<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMES</journal-id>
<journal-id journal-id-type="nlm-ta">CMES</journal-id>
<journal-id journal-id-type="publisher-id">CMES</journal-id>
<journal-title-group>
<journal-title>Computer Modeling in Engineering &#x0026; Sciences</journal-title>
</journal-title-group>
<issn pub-type="epub">1526-1506</issn>
<issn pub-type="ppub">1526-1492</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">53465</article-id>
<article-id pub-id-type="doi">10.32604/cmes.2024.053465</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>IWTW: A Framework for IoWT Cyber Threat Analysis</article-title>
<alt-title alt-title-type="left-running-head">IWTW: A Framework for IoWT Cyber Threat Analysis</alt-title>
<alt-title alt-title-type="right-running-head">IWTW: A Framework for IoWT Cyber Threat Analysis</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Jeon</surname><given-names>GyuHyun</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Jin</surname><given-names>Hojun</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Lee</surname><given-names>Ju Hyeon</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Jeon</surname><given-names>Seungho</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-5" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Seo</surname><given-names>Jung Taek</given-names></name><xref ref-type="aff" rid="aff-2">2</xref><email>seojt@gachon.ac.kr</email></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Information Security, Gachon University</institution>, <addr-line>Seongnam, 13120</addr-line>, <country>Republic of Korea</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Computer Engineering (Smart Security), Gachon University</institution>, <addr-line>Seongnam, 13120</addr-line>, <country>Republic of Korea</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Jung Taek Seo. Email: <email>seojt@gachon.ac.kr</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2024</year></pub-date>
<pub-date date-type="pub" publication-format="electronic"><day>27</day><month>9</month><year>2024</year></pub-date>
<volume>141</volume>
<issue>2</issue>
<fpage>1575</fpage>
<lpage>1622</lpage>
<history>
<date date-type="received">
<day>30</day>
<month>4</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>20</day>
<month>8</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2024 The Authors.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMES_53465.pdf"></self-uri>
<abstract>
<p>The Internet of Wearable Things (IoWT) or Wearable Internet of Things (WIoT) is a new paradigm that combines IoT and wearable technology. Advances in IoT technology have enabled the miniaturization of sensors embedded in wearable devices and the ability to communicate data and access real-time information over low-power mobile networks. IoWT devices are highly interdependent with mobile devices. However, due to their limited processing power and bandwidth, IoWT devices are vulnerable to cyberattacks due to their low level of security. Threat modeling and frameworks for analyzing cyber threats against existing IoT or low-power protocols have been actively researched. The threat analysis framework used in existing studies was limited to specific protocols and did not target IoWT devices. In addition, In the literature surveyed to date, no cyber threat analysis framework is targeting IoWT. Therefore, the threat model presented in the existing research on cyber threat analysis and modeling for IoWT is specialized for specific devices. In addition, because it does not present standardized attack tactics and techniques, there is a limitation in that it is difficult to identify attacks quickly. In this paper, we propose an Internet of Wearable Things threat analysis frameWork (IWTW) framework that can derive security threats through systematic analysis of IoWT attack cases and possible security threats and perform cyber threat analysis based on them. The methodology for developing the IWTW framework consists of three steps: Analysis, Standardization, and Compilation. IoWT attack cases and potential security threats are analyzed in the analysis stage. In the standardization stage, attack tactics and techniques derived from the analysis of attack cases and potential security threats are standardized, resulting in 3 attack categories, 18 attack tactics, and 68 attack techniques. In the compilation stage, standardized security threats are combined to develop the IWTW framework ultimately. We present four case studies targeting MiBand 2, Fitbit Charge HR/Surge, Samsung Gear 3, Xiaomi Amazifit, Honor Band 5, Honor Watch ES, and Senbono CF-58 devices to validate the proposed IWTW framework. We analyzed the attack process through a case study and applied the IWTW framework to derive standardized attack categories, tactics, and techniques effectively. By applying the IWTW framework to cyber threat analysis targeting IoWT, security threats can be standardized, and the attack process can be quickly derived, enabling effective attack analysis on IoWT.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Internet of wearable things</kwd>
<kwd>wearable device</kwd>
<kwd>threat framework</kwd>
<kwd>security threat</kwd>
</kwd-group>
<funding-group>
<award-group id="awg1">
<funding-source>Institute of Information &#x0026; Communications Technology Planning &#x0026; Evaluation (IITP)</funding-source>
<award-id>RS-2021-II210493</award-id>
</award-group>
<award-group id="awg2">
<funding-source>Gachon University</funding-source>
<award-id>GCU-202300750001</award-id>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>The Internet of Wearable Things (IoWT) or Wearable Internet of Things (WIoT) is a new paradigm that combines IoT and wearable technologies. Advances in IoT technology have enabled the miniaturization of sensors embedded in wearable devices and the ability to communicate data and access real-time information over low-power mobile networks [<xref ref-type="bibr" rid="ref-1">1</xref>]. These advantages have led to a proliferation of personal wearable devices and the application of IoWT technology in various fields such as medicine, healthcare, and sports [<xref ref-type="bibr" rid="ref-2">2</xref>,<xref ref-type="bibr" rid="ref-3">3</xref>]. IoWT devices are interconnected by pairing with mobile devices to communicate with external servers to synchronize data, use web and phone services, and so on [<xref ref-type="bibr" rid="ref-4">4</xref>]. As such, mobile devices such as smartphones and tablets are highly interdependent as they serve as convenient gateways to IoT and wearable objects [<xref ref-type="bibr" rid="ref-5">5</xref>]. However, IoWT devices have difficulty using high computing security mechanisms such as Advanced Encryption Standard (AES), Rivest, Shamir, and Adleman (RSA) due to their limited processing power and bandwidth [<xref ref-type="bibr" rid="ref-6">6</xref>]. These characteristics make IoWT devices less secure than other devices, making them vulnerable to cyberattacks [<xref ref-type="bibr" rid="ref-7">7</xref>]. There are various attack methods against IoWT devices, including device disabling, unauthorized traffic access and analysis, and Man-in-The-Middle (MiTM) Attack.</p>
<p>There is an active research effort to analyze cyber threats targeting existing IoT or low-power protocols. Barua et al. [<xref ref-type="bibr" rid="ref-8">8</xref>] proposed the Bluetooth Low Energy (BLE) Threat Model, a comprehensive taxonomy of possible security and privacy threats to the BLE protocol, assuming it communicates with low-power, computationally constrained sensors and IoT devices rather than regular Bluetooth. They categorize security threats into eight categories based on the attacker&#x2019;s approach and the severity of the attack. Griffy-Brown et al. [<xref ref-type="bibr" rid="ref-9">9</xref>] proposed the Enterprise Risk Management Optimization (ERMO) framework, which describes cybersecurity in terms of risk for biodigital systems and represents a lifecycle approach to cyber risk management. The ERMO process consists of eight steps and includes two main goals: risk prioritization through risk analysis and organizational protection and evolution. It also provides a semi-quantitative method to score both risk and reward. The MITRE ATT&#x0026;CK Framework is a security framework developed by MITRE Corporation that categorizes information about different attack techniques [<xref ref-type="bibr" rid="ref-10">10</xref>]. Based on actual cyber-attack cases, the attacker&#x2019;s behavior is categorized into various tactics and techniques. In addition, there are frameworks suitable for different network environments, such as Enterprise and Industrial Control System (ICS). Cybersecurity Competency for Research and Innovation (CMTMF) is a threat modeling framework for mobile systems created by the Cyber security cOmpeteNC fOr Research anD InnovAtion (CONCORDIA) project to highlight the importance of cyber threat intelligence skills [<xref ref-type="bibr" rid="ref-11">11</xref>]. The Wearable Smart Health Device (WSHD) Threat Model examines exploitable aspects of wearable smart health devices, such as sensors connected to the Internet, to monitor the wearer&#x2019;s health and exchange data [<xref ref-type="bibr" rid="ref-12">12</xref>]. The threat model targets the WSHD device-companion app and companion app-cloud communication sections and includes security threats that may occur in WSHD communication. The MEDICALHARM is a threat modeling methodology tailored to identify threats in Modern Medical Devices (MMD) systems [<xref ref-type="bibr" rid="ref-13">13</xref>]. The proposed methodology combines security threats and risk analysis.</p>
<p>However, the following problems exist with IoWT in existing research. Since the threat model is limited to BLE, applying it to security threats in other wireless communication protocols is difficult. The ERMO model is too comprehensive a concept to derive attack tactics and techniques, so it is difficult to classify cyber threats properly. CMTMF is divided into 105 attack actions and 14 tactical categories, but unlike MITER ATT&#x0026;CK, there are no unique tactics. The WSHD Threat Model did not standardize security threats&#x2019; attack tactics and techniques. This renders it impossible to define the scope and characteristics of security threats properly and causes low accuracy in attack identification. The MEDICALHARM has a total of 11 distinguishable attack tactics and techniques, which is very small. Additionally, the selected security threats have inaccurate attack tactics and techniques. For this reason, a cyber threat analysis framework that is specialized for IoWT and can standardize various attack tactics and techniques is needed. Therefore, the low power and communication protocol characteristics of IoWT devices must be considered. Additionally, reliable classification criteria must be selected to identify attack tactics and techniques in IoWT security threats accurately.</p>
<p>In this paper, we propose the Internet of Wearable Things threat analysis frameWork (IWTW) framework, which derives security threats through systematic analysis of IoWT attack cases and possible security threats and performs cyber threat analysis based on them. The methodology for developing the IWTW framework consists of three stages: Analysis, Standardization, and Compilation. In the Analysis phase, we analyze the attack cases performed against IoWT devices and derive the attack process and security threats. It includes the IoWT Attack Cases course, which analyzes possible attack cases against IoWT, and the IoWT Security Threat course, which analyzes potential security threats that may occur in IoWT. In the Standardization step, the data derived from the analysis of attack cases and potential security threats is organized into 3 attack categories, 18 attack tactics, and 68 attack techniques. The IWTW framework is developed in the Compilation step by combining the security threats organized in the previous step. The IWTW framework comprises 18 standardized attack tactics and 68 detailed attack techniques based on three attack categories: Launch on Attack, Expand Attack, and Attack Result. We applied case studies on MiBand 2, Fitbit Charge HR/Surge, Samsung Gear 3, Xiaomi Amazifit, Honor Band 5, Honor Watch ES, and Senbono CF-58 devices to validate the proposed IWTW framework. Afterward, the evaluation results are compared with existing studies, and study limitations are discussed.</p>
<p>The primary contributions of this paper are as follows:
<list list-type="bullet">
<list-item>
<p>We propose a methodology and the IWTW framework based on IoWT attack cases and possible security threats to analyze cyber threats against IoWTs. Through the IWTW framework, security threats can be classified into 3 attack categories, 18 attack tactics, and 68 attack techniques.</p></list-item>
<list-item>
<p>The proposed framework accurately defines the scope and characteristics of attacks by standardizing various attack tactics and techniques used in security threats occurring in the IoWT environment, leading to more accurate attack identification.</p></list-item>
<list-item>
<p>We validated the IWTW framework through case studies that performed attacks targeting actual IoWT devices and derived the strengths and weaknesses of our framework.</p></list-item>
</list></p>
<p>This paper is organized as follows. <xref ref-type="sec" rid="s2">Section 2</xref> provides an overview of IoWT, IoWT network structure, and differences between IoWT and IT networks. <xref ref-type="sec" rid="s3">Section 3</xref> analyzes existing research related to cyber threat analysis and frameworks for IoWT. <xref ref-type="sec" rid="s4">Section 4</xref> presents the methodology and IWTW framework we developed for analyzing cyber threats targeting IoWT. <xref ref-type="sec" rid="s5">Section 5</xref> presents a case study of the IWTW framework. <xref ref-type="sec" rid="s6">Section 6</xref> provides a discussion of this study. <xref ref-type="sec" rid="s7">Section 7</xref> presents conclusions and future work.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Background</title>
<p><xref ref-type="sec" rid="s2">Section 2</xref> reviews the literature on IoWT overview and reference architecture, possible security threats to IoWT devices, and existing threat modeling frameworks.</p>
<p><xref ref-type="fig" rid="fig-1">Fig. 1</xref> provides an overview of wearable devices&#x2019; typical components and communication processes [<xref ref-type="bibr" rid="ref-14">14</xref>&#x2013;<xref ref-type="bibr" rid="ref-16">16</xref>]. The wearable device&#x2019;s sensors, such as accelerometer, gyroscope, and magnetometer, allow you to input data or monitor your activity. Then, it connects with the mobile device by performing a pairing process such as Bluetooth&#x2019;s Generic Attribute Profile (GATT) and Generic Access Profile (GAP). After that, the information from the mobile device, such as a smartphone, is transmitted to the server or Personal Computer (PC) via wireless communication. Finally, the processed data is returned to the paired wearable device or smartphone. The wearable device can directly connect with the mobile device or PC via Wi-Fi (WLAN) based on the wireless module.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Overview of wearable device structure and communication</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-1.tif"/>
</fig>
<p>Meanwhile, wearable devices support different communication ranges. They use various wireless communication protocols such as Near Field Communication (NFC), Wi-Fi, Bluetooth Security measures for wireless data access are essential as they often involve transmitting personal information, such as financial payments, healthcare. However, resource constraints in the form of limited battery, CPU, memory, and device form factors of wearable devices limit the implementation of high-level security mechanisms.</p>
<p>IoWT network topologies are generally classified into three categories based on the network connection structure. <xref ref-type="table" rid="table-1">Table 1</xref> provides information on the technologies typically used for wireless communication in IoWT devices, categorized by interaction method, connection time, and data processing speed. IoWT network topologies are generally categorized into three types based on the network connectivity structure.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>IoWT wireless communication technology</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Ref.</th>
<th>Connection<break/>technology</th>
<th>Interconnection method</th>
<th>Connection distance</th>
<th>Data transfer speed</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-17">17</xref>]</td>
<td>Wi-Fi direct</td>
<td>W2H, W2I, W2W</td>
<td><inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>200</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>m</mml:mtext></mml:mrow></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>250</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>Mbps</mml:mtext></mml:mrow></mml:math></inline-formula></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-18">18</xref>]</td>
<td>BLE</td>
<td>W2H, W2W</td>
<td><inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>300</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>m</mml:mtext></mml:mrow></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>50</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>Mbps</mml:mtext></mml:mrow></mml:math></inline-formula></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-19">19</xref>]</td>
<td>NFC</td>
<td>W2H</td>
<td><inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>0.2</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>m</mml:mtext></mml:mrow></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>424</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>kbps</mml:mtext></mml:mrow></mml:math></inline-formula></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-20">20</xref>]</td>
<td>Zigbee</td>
<td>W2H, W2W</td>
<td><inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>100</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>m</mml:mtext></mml:mrow></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>250</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>kbps</mml:mtext></mml:mrow></mml:math></inline-formula></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-21">21</xref>]</td>
<td>LTE-M</td>
<td>W2I</td>
<td><inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>10</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>km</mml:mtext></mml:mrow></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>1</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>Mbps</mml:mtext></mml:mrow></mml:math></inline-formula></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-21">21</xref>]</td>
<td>NB-IoT</td>
<td>W2I</td>
<td><inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>15</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>m</mml:mtext></mml:mrow></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>250</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>kbps</mml:mtext></mml:mrow></mml:math></inline-formula></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-22">22</xref>]</td>
<td>NR-REDCAP</td>
<td>W2I</td>
<td><inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>10</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>km</mml:mtext></mml:mrow></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:mo>&#x2264;</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mn>150</mml:mn><mml:mspace width="thinmathspace" /><mml:mrow><mml:mtext>Mbps</mml:mtext></mml:mrow></mml:math></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Wearable to Hub (W2H):</bold> Interconnected with a hub, such as a smartphone, PC, or tablet. The purpose is to collect data from IoWT devices and connect them to the external Internet. The hub requires high computing capacity to process the data, including storing and distributing the collected data. It also requires at least two interfaces for data collection and internet connection [<xref ref-type="bibr" rid="ref-16">16</xref>].</p>
<p><bold>Wearble to Infrastructure (W2I):</bold> IoWT devices are directly interconnected to network base stations such as NodeB/eNodeB/gNodeB, or to the Internet such as 3G/4G/5G, Wi-Fi, and each device includes Wi-Fi or cellular connectivity. For example, applications on smartwatches process data sensed by IoWT devices locally and then interact directly with central servers on the Internet [<xref ref-type="bibr" rid="ref-23">23</xref>].</p>
<p><bold>Wearable to Wearable (W2W):</bold> This is the interconnection between wearable devices. It aims to communicate directly between IoWT devices to exchange information. It has good dash time and responsiveness in communication, but it has limitations in resource capacity due to the nature of connecting wearable devices [<xref ref-type="bibr" rid="ref-10">10</xref>,<xref ref-type="bibr" rid="ref-24">24</xref>].</p>
<p><xref ref-type="table" rid="table-2">Table 2</xref> summarizes the differences between IT and wearable networks [<xref ref-type="bibr" rid="ref-25">25</xref>&#x2013;<xref ref-type="bibr" rid="ref-30">30</xref>]. The differences between IT and wearable network communications are as follows: IT networks vary in size depending on whether they are home or business networks and consist of computers, servers, and other interconnected devices to send and receive data and resources [<xref ref-type="bibr" rid="ref-31">31</xref>]. Wearable networks, on the other hand, include wearable devices such as smartwatches, smart glasses, smart bands, and fitness trackers and are smaller than IT networks because they are primarily human-centric connections that monitor the user&#x2019;s physical condition [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-25">25</xref>,<xref ref-type="bibr" rid="ref-26">26</xref>]. Wearable devices also prioritize low power consumption due to battery size constraints, so they often use protocols such as BLE, which are designed to minimize power usage during the communication process [<xref ref-type="bibr" rid="ref-27">27</xref>]. Wearable communications also connect with mobile devices to improve processing performance, as they operate over shorter distances than typical IT communications and have slower data processing speeds due to the miniaturization of the devices [<xref ref-type="bibr" rid="ref-25">25</xref>,<xref ref-type="bibr" rid="ref-28">28</xref>&#x2013;<xref ref-type="bibr" rid="ref-30">30</xref>]. Wearable devices used for health or medical purposes send and receive sensitive data, such as bodily information, making security for wearable networks important [<xref ref-type="bibr" rid="ref-25">25</xref>].</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Summary of differences between IT and wearable network communications</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Difference</th>
<th>IT network</th>
<th>Wearable network</th>
</tr>
</thead>
<tbody>
<tr>
<td>Network size</td>
<td>&#x2022; Various</td>
<td>&#x2022; Usually small<break/>
&#x2002; (e.g., Personal area network (PAN))</td>
</tr>
<tr>
<td>Network performance</td>
<td>&#x2022; High</td>
<td>&#x2022; Low</td>
</tr>
<tr>
<td>Power consumption</td>
<td>&#x2022; High</td>
<td>&#x2022; Low</td>
</tr>
<tr>
<td>Data processing speed</td>
<td>&#x2022; Very fast</td>
<td>&#x2022; Slow</td>
</tr>
<tr>
<td>Connection distance</td>
<td>&#x2022; Very long</td>
<td>&#x2022; Short</td>
</tr>
<tr>
<td>Transmission and reception data</td>
<td>&#x2022; Various</td>
<td>&#x2022; Limited</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3">
<label>3</label>
<title>Related Works</title>
<p><xref ref-type="sec" rid="s3">Section 3</xref> reviews the research related to cyber threat analysis and frameworks for IoWT.</p>
<p>A cyber threat analysis framework is a systematic approach to quickly identifying and managing security threats to a system from external cyberattacks. It is necessary to analyze attack vectors, design defensive techniques against security threats, and implement countermeasures and follow-up actions.</p>
<p>As shown in <xref ref-type="table" rid="table-3">Table 3</xref>, <xref ref-type="sec" rid="s3_1">Sections 3.1</xref> and <xref ref-type="sec" rid="s3_2">3.2</xref> categorize existing research according to the target of threat modeling. Afterwards, we provide examples of cyber threat analysis frameworks and model studies related to medical devices and IoT, including the BLE Threat Model, ERMO, MITRE ATT&#x0026;CK, CONCORDIA&#x2013;CMTMF, Emerging Miniaturized Wireless Biomedical Devices (MWBD), Bhadra, WSHD Threat Model, and MEDICALHARM.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Related literature</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Ref.</th>
<th>Main idea</th>
<th>Framework/model name</th>
<th>Advantage</th>
<th>Disadvantage</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-8">8</xref>]</td>
<td>&#x2022;
Categorizes security<break/>&#x2002; threats targeting<break/>&#x2002; low-power BLE
</td>
<td>BLE threat model</td>
<td>&#x2022; Attack techniques<break/>&#x2002; and detailed<break/>&#x2002; technical<break/>&#x2002; representations
</td>
<td>&#x2022; Limited to<break/>&#x2002; BLE only
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-9">9</xref>]</td>
<td>&#x2022; Provides a foundation<break/>&#x2002; and methodology for<break/>&#x2002; analyzing<break/>&#x2002; cyber-biological risks
</td>
<td>ERMO</td>
<td>&#x2022;
Identify security<break/>&#x2002; threats to<break/>&#x2002; categorize<break/>&#x2002; attack vectors
</td>
<td>&#x2022;
Too comprehensive<break/>&#x2002; methodology
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-10">10</xref>]</td>
<td>&#x2022;
Categorizes attacker<break/>&#x2002; behavior into different<break/>&#x2002; tactics and techniques<break/>&#x2002; based on real-world<break/>&#x2002; cyberattack cases
</td>
<td>MITRE ATT&#x0026;CK</td>
<td>&#x2022;
Systematic<break/>&#x2002; approach<break/>&#x2002; categorized<break/>&#x2002; by attack<break/>&#x2002; tactics and<break/>&#x2002; techniques
</td>
<td>&#x2022;
Does not<break/>&#x2002; consider IoWT
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-11">11</xref>]</td>
<td>&#x2022;
Threat modeling<break/>&#x2002; framework for mobile<break/>&#x2002; systems
</td>
<td>CONCORDIA&#x2013;CMTMF</td>
<td>&#x2022;
Systematic<break/>&#x2002; approach in mobile<break/>&#x2002; systems
</td>
<td>&#x2022;
Does not<break/>&#x2002; consider IoWT
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-12">12</xref>]</td>
<td>&#x2022;
Threat modeling for<break/>&#x2002; WSHD devices
</td>
<td>WSHD threat model</td>
<td>&#x2022;
Identify<break/>&#x2002; vulnerabilities in<break/>&#x2002; WSHD devices
</td>
<td>&#x2022;
Unstandardized<break/>&#x2002; attack tactics and<break/>&#x2002; techniques
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-13">13</xref>]</td>
<td>&#x2022;
Threat modeling<break/>&#x2002; methodology<break/>&#x2002; for MMDs
</td>
<td>MEDICALHARM</td>
<td>&#x2022;
Systematic<break/>&#x2002; approach in<break/>&#x2002; medical devices
</td>
<td>&#x2022;
Few classifiable<break/>&#x2002; attack tactics and<break/>&#x2002; techniques
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-32">32</xref>]</td>
<td>&#x2022;
Propose threat<break/>&#x2002; modeling for mobile<break/>&#x2002; healthcare devices
</td>
<td>Emerging MWBD</td>
<td>&#x2022;
Security threat<break/>&#x2002; identification and<break/>&#x2002; risk management
</td>
<td>&#x2022;
Too comprehensive<break/>&#x2002; modeling
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-33">33</xref>]</td>
<td>&#x2022; Threat modeling<break/>&#x2002; framework for mobile<break/>&#x2002; networks</td>
<td>Bhadra</td>
<td>&#x2022; Systematic<break/>&#x2002; approach in mobile<break/>&#x2002; networks
</td>
<td>&#x2022; Does not<break/>&#x2002; consider IoWT</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s3_1">
<label>3.1</label>
<title>IT, IoT, and Mobile Threat Model &#x0026; Framework</title>
<p>The ERMO framework [<xref ref-type="bibr" rid="ref-9">9</xref>] describes cybersecurity in terms of risk for biodigital systems and points to a lifecycle approach for cyber risk management. Since biodigital systems encompass both life sciences and cybersecurity, risk analysis through this framework includes digital, hardware, and biological assets. Risk in the ERMO process includes two main goals: prioritizing risks through analysis, protecting and evolving the organization, and providing a semi-quantitative way to score both risk and reward. It also provides an initial identification of key exposure variables and loss drivers for biodigital systems. The ERMO Framework&#x2019;s methodology consists of eight steps. Steps 1 and 2 prioritize risks, including cyberbio assets, operations, and liabilities. Step 3 identifies the causes of loss or risk that impact Steps 1 and 2. Step 4 is the consequences of the impacted risks. Step 5 includes controls to minimize loss frequency and/or severity. Steps 6 and 7 assess the damage to components, such as cyberbio systems, subsystems. Step 8 includes implementing and monitoring risk controls and risk financing plans and programs. Based on the proposed methodology, key exposures, exposure variables, and sources of loss can be identified and developed into a risk registry. However, the ERMO model is too broad to categorize the tactics and techniques used against cyber threats properly. Since the threat model does not classify detailed attack tactics and techniques, in-depth cyber-attack analysis is difficult. The study did not include specific attack tactics and techniques to classify. In addition, the proposed framework does not have a validation process, and thus its reliability is low.</p>
<p>The MITRE ATT&#x0026;CK Framework [<xref ref-type="bibr" rid="ref-10">10</xref>] is a security framework developed by MITRE Corporation that categorizes information about different attack techniques. The attacker&#x2019;s behavior is categorized into different tactics and techniques based on actual cyber-attack cases. This framework is used to analyze attack patterns and derive attack behaviors to improve the ability to detect advanced attacks. The MITRE ATT&#x0026;CK database contains useful information on threat modeling languages, such as assets (e.g., computers, services, internal and external networks), attack phases (e.g., spearphishing attachments, user execution), and threat modeling languages. The data can be used to develop various threat models and methodologies. Some frameworks, such as Enterprise and ICS, are appropriate for different network environments. However, the MITER ATT&#x0026;CK Framework does not specialize in IoWT. Because IoWT devices operate in a unique environment due to limitations such as low processing power and bandwidth, applying all attack techniques proposed in existing IT and ICS frameworks is difficult.</p>
<p>CMTMF [<xref ref-type="bibr" rid="ref-11">11</xref>] is a threat modeling framework for mobile systems created by the CONCORDIA project to highlight the importance of cyber threat intelligence techniques. This study focusing on threats to the mobile network itself, the entry points for carrying out attacks were analyzed as follows: the mobile device, the SIM Card, the mobile app, the gNodeB, the IPUPS, the SEPP, and the Network Exposure Function (NEF)-CAPIF. It was developed to address the difficulties in applying existing threat modeling frameworks such as MITRE ATT&#x0026;CK and Bhadra framework to mobile networks. CMTMF is compatible with sub-frameworks of MITRE ATT&#x0026;CK, such as MITRE ATT&#x0026;CK for Enterprise, Mobile, and ICS. CMTMF is divided into 105 attack behaviors and 14 tactic categories, but unlike MITRE ATT&#x0026;CK, there are no unique tactics. Instead, the attacks are characterized by the use of multiple devices on a mobile network and the repetitive nature of the attacks, so the attacks are documented in a step-by-step loop. However, it does not consider the wearable environment. IoWT devices perform special network communications such as BLE, NFC, and Zigbee and operate in the unique environment of wearables. This indicates that existing IT and ICS target threat analysis techniques cannot be applied accurately.</p>
<p>MWBDs [<xref ref-type="bibr" rid="ref-32">32</xref>] are miniaturized mobile healthcare devices used in healthcare services such as telemedicine and have limited resources (size, power, processing, and storage). Due to these characteristics, they pose security risks to the privacy of users while collecting and transmitting patients&#x2019; sensitive personal information. Therefore, this study proposed a methodology to counter cyberattacks on MWBDs. In MWBD, threat modeling, assets, vulnerabilities, threats, attacks, risk classification, and risk assessment are performed. First, assemble a team to perform threat modeling. The threat modeling team should include at least one member from each engineering group involved in hardware, radio links, and software to ensure a solid understanding of the underlying technology. Next, the security assumptions and constraints against which the threat modeling is performed to capture information at the appropriate level of abstraction are identified. The operating environment is analyzed during this process, and security domains/perimeters/use cases are defined. Later, attackers are defined, followed by a systematic analysis of security threats. Finally, once the risks to the system are defined, risk management is performed to assess, monitor, and respond to the risks. This study validated the proposed MWBD threat modeling by conducting a case study on MWBD devices with the following characteristics: Injectable, Ingestible, Implantable, and Wearable. However, this threat modeling methodology is too broad a concept for detailed threat analysis. The proposed threat model did not provide detailed information about attack tactics and techniques to classify cyberattacks in detail. For example, no specific classification has been performed on attacks that occurred during the BLE pairing process between a wireless implantable neural interface system on a chip (SoC) and an external terminal.</p>
<p>The Bhadra framework [<xref ref-type="bibr" rid="ref-33">33</xref>] is a threat modeling framework that classifies publicly known security threats to mobile networks into nine tactical and 55 technical categories. It focuses on 2G, 3G, and 4G technologies based on 3GPP standards. The BHADRA framework identifies a wide range of potential attackers by modeling even attacks that have not been observed in practice. The threat modeling methodology consists of three phases, and the attack lifecycle proceeds in the following order: attack mounting, attack execution, and attack consequences. Attack mounting is when an attacker finds a target&#x2019;s weaknesses, gains initial access to the target, and establishes a persistent presence. Attack execution is where the attacker exploits vulnerabilities in the system to extend control from initial access to the target. Attack results are when the attacker achieves their tactical objectives, primarily related to information gathering and other attack impacts. However, the proposed Bhadra framework has limitations when applied to IoWT. For example, Attack Progression&#x2019;s SS7-based techniques include protocols such as the Signaling Connection Control Part (SCCP) and Transaction Capabilities Application Part (TCAP). Security threats cannot be identified since IoWT devices do not support these protocols.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>IoWT Threat Model &#x0026; Framework</title>
<p>The BLE Threat Model [<xref ref-type="bibr" rid="ref-8">8</xref>] represents a comprehensive categorization of security and privacy threats to the BLE protocol, which is based on communicating with low-power, computationally limited sensors and IoT devices rather than regular Bluetooth. First, we categorize the security threats into eight categories based on the attacker&#x2019;s approach and the severity of the attack. Attacks that perform similar attack techniques are combined into one category. The security threats are classified as follows: Passive Eavesdropping, which occur due to the simplified and predictable design of BLE channel hopping; Active Eavesdropping, where an attacker positions itself in the BLE communication path to steal information; and Device Cloning, where an attacker causes damage by pretending to be a trusted device of the target, cryptographic vulnerability, which exploits cryptographic weaknesses and flaws in the BLE protocol; DoS, which occurs at the physical and network layers to prevent the intended user from using system resources; Distortion, which attacks the services of a BLE device by exploiting vulnerabilities in BLE protocol services and BLE data packets; and Surveillance, which is used to identify BLE devices. However, since the BLE threat model targets only a single protocol, it is unsuitable for security threats to various protocols used in IoWT. Many communication protocols are used between wearable devices and mobile devices, such as NFC, Zigbee, Wi-Fi Direct, and NB-IoT. Therefore, it must be possible to target multiple protocols.</p>
<p>The WSHD Threat Model [<xref ref-type="bibr" rid="ref-12">12</xref>] examines exploitable aspects of wearable smart health devices, such as sensors connected to the Internet, to monitor the wearer&#x2019;s health and exchange data. The proposed threat model represents the companion apps, cloud, and communication protocols of the WSHD system. The threat model targets the following two communication sections, which include security threats that may occur in communications established in the WSHD system: WSHD device-companion app and companion app-cloud. This study selected Garmin Connect, Polar Beat, Mysugr, and Finger Oximeter-SpO2 companion apps to verify the proposed threat model and analyze their vulnerabilities. The programs and tools used are Wireshark, BLECryptracer, and Logcat. The security threats identified include network packet sniffing, traffic capture and manipulation, data collection using valid APIs, and encryption vulnerabilities. However, a formalization process was not performed on the attack tactics and techniques used in security threats. If there is no formalization process for attacks, the scope and characteristics of security threats cannot be properly defined, which reduces the accuracy of attack identification.</p>
<p>The MEDICALHARM [<xref ref-type="bibr" rid="ref-13">13</xref>] is a threat modeling methodology tailored to identify threats in MMD systems. The proposed methodology combines security threats and risk analysis. The primary security threats are security and privacy threats and include Modification breach, Exposure of sensitive or personal data, Denial of service, Impact of threat, Component threat, Access breach, Likelihood of threat, Harm to the patient, Assumptions and constraints about the system, Relevant in-depth threat, Monitoring and logging. The risk analysis adopts the semi-quantitative analysis recommended by the National Institute of Standards and Technology (NIST). This study uses CVSS scores to assess the risk of all identified vulnerabilities, combined with qualitative likelihood and impact measures. However, the proposed threat modeling has few distinguishable attack tactics and techniques, totaling 11. In addition, the selected security threats are not at the same level, so the scope of analysis is different. For example, Denial of service is included in the attack technique, but the Component threat is included in the attack tactic. Therefore, the number of attack tactics and techniques that can actually be classified is smaller.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Framework for IoWT Cyber Threat Analysis</title>
<p><xref ref-type="sec" rid="s4">Section 4</xref> introduces IWTW, a cyber threat analysis framework. Existing cyber threat analysis frameworks are not specialized for IoWT environments, which makes it difficult to analyze attacks. Therefore, we propose IWTW, a framework for analyzing cyber threats targeting IoWT. <xref ref-type="sec" rid="s4">Section 4</xref> consists of the development methodology, the analysis of IoWT attack cases, the formalization of attack tactics and techniques in threat data, and a detailed description of the developed IWTW framework. Most attack tactical categories applied in the IWTW framework are based on the MITRE ATT&#x0026;CK framework. However, MITRE ATT&#x0026;CK does not cover frameworks based on IoT or IoWT systems, so it cannot properly evaluate IoWT attacks. Therefore, the IWTW Framework modifies existing attack tactics and techniques or adds new attack tactics to fit the IoWT environment. The IWTW Framework may be regularly updated with data on attack tactics and techniques in the future.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Methodology for Developing IWTW Framework</title>
<p><xref ref-type="sec" rid="s4_1">Section 4.1</xref> describes the IWTW cyber threat analysis framework. IoWT attack cases, IoWT security threats, and attack tactics and techniques were derived from a variety of literature, including technical reports, white papers, studies, and academic publications. The methodology is divided into three phases. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> shows an overview of the IWTW framework development methodology.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Methodology for developing IWTW framework</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-2.tif"/>
</fig>
<p><bold>Step 1 Analysis:</bold> Analyze the attack cases and derive the attack process performed against IoWT devices.</p>
<p><bold>Step 2 Standardization:</bold> Standardize attack tactics and techniques derived from the analysis of attack cases and potential security threats.</p>
<p><bold>Step 3 Compilation:</bold> Combining the security threats formalized in the previous step to propose an IWTW framework.</p>
<p>The proposed methodology is divided into two areas: Clustering and Development. First, the Clustering area stores data derived from the analysis of attack cases targeting IoWT and potential security threats that may occur in IoWT. The clustering area requires continuous updates in response to new cyber-attacks. In addition, it consists of two parts: Analysis and Standardization. First, the Analysis part includes IoWT Attack Cases, which analyzes attack cases that can occur against IoWT, and IoWT Security Threat, which analyzes potential security threats that can occur in IoWT. IoWT Attack Cases is based on actual attacks against IoWT and analyzes the attack process and security threats. IoWT Security Threat is not derived from the attack cases that were previously analyzed, but it analyzes the security threats that can be caused by potential attackers targeting IoWT. The Standardization part performs the process of standardizing the attack categories, attack tactics, and attack techniques derived from the Analysis part.</p>
<p>The equation for the proposed methodology is as follows: The set of security threats derived through IoWT Attack Case and IoWT Security Threat are X and Y. IoWT attack data is collected as much as <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mi>i</mml:mi></mml:math></inline-formula>. Z means set in which duplicates of the derived security threats have been removed. The set Z is defined as follows: <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:mi>Z</mml:mi><mml:mo>=</mml:mo><mml:munderover><mml:mo>&#x22C3;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:munderover><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x222A;</mml:mo><mml:msub><mml:mi>Y</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. Attack categories are defined as follows: Launch on Attack, Expand Attack, and Attack Result are expressed as <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>. The elements <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> of set Z can be classified into <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. The relationship between <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is defined as follows: <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mi mathvariant="normal">&#x2200;</mml:mi><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mi>Z</mml:mi><mml:mo>,</mml:mo><mml:mi mathvariant="normal">&#x2203;</mml:mi><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mo fence="false" stretchy="false">{</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo fence="false" stretchy="false">}</mml:mo><mml:mspace width="negativethinmathspace" /><mml:mo>&#x003A;</mml:mo><mml:mrow><mml:msub><mml:mi>z</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. Attack tactics classified within attack category <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> to <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. Attack Techniques classified within attack tactics <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> to <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> contains attack tactics <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> contains attack techniques <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. The relational expressions for <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are defined as follows: <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:mi mathvariant="normal">&#x2200;</mml:mi><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mi mathvariant="normal">&#x2203;</mml:mi><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2286;</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x003A;</mml:mo><mml:mi mathvariant="normal">&#x2200;</mml:mi><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi mathvariant="normal">&#x2203;</mml:mi><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2286;</mml:mo><mml:msub><mml:mi>b</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula></p>
<p>In the development area, a cyber threat analysis framework for IoWT is developed based on threat analysis data from the clustering area. By combining the standardized attack categories, attack tactics, and attack techniques, the IWTW framework is finally developed.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Step 1: Analyze IoWT Attack Cases and Possible IoWT Security Threats</title>
<p><xref ref-type="sec" rid="s4_2">Section 4.2</xref> reviews IoWT attack cases and analyzes potential IoWT security threats.</p>
<sec id="s4_2_1">
<label>4.2.1</label>
<title>IoWT Attack Cases</title>
<p>IoWT devices typically collect data and process important information from clients. Popular types of IoWT devices include NFC Smart Ring, Smart Posture Trainer, Gaming Simulator, Smart Shoes, Smart Jewelry, Fitness Tracker, Smart Band for Blinds, Smart Clothing, GPS Tracking Band [<xref ref-type="bibr" rid="ref-19">19</xref>,<xref ref-type="bibr" rid="ref-20">20</xref>]. <xref ref-type="table" rid="table-4">Table 4</xref> analyzes the attack cases against these IoWT assets. The attacks are categorized into IoWT assets, attack processes, and threat techniques based on the targets and attack methods.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Cases of cyber-attack targeting IoWT device</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Ref.</th>
<th>IoWT asset</th>
<th>Attack process</th>
<th>Security threats</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-8">8</xref>]</td>
<td>Smart watch</td>
<td>
&#x2022; Through the GATT protocol,<break/>&#x2002; neighboring wearable devices<break/>&#x2002; broadcast a signal, and the master<break/>&#x2002; (Mobile) connects to the signal.<break/>&#x2022; Exploit a vulnerability in the<break/>&#x2002; internal mechanism of the GATT<break/>&#x2002; protocol where services can be<break/>&#x2002; easily cloned and spoofed.<break/>&#x2022; The attacker uses a fake mobile<break/>&#x2002; app to impersonate a BLE<break/>&#x2002; wearable device, and the master<break/>&#x2002; connects to the malicious device.<break/>&#x2022; The malicious device propagates<break/>&#x2002; the connection with the original<break/>&#x2002; device and performs an ITM<break/>&#x2002; attack.</td>
<td>&#x2022; Man-in-the-middle<break/>&#x2002; attack, protocol<break/>&#x2002; vulnerability,<break/>&#x2002; eavesdropping</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-34">34</xref>]</td>
<td>Smart watch</td>
<td>&#x2022; Use the Bluefruit LE sniffer tool<break/>&#x2002; to capture BLE traffic.<break/>&#x2022; Analyze the data packets using<break/>&#x2002; wireshark, an open-source packet<break/>&#x2002; analyzer.<break/>&#x2022; Identify smart wearable device<break/>&#x2002; type and version via static<break/>&#x2002; addresses in the analyzed<break/>&#x2002; packet data.</td>
<td>&#x2022; Passive sniffing attack,<break/>&#x2002; traffic capture</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-35">35</xref>]</td>
<td>Smart band</td>
<td>&#x2022; Normal use between wearable<break/>&#x2002; devices and mobile (gateway).<break/>&#x2022; The cracked app is installed on the<break/>&#x2002; attacker&#x2019;s smartphone.<break/>&#x2022; Forced pairing between wearable<break/>&#x2002; device and attacker smartphone<break/>&#x2002; via cracked app.<break/>&#x2022; Exploitation of a vulnerability<break/>&#x2002; where the wearable device and<break/>&#x2002; smartphone do not authenticate<break/>&#x2002; each other every time they<break/>&#x2002; connect, preventing the wearable<break/>&#x2002; device from distinguishing<break/>&#x2002; between the real user&#x2019;s smartphone<break/>&#x2002; and the attacker&#x2019;s smartphone.</td>
<td>&#x2022; Malicious app, illegal<break/>&#x2002; device pairing, absence of<break/>&#x2002; certification</td>
</tr>
<tr>
<td></td>
<td></td>
<td>&#x2022; Collecting health data from the<break/>&#x2002; wearable device, such as the user&#x2019;s<break/>&#x2002; heart rate, physical activity, and<break/>&#x2002; calorie consumption.<break/>&#x2022; The collected data is sent to the<break/>&#x2002; attacker&#x2019;s smartphone.</td>
<td></td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-36">36</xref>]</td>
<td>Smart band</td>
<td>&#x2022; Detect smart band devices using<break/>&#x2002; vulnerability scanning tools.<break/>&#x2022; Eavesdropping the BLE protocol.<break/>&#x2022; Using the Adafruit BLE sniffer<break/>&#x2002; nRF51822 in an Ubuntu virtual<break/>&#x2002; machine on VMWare to sniff<break/>&#x2002; packets exchanged during BLE<break/>&#x2002; communication.<break/>&#x2022; Performed healthcare-related data<break/>&#x2002; exfiltration and packet injection,<break/>&#x2002; including user steps, distance<break/>&#x2002; traveled, calories burned.</td>
<td>&#x2022; Scanning, sniffing, data<break/>&#x2002; extraction, packet<break/>&#x2002; injection</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-37">37</xref>]</td>
<td>Smart watch</td>
<td>&#x2022; Performing active scanning<break/>&#x2002; utilizing the Nmap security<break/>&#x2002; scanner tool modified to run in an<break/>&#x2002; android wear environment.<break/>&#x2022; A ZGPAX S8 smartwatch/phone<break/>&#x2002; device runs a malicious access<break/>&#x2002; point using the same SSID name<break/>&#x2002; as an HP OfficeJet 8610 Wi-Fi<break/>&#x2002; direct printer.<break/>&#x2022; Selecting and connecting to a fake<break/>&#x2002; Wi-Fi direct printer based on its<break/>&#x2002; SSID name when a victim<break/>&#x2002; attempts to send a print job from<break/>&#x2002; their laptop.<break/>&#x2022; Sending a printout containing<break/>&#x2002; sensitive data to the attacker in a<break/>&#x2002; file format such<break/>&#x2002; as PDF.</td>
<td>&#x2022; Scanning, malicious app,<break/>&#x2002;	 eavesdroppinl</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-38">38</xref>]</td>
<td>Fitness tracker</td>
<td>&#x2022; Tracking the victim using a<break/>&#x2002; vulnerability in the Fitbit tracker<break/>&#x2002; that always uses the same device<break/>&#x2002; address.<break/>&#x2022; Connect to a Fitbit tracker paired<break/>&#x2002; to a mobile device using the<break/>&#x2002; GattTool utility.<break/>&#x2022; Automated shell script that<break/>&#x2002; continuously reads the tracker&#x2019;s<break/>&#x2002; characteristics and causes it to<break/>&#x2002; respond to all requests (DoS<break/>&#x2002; attack, reducing availability).</td>
<td>&#x2022; Same device address,<break/>&#x2002; protocol vulnerability,<break/>&#x2002; vulnerability tool,<break/>&#x2002; automated shell script,<break/>&#x2002; DoS, preventing service</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-39">39</xref>]</td>
<td>Fitness tracker</td>
<td>&#x2022; Blocks multiple services, including<break/>&#x2002; phone, increasing battery<break/>&#x2002; utilization and causing pairing<break/>&#x2002; blocking.<break/>&#x2022; The microprocessor does not have<break/>&#x2002; the necessary protection to lock<break/>&#x2002; out external reads and writes to<break/>&#x2002; internal flash, targets<break/>&#x2002; Nike&#x002B;Fuelband devices with USB<break/>&#x2002; connectors.<break/>&#x2022; Uses standard ST microelectronic<break/>&#x2002; development tools to communicate<break/>&#x2002; with the STM32 system and obtain<break/>&#x2002; the device&#x2019;s firmware.</td>
<td>&#x2022; USB connect, corrupted<break/>&#x2002; firmware, string<break/>&#x2002; replacement</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-40">40</xref>]</td>
<td>Fitness tracker, smart watch</td>
<td>&#x2022; Apply the modified firmware via<break/>&#x2002; the USB connector to perform<break/>&#x2002; the attack (change strings).<break/>&#x2022; Ubertooth one is a BLE antenna<break/>&#x2002; that provides spectrum analysis<break/>&#x2002; (similar to sniffing) of the 2.4 GHz<break/>&#x2002; radio band in a simple<break/>&#x2002; plug-and-play USB dongle.<break/>&#x2022; Targets Jawbone UP, pebble steel,<break/>&#x2002; and Fitbit charge HR wearables.<break/>&#x2022; Enable Ubertooth on the attack<break/>&#x2002; system using the command<break/>&#x2002; ubertooth-btle-fc/tmp/pipe.<break/>&#x2022; Activate mobile&#x2019;s bluetooth<break/>&#x2002; feature to pair the phone to the<break/>&#x2002; device using the specific pairing<break/>&#x2002; process for each wearable device.<break/>&#x2022; Ubertooth is actually responsible<break/>&#x2002; for sending data from the wearable<break/>&#x2002; to the vendor-specific app on the<break/>&#x2002; phone, while Ubertooth continues<break/>&#x2002; to sniff and capture the packets<break/>&#x2002; going back and forth.</td>
<td>&#x2022; Protocol vulnerability,<break/>&#x2002; USB connect, sniffing,<break/>&#x2002; data extraction, MITM<break/>&#x2002; attack</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_2_2">
<label>4.2.2</label>
<title>IoWT Security Threat</title>
<p>In addition to the examples of IoWT attacks analyzed in <xref ref-type="sec" rid="s4_2_1">Section 4.2.1</xref>, we also considered IoWT attacks that potential attackers or security threats could cause. <xref ref-type="table" rid="table-5">Table 5</xref> shows the potential security threats and their descriptions for IoWT, derived from a literature review of papers, studies, and technical reports related to cybersecurity threats to IoWT. The possible security threats were analyzed by considering confidentiality, integrity, and availability issues for IoWT [<xref ref-type="bibr" rid="ref-41">41</xref>,<xref ref-type="bibr" rid="ref-42">42</xref>]. Confidentiality breaches include unauthorized access to resources by unauthorized users, and related security threats include access to user information, such as accessing and analyzing communication traffic between wearable devices, eavesdropping, and information-gathering attacks. Integrity breaches involve modifying sensitive information collected from wearable devices, such as user physical and medical information, and related security threats include reply, modification, and masquerade attacks on wireless communications. Availability breaches involve causing a wearable device to behave erratically or block communication, and related security threats include denial-of-service attacks.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Potential security threats targeting IoWT device</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Ref.</th>
<th>Security threat</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>[<xref ref-type="bibr" rid="ref-43">43</xref>]</td>
<td>Active sniffing</td>
<td>&#x2022; An attacker impersonates a legitimate device or actively<break/>&#x2002; manipulates connection parameters.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-44">44</xref>]</td>
<td>Authentication bypass</td>
<td>&#x2022; Successful exploitation of this vulnerability will cause the<break/>&#x2002; access control functionality of certain applications to fail.<break/>&#x2022; (e.g., Huawei children smart watch (Simba-AL00)<break/>&#x2002; 1.1.1.274).</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-45">45</xref>]</td>
<td>Automated shell script</td>
<td>&#x2022; Mimics a DoS attack to initiate a connection request and<break/>&#x2002; read the characteristics of the wearable device.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-46">46</xref>]</td>
<td>Bluebugging</td>
<td>&#x2022; Allow an attacker to take control of a Bluetooth-enabled<break/>&#x2002; device without the user&#x2019;s knowledge. Exploit vulnerabilities<break/>&#x2002; in the Bluetooth protocol or device firmware to remotely<break/>&#x2002; execute commands.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-47">47</xref>]</td>
<td>Command injection</td>
<td>&#x2022; An attack that aims to execute arbitrary commands on the<break/>&#x2002; host operating system through a vulnerable application.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-48">48</xref>]</td>
<td>Data extraction</td>
<td>&#x2022; Used by attackers to steal data from the network.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-49">49</xref>]</td>
<td>Denial of service</td>
<td>&#x2022; Sends many requests to the target device in a short time or<break/>&#x2002; sends requests to the target device that it does not know<break/>&#x2002; how to process.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-50">50</xref>]</td>
<td>Firmware access</td>
<td>&#x2022; Successful access to firmware, which can lead to future<break/>&#x2002; updates and increased privileges for the attacker.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-51">51</xref>]</td>
<td>Firmware corruption</td>
<td>&#x2022; The attacker manipulates, overwrites, or corrupts the<break/>&#x2002; firmware to deny use of the system or device.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-52">52</xref>]</td>
<td>Fixed device address</td>
<td>&#x2022; Random address programmed or generated by the device<break/>&#x2002; at runtime on a BLE device.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-53">53</xref>]</td>
<td>Illegal device pairing</td>
<td>&#x2022; The attacker attempts to connect to a BLE-enabled device<break/>&#x2002; without user knowledge or consent.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-54">54</xref>]</td>
<td>Illegal filming</td>
<td>&#x2022; Abuse the recording capabilities of smart glasses to illegally<break/>&#x2002; take photos and videos.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-55">55</xref>]</td>
<td>Information gathering</td>
<td>&#x2022; Gather information about wearable devices and use the<break/>&#x2002; information to analyze the vulnerabilities of the device and<break/>&#x2002; increase the number of possible ways to attack it.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-56">56</xref>]</td>
<td>Leaky BTLE</td>
<td>&#x2022; The number of TKs that can be used to generate STK in<break/>&#x2002; the STK generation stage is small.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-57">57</xref>]</td>
<td>Location tracking</td>
<td>&#x2022; Leveraging BLE used in wearable devices to track users by<break/>&#x2002; intercepting and analyzing signals emitted for legitimate<break/>&#x2002; functions such as device location services.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-58">58</xref>]</td>
<td>Malicious app</td>
<td>&#x2022; Malicious apps are installed on mobile devices and forced<break/>&#x2002; to connect with wearable devices, compromising data<break/>&#x2002; security.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-59">59</xref>]</td>
<td>Malware attack</td>
<td>&#x2022; Malware is installed on a mobile device and forced to<break/>&#x2002; connect with a wearable device, compromising the wearable<break/>&#x2002; device&#x2019;s sensors.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-60">60</xref>]</td>
<td>Masquerade attack</td>
<td>&#x2022; The attacker impersonates a legitimate IoWT device or<break/>&#x2002; user to gain unauthorized access or manipulate the system.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-61">61</xref>]</td>
<td>MITM attack</td>
<td>&#x2022; Occurs when an attacker intercepts and alters<break/>&#x2002; communications between two parties, acting as an<break/>&#x2002; unwitting intermediary. Used to intercept authentication<break/>&#x2002; credentials, session keys, or other sensitive data exchanged<break/>&#x2002; during the pairing process.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-62">62</xref>]</td>
<td>Modification attack</td>
<td>&#x2022; Since data transfer between wearable devices is performed<break/>&#x2002; over the air, an attacker can intercept the wearable device&#x2019;s<break/>&#x2002; traffic exchange or modify the contents of the exchange<break/>&#x2002; packets after gaining access to the information.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-63">63</xref>]</td>
<td>Non-authentication</td>
<td>&#x2022; Wearable devices lack authentication mechanisms.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-64">64</xref>]</td>
<td>Non-encrypted data</td>
<td>&#x2022; Poor implementation of encryption in communication<break/>&#x2002; protocols used in wearable devices</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-65">65</xref>]</td>
<td>Packet injection</td>
<td>&#x2022; Intentionally sending altered or manipulated data packets<break/>&#x2002; to manipulate or disrupt the normal operation of the<break/>&#x2002; wearable device.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-66">66</xref>]</td>
<td>Passive sniffing</td>
<td>&#x2022; The attacker passively intercepts communications without<break/>&#x2002; actively participating in the connection. Use of specialized<break/>&#x2002; hardware or software tools that can capture packets.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-67">67</xref>]</td>
<td>Physical access</td>
<td>&#x2022; Physically accessing the wearable device, such as via USB,<break/>&#x2002; to perform physical compromise and spoofing attacks.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-68">68</xref>]</td>
<td>Replay attack</td>
<td>&#x2022; An attacker captures packets and retransmits them to the<break/>&#x2002; target for malicious purposes.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-69">69</xref>]</td>
<td>Service stop</td>
<td>&#x2022; The attacker stops or disables services on the system so that<break/>&#x2002; legitimate users cannot use those services.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-70">70</xref>]</td>
<td>Third-party</td>
<td>&#x2022; Passing key information such as personal information and<break/>&#x2002; wearable device key information to third parties, but the<break/>&#x2002; data is stored in plain text and is vulnerable.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-71">71</xref>]</td>
<td>Traffic analysis</td>
<td>&#x2022; Analyze communication traffic from captured wearable<break/>&#x2002; devices to gain access to sensitive data, such as user activity<break/>&#x2002; in network traffic.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-72">72</xref>]</td>
<td>Traffic capture</td>
<td>&#x2022; A tool like pcap can be used to capture communication<break/>&#x2002; traffic from a wearable device.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-73">73</xref>]</td>
<td>Unauthorized access</td>
<td>&#x2022; Gain unauthorized access to the wearable device or<break/>&#x2002; network to prepare for further attacks.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-74">74</xref>]</td>
<td>Unsecure network</td>
<td>&#x2022; Data is transmitted over an unsecured network or<break/>&#x2002; in an unencrypted format.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-75">75</xref>]</td>
<td>Unsecure PIN</td>
<td>&#x2022; Lack of authentication due to unsecured PIN systems<break/>&#x2002; within the wearable device.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-76">76</xref>]</td>
<td>Vulnerable protocol</td>
<td>&#x2022; Security vulnerabilities in communication protocols<break/>&#x2002; between wearable devices, such as MQTT, BLE.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-77">77</xref>]</td>
<td>Weaponization</td>
<td>&#x2022; Attacking a wearable device, such as a wearable medical<break/>&#x2002; device, and then manipulating it to perform malicious<break/>&#x2002; behavior causing actual damage.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-78">78</xref>]</td>
<td>Wireless access</td>
<td>&#x2022; Communication methods based on wireless LAN<break/>&#x2002; standards such as Wi-Fi Direct and BLE. Wearable devices<break/>&#x2002; connected to these wireless access points can be attacked.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Step 2: Standardization of Attack Tactics and Techniques</title>
<p>In this session, we will formalize the attack tactics and techniques derived from our analysis of attack cases and potential security threats against IoWT devices in <xref ref-type="sec" rid="s3_2">Section 3.2</xref>. Attack categories represent the initiation, progression, and consequence phases of an attack. Attack tactics represent the attacker&#x2019;s behavior in accordance with the attack goal. Attack techniques represent how the attacker achieves the attack tactic against the goal, and there are various attack techniques for each attack tactic. This study referenced the MITRE ATT&#x0026;CK Framework to formalize attack tactics and attack techniques but did not include them in the formalization process if they are not applicable or not applicable to IoWT devices.</p>
<sec id="s4_3_1">
<label>4.3.1</label>
<title>Launch on Attack</title>
<p>Launch on Attack is categorized into three attack tactics: Reconnaissance, Resource Development, and Initial Access. It represents a possible security threat in the early stages of an attack, such as when an attacker discovers a security weakness in a target. The attack can be expanded based on the information gained during this phase.</p>
<p><bold>Reconnaissance</bold> is an attack tactic that gathers information that can be used in an attack. It includes the Exploitation of Wireless Device Configuration, Active Scanning, and Passive Scanning attack techniques. <xref ref-type="table" rid="table-6">Table 6</xref> shows the attack techniques used in the Reconnaissance tactic and their descriptions.</p>
<table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>Attack techniques and detailed descriptions used in Reconnaissance</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">Reconnaissance</td>
<td>[<xref ref-type="bibr" rid="ref-79">79</xref>]</td>
<td>Exploitation of wireless device configuration</td>
<td>&#x2022; It filters and analyzes wireless network traffic to leverage specific components such as source and destination addresses, protocols used, and data payloads.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-80">80</xref>]</td>
<td>Active scanning</td>
<td>&#x2022; Unlike other forms of reconnaissance that do not involve direct interaction, scanning attacks involve the attacker probing the victim&#x2019;s infrastructure through network traffic.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-81">81</xref>]</td>
<td>Passive scanning</td>
<td>&#x2022; In a scanning attack, the attacker sends standard communication messages to the target&#x2019;s wearable device and gathers the necessary public information from the returned response messages.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Resource Development</bold> is an attack tactic in which an attacker creates, purchases, compromises, or steals resources such as tools or vulnerabilities that can be used in an attack, and includes the Obtain Capabilities, Develop Capabilities, and Stage Capabilities attack techniques. <xref ref-type="table" rid="table-7">Table 7</xref> shows the attack techniques used in the Reconnaissance attack tactic and their detailed descriptions.</p>
<table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>Attack techniques and detailed descriptions used in resource development</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">Resource development</td>
<td>[<xref ref-type="bibr" rid="ref-82">82</xref>]</td>
<td>Obtain<break/>capabilities</td>
<td>&#x2022; The attacker obtains information<break/>&#x2002; about software tools or<break/>&#x2002; vulnerabilities needed for the<break/>&#x2002; attack<break/> &#x2002;(e.g., purchased, downloaded,<break/>&#x2002; stolen).</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-83">83</xref>]</td>
<td>Develop<break/>capabilities</td>
<td>
&#x2022; The attacker builds the software<break/>&#x2002; tools needed for the attack or<break/>&#x2002; discovers vulnerabilities.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-84">84</xref>]</td>
<td>Stage<break/>capabilities</td>
<td>&#x2022; The attacker deploys the<break/>&#x2002; capabilities required for the attack<break/>&#x2002; into the target&#x2019;s network<break/>&#x2002; infrastructure.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Initial Access</bold> is an attack tactic for attack vectors used to gain an initial foothold within a mobile or wearable device network. It includes the Exploit Public-Facing Application, Deliver Malicious App, Network Configuration Manipulation, and Replication Through Removable Media attack techniques. <xref ref-type="table" rid="table-8">Table 8</xref> shows the attack techniques used in the Initial Access attack tactic and their detailed descriptions.</p>
<table-wrap id="table-8">
<label>Table 8</label>
<caption>
<title>Attack techniques and detailed descriptions used in initial access</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="4">Initial access</td>
<td>[<xref ref-type="bibr" rid="ref-85">85</xref>]</td>
<td>Exploit public-facing application</td>
<td>
&#x2022; An attacker attempts to exploit a<break/>&#x2002; weakness in a host or system<break/>&#x2002; connected to the internet to gain<break/>&#x2002; initial access to a network. This<break/>&#x2002; includes vulnerabilities in<break/>&#x2002; communication protocols (e.g.,<break/>&#x2002; GATT) and applications for<break/>&#x2002; wearable devices.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-86">86</xref>]</td>
<td>Deliver malicious app</td>
<td>
&#x2022; Malicious or cracked applications<break/>&#x2002; are installed on a wearable or<break/>&#x2002; mobile device through legitimate<break/>&#x2002; channels.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-87">87</xref>]</td>
<td>Network configuration manipulation</td>
<td>
&#x2022; An attacker can manipulate the<break/>&#x2002; configuration of a network to run<break/>&#x2002; a malicious access point by<break/>&#x2002; manipulating the SSID name of a<break/>&#x2002; malicious wearable device to be the<break/>&#x2002; same SSID as the target&#x2019;s Wi-Fi<break/>&#x2002; direct printer.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-88">88</xref>]</td>
<td>Replication through removable media</td>
<td>
&#x2022; The attacker exploits or copies<break/>&#x2002; malicious code onto a device<break/>&#x2002; connected via USB and moves it to<break/>&#x2002; the wearable device. The attacker<break/>&#x2002; can then attempt to exploit the<break/>&#x2002; device by accessing stored data.
</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_3_2">
<label>4.3.2</label>
<title>Expand Attack</title>
<p>The Expand Attack phase extends the attack process to the attacker&#x2019;s intended goal through various methods, including vulnerability exploitation, after successful initial access to the target. Expand Attack is categorized into nine attack tactics: Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, and Command and Control.</p>
<p><bold>Execution</bold> is an attack tactic that involves executing code and files to control a wearable device and includes the Application Layer Protocol, Native API, Command and Scripting Interpreter, Device Synchronization, and Firmware Update attack techniques. <xref ref-type="table" rid="table-9">Table 9</xref> shows the attack techniques used in executing the attack tactics and their detailed descriptions.</p>
<table-wrap id="table-9">
<label>Table 9</label>
<caption>
<title>Attack techniques and detailed descriptions used in execution</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="5">Execution</td>
<td>[<xref ref-type="bibr" rid="ref-89">89</xref>]</td>
<td>Application layer protocol</td>
<td>
&#x2022; Installing and running malicious or<break/>&#x2002; cracked applications to perform<break/>&#x2002; unauthorized activities.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-90">90</xref>]</td>
<td>Native API</td>
<td>
&#x2022; Execute basic system commands or<break/>&#x2002; API calls to enable packet capture on<break/>&#x2002; the Ubertooth device, which is<break/>&#x2002; responsible for executing functions on<break/>&#x2002; the wearable device.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-91">91</xref>]</td>
<td>Command and scripting interpreter</td>
<td>
&#x2022; Exploit vulnerabilities in applications<break/>&#x2002; to execute arbitrary commands.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-92">92</xref>]</td>
<td>Device synchronization</td>
<td>
&#x2022; During the synchronization process<break/>&#x2002; between a wearable device and a<break/>&#x2002; paired mobile device, if the data being<break/>&#x2002; synchronized contains an executable<break/>&#x2002; file, malicious code can be delivered<break/>&#x2002; under the guise of a synchronization<break/>&#x2002; operation.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-93">93</xref>]</td>
<td>Firmware<break/>update</td>
<td>
&#x2022; The attacker spoofs update<break/>&#x2002; notifications or compromises the<break/>&#x2002; wearable device&#x2019;s update mechanism<break/>&#x2002; to execute a malicious firmware<break/>&#x2002; installation of the attacker&#x2019;s choosing.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Persistence</bold> is an attack tactic for accessing, working with, or changing the configuration of a wearable device that requires an attacker to have a persistent presence on the device. It includes Boot or Logon Autostart Execution and Subvert Trust Controls attack techniques. <xref ref-type="table" rid="table-10">Table 10</xref> shows the attack techniques used in the Persistence attack tactic and their detailed descriptions.</p>
<table-wrap id="table-10">
<label>Table 10</label>
<caption>
<title>Attack techniques and detailed descriptions used in persistence</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="2">Persistence</td>
<td>[<xref ref-type="bibr" rid="ref-94">94</xref>]</td>
<td>Boot or logon autostart execution</td>
<td>
&#x2022; An attacker configures system<break/>&#x2002; settings to automatically run a<break/>&#x2002; program during system boot or logon<break/>&#x2002; to maintain persistence on a<break/>&#x2002; compromised system or gain a higher<break/>&#x2002; privilege level. A wearable device is<break/>&#x2002; connected to a USB or other device to<break/>&#x2002; autorun.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-95">95</xref>]</td>
<td>Subvert trust controls</td>
<td>
&#x2022; Weaken security controls that warn of<break/>&#x2002; untrusted activity or prevent<break/>&#x2002; untrusted applications from running.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Privilege Escalation</bold> is an attack tactic that allows an attacker to gain higher levels of privileges on a device and includes Weaken Authentication, Process Injection, and Manipulated Authentication attack techniques. <xref ref-type="table" rid="table-11">Table 11</xref> shows the attack techniques used in the Privilege Escalation attack tactic and their detailed descriptions.</p>
<table-wrap id="table-11">
<label>Table 11</label>
<caption>
<title>Attack techniques and detailed descriptions used in privilege escalation</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">Privilege escalation</td>
<td>[<xref ref-type="bibr" rid="ref-96">96</xref>]</td>
<td>Weaken<break/>authentication</td>
<td>
&#x2022; No authentication is performed between<break/>&#x2002; wearables and mobile devices, making<break/>&#x2002; distinguishing between the attacker&#x2019;s<break/>&#x2002; mobile device and the actual user&#x2019;s<break/>&#x2002; mobile device is impossible. This allows<break/>&#x2002; for persistence or escalation of privileges<break/>&#x2002; without re-authentication.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-97">97</xref>]</td>
<td>Process injection</td>
<td>
&#x2022; Injects a malicious process into a<break/>&#x2002; legitimate process to allow the attacker<break/>&#x2002; to take control of a Bluetooth-enabled<break/>&#x2002; device without the user&#x2019;s knowledge.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-98">98</xref>]</td>
<td>Manipulated authentication</td>
<td>
&#x2022; To gain user privileges, the attacker<break/>&#x2002; manipulates authentication tokens to<break/>&#x2002; maintain sessions between wearables and<break/>&#x2002; mobile devices.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Defense Evasion</bold> is an attack tactic allowing an attacker to evade detection or other defense mechanisms. It includes Weaken Encryption, Disk Content Wipe, Valid Accounts, and Masquerading attack techniques. <xref ref-type="table" rid="table-12">Table 12</xref> shows the attack techniques used in Defense Evasion attack tactics and their detailed descriptions.</p>
<table-wrap id="table-12">
<label>Table 12</label>
<caption>
<title>Attack techniques and detailed descriptions used in defense evasion</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="4">Defense evasion</td>
<td>[<xref ref-type="bibr" rid="ref-99">99</xref>]</td>
<td>Weaken encryption</td>
<td>
&#x2022; Exploit a vulnerability in the protocol&#x2019;s<break/>&#x2002; internal encryption mechanism to<break/>&#x2002; compromise the encryption function.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-100">100</xref>]</td>
<td>Disk content wipe</td>
<td>
&#x2022; It bypasses security features that protect<break/>&#x2002; sensitive data by deleting sections<break/>&#x2002; responsible for protections needed to<break/>&#x2002; lock out external reads and writes to<break/>&#x2002; internal flash.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-101">101</xref>]</td>
<td>Valid accounts</td>
<td>
&#x2022; By bypassing authentication<break/>&#x2002; mechanisms, the attacker gains<break/>&#x2002; unauthorized access using legitimate<break/>&#x2002; credentials without being detected.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-102">102</xref>]</td>
<td>Masquerading</td>
<td>
&#x2022; Attackers manipulate an object&#x2019;s name,<break/>&#x2002; location, or appearance, whether<break/>&#x2002; legitimate or malicious, to make it<break/>&#x2002; appear legitimate. Examples include<break/>&#x2002; phishing firmware update processes and<break/>&#x2002; manipulating file metadata.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Credential Access</bold> is an attack tactic attackers use to gain unauthorized access to resources. It includes the Unsecured Credentials and Steal Application Access Token attack techniques. <xref ref-type="table" rid="table-13">Table 13</xref> shows the attack techniques used in the Credential Access attack tactic and their detailed descriptions.</p>
<table-wrap id="table-13">
<label>Table 13</label>
<caption>
<title>Attack techniques and detailed descriptions used in credential access</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="2">Credential access</td>
<td>[<xref ref-type="bibr" rid="ref-103">103</xref>]</td>
<td>Unsecured credentials</td>
<td>
&#x2022; The attacker sniffs wireless<break/>&#x2002; communication packets, such as BLE, to<break/>&#x2002; access unencrypted credentials or<break/>&#x2002; sensitive information transmitted<break/>&#x2002; between the wearable device and the<break/>&#x2002; paired mobile device.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-104">104</xref>]</td>
<td>Steal application access token</td>
<td>
&#x2022; The attacker obtains credentials by<break/>&#x2002; hijacking the authentication token used<break/>&#x2002; to maintain a session between the<break/>&#x2002; wearable and mobile device.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Discovery</bold> is an attack tactic for gaining information about wearable devices and other network systems. It includes System Information Discovery, Network Service Scanning, Location Tracking, Passive Sniffing, and Active Sniffing attack techniques. <xref ref-type="table" rid="table-14">Table 14</xref> shows the attack techniques used in the Discovery tactic and their detailed descriptions.</p>
<table-wrap id="table-14">
<label>Table 14</label>
<caption>
<title>Attack techniques and detailed descriptions used in discovery</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="5">Discovery</td>
<td>[<xref ref-type="bibr" rid="ref-105">105</xref>]</td>
<td>System information discovery</td>
<td>
&#x2022; Obtain information about the system<break/>&#x2002; and its components, such as device type<break/>&#x2002; and firmware version. Based on this, the<break/>&#x2002; attack method is tailored to the<break/>&#x2002; vulnerabilities of that version of the<break/>&#x2002; wearable device.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-106">106</xref>]</td>
<td>Network service scanning</td>
<td>
&#x2022; The attacker analyzes packets to retrieve<break/>&#x2002; operational details about the device, such<break/>&#x2002; as communication protocols or device<break/>&#x2002; capabilities.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-107">107</xref>]</td>
<td>Location tracking</td>
<td>
&#x2022; Through a malicious or exploited<break/>&#x2002; application on a compromised wearable<break/>&#x2002; device, the attacker can track the device&#x2019;s<break/>&#x2002; physical location using standard<break/>&#x2002; operating system APIs.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-108">108</xref>]</td>
<td>Passive sniffing</td>
<td>
&#x2022; The attacker passively intercepts<break/>&#x2002; communications without actively<break/>&#x2002; participating in the connection. It uses<break/>&#x2002; specialized hardware or software tools<break/>&#x2002; that can capture packets, but they are<break/>&#x2002; difficult to detect.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-109">109</xref>]</td>
<td>Active sniffing</td>
<td>
&#x2022; Intercepting packages are sent over a<break/>&#x2002; network that uses switches.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Lateral Movement</bold> is an attack tactic that allows an attacker to gain unauthorized access to and control of remote systems on a network and includes the Use of Alternate Authentication Material, Replication Through Wireless and Remote Services attack techniques. <xref ref-type="table" rid="table-15">Table 15</xref> shows the attack techniques used in the Lateral Movement attack tactic and their descriptions.</p>
<table-wrap id="table-15">
<label>Table 15</label>
<caption>
<title>Attack techniques and detailed descriptions used in lateral movement</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">Lateral movement</td>
<td>[<xref ref-type="bibr" rid="ref-110">110</xref>]</td>
<td>Use alternate authentication material</td>
<td>
&#x2022; An attacker can bypass the standard<break/>&#x2002; authentication process to establish<break/>&#x2002; control over a wearable device by<break/>&#x2002; forcibly pairing it using spoofed<break/>&#x2002; authentication credentials.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-111">111</xref>]</td>
<td>Replication through wireless</td>
<td>
&#x2022; Cloning methods via Bluetooth,<break/>&#x2002; BLE, WLAN.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-112">112</xref>]</td>
<td>Remote services</td>
<td>
&#x2022; Exploit vulnerabilities in communication<break/>&#x2002; protocols to gain unauthorized access or<break/>&#x2002; execute attacks.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Collection</bold> is an attack tactic used to identify and collect key information from the target network, such as sensitive files, including user personal information. It includes the Data Local System, Data from Removable Media, Video Capture, Capture Bluetooth Traffic, Adversary-in-the-Middle, and Replay Attack techniques. <xref ref-type="table" rid="table-16">Table 16</xref> shows the attack techniques and detailed descriptions used in the Collection attack tactic.</p>
<table-wrap id="table-16">
<label>Table 16</label>
<caption>
<title>Attack techniques and detailed descriptions used in collection</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="6">Collection</td>
<td>[<xref ref-type="bibr" rid="ref-113">113</xref>]</td>
<td>Data from local system</td>
<td>
&#x2022; Includes methods that allow the attacker<break/>&#x2002; to collect data from the local system. The<break/>&#x2002; purpose of this technique is to collect<break/>&#x2002; sensitive data that can be used in<break/>&#x2002; subsequent phases of the attack. In this<break/>&#x2002; technique, the local system is a wearable<break/>&#x2002; device.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-114">114</xref>]</td>
<td>Data from removable media</td>
<td>
&#x2022; It collects sensitive data from all<break/>&#x2002; removable media. Data collection can be<break/>&#x2002; done automatically by scanning for<break/>&#x2002; connected removable media.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-115">115</xref>]</td>
<td>Video capture</td>
<td>
&#x2022; An attacker can utilize the device&#x2019;s<break/>&#x2002; camera to capture video recordings to<break/>&#x2002; gather information. Instead of video<break/>&#x2002; files, images can be captured at specified<break/>&#x2002; intervals.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-116">116</xref>]</td>
<td>Capture Bluetooth traffic</td>
<td>
&#x2022; Capture Bluetooth traffic from a<break/>&#x2002; wearable device using a tool like pcap to<break/>&#x2002; collect data without authorization.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-117">117</xref>]</td>
<td>Adversary-in-the-middle</td>
<td>
&#x2022; Intercept and alter a wearable device&#x2019;s<break/>&#x2002; communications. This allows them to<break/>&#x2002; manipulate data or collect sensitive data,<break/>&#x2002; compromising its integrity and<break/>&#x2002; availability.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-118">118</xref>]</td>
<td>Replay attack</td>
<td>
&#x2022; Replay attacks are a common form of<break/>&#x2002; attack on wireless communications<break/>&#x2002; where an attacker captures legitimate<break/>&#x2002; communication packets and later<break/>&#x2002; retransmits them with malicious intent.<break/>&#x2002; Attacks can include unlocking, sending<break/>&#x2002; fake notifications.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Command and Control</bold> is an attack tactic for how an attacker communicates with a compromised wearable device or system within a targeted network and includes Communication Through Removable Media, Communication via Bluetooth, and Communication via WLAN attack techniques. <xref ref-type="table" rid="table-17">Table 17</xref> shows the attack techniques used in the Command and Control attack tactic and their detailed descriptions.</p>
<table-wrap id="table-17">
<label>Table 17</label>
<caption>
<title>Attack techniques and detailed descriptions used in command and control</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">Command and control</td>
<td>[<xref ref-type="bibr" rid="ref-119">119</xref>]</td>
<td>Communication through removable media</td>
<td>&#x2022; An attacker uses removable media to<break/>&#x2002; transmit commands from system to<break/>&#x2002; system to perform command and control<break/>&#x2002; between compromised hosts on a<break/>&#x2002; network that may be disconnected.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-120">120</xref>]</td>
<td>Communication via Bluetooth</td>
<td>&#x2022; Command and control via Bluetooth<break/>&#x2002; communication.</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-121">121</xref>]</td>
<td>Communication via WLAN</td>
<td>&#x2022; Command and control via WLAN<break/>&#x2002; communication.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_3_3">
<label>4.3.3</label>
<title>Attack Result</title>
<p>The Attack Result phase is the final part of the attack process, where the attacker achieves their intended goal. It is related to the state of damage caused by the attack and the impact of the attack and may cause additional damage. Attack Result is categorized into six attack tactics: Exfiltration, Impact, Wearable IoT Service, Wearable IoT Device, Protocol Exploitation, and Effect.</p>
<p><bold>Exfiltration</bold> is an attack tactic in which an attacker exfiltrates or causes the removal of sensitive data from a target wearable or mobile device and includes the Transfer Data and Exfiltration Over C2 Channel attack techniques. <xref ref-type="table" rid="table-18">Table 18</xref> shows the attack techniques used in the Exfiltration attack tactic and their detailed descriptions.</p>
<table-wrap id="table-18">
<label>Table 18</label>
<caption>
<title>Attack techniques and detailed descriptions used in exfiltration</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="2">Exfiltration</td>
<td>[<xref ref-type="bibr" rid="ref-122">122</xref>]</td>
<td>Transfer data</td>
<td>
&#x2022; The collected data is exfiltrated to<break/>&#x2002; another device or location controlled by<break/>&#x2002; the attacker (the attacker&#x2019;s mobile<break/>&#x2002; device).
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-123">123</xref>]</td>
<td>Exfiltration over C2 channel</td>
<td>
&#x2022; When a device connects to a maliciou<break/>&#x2002; saccess point, sensitive data intended for<break/>&#x2002; a legitimate printer can be redirected and<break/>&#x2002; exfiltrated by the attacker. The<break/>&#x2002; exfiltrated data is typically sent to an<break/>&#x2002; attacker-controlled control and<break/>&#x2002; command (C2) setup.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Impact</bold> is an attack tactic used by attackers to compromise the availability and integrity of the attack target. It can disrupt or destroy data and systems. It includes the following attack techniques: Delete Device Data, Data Manipulation, Endpoint Denial of Service, Data Encrypted for Impact, Inhibit System Recovery, and Firmware Corruption. <xref ref-type="table" rid="table-19">Table 19</xref> shows the attack techniques used in the Impact attack tactic and their detailed descriptions.</p>
<table-wrap id="table-19">
<label>Table 19</label>
<caption>
<title>Attack techniques and detailed descriptions used in impact</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="5">Impact</td>
<td>[<xref ref-type="bibr" rid="ref-124">124</xref>]</td>
<td>Delete device data</td>
<td>
&#x2022; Corrupting or disabling sensor data on a<break/>&#x2002; wearable device.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-125">125</xref>]</td>
<td>Data manipulation</td>
<td>
&#x2022; The attacker injects packets to change or<break/>&#x2002; add malicious and invalid data, which<break/>&#x2002; reduces user confidence in the accuracy<break/>&#x2002; and privacy of data on the wearable<break/>&#x2002; device.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-126">126</xref>]</td>
<td>Endpoint denial of service</td>
<td>
&#x2022; The attacker performs an endpoint<break/>&#x2002; denial-of-service (DoS) attack on the<break/>&#x2002; wearable device to degrade or block<break/>&#x2002; service availability to the user.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-127">127</xref>]</td>
<td>Data encrypted for impact</td>
<td>
&#x2022; The attacker encrypts files stored on the<break/>&#x2002; wearable device to prevent users from<break/>&#x2002; accessing them.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-128">128</xref>]</td>
<td>Inhibit system recovery</td>
<td>
&#x2022; The attacker blocks phone service and<break/>&#x2002; causes pairing issues, disrupting normal<break/>&#x2002; operation and potentially impacting<break/>&#x2002; device usability.
</td>
</tr>
<tr>
<td></td>
<td>[<xref ref-type="bibr" rid="ref-129">129</xref>]</td>
<td>Firmware corruption</td>
<td>
&#x2022; The attacker overwrites or corrupts the<break/>&#x2002; contents of flash memory in the system<break/>&#x2002; BIOS or other firmware of a<break/>&#x2002; system-connected device, rendering the<break/>&#x2002; device inoperable or unbootable, thus<break/>&#x2002; denying device and/or system usability.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p> <bold>Wearable IoT Service</bold> represents the type of service supported by the device. It includes the following attack techniques: Fitness, Medical, Infotainment, Industrial, and Military attack techniques. <xref ref-type="table" rid="table-20">Table 20</xref> shows the attack techniques used in the Wearable IoT Service attack tactic and their detailed descriptions.</p>
<table-wrap id="table-20">
<label>Table 20</label>
<caption>
<title>Attack techniques and detailed descriptions used in wearable IoT service</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="5">Wearable IoT service</td>
<td>[<xref ref-type="bibr" rid="ref-122">122</xref>]</td>
<td>Fitness</td>
<td>
&#x2022; Target, manipulate or exfiltrate<break/>&#x2002; quantified data collected during exercise<break/>&#x2002; (e.g., distance, speed, calories burned,<break/>&#x2002; heart rate).
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-130">130</xref>]</td>
<td>Medical</td>
<td>
&#x2022; A wearable device that combines wireless<break/>&#x2002; body area network (wBAN) and<break/>&#x2002; Ubiquitous healthcare technologies.<break/>&#x2002; Attacks can prevent them from<break/>&#x2002; accurately measuring and<break/>&#x2002; communicating the user&#x2019;s physical<break/>&#x2002; condition to patients and doctors.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-131">131</xref>]</td>
<td>Infotainment</td>
<td>
&#x2022; Exploit vulnerabilities in smart glasses,<break/>&#x2002; smart watches, to take illegal photos or<break/>&#x2002; display false data on the screen<break/>&#x2002; interface.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-132">132</xref>]</td>
<td>Industrial</td>
<td>
&#x2022; Attacks cause problems protecting the<break/>&#x2002; body or performing sophisticated tasks<break/>&#x2002; in industrial settings.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-133">133</xref>]</td>
<td>Military</td>
<td>
&#x2022; Wearable devices used for military<break/>&#x2002; purposes, such as heart rate monitoring,<break/>&#x2002; power delivery, enemy identification,<break/>&#x2002; cameras.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Wearable IoT Device</bold> represents a type of IoWT device. It includes Accessory, Attachable, and Edible attack techniques. <xref ref-type="table" rid="table-21">Table 21</xref> shows the attack techniques used in the Wearable IoT Device attack tactic and their detailed descriptions.</p>
<table-wrap id="table-21">
<label>Table 21</label>
<caption>
<title>Attack techniques and detailed descriptions used in wearable IoT device</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">Wearable IoT device</td>
<td>[<xref ref-type="bibr" rid="ref-134">134</xref>]</td>
<td>Accessory</td>
<td>
&#x2022; A wearable device in the form of a watch<break/>&#x2002; or band, such as a smartwatch, smart<break/>&#x2002; band, or smart glasses, is attacked. The<break/>&#x2002; attack manipulates the device&#x2019;s data or<break/>&#x2002; causes abnormal behavior.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-135">135</xref>]</td>
<td>Attachable</td>
<td>
&#x2022; A device that is worn on the skin, such<break/>&#x2002; as a patch, or in the form of clothing,<break/>&#x2002; such as smart shoes or clothing, is a<break/>&#x2002; smart device. When an attack<break/>&#x2002; is executed, the device&#x2019;s data is<break/>&#x2002; manipulated to show false output<break/>&#x2002; values.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-136">136</xref>]</td>
<td>Eatable</td>
<td>
&#x2022; Devices that are implanted or taken<break/>&#x2002; directly into the body, such as smart pills,<break/>&#x2002; can be attacked, resulting in actual<break/>&#x2002; human harm.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Protocol Exploitation</bold> is an attack tactic for exploiting vulnerable protocols in wearable device communications. It includes BLE, Wi-Fi Direct, NFC, Zigbee, LTE-M, NB-IoT, and NR-REDCAP attack techniques. <xref ref-type="table" rid="table-22">Table 22</xref> shows the attack techniques used in the Protocol Exploitation attack tactic and their detailed descriptions.</p>
<table-wrap id="table-22">
<label>Table 22</label>
<caption>
<title>Attack techniques and detailed descriptions used in protocol exploitation</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="7">Protocol exploitation</td>
<td>[<xref ref-type="bibr" rid="ref-137">137</xref>]</td>
<td>BLE</td>
<td>
&#x2022; Attacks that exploit vulnerabilities<break/>&#x2002; in BLE.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-138">138</xref>]</td>
<td>Wi-Fi direct</td>
<td>
&#x2022; Attacks that exploit vulnerabilities in<break/>&#x2002; Wi-Fi direct.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-139">139</xref>]</td>
<td>NFC</td>
<td>
&#x2022; Attacks that exploit vulnerabilities<break/>&#x2002; in NFC.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-140">140</xref>]</td>
<td>Zigbee</td>
<td>
&#x2022; Attacks that exploit vulnerabilities in<break/>&#x2002; Zigbee.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-141">141</xref>]</td>
<td>LTE-M</td>
<td>
&#x2022; Attacks that exploit vulnerabilities<break/>&#x2002; in LTE.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-142">142</xref>]</td>
<td>NB-IoT</td>
<td>
&#x2022; Attacks that exploit vulnerabilities in<break/>&#x2002; NB-IoT.
</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-143">143</xref>]</td>
<td>NR-REDCAP</td>
<td>
&#x2022; Attacks that exploit vulnerabilities in<break/>&#x2002; NR-REDCAP.
</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Effect</bold> is an attack tactic related to damage caused by a wearable device attack and includes the IoWT Device Damage and Physical Injury attack techniques. <xref ref-type="table" rid="table-23">Table 23</xref> shows the attack techniques used in the Effect attack tactic and their detailed descriptions.</p>
<table-wrap id="table-23">
<label>Table 23</label>
<caption>
<title>Attack techniques and detailed descriptions used in effect</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Attack tactics</th>
<th>Ref.</th>
<th>Attack techniques</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="2">Effect</td>
<td>[<xref ref-type="bibr" rid="ref-144">144</xref>]</td>
<td>IoWT device damage</td>
<td>
&#x2022; IoWT device data is corrupted or<break/>&#x2002; disabled, preventing the device from<break/>&#x2002; being used normally<break/>&#x2002;
(e.g., displaying inaccurate<break/>&#x2002; measurements due to health data<break/>&#x2002; manipulation).</td>
</tr>
<tr>
<td>[<xref ref-type="bibr" rid="ref-114">114</xref>]</td>
<td>Physical injury</td>
<td>
&#x2022; Actual physical harm is caused to a<break/>&#x2002; person due to an attack on an IoWT<break/>&#x2002; device<break/>&#x2002;
(e.g., medical errors due to abnormal<break/>&#x2002; behavior of a medical device)</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Step 3: Developed IWTW Framework</title>
<p><xref ref-type="fig" rid="fig-3">Fig. 3</xref> shows the IWTW framework developed by combining the 3 Attack Categories, 18 Attack Tactics, and 68 Attack Techniques for the attack flows derived from <xref ref-type="sec" rid="s4_2">Sections 4.2</xref> and <xref ref-type="sec" rid="s4_3">4.3</xref>. The attack categories are organized as follows: Launch on Attack, Expand Attack, Attack Result. Launch on Attack indicates a security threat that may occur in the early stages of an attack. Therefore, the subsections are organized as follows: Reconnaissance, Resource Development, and Initial Access. Expand Attack refers to expanding the attack process to the attacker&#x2019;s intended target. Accordingly, the subsections are organized as follows: Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control. Attack Result indicates the damage caused by the attack and its impact. Therefore, the subsections are organized as follows: Exfiltration, Impact, Wearable IoT Service, Wearable IoT Device, Protocol Exploitation, and Effect. IoWT attack techniques included in each subsection were derived and mapped to attack tactics through the following process: 1. Analyze attack cases targeting IoWT assets. 2. Categorize IoWT by asset type, attack process, and security threat. 3. Classify potential security threats that may occur targeting IoWT. 4. Analyze and standardize the main functions that constitute security threats.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Overview of IWTW framework</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-3.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-4">Figs. 4</xref>&#x2013;<xref ref-type="fig" rid="fig-6">6</xref> show the IWTW framework&#x2019;s attack categories: Launch on Attack, Expand Attack, Attack Result, and Components.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Attack category of IWTW framework, launch on attack</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-4.tif"/>
</fig><fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Attack category of IWTW framework, expand attack</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-5.tif"/>
</fig><fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Attack category of IWTW framework, attack result</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-6.tif"/>
</fig>
<p>Launch on Attack is a category of security threats and attacks that can occur at the beginning of an attack in the IWTW framework. Its attack tactics are Reconnaissance, Resource Development, and Initial Access. The Launch on Attack category has 10 attack techniques, including the information and tools used to carry out the attack, and represents the attack vector for initial access.</p>
<p>Expand Attack is a category of attacks that extends the attack process to the attacker&#x2019;s intended target after initial access in the IWTW framework. It consists of the following attack tactics: Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, and Command and Control. There is a total of 33 attack tactics that fall under the Expand Attack category. They perform tasks to achieve the attack goal, such as remotely executing malicious actions against IoWT devices or gaining high privileges and persisting in the system based on them, avoiding attack detection, or communicating with and controlling systems inside the network, collecting key data within the IoWT device, or obtaining information.</p>
<p>Attack Result is a category of attack that achieves the attacker&#x2019;s intended goal in the IWTW framework. It is composed of the following attack tactics: Exfiltration, Impact, Wearable IoT Service, Wearable IoT Device, Protocol Exploitation, and Effect. There is a total of 25 attack tactics in the Attack Result attack category, which compromise the availability and integrity of services and data in IoWT devices.</p>
<p>The IWTW framework is highly reliable because it only includes attack techniques that can be performed against IoWT devices. The addition of new attack tactics allows for more detailed cybersecurity threat analysis.</p>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Case Study</title>
<p><xref ref-type="sec" rid="s5">Section 5</xref> verifies the proposed method by applying the proposed IWTW framework to three actual attack cases targeting various IoWT devices. Through a case study, we confirm whether the IWTW framework can classify IoWT assets, attack processes, security threats, and attack tactics and techniques.</p>
<sec id="s5_1">
<label>5.1</label>
<title>Case Study 1: MiBand 2</title>
<p><xref ref-type="fig" rid="fig-7">Fig. 7</xref> illustrates how the MiBand 2 smart band attack case is applied to the IWTW framework. Exploitation of Wireless Device Configuration: Filtered and analyzed BLE communication wireless network traffic to analyze source and destination addresses. Active Scanning: Discovered wearable devices through the discovery capabilities of BLE sniffers. Obtain Capabilities: Uses the application and hardware sniffers required for the attack. Masquerading: Display a user authentication screen with fake commands. Passive Sniffing: Sniffs the MiBand 2&#x2019;s packets through the SmartRF Sniffer. Data from Local System: Using BLETestTool to collect sports and heart rate data from MiBand 2. Capture Bluetooth Traffic: Capture BLE communication packets. Adversary-in-the-Middle: Intercept sensitive data between wearable device communications. Replay Attack: vibrates the MiBand 2 with a fake notification. Communication via Bluetooth: Communicates with the attacker based on Bluetooth. Transfer Data: Leaks collected data to the attacker&#x2019;s device. Inhibit System Recovery: Prevents phone and text services from functioning normally through fake notifications. Fitness: Fitness data related to exercise is leaked. Infotainment: Vulnerabilities in smart bands are exploited. Accessory: A wearable device in a wearable form. BLE: An attack that exploits a vulnerability in BLE communication. IoWT Device Damage: The MiBand was physically damaged by the constant vibration caused by the fake notifications.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>IWTW framework applied to MiBand 2 smart band attack</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-7.tif"/>
</fig>
<p>Zhang et al. [<xref ref-type="bibr" rid="ref-145">145</xref>] used the CC2540 USB, TI SmartRF, and BLETestTool to remotely sniff and analyze traffic on the MiBand 2 wearable smartband. <xref ref-type="fig" rid="fig-8">Fig. 8</xref> shows an overview of the attack process for MiBand 2. The CC2540 USB dongle is used as a hardware sniffer, TI SmartRF Packet Sniffer is a software application that sniffs BLE communication packets between the smartphone and the wearable device, and BLETestTool is an attack tool that runs on an Android smartphone to test attacks against the wearable device. First, the hardware sniffer, smartphone, and smart wristband are placed close to Bluetooth discovery so the smartphone can discover the MiBand 2 via Bluetooth. Then, turn on the TI SmartRF Packet Sniffer on your PC and launch the MiBand 2&#x2019;s official support application on your Android phone. The packets are sniffed once connected to the MiBand 2 through the application, and the information is displayed on the TI SmartRF Packet Sniffer. All sniffed packets are stored in hexadecimal, and the commands in the packets are analyzed by converting them to decimal, ASCII code, Unicode, or UTF-8 code. After running BLETestTool on an Android smartphone and using it to connect to the MiBand 2, send some commands recorded using BLETestTool to the MiBand 2 and fake commands written by the attacker to bypass the authentication process. Once the authentication process is complete, the attacker uses BLETestTool to perform attacks such as getting sports and heart rate data or vibrating this MiBand 2 with fake notifications.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Overview of the MiBand 2 attack process</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-8.tif"/>
</fig>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Case Study 2: Fitbit Charge HR/Surge, Samsung Gear 3, Xiaomi Amazifit</title>
<p><xref ref-type="fig" rid="fig-9">Fig. 9</xref> illustrates how the Smartwatch/band based on BLE 4.0 and 4.2 attack case is applied to the IWTW framework. Exploitation of Wireless Device Configuration: Filtered and analyzed BLE communication wireless network traffic to analyze source and destination addresses. Active Scanning: Scanned for wearable devices through a BLE sniffer. Obtain Capabilities: the HCI snoop log is the tool used in the attack. The Native API enables packet capture from Ubertooth devices. Weaken Encryption: Weaknesses in the data encryption mechanism result in plaintext transmission. Unsecured Credentials: Uses the user&#x2019;s digital signature. System Information Discovery: Identifies devices through packet analysis. Passive Sniffing: Sniffs packets from the wearable device through an Adafruit sniffer. Use Alternate Authentication Material: Use a spoofed digital signature to maintain connectivity between devices. Data from Local System: Perform follow-up attacks based on sender and receiver MAC addresses and identifying devices derived through WireShark. Capture Bluetooth Traffic: Captures BLE communication packets. Adversary-in-the-Middle: Intercept sensitive information such as sender and receiver static MAC addresses and communication messages between wearable device communications. Communication via Bluetooth: Communicates with the attacker based on Bluetooth. Transfer Data collects data information about the wearer&#x2019;s movements and habits. Fitness: Fitness data related to the wearer&#x2019;s movements is compromised. Infotainment: A vulnerability in the smartwatch or band has been exploited. Accessory: A wearable device in a wearable form. BLE: The attack exploits a vulnerability in BLE communication.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>IWTW framework applied to smartwatch/band based on BLE 4.0 and 4.2 attack</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-9.tif"/>
</fig>
<p>Cusack et al. [<xref ref-type="bibr" rid="ref-146">146</xref>] used BLE sniffers to capture and analyze communication packets from Fitbit Charge HR/Surge, Samsung Gear 3, Xiaomi Amazifit smartwatches, and smartbands using BLE 4.0 and 4.2 to extract sensitive information. <xref ref-type="fig" rid="fig-10">Fig. 10</xref> shows an overview of the attack process for Fitbit Charge HR/Surge, Samsung Gear 3, and Xiaomi Amazifit attack process. First, use Ubertooth, the HCI snoop log, and the Adafruit sniffer tool to dump the pairing-related packets of the wearable devices into pcapng and pcap files. The dumped files are analyzed using Wireshark to check whether the data is text-encrypted and to collect essential information such as digital signatures, device identification, mapping of the wearer&#x2019;s movements and habits, and device logs. As a result, sensitive information, such as static MAC addresses of the sender and receiver, and communications messages, were sent in plain text, and message logs (Email, SMS, and Facebook) were checked. The vulnerability allows for blueprinting attacks against each wearable device. Analysis showed that all wearable devices had credential data that provided access.</p>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>Overview of the Fitbit Charge HR/Surge, Samsung Gear 3, Xiaomi Amazifit attack process</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-10.tif"/>
</fig>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>Case Study 3: Honor Band 5 Honor Watch ES</title>
<p><xref ref-type="fig" rid="fig-11">Fig. 11</xref> illustrates how the Honor Band 5 and Honor watch ES smart watch attack case is applied to the IWTW framework. Exploitation of Wireless Device Configuration: Filtered and analyzed BLE communication wireless network traffic. Active Scanning: Discovered wearable devices through the BLE sniffer&#x2019;s discovery capabilities. Obtain Capabilities: The Nordic Semiconductor nRF52 DK Sniffer tool was used in the attack. Weaken Authentication: No encryption during the pairing process. System Information Discovery: Identifies devices by deriving plain text data through packet analysis. Passive Sniffing: Sniffing packets through a BLE sniffer. Data from Local System: The attacker used Wireshark to collect plain text data about personal information from a series of Honor devices. Capture Bluetooth Traffic: Capture BLE communication packets. Adversary-in-the-Middle: Intercept sensitive information such as physical activity data, synchronization, connection, and reconnection data between wearable device communications. Communication via Bluetooth: Communicates with an attacker based on Bluetooth. Transfer Data: Collect sensitive personal information. Infotainment: Vulnerabilities in the smartwatch/band are exploited. Accessory: A wearable device that can be worn. BLE: An attack that exploits a vulnerability in BLE communication.</p>
<fig id="fig-11">
<label>Figure 11</label>
<caption>
<title>IWTW framework applied to Honor Band 5 and Honor watch ES smart watch attack</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-11.tif"/>
</fig>
<p>Fuster et al. [<xref ref-type="bibr" rid="ref-70">70</xref>] used the Nordic Semiconductor nRF52 DK Sniffer to capture and analyze communication packets from various wearable smartwatches/bands to derive privacy and security vulnerabilities. In Case Study 3, They focus on the Honor Band 5 and Honor Watch ES devices. <xref ref-type="fig" rid="fig-12">Fig. 12</xref> shows an overview of the attack process for Honor Band 5 and Honor Watch ES attack process. First, capture BLE communication between wearable and mobile devices using the Nordic Semiconductor nRF52 DK tool and then analyze it using WireShark. BLE communication is performed via pairing, and physical activity data, synchronization, connection, and reconnection data are collected and analyzed. Honor device series require a separate Huawei ID and Huawei Health service to use. The devices use unencrypted pairing methods and communication, which expose personal data in plain text. In addition, wearable devices can be identified by using static MAC addresses.</p>
<fig id="fig-12">
<label>Figure 12</label>
<caption>
<title>Overview of the Honor Band 5 and Honor Watch ES attack process</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-12.tif"/>
</fig>
</sec>
<sec id="s5_4">
<label>5.4</label>
<title>Case Study 4: Senbono CF-58</title>
<p><xref ref-type="fig" rid="fig-13">Fig. 13</xref> illustrates how the Senbono CF-58 smart watch attack case is applied to the IWTW framework. Exploitation of Wireless Device Configuration: Filtered and analyzed BLE communication wireless network traffic. Active Scanning: Discovered wearable devices through the BLE sniffer&#x2019;s discovery capabilities. Obtain Capabilities: The BetterCap Sniffer tool was used in the attack. Command and Scripting Interpreter: Gather details using the BLE.enum command. Weaken Encryption: No encryption during network connection. System Information Discovery: Identifies devices by deriving plain text data through packet analysis. Passive Sniffing: Sniffing packets through the BetterCap sniffer. Data from Local System: The attacker used Wireshark to collect plain text data about personal information from the Senbono CF-58 devices. Capture Bluetooth Traffic: Capture BLE communication packets. Adversary-in-the-Middle: Intercept sensitive information such as physical activity data, synchronization, connection, and reconnection data between wearable device communications. Communication via Bluetooth: Communicates with an attacker based on Bluetooth. Data Manipulation: Change data by modifying the descriptor of the UUID. Infotainment: Vulnerabilities in the smartwatch/band are exploited. Accessory: A wearable device that can be worn. BLE: An attack that exploits a vulnerability in BLE communication.</p>
<fig id="fig-13">
<label>Figure 13</label>
<caption>
<title>IWTW framework applied to Senbono CF-58 smart watch attack</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-13.tif"/>
</fig>
<p>Khan et al. [<xref ref-type="bibr" rid="ref-147">147</xref>] used BetterCap Sniffer to capture smartwatch communication packets and GattTool to establish and control connections between BLE gadgets. In Case Study 4, They focus on Senbono CF-58 devices. <xref ref-type="fig" rid="fig-14">Fig. 14</xref> shows an overview of the attack process for the Senbono CF-58 devices attack process. First, install the BetterCap BLE scanning tool on your Kali Linux machine and enable the Bluetooth service. After identifying the BLE device through BetterCap, find the Senbono CF-58 device in the list of scanned BLE devices and record its MAC address. Afterward, the Mac address is collected, and the BLE.enum command collects detailed information. After completing attack reconnaissance, check the data packets through Wireshark. Send a ping to the BLE gadget to capture packets and analyze the gadget&#x2019;s UUID descriptor model. Check what type of data the gadget&#x2019;s UUID descriptor corresponds to. Connect your CF58 smartwatch and Kali Linux machine using GATTTOOL. Also, access the terminal and check all UUIDs associated with the device. Afterward, used Wireshark to cross-reference the previously identified UUIDs to identify specific UUIDs to target. Finally, the data on the smartwatch is altered by modifying the value of the target UUID.</p>
<fig id="fig-14">
<label>Figure 14</label>
<caption>
<title>Overview of the Senbono CF-58 attack process</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_53465-fig-14.tif"/>
</fig>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Discussion</title>
<p>In this session, we compare and analyze IWTW and existing cyber threat framework research. We selected evaluation items that could compare threat modeling and framework characteristics for comparative analysis: compare domain, Threat granularity, Threat, Standardization, and Applicability in the IoWT. <xref ref-type="table" rid="table-24">Table 24</xref> compares the proposed framework with existing research.</p>
<table-wrap id="table-24">
<label>Table 24</label>
<caption>
<title>Comparison of cyber threat framework, including ours</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Reference</th>
<th>Domain</th>
<th>Threat granularity</th>
<th>Threat</th>
<th>Standardization</th>
<th>Applicability in the IoWT</th>
</tr>
</thead>
<tbody>
<tr>
<td>BLE threat model [<xref ref-type="bibr" rid="ref-8">8</xref>]</td>
<td>IoWT</td>
<td>High</td>
<td>17</td>
<td>O</td>
<td>O</td>
</tr>
<tr>
<td>ERMO [<xref ref-type="bibr" rid="ref-9">9</xref>]</td>
<td>IT, IoT</td>
<td>Low</td>
<td>2</td>
<td>X</td>
<td>X</td>
</tr>
<tr>
<td>MITRE ATT&#x0026;CK [<xref ref-type="bibr" rid="ref-10">10</xref>]</td>
<td>IT, mobile</td>
<td>High</td>
<td>86<break/>(mobile)</td>
<td>O</td>
<td>&#x25B3;</td>
</tr>
<tr>
<td>CONCORDIA&#x2013;CMTMF [<xref ref-type="bibr" rid="ref-11">11</xref>]</td>
<td>Mobile</td>
<td>High</td>
<td>47</td>
<td>O</td>
<td>&#x25B3;</td>
</tr>
<tr>
<td>WSHD threat model [<xref ref-type="bibr" rid="ref-12">12</xref>]</td>
<td>IoWT</td>
<td>Low</td>
<td>7</td>
<td>X</td>
<td>O</td>
</tr>
<tr>
<td>MEDICALHARM [<xref ref-type="bibr" rid="ref-13">13</xref>]</td>
<td>IoWT</td>
<td>Low</td>
<td>11</td>
<td>O</td>
<td>O</td>
</tr>
<tr>
<td>Emerging MWBD [<xref ref-type="bibr" rid="ref-30">30</xref>]</td>
<td>IT, IoT</td>
<td>Low</td>
<td>8</td>
<td>X</td>
<td>X</td>
</tr>
<tr>
<td>Bhadra [<xref ref-type="bibr" rid="ref-31">31</xref>]</td>
<td>Mobile</td>
<td>High</td>
<td>55</td>
<td>O</td>
<td>&#x25B3;</td>
</tr>
<tr>
<td><bold>Ours (IWTW)</bold></td>
<td>IoWT</td>
<td>High</td>
<td>68</td>
<td>O</td>
<td>O</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>This research proposed IWTW framework to analyze cyber threats targeting IoWT devices. The proposed IWTW was studied in cyber threat frameworks (BLE Threat Model [<xref ref-type="bibr" rid="ref-8">8</xref>], ERMO [<xref ref-type="bibr" rid="ref-9">9</xref>], MITER ATT&#x0026;CK [<xref ref-type="bibr" rid="ref-10">10</xref>], CONCORDIA&#x2013;CMTMF [<xref ref-type="bibr" rid="ref-11">11</xref>], WSHD Threat Model [<xref ref-type="bibr" rid="ref-12">12</xref>], MEDICALHARM [<xref ref-type="bibr" rid="ref-13">13</xref>], Emerging MWBD [<xref ref-type="bibr" rid="ref-30">30</xref>], Bhadra [<xref ref-type="bibr" rid="ref-31">31</xref>]), as shown in <xref ref-type="table" rid="table-24">Table 24</xref>.</p>

<p>ERMO, Emerging MWBD, MITER ATT&#x0026;CK, and CONCORDIA&#x2013;CMTMF analyze security threats targeting IT, IoT, and mobile. Although some attack tactics and techniques were suitable for use in an IoWT environment, not all components could be applied. ERMO, Emerging MWBD, WSHD Threat Model, and WSHD Threat Model did not perform a too comprehensive threat modeling process or provide detailed information on detailed attack tactics and techniques for security threats. Most frameworks with low threat granularity had a small number of threats. In the case of the BLE Threat Model, the threat granularity is high, but the number of threats is small because a limited threat model targeting only a single protocol was proposed. ERMO, Emerging MWBD, and WSHD Threat Model do not consider the formalization process for security threat analysis, so it is unclear whether accurate threat identification is possible.</p>
<p>The IWTW framework presented in this research is designed to analyze cybersecurity threats targeting IoWT devices. For detailed analysis of security threats, IoWT assets, attack processes, and security threats from actual IoWT attack cases were derived. Additionally, a standardization was conducted to classify attack tactics and techniques. In addition, through a case study on actual IoWT attack cases, we verified that the IWTW framework can effectively classify IoWT security threats.</p>
<p>The IWTW framework allows detailed analysis of cyber threats to IoWT. However, the IWTW framework has several limitations. In this research, we investigated actual IoWT attack cases and potential security threats that could occur in IoWT to derive security threats. As attack methods become more sophisticated and new attack techniques are used, the existing IWTW framework alone may have a negative impact on analyzing cyber-attacks. Additionally, there are limits to the attack tactics and techniques that can be analyzed depending on the attack cases investigated and the scale of the security threat. Therefore, continuous updating of the IWTW framework is necessary.</p>
</sec>
<sec id="s7">
<label>7</label>
<title>Conclusion</title>
<p>As IoWT technology has evolved, the sensors embedded in wearable devices have become smaller and more accessible through low-power mobile networks. However, these features also give IoWT devices limited processing power and bandwidth, which prevents the use of high computational security mechanisms such as AES and RSA. Existing works propose threat modeling or frameworks targeting IoT or low-power protocols. However, the proposed techniques only apply to specific protocols, the models are too comprehensive, and they do not consider the IoWT environment. Therefore, the threat model presented in the existing research on cyber threat analysis and modeling for IoWT is specialized for specific devices. In addition, it is difficult to identify attacks quickly because it does not present standardized attack tactics and techniques. For these reasons, this research proposes IWTW, a framework for cyber threat analysis for IoWTs. The methodology for developing the IWTW framework is divided into two areas: Clustering and Development. Clustering stores data derived from analyzing attack cases against IoWTs and potential security threats that may occur in IoWTs. It consists of two parts: Analysis and Standardization. The Analysis part includes IoWT Attack Cases, which analyzes attack cases that can occur against IoWT, and IoWT Security Threat, which analyzes potential security threats that can occur in IoWT. IoWT Attack Cases is based on actual attacks against IoWT and analyzes the attack process and security threats. IoWT Security Threat analyzes the security threats that can be caused by potential attackers targeting IoWT. The Standardization part performs the process of standardizing the attack categories, attack tactics, and attack techniques derived from the Analysis part. The development combines the formalized attack categories, attack tactics, and attack techniques from the Clustering section to derive an IWTW framework. ITWT framework was validated through four case studies targeting MiBand 2, Fitbit Charge HR/Surge, Samsung Gear 3, Xiaomi Amazifit, Honor Band 5, Honor Watch ES, and Senbono CF-58 devices. For the comparative analysis of IWTW and existing cyber threat framework studies, we selected evaluation items that allow us to compare threat modeling and framework characteristics: comparison domain, threat granularity, threat, standardization, and IoWT applicability. We confirmed that the IWTW framework can classify IoWT security threats more effectively than existing studies. We discussed the attack cases investigated for security threats and the limitations of the attack techniques that can be analyzed when the scale is small. As attack methods become more sophisticated and new techniques are used, the existing IWTW framework alone may negatively impact the analysis process. Therefore, continuous updating of the IWTW framework is necessary.</p>
<p>In future research, we will regularly update the IWTW framework to increase the scale of attack tactics and techniques that can be analyzed. Meanwhile, we will develop a new framework for advancing IoWT attack technology and responding to IoWT security threats by building an IoWT testbed and conducting vulnerability analysis research through attack simulation.</p>
</sec>
</body>
<back>
<glossary content-type="abbreviations" id="glossary-1">
<title>Nomenclature</title>
<def-list>
<def-item>
<term>IoT</term>
<def>
<p>Internet of Things</p>
</def>
</def-item>
<def-item>
<term>IoWT</term>
<def>
<p>Internet of Wearable Things</p>
</def>
</def-item>
<def-item>
<term>BLE</term>
<def>
<p>Bluetooth Low Energy</p>
</def>
</def-item>
<def-item>
<term>LTE-M</term>
<def>
<p>Long Term Evolution for MTC</p>
</def>
</def-item>
<def-item>
<term>NB-IoT</term>
<def>
<p>Narrowband-IoT</p>
</def>
</def-item>
<def-item>
<term>NR-REDCAP</term>
<def>
<p>New Radio-Reduced Capability</p>
</def>
</def-item>
<def-item>
<term>NFC</term>
<def>
<p>Near-Field Communication</p>
</def>
</def-item>
<def-item>
<term>W2H</term>
<def>
<p>Wearables-to-Hub</p>
</def>
</def-item>
<def-item>
<term>W2I</term>
<def>
<p>Wearables-to-Infrastructure</p>
</def>
</def-item>
<def-item>
<term>W2W</term>
<def>
<p>Wearables-to-Wearables</p>
</def>
</def-item>
<def-item>
<term>GATT</term>
<def>
<p>Generic Attribute Profile</p>
</def>
</def-item>
</def-list>
</glossary>
<ack>
<p>None.</p>
</ack>
<sec><title>Funding Statement</title>
<p>This work was supported by Institute of Information &#x0026; Communications Technology Planning &#x0026; Evaluation (IITP) grant funded by the Korea government (MSIT) (No. RS-2021-II210493, 5G Massive Next Generation Cyber Attack Deception Technology Development, 90%), and the Gachon University research fund of 2022 (GCU-202300750001, 10%).</p>
</sec>
<sec><title>Author Contributions</title>
<p>Conceptualization, GyuHyun Jeon; methodology, GyuHyun Jeon and Hojun Jin; Case study, GyuHyun Jeon and Ju Hyeon Lee; writing, GyuHyun Jeon; writing-review and editing, Ju Hyeon Lee, Seungho Jeon, and Jung Taek Seo. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability"><title>Availability of Data and Materials</title>
<p>Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.</p>
</sec>
<sec><title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>1.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dian</surname> <given-names>FJ</given-names></string-name>, <string-name><surname>Vahidnia</surname> <given-names>R</given-names></string-name>, <string-name><surname>Rahmati</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: a survey</article-title>. <source>IEEE Access</source>. <year>2020</year>;<volume>8</volume>:<fpage>69200</fpage>&#x2013;<lpage>11</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2020.2986329</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>2.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cornacchia</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ozcan</surname> <given-names>K</given-names></string-name>, <string-name><surname>Zheng</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Velipasalar</surname> <given-names>S</given-names></string-name></person-group>. <article-title>A survey on activity detection and classification using wearable sensors</article-title>. <source>IEEE Sens J</source>. <year>2016</year>;<volume>17</volume>(<issue>2</issue>):<fpage>386</fpage>&#x2013;<lpage>403</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JSEN.2016.2628346</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>3.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tahir</surname> <given-names>H</given-names></string-name>, <string-name><surname>Tahir</surname> <given-names>R</given-names></string-name>, <string-name><surname>McDonald-Maier</surname> <given-names>K</given-names></string-name></person-group>. <article-title>On the security of consumer wearable devices in the Internet of Things</article-title>. <source>PLoS One</source>. <year>2018</year>;<volume>13</volume>(<issue>4</issue>):<fpage>e0195487</fpage>. doi:<pub-id pub-id-type="doi">10.1371/journal.pone.0195487</pub-id>; <pub-id pub-id-type="pmid">29668756</pub-id></mixed-citation></ref>
<ref id="ref-4"><label>4.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hale</surname> <given-names>ML</given-names></string-name>, <string-name><surname>Lotfy</surname> <given-names>K</given-names></string-name>, <string-name><surname>Gamble</surname> <given-names>RF</given-names></string-name>, <string-name><surname>Walter</surname> <given-names>C</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Developing a platform to evaluate and assess the security of wearable devices</article-title>. <source>Digit Commun Netw</source>. <year>2019</year>;<volume>5</volume>(<issue>3</issue>):<fpage>147</fpage>&#x2013;<lpage>59</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.dcan.2018.10.009</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>5.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cirani</surname> <given-names>S</given-names></string-name>, <string-name><surname>Picone</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Wearable computing for the internet of things</article-title>. <source>IT Prof</source>. <year>2015</year>;<volume>17</volume>(<issue>5</issue>):<fpage>35</fpage>&#x2013;<lpage>41</lpage>. doi:<pub-id pub-id-type="doi">10.1109/MITP.2015.89</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>6.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gupta</surname> <given-names>A</given-names></string-name>, <string-name><surname>Tripathi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>A</given-names></string-name></person-group>. <article-title>A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN</article-title>. <source>Comput Commun</source>. <year>2020</year>;<volume>160</volume>:<fpage>311</fpage>&#x2013;<lpage>25</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comcom.2020.06.010</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>7.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Shahriar</surname> <given-names>H</given-names></string-name>, <string-name><surname>Riad</surname> <given-names>AK</given-names></string-name></person-group>. <article-title>Security and privacy analysis of wearable health device</article-title>. In: <conf-name>2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC)</conf-name>, <year>2020</year>; <publisher-loc>Madrid, Spain</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-8"><label>8.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Barua</surname> <given-names>A</given-names></string-name>, <string-name><surname>Al Alamin</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Hossain</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Hossain</surname> <given-names>E</given-names></string-name></person-group>. <article-title>Security and privacy threats for bluetooth low energy in IoT and wearable devices: a comprehensive survey</article-title>. <source>IEEE Open J Commun Soc</source>. <year>2022</year>;<volume>3</volume>:<fpage>251</fpage>&#x2013;<lpage>81</lpage>.</mixed-citation></ref>
<ref id="ref-9"><label>9.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Griffy-Brown</surname> <given-names>C</given-names></string-name>, <string-name><surname>Miller</surname> <given-names>H</given-names></string-name>, <string-name><surname>Chun</surname> <given-names>M</given-names></string-name>, <string-name><surname>Johnson</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Cyber risk case analysis in wearables and medical devices: developing a cyberbio security risk framework</article-title>. In: <conf-name>Portland International Conference on Management of Engineering and Technology (PICMET)</conf-name>, <year>2022</year>; <publisher-loc>Portland, OR, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-10"><label>10.</label><mixed-citation
publication-type="other"><article-title>Mobile matrix: MITRE ATT&#x0026;CK</article-title>; <year>2024</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/matrices/mobile/">https://attack.mitre.org/matrices/mobile/</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-11"><label>11.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Santos</surname> <given-names>B</given-names></string-name>, <string-name><surname>Barriga</surname> <given-names>L</given-names></string-name>, <string-name><surname>Dzogovic</surname> <given-names>B</given-names></string-name>, <string-name><surname>Hassan</surname> <given-names>I</given-names></string-name>, <string-name><surname>Feng</surname> <given-names>B</given-names></string-name>, <string-name><surname>Jacot</surname> <given-names>N</given-names></string-name>, <etal>et al.</etal></person-group>, editors. <article-title>Threat modelling for 5G networks</article-title>. In: <conf-name>2022 International Wireless Communications and Mobile Computing (IWCMC)</conf-name>, <year>2022</year>; <publisher-loc>Dubrovnik, Croatia</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-12"><label>12.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Timko</surname> <given-names>D</given-names></string-name>, <string-name><surname>Sharko</surname> <given-names>M</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Security analysis of wearable smart health devices and their companion apps</article-title>. In: <conf-name>2024 IEEE Security and Privacy Workshops (SPW)</conf-name>, <year>2024</year>.</mixed-citation></ref>
<ref id="ref-13"><label>13.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kwarteng</surname> <given-names>E</given-names></string-name>, <string-name><surname>Cebe</surname> <given-names>M</given-names></string-name></person-group>. <article-title>MEDICALHARM: a threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives</article-title>. <source>Int J Inf Secur</source>. <year>2024</year>;<volume>23</volume>(<issue>3</issue>):<fpage>2225</fpage>&#x2013;<lpage>68</lpage>.</mixed-citation></ref>
<ref id="ref-14"><label>14.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Qureshi</surname> <given-names>N</given-names></string-name>, <string-name><surname>Shin</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Performance analysis of IoT-enabled DDoS botnets in wearable devices</article-title>. <source>J Theor Appl Inf Technol</source>. <year>2021</year>;<volume>99</volume>(<issue>16</issue>):<fpage>4026</fpage>&#x2013;<lpage>43</lpage>.</mixed-citation></ref>
<ref id="ref-15"><label>15.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aroganam</surname> <given-names>G</given-names></string-name>, <string-name><surname>Manivannan</surname> <given-names>N</given-names></string-name>, <string-name><surname>Harrison</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Review on wearable technology sensors used in consumer sport applications</article-title>. <source>Sensors</source>. <year>2019</year>;<volume>19</volume>(<issue>9</issue>):<fpage>1983</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s19091983</pub-id>; <pub-id pub-id-type="pmid">31035333</pub-id></mixed-citation></ref>
<ref id="ref-16"><label>16.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Seneviratne</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Nguyen</surname> <given-names>T</given-names></string-name>, <string-name><surname>Lan</surname> <given-names>G</given-names></string-name>, <string-name><surname>Khalifa</surname> <given-names>S</given-names></string-name>, <string-name><surname>Thilakarathna</surname> <given-names>K</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A survey of wearable devices and challenges</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2017</year>;<volume>19</volume>(<issue>4</issue>):<fpage>2573</fpage>&#x2013;<lpage>620</lpage>.</mixed-citation></ref>
<ref id="ref-17"><label>17.</label><mixed-citation publication-type="other"><article-title>Wi-Fi Direct: WiFi ALLIANCE</article-title>. Available from: <ext-link ext-link-type="uri" xlink:href="https://www.wi-fi.org/discover-wi-fi/wi-fi-direct">https://www.wi-fi.org/discover-wi-fi/wi-fi-direct</ext-link> <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-18"><label>18.</label><mixed-citation publication-type="other"><article-title>What is the difference between bluetooth and 2.4 GHz? MeeTion</article-title>; <year>2023</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://www.meetion.com/what-is-the-difference-between-bluetooth-and-24-ghz.html">https://www.meetion.com/what-is-the-difference-between-bluetooth-and-24-ghz.html</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-19"><label>19.</label><mixed-citation publication-type="other"><article-title>ISO/IEC 14443-4:2018</article-title>; <year>2018</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://www.iso.org/standard/73599.html">https://www.iso.org/standard/73599.html</ext-link>. <comment>[Accessed on 2024]</comment>.</mixed-citation></ref>
<ref id="ref-20"><label>20.</label><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>Compatibility PB</collab></person-group>. <article-title>IEEE standard for low-rate wireless networks</article-title>. <year>2023</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://ieeexplore.ieee.org/abstract/document/10014667">https://ieeexplore.ieee.org/abstract/document/10014667</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-21"><label>21.</label><mixed-citation publication-type="other"><article-title>Release 15: 3GPP</article-title>; <year>2019</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://www.3gpp.org/specifications-technologies/releases/release-15">https://www.3gpp.org/specifications-technologies/releases/release-15</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-22"><label>22.</label><mixed-citation publication-type="other"><article-title>Release 17: 3GPP</article-title>; <year>2022</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://www.3gpp.org/specifications-technologies/releases/release-17">https://www.3gpp.org/specifications-technologies/releases/release-17</ext-link> <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-23"><label>23.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Panicacci</surname> <given-names>S</given-names></string-name>, <string-name><surname>Giuffrida</surname> <given-names>G</given-names></string-name>, <string-name><surname>Donati</surname> <given-names>M</given-names></string-name>, <string-name><surname>Lubrano</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ruiu</surname> <given-names>A</given-names></string-name>, <string-name><surname>Fanucci</surname> <given-names>L</given-names></string-name></person-group>. editors. <article-title>Empowering home health monitoring of COVID-19 patients with smartwatch position and fitness tracking</article-title>. In: <conf-name>2021 IEEE 34th International Symposium on Computer-Based Medical Systems (CBMS)</conf-name>, <year>2021</year>; <publisher-loc>Aveiro, Portugal</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-24"><label>24.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Collotta</surname> <given-names>M</given-names></string-name>, <string-name><surname>Pau</surname> <given-names>G</given-names></string-name>, <string-name><surname>Talty</surname> <given-names>T</given-names></string-name>, <string-name><surname>Tonguz</surname> <given-names>OK</given-names></string-name></person-group>. <article-title>Bluetooth 5: a concrete step forward toward the IoT</article-title>. <source>IEEE Commun Mag</source>. <year>2018</year>;<volume>56</volume>(<issue>7</issue>):<fpage>125</fpage>&#x2013;<lpage>31</lpage>.</mixed-citation></ref>
<ref id="ref-25"><label>25.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bhatti</surname> <given-names>DS</given-names></string-name>, <string-name><surname>Saleem</surname> <given-names>S</given-names></string-name>, <string-name><surname>Imran</surname> <given-names>A</given-names></string-name>, <string-name><surname>Iqbal</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Alzahrani</surname> <given-names>A</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>H</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>A survey on wireless wearable body area networks: a perspective of technology and economy</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>20</issue>):<fpage>7722</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s22207722</pub-id>; <pub-id pub-id-type="pmid">36298073</pub-id></mixed-citation></ref>
<ref id="ref-26"><label>26.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Darwish</surname> <given-names>A</given-names></string-name>, <string-name><surname>Hassanien</surname> <given-names>AE</given-names></string-name></person-group>. <article-title>Wearable and implantable wireless sensor network solutions for healthcare monitoring</article-title>. <source>Sensors</source>. <year>2011</year>;<volume>11</volume>(<issue>6</issue>):<fpage>5561</fpage>&#x2013;<lpage>95</lpage>. doi:<pub-id pub-id-type="doi">10.3390/s110605561</pub-id>; <pub-id pub-id-type="pmid">22163914</pub-id></mixed-citation></ref>
<ref id="ref-27"><label>27.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sun</surname> <given-names>H</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>RQ</given-names></string-name>, <string-name><surname>Qian</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Wearable communications in 5G: challenges and enabling technologies</article-title>. <source>IEEE Vehicular Technol Mag</source>. <year>2018</year>;<volume>13</volume>(<issue>3</issue>):<fpage>100</fpage>&#x2013;<lpage>9</lpage>.</mixed-citation></ref>
<ref id="ref-28"><label>28.</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Bello</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Figetakis</surname> <given-names>E</given-names></string-name></person-group>. <article-title>Iot-based wearables: a comprehensive survey</article-title>. <comment>arXiv preprint arXiv:2304.09861</comment>. <year>2023</year>.</mixed-citation></ref>
<ref id="ref-29"><label>29.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lee</surname> <given-names>J</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>D</given-names></string-name>, <string-name><surname>Ryoo</surname> <given-names>H-Y</given-names></string-name>, <string-name><surname>Shin</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Sustainable wearables: wearable technology for enhancing the quality of human life</article-title>. <source>Sustainability</source>. <year>2016</year>;<volume>8</volume>(<issue>5</issue>):<fpage>466</fpage>. doi:<pub-id pub-id-type="doi">10.3390/su8050466</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>30.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jian</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Industrial design of wearable intelligent devices based on wireless networks</article-title>. <source>Meas: Sens</source>. <year>2023</year>;<volume>30</volume>:<fpage>100934</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.measen.2023.100934</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>31.</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Academy</surname> <given-names>CN</given-names></string-name></person-group>. <source>Introduction to networks companion guide</source>. <edition>1</edition> edition. <publisher-loc>San Jose, CA, USA</publisher-loc>: <publisher-name>CISCO</publisher-name>; <year>2013</year>.</mixed-citation></ref>
<ref id="ref-32"><label>32.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Vakhter</surname> <given-names>V</given-names></string-name>, <string-name><surname>Soysal</surname> <given-names>B</given-names></string-name>, <string-name><surname>Schaumont</surname> <given-names>P</given-names></string-name>, <string-name><surname>Guler</surname> <given-names>U</given-names></string-name></person-group>. <article-title>Threat modeling and risk analysis for miniaturized wireless biomedical devices</article-title>. <source>IEEE Internet Things J</source>. <year>2022</year>;<volume>9</volume>(<issue>15</issue>):<fpage>13338</fpage>&#x2013;<lpage>52</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2022.3144130</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>33.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rao</surname> <given-names>SP</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>H-Y</given-names></string-name>, <string-name><surname>Aura</surname> <given-names>T</given-names></string-name></person-group>. <article-title>Threat modeling framework for mobile communication systems</article-title>. <source>Comput Secur</source>. <year>2023</year>;<volume>125</volume>(<issue>5</issue>):<fpage>103047</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.cose.2022.103047</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>34.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Silva-Trujillo</surname> <given-names>AG</given-names></string-name>, <string-name><surname>Gonz&#x00E1;lez Gonz&#x00E1;lez</surname> <given-names>MJ</given-names></string-name>, <string-name><surname>Rocha P&#x00E9;rez</surname> <given-names>LP</given-names></string-name>, <string-name><surname>Garc&#x00ED;a Villalba</surname> <given-names>LJ</given-names></string-name></person-group>. <article-title>Cybersecurity analysis of wearable devices: smartwatches passive attack</article-title>. <source>Sensors</source>. <year>2023</year>;<volume>23</volume>(<issue>12</issue>):<fpage>5438</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s23125438</pub-id>; <pub-id pub-id-type="pmid">37420605</pub-id></mixed-citation></ref>
<ref id="ref-35"><label>35.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Lee</surname> <given-names>M</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>K</given-names></string-name>, <string-name><surname>Shim</surname> <given-names>J</given-names></string-name>, <string-name><surname>S-j</surname> <given-names>Cho</given-names></string-name>, <string-name><surname>Choi</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Security threat on wearable services: Empirical study using a commercial smartband</article-title>. In: <conf-name>2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)</conf-name>, <year>2016</year>; <publisher-loc>Seoul, Republic of Korea</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-36"><label>36.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Langone</surname> <given-names>M</given-names></string-name>, <string-name><surname>Setola</surname> <given-names>R</given-names></string-name>, <string-name><surname>Lopez</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Cybersecurity of wearable devices: an experimental analysis and a vulnerability assessment method</article-title>. In: <conf-name>2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)</conf-name>, <year>2017</year>; <publisher-loc>Turin, Italy</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-37"><label>37.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Siboni</surname> <given-names>S</given-names></string-name>, <string-name><surname>Shabtai</surname> <given-names>A</given-names></string-name>, <string-name><surname>Elovici</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Leaking data from enterprise networks using a compromised smartwatch device</article-title>. In: <conf-name>Proceedings of the 33rd Annual ACM Symposium on Applied Computing</conf-name>, <year>2018</year>; <publisher-loc>Pau, France</publisher-loc>.</mixed-citation></ref>
<ref id="ref-38"><label>38.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Goyal</surname> <given-names>R</given-names></string-name>, <string-name><surname>Dragoni</surname> <given-names>N</given-names></string-name>, <string-name><surname>Spognardi</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Mind the tracker you wear: a security analysis of wearable health trackers</article-title>. In: <conf-name>Proceedings of the 31st Annual ACM Symposium on Applied Computing</conf-name>, <year>2016</year>; <publisher-loc>Pisa, Italy</publisher-loc>.</mixed-citation></ref>
<ref id="ref-39"><label>39.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Arias</surname> <given-names>O</given-names></string-name>, <string-name><surname>Wurm</surname> <given-names>J</given-names></string-name>, <string-name><surname>Hoang</surname> <given-names>K</given-names></string-name>, <string-name><surname>Jin</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Privacy and security in internet of things and wearable devices</article-title>. <source>IEEE Trans Multi-Scale Comput Syst</source>. <year>2015</year>;<volume>1</volume>(<issue>2</issue>):<fpage>99</fpage>&#x2013;<lpage>109</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TMSCS.2015.2498605</pub-id>.</mixed-citation></ref>
<ref id="ref-40"><label>40.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Lotfy</surname> <given-names>K</given-names></string-name>, <string-name><surname>Hale</surname> <given-names>ML</given-names></string-name></person-group>. <article-title>Assessing pairing and data exchange mechanism security in the wearable internet of things</article-title>. In: <conf-name>2016 IEEE International Conference on Mobile Services (MS)</conf-name>, <year>2016</year>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-41"><label>41.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yan</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Qian</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Sharif</surname> <given-names>H</given-names></string-name>, <string-name><surname>Tipper</surname> <given-names>D</given-names></string-name></person-group>. <article-title>A survey on cyber security for smart grid communications</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2012</year>;<volume>14</volume>(<issue>4</issue>):<fpage>998</fpage>&#x2013;<lpage>1010</lpage>. doi:<pub-id pub-id-type="doi">10.1109/SURV.2012.010912.00035</pub-id>.</mixed-citation></ref>
<ref id="ref-42"><label>42.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mejri</surname> <given-names>MN</given-names></string-name>, <string-name><surname>Ben-Othman</surname> <given-names>J</given-names></string-name>, <string-name><surname>Hamdi</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Survey on VANET security challenges and possible cryptographic solutions</article-title>. <source>Vehicular Commun</source>. <year>2014</year>;<volume>1</volume>(<issue>2</issue>):<fpage>53</fpage>&#x2013;<lpage>66</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.vehcom.2014.05.001</pub-id>.</mixed-citation></ref>
<ref id="ref-43"><label>43.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zuo</surname> <given-names>C</given-names></string-name>, <string-name><surname>Wen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Lin</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Automatic fingerprinting of vulnerable ble iot devices with static uuids from mobile apps</article-title>. In: <conf-name>Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security</conf-name>, <year>2019</year>; <publisher-loc>London, UK</publisher-loc>.</mixed-citation></ref>
<ref id="ref-44"><label>44.</label><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>Security Advisory</collab></person-group>. <article-title>Identity authentication bypass vulnerability in the Huawei children smart watch (Simba-AL00)</article-title>; <publisher-name>HUAWEI</publisher-name>; <year>2023</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-iabvithcswsa-c385b2dc-en">https://www.huawei.com/en/psirt/security-advisories/2023/huawei-sa-iabvithcswsa-c385b2dc-en</ext-link> <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-45"><label>45.</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Riad</surname> <given-names>AKI</given-names></string-name>, <string-name><surname>Shahriar</surname> <given-names>H</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Barsha</surname> <given-names>FL</given-names></string-name></person-group>. <chapter-title>Heath device security and privacy: a comparative analysis of Fitbit, Jawbone, google glass and samsung galaxy watch</chapter-title>. In: <source>Data protection and privacy in healthcare</source>. <year>2021</year>; <publisher-loc>Boca Raton, FL, USA</publisher-loc>: <publisher-name>CRC Press</publisher-name>; p. <fpage>91</fpage>&#x2013;<lpage>108</lpage>.</mixed-citation></ref>
<ref id="ref-46"><label>46.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Ai</surname> <given-names>M</given-names></string-name>, <string-name><surname>Xue</surname> <given-names>K</given-names></string-name>, <string-name><surname>Luo</surname> <given-names>B</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>L</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>N</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>Q</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Blacktooth: breaking through the defense of bluetooth in silence</article-title>. In: <conf-name>Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security</conf-name>, <year>2022</year>; <publisher-loc>Los Angeles, CA, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-47"><label>47.</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Singh</surname> <given-names>N</given-names></string-name>, <string-name><surname>Buyya</surname> <given-names>R</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Securing cloud-based internet of things: challenges and mitigations</article-title>. <comment>arXiv preprint arXiv:2402.00356</comment>. <year>2024</year>.</mixed-citation></ref>
<ref id="ref-48"><label>48.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Contini</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Martins</surname> <given-names>LEG</given-names></string-name></person-group>. <article-title>Wearable device sensing technologies: a systematic literature review: analysis of sensors applicable to wearable devices</article-title>. <source>Res Biomed Eng</source>. <year>2024</year>;<volume>40</volume>(<issue>1</issue>):<fpage>69</fpage>&#x2013;<lpage>84</lpage>.</mixed-citation></ref>
<ref id="ref-49"><label>49.</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Paul</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sinha</surname> <given-names>S</given-names></string-name></person-group>. <chapter-title>Denial of service attacks in the internet of things</chapter-title>. In: <source>Internet of Things in modern computing</source>. <year>2023</year>; <publisher-loc>Boca Raton, FL, USA</publisher-loc>: <publisher-name>CRC Press</publisher-name>; p. <fpage>67</fpage>&#x2013;<lpage>90</lpage>.</mixed-citation></ref>
<ref id="ref-50"><label>50.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bakhshi</surname> <given-names>T</given-names></string-name>, <string-name><surname>Ghita</surname> <given-names>B</given-names></string-name>, <string-name><surname>Kuzminykh</surname> <given-names>I</given-names></string-name></person-group>. <article-title>A review of IoT firmware vulnerabilities and auditing techniques</article-title>. <source>Sensors</source>. <year>2024</year>;<volume>24</volume>(<issue>2</issue>):<fpage>708</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s24020708</pub-id>; <pub-id pub-id-type="pmid">38276399</pub-id></mixed-citation></ref>
<ref id="ref-51"><label>51.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Praveen</surname> <given-names>P</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>RK</given-names></string-name></person-group>. <article-title>Smart devices and SRAM: analyzing their impact</article-title>. In: <conf-name>2023 International Conference on Sustainable Emerging Innovations in Engineering and Technology (ICSEIET)</conf-name>, <year>2023</year>; <publisher-loc>Ghaziabad, India</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-52"><label>52.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Bang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Jang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Ro</surname> <given-names>M</given-names></string-name>, <string-name><surname>Choi</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Kwon</surname> <given-names>D</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>K</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Evaluating LoRaWAN performance in intentional and unintentional DoS attacks by legacy 900MHz network devices</article-title>. In: <conf-name>2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)</conf-name>, <year>2023</year>; <publisher-loc>Rabat, Morocco</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-53"><label>53.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sen</surname> <given-names>ERK</given-names></string-name>, <string-name><surname>Dash</surname> <given-names>EA</given-names></string-name></person-group>. <article-title>Unveiling the shadows: exploring the security challenges of the internet of things (IoT)</article-title>. <source>Int J Scientific Res Manag</source>. <year>2023</year>;<volume>7</volume>(<issue>7</issue>):<fpage>1</fpage>&#x2013;<lpage>12</lpage>. doi:<pub-id pub-id-type="doi">10.55041/IJSREM23970</pub-id>.</mixed-citation></ref>
<ref id="ref-54"><label>54.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lee</surname> <given-names>J</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>K</given-names></string-name></person-group>. <article-title>Spy in your eye: spycam attack via open-sided mobile VR device</article-title>. <source>IEICE Trans Inf Syst</source>. <year>2022</year>;<volume>105</volume>(<issue>10</issue>):<fpage>1817</fpage>&#x2013;<lpage>20</lpage>.</mixed-citation></ref>
<ref id="ref-55"><label>55.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>N</given-names></string-name>, <string-name><surname>Yuan</surname> <given-names>K</given-names></string-name>, <string-name><surname>Naveed</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>X</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>X</given-names></string-name></person-group>. <article-title>Leave me alone: App-level protection against runtime information gathering on android</article-title>. In: <conf-name>2015 IEEE Symposium on Security and Privacy</conf-name>, <year>2015</year>; <publisher-loc>San Jose, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-56"><label>56.</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Cyr</surname> <given-names>B</given-names></string-name>, <string-name><surname>Horn</surname> <given-names>W</given-names></string-name>, <string-name><surname>Miao</surname> <given-names>D</given-names></string-name>, <string-name><surname>Specter</surname> <given-names>M</given-names></string-name></person-group>. <source>Security analysis of wearable fitness devices (Fitbit)</source><italic>,</italic> <publisher-loc>Cambridge, Massachusetts, USA</publisher-loc>: <publisher-name>Massachusetts Institute of Technology</publisher-name>; <year>2014</year>. vol. <volume>1</volume>, p. <fpage>1</fpage>&#x2013;<lpage>14</lpage>.</mixed-citation></ref>
<ref id="ref-57"><label>57.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Givehchian</surname> <given-names>H</given-names></string-name>, <string-name><surname>Bhaskar</surname> <given-names>N</given-names></string-name>, <string-name><surname>Herrera</surname> <given-names>ER</given-names></string-name>, <string-name><surname>Soto</surname> <given-names>HRL</given-names></string-name>, <string-name><surname>Dameff</surname> <given-names>C</given-names></string-name>, <string-name><surname>Bharadia</surname> <given-names>D</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Evaluating physical-layer ble location tracking attacks on mobile devices</article-title>. In: <conf-name>2022 IEEE Symposium on Security and Privacy (SP)</conf-name>, <year>2022</year>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-58"><label>58.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hasan</surname> <given-names>MK</given-names></string-name>, <string-name><surname>Ghazal</surname> <given-names>TM</given-names></string-name>, <string-name><surname>Saeed</surname> <given-names>RA</given-names></string-name>, <string-name><surname>Pandey</surname> <given-names>B</given-names></string-name>, <string-name><surname>Gohel</surname> <given-names>H</given-names></string-name>, <string-name><surname>Eshmawi</surname> <given-names>AA</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things</article-title>. <source>IET Commun</source>. <year>2022</year>;<volume>16</volume>(<issue>5</issue>):<fpage>421</fpage>&#x2013;<lpage>32</lpage>.</mixed-citation></ref>
<ref id="ref-59"><label>59.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Messinis</surname> <given-names>S</given-names></string-name>, <string-name><surname>Temenos</surname> <given-names>N</given-names></string-name>, <string-name><surname>Protonotarios</surname> <given-names>NE</given-names></string-name>, <string-name><surname>Rallis</surname> <given-names>I</given-names></string-name>, <string-name><surname>Kalogeras</surname> <given-names>D</given-names></string-name>, <string-name><surname>Doulamis</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Enhancing internet of medical things security with artificial intelligence: a comprehensive review</article-title>. <source>Comput Biol Med</source>. <year>2024</year>:<fpage>108036</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.compbiomed.2024.108036</pub-id>; <pub-id pub-id-type="pmid">38295478</pub-id></mixed-citation></ref>
<ref id="ref-60"><label>60.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Krishnendu</surname> <given-names>T</given-names></string-name>, <string-name><surname>Nair</surname> <given-names>PP</given-names></string-name></person-group>. <article-title>ASLADS: a secure lightweight authentication and data transmission scheme for smart IoT devices</article-title>. In: <conf-name>2024 16th International Conference on COMmunication Systems &#x0026; NETworkS (COMSNETS)</conf-name>, <year>2024</year>; <publisher-loc>Bengaluru, India</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-61"><label>61.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Qaddoori</surname> <given-names>SL</given-names></string-name>, <string-name><surname>Fathi</surname> <given-names>la</given-names></string-name>, <string-name><surname>Hammoudy</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Ali</surname> <given-names>QI</given-names></string-name></person-group>. <article-title>Advancing public health monitoring through secure and efficient wearable technology</article-title>. <source>Int J Saf Secur Eng</source>. <year>2023</year>;<volume>13</volume>(<issue>6</issue>):<fpage>1001</fpage>&#x2013;<lpage>14</lpage>. doi:<pub-id pub-id-type="doi">10.18280/ijsse.130603</pub-id>.</mixed-citation></ref>
<ref id="ref-62"><label>62.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Nair</surname> <given-names>G</given-names></string-name></person-group>. <article-title>PacketChain: a blockchain-inspired method for enhanced security of packet communication of highly constrained IoT wearable devices</article-title>. In: <conf-name>2023 International Conference on Control, Communication and Computing (ICCC)</conf-name>, <year>2023</year>; <publisher-loc>Thiruvananthapuram, India</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-63"><label>63.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Li</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>P</given-names></string-name>, <string-name><surname>Jiao</surname> <given-names>L</given-names></string-name>, <string-name><surname>Yan</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zeng</surname> <given-names>K</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Security analysis of triangle channel-based physical layer key generation in wireless backscatter communications</article-title>. <source>IEEE Trans Inf Forensics Secur</source>. <year>2022</year>;<volume>18</volume>:<fpage>948</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TIFS.2022.3224852</pub-id>.</mixed-citation></ref>
<ref id="ref-64"><label>64.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>van Weenen</surname> <given-names>E</given-names></string-name></person-group>. <article-title>Smart wearables in healthcare</article-title>. <source>Dimensions Intell Anal Smart Digit Health Solutions: Chapman Hall/CRC</source>. <year>2024</year>;<volume>1</volume>:<fpage>23</fpage>&#x2013;<lpage>61</lpage>.</mixed-citation></ref>
<ref id="ref-65"><label>65.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Ebrahimabadi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Younis</surname> <given-names>M</given-names></string-name>, <string-name><surname>Lalouani</surname> <given-names>W</given-names></string-name>, <string-name><surname>Alshaeri</surname> <given-names>A</given-names></string-name>, <string-name><surname>Karimi</surname> <given-names>SN</given-names></string-name></person-group>. <article-title>Security protocol for wearables embedded devices&#x2019; data transmission</article-title>. In: <conf-name>2022 IEEE International Conference on E-health Networking, Application &#x0026; Services (HealthCom)</conf-name>, <year>2022</year>; <publisher-loc>Genoa, Italy</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-66"><label>66.</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Nandikotkur</surname> <given-names>A</given-names></string-name></person-group>. <source>SeniorSentry: safeguarding agetech devices and sensors using contextual anomaly detection and supervised machine learning (Master&#x2019;s Thesis)</source>. <publisher-name>Manipal Institute of Technology</publisher-name>: <publisher-loc>Manipal</publisher-loc>; <year>2023</year>.</mixed-citation></ref>
<ref id="ref-67"><label>67.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Newaz</surname> <given-names>AI</given-names></string-name>, <string-name><surname>Sikder</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Rahman</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Uluagac</surname> <given-names>AS</given-names></string-name></person-group>. <article-title>A survey on security and privacy issues in modern healthcare systems: attacks and defenses</article-title>. <source>ACM Trans Comput Healthcare</source>. <year>2021</year>;<volume>2</volume>(<issue>3</issue>):<fpage>1</fpage>&#x2013;<lpage>44</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3453176</pub-id>.</mixed-citation></ref>
<ref id="ref-68"><label>68.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Li</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>N</given-names></string-name>, <string-name><surname>Ni</surname> <given-names>J</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Du</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Secure and lightweight authentication with key agreement for smart wearable systems</article-title>. <source>IEEE Internet Things J</source>. <year>2020</year>;<volume>7</volume>(<issue>8</issue>):<fpage>7334</fpage>&#x2013;<lpage>44</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2020.2984618</pub-id>.</mixed-citation></ref>
<ref id="ref-69"><label>69.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Diaz</surname> <given-names>RAC</given-names></string-name>, <string-name><surname>Ghita</surname> <given-names>M</given-names></string-name>, <string-name><surname>Copot</surname> <given-names>D</given-names></string-name>, <string-name><surname>Birs</surname> <given-names>IR</given-names></string-name>, <string-name><surname>Muresan</surname> <given-names>C</given-names></string-name>, <string-name><surname>Ionescu</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Context aware control systems: an engineering applications perspective</article-title>. <source>IEEE Access</source>. <year>2020</year>;<volume>8</volume>:<fpage>215550</fpage>&#x2013;<lpage>69</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2020.3041357</pub-id>.</mixed-citation></ref>
<ref id="ref-70"><label>70.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fuster</surname> <given-names>J</given-names></string-name>, <string-name><surname>Solera-Cotanilla</surname> <given-names>S</given-names></string-name>, <string-name><surname>P&#x00E9;rez</surname> <given-names>J</given-names></string-name>, <string-name><surname>Vega-Barbas</surname> <given-names>M</given-names></string-name>, <string-name><surname>Palacios</surname> <given-names>R</given-names></string-name>, <string-name><surname>Alvarez-Campana</surname> <given-names>M</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Analysis of security and privacy issues in wearables for minors</article-title>. <source>Wirel Netw</source>. <year>2023</year>:<fpage>1</fpage>&#x2013;<lpage>17</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11276-022-03211-6</pub-id>.</mixed-citation></ref>
<ref id="ref-71"><label>71.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Buttyan</surname> <given-names>L</given-names></string-name>, <string-name><surname>Holczer</surname> <given-names>T</given-names></string-name></person-group>. <article-title>Traffic analysis attacks and countermeasures in wireless body area sensor networks</article-title>. In: <conf-name>2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)</conf-name>, <year>2012</year>; <publisher-loc>San Francisco, CA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-72"><label>72.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Barman</surname> <given-names>L</given-names></string-name>, <string-name><surname>Dumur</surname> <given-names>A</given-names></string-name>, <string-name><surname>Pyrgelis</surname> <given-names>A</given-names></string-name>, <string-name><surname>Hubaux</surname> <given-names>J-P</given-names></string-name></person-group>. <article-title>Every byte matters: traffic analysis of bluetooth wearable devices</article-title>. <source>Proc ACM Interact Mo</source>. <year>2021</year>;<volume>5</volume>(<issue>2</issue>):<fpage>1</fpage>&#x2013;<lpage>45</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3463512</pub-id>.</mixed-citation></ref>
<ref id="ref-73"><label>73.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Seeam</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ogbeh</surname> <given-names>OS</given-names></string-name>, <string-name><surname>Guness</surname> <given-names>S</given-names></string-name>, <string-name><surname>Bellekens</surname> <given-names>X</given-names></string-name></person-group>. <article-title>Threat modeling and security issues for the internet of things</article-title>. In: <conf-name>2019 Conference on Next Generation Computing Applications (NextComp)</conf-name>, <year>2019</year>; <publisher-loc>Mauritius</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-74"><label>74.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Affia</surname> <given-names>AO</given-names></string-name>, <string-name><surname>Finch</surname> <given-names>H</given-names></string-name>, <string-name><surname>Jung</surname> <given-names>W</given-names></string-name>, <string-name><surname>Samori</surname> <given-names>IA</given-names></string-name>, <string-name><surname>Potter</surname> <given-names>L</given-names></string-name>, <string-name><surname>Palmer</surname> <given-names>X-L</given-names></string-name></person-group>. <article-title>IoT health devices: exploring security risks in the connected landscape</article-title>. <source>IoT</source>. <year>2023</year>;<volume>4</volume>(<issue>2</issue>):<fpage>150</fpage>&#x2013;<lpage>82</lpage>. doi:<pub-id pub-id-type="doi">10.3390/iot4020009</pub-id>.</mixed-citation></ref>
<ref id="ref-75"><label>75.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ching</surname> <given-names>KW</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>MM</given-names></string-name></person-group>. <article-title>Wearable technology devices security and privacy vulnerability analysis</article-title>. <source>Int J Netw Secur Its Appl</source>. <year>2016</year>;<volume>8</volume>(<issue>3</issue>):<fpage>19</fpage>&#x2013;<lpage>30</lpage>. doi:<pub-id pub-id-type="doi">10.5121/ijnsa.2016.8302</pub-id>.</mixed-citation></ref>
<ref id="ref-76"><label>76.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Classen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wegemer</surname> <given-names>D</given-names></string-name>, <string-name><surname>Patras</surname> <given-names>P</given-names></string-name>, <string-name><surname>Spink</surname> <given-names>T</given-names></string-name>, <string-name><surname>Hollick</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Anatomy of a vulnerable fitness tracking system: dissecting the fitbit cloud, app, and firmware</article-title>. <source>Proc ACM Interact Mo</source>. <year>2018</year>;<volume>2</volume>(<issue>1</issue>):<fpage>1</fpage>&#x2013;<lpage>24</lpage>.</mixed-citation></ref>
<ref id="ref-77"><label>77.</label><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>Meredith CMTaKA</collab></person-group>. <article-title>The vulnerabilities of medical and wearable devices: tucker ellis</article-title>; <year>2020</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://www.tuckerellis.com/publications/the-vulnerabilities-of-medical-and-wearable-devices/">https://www.tuckerellis.com/publications/the-vulnerabilities-of-medical-and-wearable-devices/</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-78"><label>78.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aksu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Uluagac</surname> <given-names>AS</given-names></string-name>, <string-name><surname>Bentley</surname> <given-names>ES</given-names></string-name></person-group>. <article-title>Identification of wearable devices with bluetooth</article-title>. <source>IEEE Trans Sustain Comput</source>. <year>2018</year>;<volume>6</volume>(<issue>2</issue>):<fpage>221</fpage>&#x2013;<lpage>30</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TSUSC.2018.2808455</pub-id>.</mixed-citation></ref>
<ref id="ref-79"><label>79.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chong</surname> <given-names>Y-W</given-names></string-name>, <string-name><surname>Ismail</surname> <given-names>W</given-names></string-name>, <string-name><surname>Ko</surname> <given-names>K</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>C-Y</given-names></string-name></person-group>. <article-title>Energy harvesting for wearable devices: a review</article-title>. <source>IEEE Sens J</source>. <year>2019</year>;<volume>19</volume>(<issue>20</issue>):<fpage>9047</fpage>&#x2013;<lpage>62</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JSEN.2019.2925638</pub-id>.</mixed-citation></ref>
<ref id="ref-80"><label>80.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tseng</surname> <given-names>TW</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>CT</given-names></string-name>, <string-name><surname>Lai</surname> <given-names>F</given-names></string-name></person-group>. <article-title>Threat analysis for wearable health devices and environment monitoring internet of things integration system</article-title>. <source>IEEE Access</source>. <year>2019</year>;<volume>7</volume>:<fpage>144983</fpage>&#x2013;<lpage>94</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2019.2946081</pub-id>.</mixed-citation></ref>
<ref id="ref-81"><label>81.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Vasilevski</surname> <given-names>I</given-names></string-name>, <string-name><surname>Blazhevski</surname> <given-names>D</given-names></string-name>, <string-name><surname>Pachovski</surname> <given-names>V</given-names></string-name>, <string-name><surname>Stojmenovska</surname> <given-names>I</given-names></string-name></person-group>. <article-title>Five years later: how effective is the MAC randomization in practice? The no-at-all attack</article-title>. In: <conf-name>ICT Innovations 2019 Big Data Processing and Mining: 11th International Conference, ICT Innovations 2019</conf-name>, <year>2019 Oct 17&#x2013;19</year>; <publisher-loc>Ohrid, North Macedonia</publisher-loc>: <publisher-name>Springer</publisher-name>.</mixed-citation></ref>
<ref id="ref-82"><label>82.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Holliman</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhivich</surname> <given-names>M</given-names></string-name>, <string-name><surname>Khazan</surname> <given-names>R</given-names></string-name>, <string-name><surname>Swiston</surname> <given-names>A</given-names></string-name>, <string-name><surname>Telfer</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Building low-power trustworthy systems: cyber-security considerations for real-time physiological status monitoring</article-title>. In: <conf-name>MILCOM 2016&#x2013;2016 IEEE Military Communications Conference</conf-name>, <year>2016</year>; <publisher-loc>Baltimore, MD, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-83"><label>83.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Vithanwattana</surname> <given-names>N</given-names></string-name>, <string-name><surname>Mapp</surname> <given-names>G</given-names></string-name>, <string-name><surname>George</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Developing a comprehensive information security framework for mHealth: a detailed analysis</article-title>. <source>J Reliable Intell Environ</source>. <year>2017</year>;<volume>3</volume>:<fpage>21</fpage>&#x2013;<lpage>39</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s40860-017-0038-x</pub-id>.</mixed-citation></ref>
<ref id="ref-84"><label>84.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Montanz Rodriguez</surname> <given-names>R</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Cyber social engineering kill chain</article-title>. In: <conf-name>International Conference on Science of Cyber Security</conf-name>, <year>2022</year>; <publisher-loc>Matsue, Japan</publisher-loc>: <publisher-name>Springer</publisher-name>.</mixed-citation></ref>
<ref id="ref-85"><label>85.</label><mixed-citation publication-type="other"><article-title>Exploit public-facing application: MITRE ATTACK</article-title>; <year>2024</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1190/">https://attack.mitre.org/</ext-link> <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1190/">techniques/T1190/</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-86"><label>86.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Jabar</surname> <given-names>T</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>MM</given-names></string-name>, <string-name><surname>Al-Kadhimi</surname> <given-names>AA</given-names></string-name></person-group>. <article-title>Mobile advanced persistent threat detection using device behavior (SHOVEL) framework</article-title>. In: <conf-name>Proceedings of the 8th International Conference on Computational Science and Technology: ICCST 2021</conf-name>, <year>2022 Aug 28&#x2013;29</year>; <publisher-loc>Labuan, Malaysia</publisher-loc>: <publisher-name>Springer</publisher-name>.</mixed-citation></ref>
<ref id="ref-87"><label>87.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Farooqui</surname> <given-names>MNI</given-names></string-name>, <string-name><surname>Arshad</surname> <given-names>J</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>MM</given-names></string-name></person-group>. <article-title>A layered approach to threat modeling for 5G-based systems</article-title>. <source>Electronics</source>. <year>2022</year>;<volume>11</volume>(<issue>12</issue>):<fpage>1819</fpage>. doi:<pub-id pub-id-type="doi">10.3390/electronics11121819</pub-id>.</mixed-citation></ref>
<ref id="ref-88"><label>88.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Kwon</surname> <given-names>R</given-names></string-name>, <string-name><surname>Ashley</surname> <given-names>T</given-names></string-name>, <string-name><surname>Castleberry</surname> <given-names>J</given-names></string-name>, <string-name><surname>Mckenzie</surname> <given-names>P</given-names></string-name>, <string-name><surname>Gourisetti</surname> <given-names>SNG</given-names></string-name></person-group>. <article-title>Cyber threat dictionary using mitre att&#x0026;ck matrix and nist cybersecurity framework mapping</article-title>. In: <conf-name>2020 Resilience Week (RWS)</conf-name>, <year>2020</year>; <publisher-loc>Salt Lake City, UT, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-89"><label>89.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lakshminarayana</surname> <given-names>S</given-names></string-name>, <string-name><surname>Praseed</surname> <given-names>A</given-names></string-name>, <string-name><surname>Thilagam</surname> <given-names>PS</given-names></string-name></person-group>. <article-title>Securing the IoT application layer from an MQTT protocol perspective: challenges and research prospects</article-title>. <source>IEEE Commun Surv Tutor</source>. <year>2024</year>:<fpage>1</fpage>. doi:<pub-id pub-id-type="doi">10.1109/COMST.2024.3372630</pub-id>.</mixed-citation></ref>
<ref id="ref-90"><label>90.</label><mixed-citation publication-type="other"><article-title>Native API: MITRE ATT&#x0026;CK</article-title>; <year>2024</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1575/">https://attack.mitre.org/techniques/T1575/</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-91"><label>91.</label><mixed-citation publication-type="other"><article-title>Command and scripting interpreter: MITRE ATT&#x0026;CK</article-title>; <year>2024</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1623/">https://attack.mitre.org/techniques/T1623/</ext-link>. <comment>[Accessed on 2024]</comment>.</mixed-citation></ref>
<ref id="ref-92"><label>92.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Addo</surname> <given-names>EO</given-names></string-name>, <string-name><surname>Kommey</surname> <given-names>B</given-names></string-name>, <string-name><surname>Agbemenu</surname> <given-names>AS</given-names></string-name></person-group>. <article-title>Wearable networks: requirements, technologies, and research trends</article-title>. <source>Int J Appl Inf Syst</source>. <year>2019</year>;<volume>12</volume>(<issue>20</issue>):<fpage>1</fpage>&#x2013;<lpage>7</lpage>. doi:<pub-id pub-id-type="doi">10.5120/ijais2019451789</pub-id>.</mixed-citation></ref>
<ref id="ref-93"><label>93.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Karabacak</surname> <given-names>F</given-names></string-name>, <string-name><surname>Ogras</surname> <given-names>U</given-names></string-name>, <string-name><surname>Ozev</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Malicious activity detection in lightweight wearable and iot devices using signal stitching</article-title>. <source>Sensors</source>. <year>2021</year>;<volume>21</volume>(<issue>10</issue>):<fpage>3408</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s21103408</pub-id>; <pub-id pub-id-type="pmid">34068359</pub-id></mixed-citation></ref>
<ref id="ref-94"><label>94.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahn</surname> <given-names>G</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>K</given-names></string-name>, <string-name><surname>Park</surname> <given-names>W</given-names></string-name>, <string-name><surname>Shin</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Malicious file detection method using machine learning and interworking with MITRE ATT&#x0026;CK framework</article-title>. <source>Appl Sci</source>. <year>2022</year>;<volume>12</volume>(<issue>21</issue>):<fpage>10761</fpage>. doi:<pub-id pub-id-type="doi">10.3390/app122110761</pub-id>.</mixed-citation></ref>
<ref id="ref-95"><label>95.</label><mixed-citation publication-type="other"><article-title>Subvert trust controls: MITRE ATT&#x0026;CK</article-title>; <year>2024</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1632/">https://attack.mitre.org/techniques/T1632/</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-96"><label>96.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hayashi</surname> <given-names>VT</given-names></string-name>, <string-name><surname>Ruggiero</surname> <given-names>WV</given-names></string-name></person-group>. <article-title>Hands-free authentication for virtual assistants with trusted IoT device and machine learning</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>4</issue>):<fpage>1325</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s22041325</pub-id>; <pub-id pub-id-type="pmid">35214227</pub-id></mixed-citation></ref>
<ref id="ref-97"><label>97.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wu</surname> <given-names>H</given-names></string-name>, <string-name><surname>O&#x2019;Connor</surname> <given-names>NE</given-names></string-name>, <string-name><surname>Bruton</surname> <given-names>J</given-names></string-name>, <string-name><surname>Hall</surname> <given-names>A</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Real-time anomaly detection for an admm-based optimal transmission frequency management system for IoT devices</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>16</issue>):<fpage>5945</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s22165945</pub-id>; <pub-id pub-id-type="pmid">36015710</pub-id></mixed-citation></ref>
<ref id="ref-98"><label>98.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ferrag</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Maglaras</surname> <given-names>L</given-names></string-name>, <string-name><surname>Derhab</surname> <given-names>A</given-names></string-name>, <string-name><surname>Janicke</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues</article-title>. <source>Telecommun Syst</source>. <year>2020</year>;<volume>73</volume>(<issue>2</issue>):<fpage>317</fpage>&#x2013;<lpage>48</lpage>.</mixed-citation></ref>
<ref id="ref-99"><label>99.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kaur</surname> <given-names>R</given-names></string-name>, <string-name><surname>Shahrestani</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ruan</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Security and privacy of wearable wireless sensors in healthcare: a systematic review</article-title>. <source>Comput Netw Commun</source>. <year>2024</year>:<fpage>24</fpage>&#x2013;<lpage>48</lpage>. doi:<pub-id pub-id-type="doi">10.37256/cnc.2120243852</pub-id>.</mixed-citation></ref>
<ref id="ref-100"><label>100.</label><mixed-citation publication-type="other"><article-title>Disk wipe: disk content wipe: MITRE ATT&#x0026;CK</article-title>; <year>2024</year>. Available from: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1561/001/">https://attack.mitre.org/</ext-link> <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1561/001/">techniques/T1561/001/</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-101"><label>101.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>L&#x00F3;pez Mart&#x00ED;nez</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gil P&#x00E9;rez</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ruiz-Mart&#x00ED;nez</surname> <given-names>A</given-names></string-name></person-group>. <article-title>A comprehensive review of the state-of-the-art on security and privacy issues in healthcare</article-title>. <source>ACM Comput Surv</source>. <year>2023</year>;<volume>55</volume>(<issue>12</issue>):<fpage>1</fpage>&#x2013;<lpage>38</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3571156</pub-id>.</mixed-citation></ref>
<ref id="ref-102"><label>102.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Papaioannou</surname> <given-names>M</given-names></string-name>, <string-name><surname>Karageorgou</surname> <given-names>M</given-names></string-name>, <string-name><surname>Mantas</surname> <given-names>G</given-names></string-name>, <string-name><surname>Sucasas</surname> <given-names>V</given-names></string-name>, <string-name><surname>Essop</surname> <given-names>I</given-names></string-name>, <string-name><surname>Rodriguez</surname> <given-names>J</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>A survey on security threats and countermeasures in internet of medical things (IoMT)</article-title>. <source>Trans Emerg Telecomm Technol</source>. <year>2022</year>;<volume>33</volume>(<issue>6</issue>):<fpage>e4049</fpage>. doi:<pub-id pub-id-type="doi">10.1002/ett.4049</pub-id>.</mixed-citation></ref>
<ref id="ref-103"><label>103.</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Besson</surname> <given-names>P-V</given-names></string-name>, <string-name><surname>Tong</surname> <given-names>VVT</given-names></string-name>, <string-name><surname>Guette</surname> <given-names>G</given-names></string-name>, <string-name><surname>Piolle</surname> <given-names>G</given-names></string-name>, <string-name><surname>Abgrall</surname> <given-names>E</given-names></string-name></person-group>. <article-title>Ursid: using formalism to refine attack scenarios for vulnerable infrastructure deployment</article-title>. <comment>arXiv preprint arXiv:230317373</comment>. <year>2023</year>.</mixed-citation></ref>
<ref id="ref-104"><label>104.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zahid</surname> <given-names>S</given-names></string-name>, <string-name><surname>Mazhar</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Abbas</surname> <given-names>SG</given-names></string-name>, <string-name><surname>Hanif</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Hina</surname> <given-names>S</given-names></string-name>, <string-name><surname>Shah</surname> <given-names>GA</given-names></string-name></person-group>. <article-title>Threat modeling in smart firefighting systems: aligning MITRE ATT&#x0026;CK matrix and NIST security controls</article-title>. <source>Internet Things</source>. <year>2023</year>;<volume>22</volume>:<fpage>100766</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.iot.2023.100766</pub-id>.</mixed-citation></ref>
<ref id="ref-105"><label>105.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rencelj Ling</surname> <given-names>E</given-names></string-name>, <string-name><surname>Ekstedt</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Estimating time-to-compromise for industrial control system attack techniques through vulnerability data</article-title>. <source>SN Comput Sci</source>. <year>2023</year>;<volume>4</volume>(<issue>3</issue>):<fpage>318</fpage>.</mixed-citation></ref>
<ref id="ref-106"><label>106.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Berady</surname> <given-names>A</given-names></string-name>, <string-name><surname>Jaume</surname> <given-names>M</given-names></string-name>, <string-name><surname>Tong</surname> <given-names>VVT</given-names></string-name>, <string-name><surname>Guette</surname> <given-names>G</given-names></string-name></person-group>. <article-title>PWNJUTSU: a dataset and a semantics-driven approach to retrace attack campaigns</article-title>. <source>IEEE Trans Netw Service Manag</source>. <year>2022</year>;<volume>19</volume>(<issue>4</issue>):<fpage>5252</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TNSM.2022.3183476</pub-id>.</mixed-citation></ref>
<ref id="ref-107"><label>107.</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Alamleh</surname> <given-names>H</given-names></string-name>, <string-name><surname>Gogarty</surname> <given-names>M</given-names></string-name>, <string-name><surname>Ruddell</surname> <given-names>D</given-names></string-name>, <string-name><surname>AlQahtani</surname> <given-names>AAS</given-names></string-name></person-group>. <article-title>Securing the invisible thread: a comprehensive analysis of BLE tracker security in apple AirTags and samsung SmartTags</article-title>. <comment>arXiv preprint arXiv:240113584</comment>. <year>2024</year>.</mixed-citation></ref>
<ref id="ref-108"><label>108.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Saxena</surname> <given-names>P</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>SK</given-names></string-name></person-group>. <article-title>Analysis of network traffic by using packet sniffing tool: wireshark</article-title>. <source>Int J Adv Res, Ideas Innov Technol</source>. <year>2017</year>;<volume>3</volume>(<issue>6</issue>):<fpage>804</fpage>&#x2013;<lpage>8</lpage>.</mixed-citation></ref>
<ref id="ref-109"><label>109.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Paravathi</surname> <given-names>C</given-names></string-name>, <string-name><surname>Roshini</surname> <given-names>D</given-names></string-name>, <string-name><surname>Nayak</surname> <given-names>SS</given-names></string-name></person-group>. <article-title>Packet sniffing</article-title>. <source>Int J Eng Manag Res</source>. <year>2024</year>;<volume>14</volume>(<issue>1</issue>):<fpage>71</fpage>&#x2013;<lpage>6</lpage>.</mixed-citation></ref>
<ref id="ref-110"><label>110.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Alexeevskaya</surname> <given-names>YA</given-names></string-name>, <string-name><surname>Molodtsova</surname> <given-names>YV</given-names></string-name>, <string-name><surname>Alexeevsky</surname> <given-names>RA</given-names></string-name></person-group>. <article-title>Forensic search for traces of unauthorized access using the kerberos authentication protocol</article-title>. In: <conf-name>2023 International Russian Smart Industry Conference (SmartIndustryCon)</conf-name>, <year>2023</year>; <publisher-loc>Sochi, Russian Federation</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-111"><label>111.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Behfar</surname> <given-names>MH</given-names></string-name>, <string-name><surname>Di Vito</surname> <given-names>D</given-names></string-name>, <string-name><surname>Korhonen</surname> <given-names>A</given-names></string-name>, <string-name><surname>Nguyen</surname> <given-names>D</given-names></string-name>, <string-name><surname>Amin</surname> <given-names>BM</given-names></string-name>, <string-name><surname>Kurkela</surname> <given-names>T</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Fully integrated wireless elastic wearable systems for health monitoring applications</article-title>. <source>IEEE Trans Compon, Packag Manuf Technol</source>. <year>2021</year>;<volume>11</volume>(<issue>6</issue>):<fpage>1022</fpage>&#x2013;<lpage>7</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TCPMT.2021.3082647</pub-id>.</mixed-citation></ref>
<ref id="ref-112"><label>112.</label><mixed-citation publication-type="other"><article-title>Remote services: MITRE ATT&#x0026;CK</article-title>; <year>2024</year>. <comment> </comment>Available from: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1021/">https://attack.mitre.org/techniques/T1021/</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-113"><label>113.</label><mixed-citation publication-type="other"><article-title>Data from local system: MITRE ATT&#x0026;CK</article-title>; <year>2024</year>. <comment> </comment>Available from: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1533/">https://attack.mitre.org/techn</ext-link> <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1533/">iques/T1533/</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-114"><label>114.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mills</surname> <given-names>AJ</given-names></string-name>, <string-name><surname>Watson</surname> <given-names>RT</given-names></string-name>, <string-name><surname>Pitt</surname> <given-names>L</given-names></string-name>, <string-name><surname>Kietzmann</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Wearing safe: physical and informational security in the age of the wearable device</article-title>. <source>Business Horizons</source>. <year>2016</year>;<volume>59</volume>(<issue>6</issue>):<fpage>615</fpage>&#x2013;<lpage>22</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.bushor.2016.08.003</pub-id>.</mixed-citation></ref>
<ref id="ref-115"><label>115.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Guo</surname> <given-names>X</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Friend or foe? Your wearable devices reveal your personal pin</article-title>. In: <conf-name>Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security</conf-name>, <publisher-loc>Xi'an, China</publisher-loc>, <year>2016</year></mixed-citation></ref>
<ref id="ref-116"><label>116.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Das</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Pathak</surname> <given-names>PH</given-names></string-name>, <string-name><surname>Chuah</surname> <given-names>C-N</given-names></string-name>, <string-name><surname>Mohapatra</surname> <given-names>P</given-names></string-name></person-group>. <article-title>Uncovering privacy leakage in BLE network traffic of wearable fitness trackers</article-title>. In: <conf-name>Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications</conf-name>, <publisher-loc>St. Augustine, FL, USA</publisher-loc>, <year>2016</year></mixed-citation></ref>
<ref id="ref-117"><label>117.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chinaei</surname> <given-names>MH</given-names></string-name>, <string-name><surname>Gharakheili</surname> <given-names>HH</given-names></string-name>, <string-name><surname>Sivaraman</surname> <given-names>V</given-names></string-name></person-group>. <article-title>Optimal witnessing of healthcare IoT data using blockchain logging contract</article-title>. <source>IEEE Internet Things J</source>. <year>2021</year>;<volume>8</volume>(<issue>12</issue>):<fpage>10117</fpage>&#x2013;<lpage>30</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2021.3051433</pub-id>.</mixed-citation></ref>
<ref id="ref-118"><label>118.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Song</surname> <given-names>W</given-names></string-name>, <string-name><surname>Jia</surname> <given-names>H</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>M</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Xue</surname> <given-names>W</given-names></string-name>, <string-name><surname>Chou</surname> <given-names>CT</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Pistis: replay attack and liveness detection for gait-based user authentication system on wearable devices using vibration</article-title>. <source>IEEE Internet Things J</source>. <year>2022</year>;<volume>10</volume>(<issue>9</issue>):<fpage>8155</fpage>&#x2013;<lpage>71</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2022.3231381</pub-id>.</mixed-citation></ref>
<ref id="ref-119"><label>119.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Bie</surname> <given-names>R</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>F</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>N</given-names></string-name>, <string-name><surname>Cheng</surname> <given-names>X</given-names></string-name>, <string-name><surname>Choi</surname> <given-names>H-A</given-names></string-name></person-group>. <article-title>Security in wearable communications</article-title>. <source>IEEE Netw</source>. <year>2016</year>;<volume>30</volume>(<issue>5</issue>):<fpage>61</fpage>&#x2013;<lpage>7</lpage>.</mixed-citation></ref>
<ref id="ref-120"><label>120.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Guill&#x00E9;n-G&#x00E1;mez</surname> <given-names>FD</given-names></string-name>, <string-name><surname>Mayorga-Fern&#x00E1;ndez</surname> <given-names>MJ</given-names></string-name></person-group>. <article-title>Empirical study based on the perceptions of patients and relatives about the acceptance of wearable devices to improve their health and prevent possible diseases</article-title>. <source>Mob Inf Syst</source>. <year>2019</year>;<volume>2019</volume>(<issue>1</issue>):<fpage>4731048</fpage>. doi:<pub-id pub-id-type="doi">10.1155/2019/4731048</pub-id>.</mixed-citation></ref>
<ref id="ref-121"><label>121.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Isai</surname> <given-names>U</given-names></string-name>, <string-name><surname>Karthikeyan</surname> <given-names>G</given-names></string-name>, <string-name><surname>Harideesh</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Wireless home automation communication and security with internet of things</article-title>. In: <conf-name>2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE)</conf-name>, <year>2020</year>; <publisher-loc>Vellore, India</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-122"><label>122.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ioannidou</surname> <given-names>I</given-names></string-name>, <string-name><surname>Sklavos</surname> <given-names>N</given-names></string-name></person-group>. <article-title>On general data protection regulation vulnerabilities and privacy issues, for wearable devices and fitness tracking applications</article-title>. <source>Cryptography</source>. <year>2021</year>;<volume>5</volume>(<issue>4</issue>):<fpage>29</fpage>. doi:<pub-id pub-id-type="doi">10.3390/cryptography5040029</pub-id>.</mixed-citation></ref>
<ref id="ref-123"><label>123.</label><mixed-citation publication-type="other"><article-title>Exfiltration over C2 channel: MITRE ATT&#x0026;CK</article-title>; <year>2024</year>. <comment> </comment>Available from: <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1646/">https://attack.mitre.org/techn</ext-link> <ext-link ext-link-type="uri" xlink:href="https://attack.mitre.org/techniques/T1646/">iques/T1646/</ext-link>. <comment>[Accessed 2024]</comment>.</mixed-citation></ref>
<ref id="ref-124"><label>124.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Datta</surname> <given-names>P</given-names></string-name>, <string-name><surname>Namin</surname> <given-names>AS</given-names></string-name>, <string-name><surname>Chatterjee</surname> <given-names>M</given-names></string-name></person-group>. <article-title>A survey of privacy concerns in wearable devices</article-title>. In: <conf-name>2018 IEEE International Conference on Big Data (Big Data)</conf-name>, <year>2018</year>; <publisher-loc>Seattle, WA, USA</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-125"><label>125.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Al-Khafajiy</surname> <given-names>M</given-names></string-name>, <string-name><surname>Baker</surname> <given-names>T</given-names></string-name>, <string-name><surname>Chalmers</surname> <given-names>C</given-names></string-name>, <string-name><surname>Asim</surname> <given-names>M</given-names></string-name>, <string-name><surname>Kolivand</surname> <given-names>H</given-names></string-name>, <string-name><surname>Fahim</surname> <given-names>M</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Remote health monitoring of elderly through wearable sensors</article-title>. <source>Multimed Tools Appl</source>. <year>2019</year>;<volume>78</volume>(<issue>17</issue>):<fpage>24681</fpage>&#x2013;<lpage>706</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-018-7134-7</pub-id>.</mixed-citation></ref>
<ref id="ref-126"><label>126.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rao</surname> <given-names>V</given-names></string-name>, <string-name><surname>Prema</surname> <given-names>K</given-names></string-name></person-group>. <article-title>A review on lightweight cryptography for internet-of-things based applications</article-title>. <source>J Ambient Intell Humanized Comput</source>. <year>2021</year>;<volume>12</volume>(<issue>9</issue>):<fpage>8835</fpage>&#x2013;<lpage>57</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s12652-020-02672-x</pub-id>.</mixed-citation></ref>
<ref id="ref-127"><label>127.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kim</surname> <given-names>K</given-names></string-name>, <string-name><surname>Alfouzan</surname> <given-names>FA</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>H</given-names></string-name></person-group>. <article-title>Cyber-attack scoring model based on the offensive cybersecurity framework</article-title>. <source>Appl Sci</source>. <year>2021</year>;<volume>11</volume>(<issue>16</issue>):<fpage>7738</fpage>. doi:<pub-id pub-id-type="doi">10.3390/app11167738</pub-id>.</mixed-citation></ref>
<ref id="ref-128"><label>128.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Amro</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gkioulos</surname> <given-names>V</given-names></string-name>, <string-name><surname>Katsikas</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Assessing cyber risk in cyber-physical systems using the ATT&#x0026;CK framework</article-title>. <source>ACM Trans Priv Secur</source>. <year>2023</year>;<volume>26</volume>(<issue>2</issue>):<fpage>1</fpage>&#x2013;<lpage>33</lpage>. doi:<pub-id pub-id-type="doi">10.1145/3571733</pub-id>.</mixed-citation></ref>
<ref id="ref-129"><label>129.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hassija</surname> <given-names>V</given-names></string-name>, <string-name><surname>Chamola</surname> <given-names>V</given-names></string-name>, <string-name><surname>Bajpai</surname> <given-names>BC</given-names></string-name>, <string-name><surname>Zeadally</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Security issues in implantable medical devices: fact or fiction?</article-title> <source>Sustain Cities Soc</source>. <year>2021</year>;<volume>66</volume>:<fpage>102552</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.scs.2020.102552</pub-id>.</mixed-citation></ref>
<ref id="ref-130"><label>130.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gupta</surname> <given-names>A</given-names></string-name>, <string-name><surname>Tripathi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Muhuri</surname> <given-names>S</given-names></string-name>, <string-name><surname>Singal</surname> <given-names>G</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>N</given-names></string-name></person-group>. <article-title>A secure and lightweight anonymous mutual authentication scheme for wearable devices in medical internet of things</article-title>. <source>J Inf Secur Appl</source>. <year>2022</year>;<volume>68</volume>:<fpage>103259</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jisa.2022.103259</pub-id>.</mixed-citation></ref>
<ref id="ref-131"><label>131.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Tian</surname> <given-names>D</given-names></string-name>, <string-name><surname>Fortino</surname> <given-names>G</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Humar</surname> <given-names>I</given-names></string-name></person-group>. <article-title>Network slicing technology in a 5G wearable network</article-title>. <source>IEEE Commun Stand Mag</source>. <year>2018</year>;<volume>2</volume>(<issue>1</issue>):<fpage>66</fpage>&#x2013;<lpage>71</lpage>. doi:<pub-id pub-id-type="doi">10.1109/MCOMSTD.2018.1700083</pub-id>.</mixed-citation></ref>
<ref id="ref-132"><label>132.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jan</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>F</given-names></string-name>, <string-name><surname>Khan</surname> <given-names>R</given-names></string-name>, <string-name><surname>Mastorakis</surname> <given-names>S</given-names></string-name>, <string-name><surname>Menon</surname> <given-names>VG</given-names></string-name>, <string-name><surname>Alazab</surname> <given-names>M</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Lightweight mutual authentication and privacy-preservation scheme for intelligent wearable devices in industrial-CPS</article-title>. <source>IEEE Trans Ind Inf</source>. <year>2020</year>;<volume>17</volume>(<issue>8</issue>):<fpage>5829</fpage>&#x2013;<lpage>39</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TII.2020.3043802</pub-id>; <pub-id pub-id-type="pmid">33981186</pub-id></mixed-citation></ref>
<ref id="ref-133"><label>133.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shi</surname> <given-names>H</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>H</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Gao</surname> <given-names>W</given-names></string-name>, <string-name><surname>Dou</surname> <given-names>S-C</given-names></string-name></person-group>. <article-title>Systematic analysis of a military wearable device based on a multi-level fusion framework: research directions</article-title>. <source>Sensors</source>. <year>2019</year>;<volume>19</volume>(<issue>12</issue>):<fpage>2651</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s19122651</pub-id>; <pub-id pub-id-type="pmid">31212742</pub-id></mixed-citation></ref>
<ref id="ref-134"><label>134.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ajakwe</surname> <given-names>SO</given-names></string-name>, <string-name><surname>Nwakanma</surname> <given-names>CI</given-names></string-name>, <string-name><surname>Kim</surname> <given-names>D-S</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>J-M</given-names></string-name></person-group>. <article-title>Key wearable device technologies parameters for innovative healthcare delivery in B5G network: a review</article-title>. <source>IEEE Access</source>. <year>2022</year>;<volume>10</volume>:<fpage>49956</fpage>&#x2013;<lpage>74</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2022.3173643</pub-id>.</mixed-citation></ref>
<ref id="ref-135"><label>135.</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Thakkar</surname> <given-names>HK</given-names></string-name>, <string-name><surname>Chowdhury</surname> <given-names>SR</given-names></string-name>, <string-name><surname>Bhoi</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Barsocchi</surname> <given-names>P</given-names></string-name></person-group>. <chapter-title>Applications of wearable technologies in healthcare: an analytical study</chapter-title>. In: <source>5G IoT and edge computing for smart healthcare</source>. <publisher-loc>Cambridge, MA, USA</publisher-loc>: <publisher-name>Elsevier</publisher-name>; <year>2022</year>. p. <fpage>279</fpage>&#x2013;<lpage>99</lpage>.</mixed-citation></ref>
<ref id="ref-136"><label>136.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Revathi</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Protocols for secure Internet of Things</article-title>. <source>Int J Educ Manag Eng</source>. <year>2017</year>;<volume>7</volume>(<issue>2</issue>):<fpage>20</fpage>.</mixed-citation></ref>
<ref id="ref-137"><label>137.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Wang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>F</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>H</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>Z</given-names></string-name></person-group>. <article-title>BlueDoor: breaking the secure information flow via BLE vulnerability</article-title>. In: <conf-name>Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services</conf-name>, <publisher-loc>Toronto, ON, Canada</publisher-loc>, <year>2020</year>; p. <fpage>286</fpage>&#x2013;<lpage>98</lpage>.</mixed-citation></ref>
<ref id="ref-138"><label>138.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ometov</surname> <given-names>A</given-names></string-name>, <string-name><surname>Shubina</surname> <given-names>V</given-names></string-name>, <string-name><surname>Klus</surname> <given-names>L</given-names></string-name>, <string-name><surname>Skibi&#x0144;ska</surname> <given-names>J</given-names></string-name>, <string-name><surname>Saafi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Pascacio</surname> <given-names>P</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>A survey on wearable technology: history, state-of-the-art and current challenges</article-title>. <source>Comput Netw</source>. <year>2021</year>;<volume>193</volume>:<fpage>108074</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comnet.2021.108074</pub-id>.</mixed-citation></ref>
<ref id="ref-139"><label>139.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sun</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>S</given-names></string-name>, <string-name><surname>He</surname> <given-names>S</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Shi</surname> <given-names>Z</given-names></string-name></person-group>. <article-title>You foot the bill! Attacking NFC with passive relays</article-title>. <source>IEEE Internet Things J</source>. <year>2020</year>;<volume>8</volume>(<issue>2</issue>):<fpage>1197</fpage>&#x2013;<lpage>210</lpage>. doi:<pub-id pub-id-type="doi">10.1109/JIOT.2020.3012580</pub-id>.</mixed-citation></ref>
<ref id="ref-140"><label>140.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zohourian</surname> <given-names>A</given-names></string-name>, <string-name><surname>Dadkhah</surname> <given-names>S</given-names></string-name>, <string-name><surname>Neto</surname> <given-names>ECP</given-names></string-name>, <string-name><surname>Mahdikhani</surname> <given-names>H</given-names></string-name>, <string-name><surname>Danso</surname> <given-names>PK</given-names></string-name>, <string-name><surname>Molyneaux</surname> <given-names>H</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>IoT Zigbee device security: a comprehensive review</article-title>. <source>Internet Things</source>. <year>2023</year>:<fpage>100791</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.iot.2023.100791</pub-id>.</mixed-citation></ref>
<ref id="ref-141"><label>141.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hireche</surname> <given-names>R</given-names></string-name>, <string-name><surname>Mansouri</surname> <given-names>H</given-names></string-name>, <string-name><surname>Pathan</surname> <given-names>A-SK</given-names></string-name></person-group>. <article-title>Security and privacy management in internet of medical things (IoMT): a synthesis</article-title>. <source>J Cybersecur Priv</source>. <year>2022</year>;<volume>2</volume>(<issue>3</issue>):<fpage>640</fpage>&#x2013;<lpage>61</lpage>. doi:<pub-id pub-id-type="doi">10.3390/jcp2030033</pub-id>.</mixed-citation></ref>
<ref id="ref-142"><label>142.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kumar</surname> <given-names>V</given-names></string-name>, <string-name><surname>Jha</surname> <given-names>RK</given-names></string-name>, <string-name><surname>Jain</surname> <given-names>S</given-names></string-name></person-group>. <article-title>NB-IoT security: a survey</article-title>. <source>Wirel Personal Commun</source>. <year>2020</year>;<volume>113</volume>:<fpage>2661</fpage>&#x2013;<lpage>708</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11277-020-07346-7</pub-id>.</mixed-citation></ref>
<ref id="ref-143"><label>143.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Saafi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hosek</surname> <given-names>J</given-names></string-name>, <string-name><surname>Kolackova</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Enabling next-generation public safety operations with mission-critical networks and wearable applications</article-title>. <source>Sensors</source>. <year>2021</year>;<volume>21</volume>(<issue>17</issue>):<fpage>5790</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s21175790</pub-id>; <pub-id pub-id-type="pmid">34502681</pub-id></mixed-citation></ref>
<ref id="ref-144"><label>144.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Al Ali</surname> <given-names>J</given-names></string-name>, <string-name><surname>Nasir</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Dweiri</surname> <given-names>FT</given-names></string-name></person-group>. <article-title>Business continuity management framework of internet of things (IoT)</article-title>. In: <conf-name>2019 Advances in Science and Engineering Technology International Conferences (ASET)</conf-name>, <year>2019</year>; <publisher-loc>Dubai, United Arab Emirates</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-145"><label>145.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Liang</surname> <given-names>Z</given-names></string-name></person-group>. <article-title>Security analysis of bluetooth low energy based smart wristbands</article-title>. In: <conf-name>2017 2nd International Conference on Frontiers of Sensors Technologies (ICFST)</conf-name>, <year>2017</year>; <publisher-loc>Shenzhen, China</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
<ref id="ref-146"><label>146.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Cusack</surname> <given-names>B</given-names></string-name>, <string-name><surname>Antony</surname> <given-names>B</given-names></string-name>, <string-name><surname>Ward</surname> <given-names>G</given-names></string-name>, <string-name><surname>Mody</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Assessment of security vulnerabilities in wearable devices</article-title>. In: <conf-name>Proceedings of 15th Australian Information Security Management Conference</conf-name>, <year>2017 Dec 5&#x2013;6</year>; <publisher-loc>Perth, WA, Australia</publisher-loc>: <publisher-name>Edith Cowan University</publisher-name>; p. <fpage>42</fpage>&#x2013;<lpage>8</lpage>.</mixed-citation></ref>
<ref id="ref-147"><label>147.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Khan</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Bajwa</surname> <given-names>HR</given-names></string-name>, <string-name><surname>Sundaram</surname> <given-names>J</given-names></string-name>, <string-name><surname>Shanmugam</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Vulnerability analysis and exploitation attacks on smart wearable devices</article-title>. In: <conf-name>2024 2nd International Conference on Advancement in Computation &#x0026; Computer Technologies (InCACCT)</conf-name>, <year>2024</year>; <publisher-loc>Gharuan, India</publisher-loc>: <publisher-name>IEEE</publisher-name>.</mixed-citation></ref>
</ref-list>
</back></article>