logo

Security and Privacy Issues of Handheld and Wearable Wireless Devices

11 Pages3010 Words267 Views
   

Added on  2023-04-17

About This Document

This report discusses the security and privacy challenges associated with handheld and wearable wireless devices. It explores the potential risks and offers solutions to address them. Find study material on Desklib.

Security and Privacy Issues of Handheld and Wearable Wireless Devices

   Added on 2023-04-17

ShareRelated Documents
Running head: WIRELESS SECURITY AND PRIVACY
SECURITY AND PRIVACY ISSUES OF HANDHELD AND WEARABLE
WIRELESS DEVICES
Name of the Student
Name of the University
Author Note
Security and Privacy Issues of Handheld and Wearable Wireless Devices_1
1
WIRELESS SECURITY AND PRIVACY
Table of Contents
Introduction................................................................................................................................2
About Wireless security and privacy in HWW..........................................................................2
Security challenges.....................................................................................................................3
System security..........................................................................................................................5
Privacy issues.............................................................................................................................5
Solution......................................................................................................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................9
Security and Privacy Issues of Handheld and Wearable Wireless Devices_2
2
WIRELESS SECURITY AND PRIVACY
Introduction
The report aims at describing the major security and privacy concerns that are faced
with wireless devices. This becomes important to determine the variety of appliance that
becomes important for daily lives. This basically includes wearable heart rate monitor, PDA,
cell phone with GPS and outfitted multiple sensors. Among all this application few has the
capability to interact with each other as this is simple and easy to operate. The report will
describe all the important security and privacy concern that arises with the wearable wireless
devices. Wearable devices offers a better benefit only if they has the ability interact directly
with other appliances. In order to achieve the goal it becomes important to ensure that proper
transparent and frequent communication is processed. However there is a high chance of
serious breach within this devices as these becomes easy to physically locate the actions of
user carrying wireless devices. The report will focus on the HWW network models, the
security challenges, privacy issues and possible solution for overcoming this concerns. It is
important to determine the major privacy concerns that comes along with the use of wireless
devices (Zhou and Jun 2015). The report has described the wireless security and privacy
concern. The chosen concept for wireless security and privacy is the handheld and wearable
devices. The report has included the major security challenges associated with the wireless
technology. Apart from this the privacy concern related to wireless security are also going to
be described in the report.
About Wireless security and privacy in HWW
Wireless security aims at providing a better way of preventing the device from
unapproved access or that damages to computers or data using wireless networks. It is
important to maintain the wireless security properly so that it can enhance the way it takes
place. There are basically 3 types of wireless networks, this includes LAN, WAN and PAN.
Wireless Wide Area Networks (WWAN), are referred to the use of mobile phone signals and
are classically maintained and provided by specific mobile phone (cellular) service providers.
The six different types of wearable wireless technologies are near the field of communication,
Bluetooth low energy, ANT, Bluetooth classic and Wi-Fi (Wang and Shengling 2016). The
different types of wireless security includes Wired Equivalent Privacy and Wi-Fi Protected
Access. The handheld and wearable wireless (HWW) gets a better implication in day to day
life due to their mobility requirements and small size. The major implementation and design
Security and Privacy Issues of Handheld and Wearable Wireless Devices_3
3
WIRELESS SECURITY AND PRIVACY
constraints that are needed to be considered includes battery depletion, slow processors, small
amount of RAM and offers a limited communication range. The area that is covered by
wireless transmission is basically limited due to technical and energy considerations. Apart
from all this there are high chances of experiencing communication failure within the
wireless network. Thus it becomes important to have a proper analysis of technological and
non-technological factors so that it can be addressed properly and can ensure better
communication within the infrastructure (Sgora et al. 2016). The non-technological issue
describes the design for new regulations so that it can provide a better way of virtually global
environment. The capabilities of the handheld and wearable wireless devices has become the
main reason for having a better security and privacy protections to an exceptional scale. This
occurs as there is threat of exposing the personal security and privacy of an individual. There
are basically two types of HWW paradigm that are associated with security issues and
privacy concerns related to user. The two main models of HWW are Flat web presence and
Hierarchical web presence.
Flat web presence: this web presence needs an effective solution for describing the
main research problems. For example the implementation of HWW devices that can take
place at anytime and anywhere that requires an effective protocol and algorithm for providing
a wide spread access to all the important and useful HWW devices (Saltikoff and Elena
2016). HWW device needs to have a proper intelligent, context aware agent that are offered
along with the services. The feasibility of scenario needs to have a proper network
infrastructure that will provide a better extent way of internet.
Hierarchical web presence: this restricts the possibility of web presence for service
and reduces the difficulty and traffic load as compared to the flat web presence. This web
presence is mainly based on local interoperability between the HWW devices (Saleem and
Kashif 2016). Thus it can be stated that this approach will simplify the design of the network
infrastructure.
Security challenges faced with HWW
Wearable wireless device needs a proper satisfactory level of security for having a
proper deployment. However it becomes important to export the solution that are recognised
for wired environment in the field of wireless devices. But this becomes very difficult to
deliver a feasible approach because there are huge differences between the two models.
Moreover it becomes difficult to protect the device from denial of service attacks as there is
Security and Privacy Issues of Handheld and Wearable Wireless Devices_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Bluetooth Networking: Advantages, Disadvantages, Security Challenges and Measures
|9
|2128
|376

Advanced Wireless Technologies: Wi-Fi, Bluetooth, Voice Over LTE
|14
|970
|456

Internet of Things (IOT) Networking Assignment
|11
|3122
|156

Internet of Things: Communication Technologies, Security Issues, and Proposals
|6
|2286
|201

Internet of Things: Communication Protocols and Technical Challenges
|10
|2295
|353

Paper on Wireless Networking Concepts
|15
|1083
|28