Exploiting Security Issues in Human Activity Recognition Systems (HARSs)

نویسندگان

چکیده

Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and vibrant academic research area. Although they adopted many fields, such as the environment, agriculture, healthcare considered assistive technology, seem to neglect aspects security privacy. This problem occurs due pervasive nature sensor-based HARSs. Sensors devices with low power computational capabilities, joining machine learning application that lies dynamic heterogeneous communication there is no generalized unified approach evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs particular tried extend existing techniques for these considering security/privacy all participating components. Initially, present architecture medical IoT data flow across entities. Then, briefly review privacy issues possible vulnerabilities each system layer. We introduce an over layer offers mutual authentication, solving issues, particularly man-in-the-middle attack (MitM). Relying on proposed solutions, manage prevent unauthorized access critical information by providing trustworthy application.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Technical and Human Issues in Computer-Based Systems Security

Computer systems and internet are becoming pervasive in our everyday life. Being online brings the consequence that such systems are prone to malicious attack. This vulnerability, along with our reliance on these systems, implies that it is important for us to do our best in securing them to ensure their proper functioning. In this paper, we are trying to tackle the security issues from both te...

متن کامل

E-Voting Systems Security Issues

In the digital age, democratic systems increasingly resort to technology to support, compliment, or even transform political processes. The growing use of various electronic means in elections reflects the general tendency of increased digitalization, greater outreach, and enhanced mobility in our societies. However, the challenges are considerable. If not carefully planned and designed, e-voti...

متن کامل

Security Issues on Banking Systems

Bank is one of the example of institute that using Information Technology (IT) in its daily task to fulfill the organization’s and customers’ need. Business transaction, money transfer, ATM, credit card, and loan are some tasks that were done every day. Customers’ personal information stored by the bank is also considered as private and should not be disclose to anybody with no authorization. O...

متن کامل

Exploiting the Gap in Human and Machine Abilities in Handwriting Recognition for Web Security Applications

Automated recognition of unconstrained handwriting continues to be a challenging research task. In contrast to the traditional role of handwriting recognition in applications such as postal automation, bank check reading etc, in this dissertation we explore the use of handwriting recognition for cyber security. HIPs (Human Interactive Proofs) are automatic reverse Turing tests designed so that ...

متن کامل

Security issues in adaptive distributed systems

Adaptive Distributed Systems (ADSs) are distributed systems that can evolve their behaviors based on changes in their environments. In this work, we discuss security and propose security metrics issues in the context of ADSs. A key premise with adaptation of distributed systems is that in order to detect changes, information must be collected by monitoring the system and its environment. How mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information

سال: 2023

ISSN: ['2078-2489']

DOI: https://doi.org/10.3390/info14060315