy harvesting techniques for Internet of Things (IoT) devices including wearable devices. |
| [ | 2020 |
| Bibliographic review of published works related to wearable devices. This work reviews published works from 2010 to 2019 (before the COVID-19 pandemic). |
| [ | 2020 |
| Review of wearables and ML systems with a focus on gait analysis. |
| [ | 2020 |
| Review of sensors and applications of wearables before the COVID-19 pandemic. This work does not review security, privacy, or ML. |
| [ | 2020 |
| Reviews contact tracing apps developed during the COVID-19 pandemic. |
| [ | 2021 |
| Review of wearables in the context of industrial settings. Work focuses on applications of wearables for industry. |
| [ | 2021 |
| Review provides a comprehensive historical review of wearables devices. Reports on applications and some aspects of security and privacy. |
Figure 3Paper organization.
Figure 4Wearable sensors based on intrusiveness level.
Figure 5Typical components of a wearable sensing device. The red dotted line indicates possible connection.
Energy sources for wearable sensing devices.
| Energy Source | Description | Examples of Wearable |
|---|---|---|
| Nonrechargeable batteries | Use of standard-size small or specialized-size batteries that power a wearable sensing device | Insulin pumps, cochlear implants/devices, implantable cardioverter defibrillators |
| Rechargeable batteries | Lithium ion batteries that may be connected to an external power source to be recharged | Smart watches, smart phones, heart trackers, insulin pumps, digital stethoscopes [ |
| Solar-powered | Use of photovoltaic (PV) cells to recharge a battery that powers a wearable | Smart bracelets [ |
| Radiofrequency (RF) | Use of antennas that extract energy from radio signals to recharge a battery or to power directly a wearable sensor | Radiofrequency identification (RFID) implants [ |
| Movement and mechanical waves | Use of piezoelectric devices to extract energy from human movements [ | Implantable medical devices [ |
| Thermoelectric generators | Use of body heat to generate power to recharge a battery or to power directly a wearable sensor [ | Biometric wearables and smart t-shirts for electrocardiogram monitoring [ |
Figure 6Typical sensors available in wearable devices grouped by type of collected data.
Sensor technologies for wearable sensing devices.
| Sensor Type | Description/Application | Wearable Device | Type of Collected |
|---|---|---|---|
| Smart fabrics (e-textiles) | Fabrics developed from traditional materials (e.g., cotton, polyester, nylon) combined with materials possessing electrical conductivity, or that can be embedded/uses to carry other sensors/electronic components. Some smart fabrics can detect the presence of chemical substances [ | Zephyr compression shirt, Nadi X smart yoga pants | Human-centric |
| Electrocardiogram (ECG) sensor | Measures the electrical impulses of the heart muscle. Usually placed in contact with the skin. May be used in conjunction with implantable cardioverter defibrillators. Provides heart pulse data | Shimmer3 ECG chest unit, Apple Watch Series 6 | Human-centric |
| Near-field communication (NFC) | Enables communication at short distances (less than 10 cm). Used as a wearable payment sensor [ | NFC Ring, many smartphones, smartwaches | Human-centric |
| Galvanic skin response (GSR) sensor | Measures skin conductivity. Used in wearables to recognize stress levels/emotional state of an individual [ | Empatica E4 wristband | Human-centric |
| Photoplethysmography (PPG) sensor | Measures blood volume changes. These sensors illuminate the skin of a wearer and measure light absorption to determine human body variables including heart rate [ | Wellvue O2 Ring, pulse oximeters, most fitness bands and smart watches | Human-centric |
| Electroencephalography (EEG) sensors | Measure electrical activity in the scalp of a user. These devices can be used to diagnose abnormal brain activity when used in healthcare applications [ | Emotiv EpocX | Human-centric |
| Glucose monitors | Monitor blood glucose levels for people with diabetes. Devices can monitor glucose levels continuously or at a single moment in time [ | Dexcom G6 CGM | Human-centric |
| Infrared (IR) sensor | Measures skin or ambient temperature. Temperature can be used to predict ovulation in female mammals. | Ava fertility tracker | Human-centric/environmental |
| Accelerometer/gyroscope | Detects sudden accelerationmovement. Accelerometers can be used to detect and characterize human activities [ | Shimmer3 IMU, Samsung Galaxy Watch 3, activity trackers, smartphones | Human-centric/ Environmental |
| Microphone | Detects sound. They can be used to detect health conditions, ambient sounds, activity, location contexts (e.g., being in a restaurant, hospital, home) [ | Eko CORE family of stethoscopes/stethoscope attachments | Human-centric/Environmental |
| Location sensor | Tracks the locations/places where a user carrying a device with location may be [ | Game Golf GPS receiver, Jiobit, Pet tracker, smartphones, most smartwatches | Human-centric/Environmental |
| Complementary Metal-Oxide Semiconductor (CMOS)/CCD imaging sensor | Takes photographs. When combined with AI, it may be used to detect objects and possibly recognize people’s identities without consent [ | Iristick, Ray-Ban/Facebook Stories smart glasses, H1 head-mounted smart glasses, Microsoft HoloLens, Axon Body 2 body cameras, smartphones, | Human-centric/Environmental |
| Radiofrequency identification (RFID) tags | Store information about its wearer. RFID can be active or passive and can be used to track assets [ | 3M RFID tags, ARDES Injection needle with RFID chip for cats and dogs, smartphones | Human-centric/Environmental |
| Laser emitter | Laser emitters are used to measure distances through light detection and ranging (LiDAR) and there are plans to be integrate them in future augmented reality (AR) glasses and smartphones [ | CuraviPlus Laser Therapy Belt for Lower Back Pain, future smart AR glasses and smartphones | Human-centric/Environmental |
| Ultrasound sensor | Detects objects in the proximity of a user/device [ | WeWALK smart cane, UltraCane, SonoQue, and Clarius portable handheld ultrasound devices | Human-centric/Environmental |
| Air quality sensor | Detects harmful gas concentrations/volatile components [ | Atmotube PRO, TZOA, Flow 2 by plume labs | Environmental |
| Spectrometer | Separates and measures the spectral components reflected by a material. The light spectrum can be used to determine the components of the material [ | GoyaLab IndiGo modular visible spectrometer | Environmental |
| Radiation sensor | Tracks ionizing [ | Instadose 2 Personal Radiation (X-ray) badge, Landauer RaySafe i3 Real-time Personal, Radiation Dosimetry, Landauee Tactical RadWatch | Environmental |
| Barometric pressure sensor | Detects barometric (atmospheric) pressure. Can be used to detect movement, activity [ | Garmin Fenix 5X | Environmental |
| Compass | Determines orientation and used for navigation | Most smartwatches | Environmental |
Figure 7General architecture of wearable sensing systems.
Types of wearable sensing systems.
| Type of System | Description | Examples of |
|---|---|---|
| Location-based systems | Use location data to track, query, or provide a service based on location only [ | Smart Caddie, OneBusAway [ |
| Human-centric systems | Use sensors to monitor human-related physiological variables, activities and behaviors. Personal monitoring systems (e.g., fitness systems) and intelligent medical/healthcare systems fall into this category [ | Fitbit Premium + Health, Garmin Connect, Samsung Health, Apple Healthkit |
| Participatory/ crowdsensing systems | Use collaborative data collected from a crowd to estimate communal parameters of interest [ | Crowdsync, COVIDNearby, CovidSens [ |
| Hybrid systems | Systems making use of the characteristics of more than one class/kind of system above. | PokemonGo |
Vulnerabilities in wearable sensing devices (adapted from [41]).
| Vulnerability | Description | Examples of Attacks |
|---|---|---|
| Limited physical security | Unauthorized physical access to a wearable device by an adversary without difficulty | Physically damaging a device, spoofing attacks [ |
| Limited power | Wearable devices use batteries or energy harvesting techniques; attacks may drain their batteries and render them unusable | Battery exhaustion attacks [ |
| Weak encryption | Use of encryption protocols that may not sufficiently protect data sent by a wearable due to energy limitations, processing power limitations, and bad software engineering practices | Eavesdropping, injection, and denial of service (DoS) attacks in health monitoring devices [ |
| Weak authentication | Failure to authenticate a user, a wearable device, or data generated by a wearable due to energy, computational power, poor design, mode of use, or user interface constraints that may not allow the implementation of strong authentication protocols on a wearable device | Stealing, losing, or duplicating a physical token for a wearable device [ |
| Unnecessary open ports | Devices may keep operating system (OS) ports/network addresses that may be exploited in security attacks or privacy violations | Tracking of users using botnets and Bluetooth low energy (BLE) [ |
| Software vulnerabilities | Software may be implemented with errors or weak programming practices that make wearables vulnerable to security attacks; some of these weak practices include backdoors and errors during firmware updates | Attacks on fitness trackers during firmware updates [ |
Wearable user’s privacy concerns, as researched by the authors of [194].
| Privacy Concern | Description |
|---|---|
| Social implications | Unawareness by a network of friends regarding data being collected about them |
| Criminal abuse | Fear that wearable data will be used by criminals to harass a user |
| Facial recognition | Association and recognition of a bystander to a place or a situation where the bystander would not wish to be recognized by others |
| Access control | Fear of users of third-party service providers sharing data without consent |
| Social media sync | Immediate publishing or sharing by the wearable device without the knowledge of the user |
| Discrete display and visual occlusion | Notifications/information of users that might be seen by bystanders who should not have access |
|
| The user’s wish to delete collected data that he or she wants to forget |
| User fears: surveillance and sousveillance | Continuous tracking of user activities that might make the user feel that no matter what they do, everything is recorded |
| Speech disclosure | Capturing speech that a user or bystanders would not want to record or share |
| Surreptitious A/V recording | Recording of video without permission that might affect bystanders |
| Location disclosure | Fear of sharing a location inadvertently to third parties that should not have access |
Privacy concerns and issues for wearables (adapted from [38]).
| User Privacy Concern | Privacy Issue | Recently Proposed Solutions |
|---|---|---|
| Access control | Context | Virtual trip lines [ |
| Speech disclosure | Bystanders’ privacy | BlindSpot [ |
| Access control | External data-sharing privacy | k-anonymity [ |
U.S. FDA-recognized standards for medical informatics security.
| FDA Date | FDA Number | Organization | Organization Designation/Date | Standard |
|---|---|---|---|---|
| 7 June 2021 | 13-119 | ANSI ISA | 62443-4-1-2018 | Security for industrial automation and control systems Part 4-1: Product security development life-cycle requirements. |
| 7 June 2021 | 13-118 | IEEE | Std 11073-40102:2020 | Health informatics-Device interoperability. Part 40102: Foundational-Cybersecurity-Capabilities for mitigation. |
| 7 June 2021 | 13-117 | IEEE | Std 11073-40101-2020 | Health informatics-Device interoperability Part 40101: Foundational-Cybersecurity-Processes for vulnerability assessment. |
| 6 July 2020 | 13-115 | IEC IEEE ISO | 29119-1 First edition 2013-09-01 | Software and systems engineering-Software testing-Part 1: Concepts and definitions |
| 6 July 2020 | 13-114 | IEEE | Std 11073-10101-2019 | Health informatics-Point-of-care medical device communication. Part 10101: Nomenclature |
| 23 December 2019 | 13-112 | AAMI | TIR97:2019 | Principles for medical device security-Postmarket risk management for device manufacturers |
| 15 July 2019 | 13-109 | AAMI ANSI UL | 2800-1: 2019 | (American National Standard) Standard for Safety for Medical Device Interoperability |
| 7 June 2018 | 13-104 | ANSI UL | 2900-2-1 First Edition 2017 | Standard for Safety Software Cybersecurity for Network-Connectable Products Part 2-1: Particular Requirements for Network Connectable Components of Healthcare and Wellness Systems |
| 4 December 2017 | 13-103 | IEC | TR 80001-2-9 Edition 1.0 2017-01 | Application of risk management for IT-networks incorporating medical devices-Part 2-9: Application guidance-guidance for use of security assurance cases to demonstrate confidence in IEC TR 80001-2-2 security capabilities |
| 4 December 2017 | 13-102 | IEC | TR 80001-2-8 Edition 1.0 2016-05 | Application of risk management for IT-networks incorporating medical devices-Part 2-8: Application guidance-guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
| 21 August 2017 | 13-97 | IEC | 82304-1 Edition 1.0 2016-10 | Health software-Part 1: General requirements for product safety |
| 21 August 2017 | 13-96 | ANSI UL | 2900-1 First Edition 2017 | Standard for Safety Standard for Software Cybersecurity Network-Connectable Products Part 1: General Requirements |
| 23 December 2016 | 13-85 | CLSI | AUTO11-A2 | Information Technology Security of In Vitro Diagnostic Instruments and Software Systems; Approved Standard-Second Edition |
| 27 June 2016 | 13-83 | AAMI | TIR57:2016 | Principles for medical device security-Risk management. |
| 14 August 2015 | 13-78 | IEC ISO | 30111 First edition 2013-11-01 | Information technology-Security techniques-Vulnerability handling processes |
| 14 August 2015 | 13-77 | IEC ISO | 29147 First edition 2014-02-15 | Information technology-Security techniques-Vulnerability disclosure |
| 27 January 2015 | 13-70 | IEC | TR 80001-2-5 Edition 1.0 2014-12 | Application of risk management for IT-networks incorporating medical devices-Part 2-5: Application guidance-Guidance on distributed alarm systems |
| 6 August 2013 | 13-62 | IEC | TR 62443-3-1 Edition 1.0 2009-07 | Industrial communication networks-Network and system security-Part 3-1: Security technologies for industrial automation and control systems |
| 6 August 2013 | 13-61 | IEC | 62443-2-1 Edition 1.0 2010-11 | Industrial communication networks-Network and system security-Part 2-1: Establishing an industrial automation and control system security program |
| 6 August 2013 | 13-60 | IEC | TS 62443-1-1 Edition 1.0 2009-07 | Industrial communication networks-Network and system security-Part 1-1: Terminology concepts and models |
| 6 August 2013 | 13-44 | IEC | TR 80001-2-3 Edition 1.0 2012-07 | Application of risk management for IT Networks incorporating medical devices-Part 2-3: Guidance for wireless networks |
| 6 August 2013 | 13-42 | IEC | TR 80001-2-2 Edition 1.0 2012-07 | Application of risk management for IT Networks incorporating medical devices-Part 2-2: Guidance for the disclosure and communication of medical device security needs risks and controls |
| 6 August 2013 | 13-38 | IEC | 80001-1 Edition 1.0 2010-10 | Application of risk management for IT-networks incorporating medical devices-Part 1: Roles responsibilities and activities |