Exploiting Security Issues in Human Activity Recognition Systems (HARSs)
Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem to neglect t...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-05-01
|
Series: | Information |
Subjects: | |
Online Access: | https://www.mdpi.com/2078-2489/14/6/315 |
_version_ | 1797594197777186816 |
---|---|
author | Sofia Sakka Vasiliki Liagkou Chrysostomos Stylios |
author_facet | Sofia Sakka Vasiliki Liagkou Chrysostomos Stylios |
author_sort | Sofia Sakka |
collection | DOAJ |
description | Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem to neglect the aspects of security and privacy. This problem occurs due to the pervasive nature of sensor-based HARSs. Sensors are devices with low power and computational capabilities, joining a machine learning application that lies in a dynamic and heterogeneous communication environment, and there is no generalized unified approach to evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs in particular and tried to extend existing techniques for these systems considering the security/privacy of all participating components. Initially, in this work, we present the architecture of a real-life medical IoT application and the data flow across the participating entities. Then, we briefly review security and privacy issues and present possible vulnerabilities of each system layer. We introduce an architecture over the communication layer that offers mutual authentication, solving many security and privacy issues, particularly the man-in-the-middle attack (MitM). Relying on the proposed solutions, we manage to prevent unauthorized access to critical information by providing a trustworthy application. |
first_indexed | 2024-03-11T02:20:14Z |
format | Article |
id | doaj.art-403b1333a7b04d99a7d3da907862072f |
institution | Directory Open Access Journal |
issn | 2078-2489 |
language | English |
last_indexed | 2024-03-11T02:20:14Z |
publishDate | 2023-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Information |
spelling | doaj.art-403b1333a7b04d99a7d3da907862072f2023-11-18T10:54:24ZengMDPI AGInformation2078-24892023-05-0114631510.3390/info14060315Exploiting Security Issues in Human Activity Recognition Systems (HARSs)Sofia Sakka0Vasiliki Liagkou1Chrysostomos Stylios2Department of Informatics and Telecommunications, University of Ioannina, 471 00 Arta, GreeceDepartment of Informatics and Telecommunications, University of Ioannina, 471 00 Arta, GreeceDepartment of Informatics and Telecommunications, University of Ioannina, 471 00 Arta, GreeceHuman activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem to neglect the aspects of security and privacy. This problem occurs due to the pervasive nature of sensor-based HARSs. Sensors are devices with low power and computational capabilities, joining a machine learning application that lies in a dynamic and heterogeneous communication environment, and there is no generalized unified approach to evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs in particular and tried to extend existing techniques for these systems considering the security/privacy of all participating components. Initially, in this work, we present the architecture of a real-life medical IoT application and the data flow across the participating entities. Then, we briefly review security and privacy issues and present possible vulnerabilities of each system layer. We introduce an architecture over the communication layer that offers mutual authentication, solving many security and privacy issues, particularly the man-in-the-middle attack (MitM). Relying on the proposed solutions, we manage to prevent unauthorized access to critical information by providing a trustworthy application.https://www.mdpi.com/2078-2489/14/6/315human activity recognitionsecurityprivacysensorswearables |
spellingShingle | Sofia Sakka Vasiliki Liagkou Chrysostomos Stylios Exploiting Security Issues in Human Activity Recognition Systems (HARSs) Information human activity recognition security privacy sensors wearables |
title | Exploiting Security Issues in Human Activity Recognition Systems (HARSs) |
title_full | Exploiting Security Issues in Human Activity Recognition Systems (HARSs) |
title_fullStr | Exploiting Security Issues in Human Activity Recognition Systems (HARSs) |
title_full_unstemmed | Exploiting Security Issues in Human Activity Recognition Systems (HARSs) |
title_short | Exploiting Security Issues in Human Activity Recognition Systems (HARSs) |
title_sort | exploiting security issues in human activity recognition systems harss |
topic | human activity recognition security privacy sensors wearables |
url | https://www.mdpi.com/2078-2489/14/6/315 |
work_keys_str_mv | AT sofiasakka exploitingsecurityissuesinhumanactivityrecognitionsystemsharss AT vasilikiliagkou exploitingsecurityissuesinhumanactivityrecognitionsystemsharss AT chrysostomosstylios exploitingsecurityissuesinhumanactivityrecognitionsystemsharss |