Tampere University of Technology

TUTCRIS Research Portal

Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things

Research output: Contribution to journalArticleScientificpeer-review

Standard

Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things. / Ometov, Aleksandr; Bezzateev, S.; Kannisto, Joona; Harju, Jarmo; Andreev, Sergey; Koucheryavy, Yevgeni.

In: IEEE Internet of Things Journal, Vol. 4, No. 4, 2017, p. 843-854.

Research output: Contribution to journalArticleScientificpeer-review

Harvard

APA

Vancouver

Author

Ometov, Aleksandr ; Bezzateev, S. ; Kannisto, Joona ; Harju, Jarmo ; Andreev, Sergey ; Koucheryavy, Yevgeni. / Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things. In: IEEE Internet of Things Journal. 2017 ; Vol. 4, No. 4. pp. 843-854.

Bibtex - Download

@article{f2db682082884ef1af21ff4ccddd9fe8,
title = "Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things",
abstract = "The Internet undergoes a fundamental transformation as billions of connected ”things” surround us and embed themselves into the fabric of our everyday lives. However, this is only the beginning of true convergence between the realm of humans and that of machines, which materializes with the advent of connected machines worn by humans, or wearables. The resulting shift from the Internet of Things to the Internet of Wearable Things (IoWT) brings along a truly personalized user experience by capitalizing on the rich contextual information, which wearables produce more than any other today’s technology. The abundance of personally identifiable information handled by wearables creates an unprecedented risk of its unauthorized exposure by the IoWT devices, which fuels novel privacy challenges. In this paper1, after reviewing the relevant contemporary background, we propose efficient means for the delegation of use applicable to a wide variety of constrained wearable devices, so that to guarantee privacy and integrity of their data. Our efficient solutions facilitate contexts when one would like to offer their personal device for temporary use (delegate it) to another person in a secure and reliable manner. In connection to the proposed protocol suite for the delegation of use, we also review the possible attack surfaces related to advanced wearables.",
keywords = "Authentication, Biomedical monitoring, Data privacy, Internet of things, Privacy, Protocols, Internet of Wearable Things, Wearables, attack surfaces, delegation of use, personally identifiable information, privacy challenges, unauthorized exposure",
author = "Aleksandr Ometov and S. Bezzateev and Joona Kannisto and Jarmo Harju and Sergey Andreev and Yevgeni Koucheryavy",
year = "2017",
doi = "10.1109/JIOT.2016.2593898",
language = "English",
volume = "4",
pages = "843--854",
journal = "IEEE Internet of Things Journal",
issn = "2327-4662",
publisher = "IEEE",
number = "4",

}

RIS (suitable for import to EndNote) - Download

TY - JOUR

T1 - Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things

AU - Ometov, Aleksandr

AU - Bezzateev, S.

AU - Kannisto, Joona

AU - Harju, Jarmo

AU - Andreev, Sergey

AU - Koucheryavy, Yevgeni

PY - 2017

Y1 - 2017

N2 - The Internet undergoes a fundamental transformation as billions of connected ”things” surround us and embed themselves into the fabric of our everyday lives. However, this is only the beginning of true convergence between the realm of humans and that of machines, which materializes with the advent of connected machines worn by humans, or wearables. The resulting shift from the Internet of Things to the Internet of Wearable Things (IoWT) brings along a truly personalized user experience by capitalizing on the rich contextual information, which wearables produce more than any other today’s technology. The abundance of personally identifiable information handled by wearables creates an unprecedented risk of its unauthorized exposure by the IoWT devices, which fuels novel privacy challenges. In this paper1, after reviewing the relevant contemporary background, we propose efficient means for the delegation of use applicable to a wide variety of constrained wearable devices, so that to guarantee privacy and integrity of their data. Our efficient solutions facilitate contexts when one would like to offer their personal device for temporary use (delegate it) to another person in a secure and reliable manner. In connection to the proposed protocol suite for the delegation of use, we also review the possible attack surfaces related to advanced wearables.

AB - The Internet undergoes a fundamental transformation as billions of connected ”things” surround us and embed themselves into the fabric of our everyday lives. However, this is only the beginning of true convergence between the realm of humans and that of machines, which materializes with the advent of connected machines worn by humans, or wearables. The resulting shift from the Internet of Things to the Internet of Wearable Things (IoWT) brings along a truly personalized user experience by capitalizing on the rich contextual information, which wearables produce more than any other today’s technology. The abundance of personally identifiable information handled by wearables creates an unprecedented risk of its unauthorized exposure by the IoWT devices, which fuels novel privacy challenges. In this paper1, after reviewing the relevant contemporary background, we propose efficient means for the delegation of use applicable to a wide variety of constrained wearable devices, so that to guarantee privacy and integrity of their data. Our efficient solutions facilitate contexts when one would like to offer their personal device for temporary use (delegate it) to another person in a secure and reliable manner. In connection to the proposed protocol suite for the delegation of use, we also review the possible attack surfaces related to advanced wearables.

KW - Authentication

KW - Biomedical monitoring

KW - Data privacy

KW - Internet of things

KW - Privacy

KW - Protocols

KW - Internet of Wearable Things

KW - Wearables

KW - attack surfaces

KW - delegation of use

KW - personally identifiable information

KW - privacy challenges

KW - unauthorized exposure

U2 - 10.1109/JIOT.2016.2593898

DO - 10.1109/JIOT.2016.2593898

M3 - Article

VL - 4

SP - 843

EP - 854

JO - IEEE Internet of Things Journal

JF - IEEE Internet of Things Journal

SN - 2327-4662

IS - 4

ER -