Exploiting Security Issues in Human Activity Recognition Systems (HARSs)
نویسندگان
چکیده
Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and vibrant academic research area. Although they adopted many fields, such as the environment, agriculture, healthcare considered assistive technology, seem to neglect aspects security privacy. This problem occurs due pervasive nature sensor-based HARSs. Sensors devices with low power computational capabilities, joining machine learning application that lies dynamic heterogeneous communication there is no generalized unified approach evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs particular tried extend existing techniques for these considering security/privacy all participating components. Initially, present architecture medical IoT data flow across entities. Then, briefly review privacy issues possible vulnerabilities each system layer. We introduce an over layer offers mutual authentication, solving issues, particularly man-in-the-middle attack (MitM). Relying on proposed solutions, manage prevent unauthorized access critical information by providing trustworthy application.
منابع مشابه
Technical and Human Issues in Computer-Based Systems Security
Computer systems and internet are becoming pervasive in our everyday life. Being online brings the consequence that such systems are prone to malicious attack. This vulnerability, along with our reliance on these systems, implies that it is important for us to do our best in securing them to ensure their proper functioning. In this paper, we are trying to tackle the security issues from both te...
متن کاملE-Voting Systems Security Issues
In the digital age, democratic systems increasingly resort to technology to support, compliment, or even transform political processes. The growing use of various electronic means in elections reflects the general tendency of increased digitalization, greater outreach, and enhanced mobility in our societies. However, the challenges are considerable. If not carefully planned and designed, e-voti...
متن کاملSecurity Issues on Banking Systems
Bank is one of the example of institute that using Information Technology (IT) in its daily task to fulfill the organization’s and customers’ need. Business transaction, money transfer, ATM, credit card, and loan are some tasks that were done every day. Customers’ personal information stored by the bank is also considered as private and should not be disclose to anybody with no authorization. O...
متن کاملExploiting the Gap in Human and Machine Abilities in Handwriting Recognition for Web Security Applications
Automated recognition of unconstrained handwriting continues to be a challenging research task. In contrast to the traditional role of handwriting recognition in applications such as postal automation, bank check reading etc, in this dissertation we explore the use of handwriting recognition for cyber security. HIPs (Human Interactive Proofs) are automatic reverse Turing tests designed so that ...
متن کاملSecurity issues in adaptive distributed systems
Adaptive Distributed Systems (ADSs) are distributed systems that can evolve their behaviors based on changes in their environments. In this work, we discuss security and propose security metrics issues in the context of ADSs. A key premise with adaptation of distributed systems is that in order to detect changes, information must be collected by monitoring the system and its environment. How mo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information
سال: 2023
ISSN: ['2078-2489']
DOI: https://doi.org/10.3390/info14060315