Enhancing Wearable Device Security with Cryptographic Authentication

Verified

Added on  2024/05/14

|2
|494
|458
Literature Review
AI Summary
This paper reviews authentication techniques for enhancing the security of wearable devices using cryptography. With the increasing integration of IoT devices into daily life, including wearable technology, the need for robust security measures is paramount due to the sensitive user data these devices handle. Current solutions often lack the necessary strength in their security infrastructure, leading to potential authentication issues. This review explores the use of cryptography-based authentication methods to ensure data integrity and source authentication. It addresses the limitations of existing solutions, such as the complexity of pairing wearable devices with other gadgets like smartphones, and proposes a new model using cryptographic techniques to solve these authentication challenges. The findings aim to contribute to further research in wearable technology, providing a clearer understanding of authentication concepts and offering a foundation for selecting the best models for securing wearable devices.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Topic: Review of Authentication techniques for
enhancing the security of wearable devices using
cryptography
What is Background Information?
Internet of things is becoming a major part of the human lives in different aspects by developing
technologies ranging from healthcare to wearable devices to smart homes. The wide usage of the
applications results in sharing a large amount of data containing the private information of the
users. Thus, the security of IoT includes data authentication, integrity. Confidentiality, privacy,
and access control.
The data transmitted through wearable devices contain sensitive data about the user and thus
application used for data collection from the wearable devices can cause a serious problem. It is
required to authenticate the wearable devices and then protecting the data transmission between
the application server and wearable device.
The current solutions state that the absence of strengthened and vivid baseline information of
security infrastructure may increase the authentication related issues for the users using wearable
technology.
Thus, there is a need to use the cryptography based methods of authentication to verify integrity
authentication and source authentication.
What is the domain?
Key-based user authentication techniques in wearable devices
What are the current solutions?
Cryptography in wearable technology
What are the issues with these solutions?
Wearable computing is also creating some major problems related to the authentication of the
user. One of the main limitations of the current solution is the adaption of a good approach for
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
user authentication. The available literature states that wearable devices are not able to work
alone due to its nature of operations, it requires to pair with some gadget like Smartphone to
operate successfully. This complexity of choosing and authentication of the gadget is the major
complexity.
What are the aims of this work?
This paper aims at proposing a new model using cryptographic techniques for solving issues
related to the authentication. Along with this, the limitations of the current studies can also help
in selecting the best model to be used for the authentication of wearable devices. This paper also
aims at providing a clear understanding of the concept of authentication in wearable devices on
the basis of the explanation of the three main factors of the proposed technology.
What are the contribution and current techniques to be used?
The findings of this can contribute to carrying out further research in the area of wearable
technology to study the concept of authentication in the different type of devices and gadgets.
The existing limitations can also be covered by the proposed model. In this paper, authentication
of wearable technology is studied in depth and the existing limitations have also been analyzed
to provide the proposed solution. An effective and secure means for authentication is also
explored along with using cryptographic technology for increasing the authentication.
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]