SlideShare a Scribd company logo
1 of 10
Download to read offline
Communications on Applied Electronics 5(10):7-12, September 2016.
Wearable Technology for Enhanced Security.
Agbaje M. Olugbenga(PhD)
Babcock University
Department of Computer Science
Ogun State, Nigeria
agbajeolugbenga@gmail.com
ABSTRACT
Wearables are small electronic devices, often comprising
one or more sensors and having computational capability.
Devices such as wrist watches, pens, and glasses with
installed cameras are now available at cheap prices for
user to purchase to monitor or securing themselves. The
Nigerian state at this period is faced with a lot of
kidnapping activities in schools, homes and abduction for
the purpose of ransomed collection and other illegal
activities necessitate these reviews. The success of the
wearable technology in medical uses prompted the
research into application into security uses. The method
of research is the use of case studies and literature search.
This paper takes a look at the possible applications of the
wearable technology to combat the cases of abduction
and kidnapping in Nigeria.
Keywords
Computing, electronics,IoT, privacy , software,
ubiquitous,wearable.
1. INTRODUCTION
The terms “wearable technology“, “wearable devices“,
and “wearables” all refer to electronic technologies or
computers that are incorporated into items of clothing
and accessories which can comfortably be worn on the
body. It can perform many of the same computing tasks
as mobile phones and laptop computers .It can provide
sensory and scanning features not typically seen in
mobile and laptop devices, such as biofeedback and
tracking of physiological function. Wearables are small
electronic devices, often comprising one or more sensors
and having computational capability[1]. Wearable
technologies are clothing and accessories incorporating
computer and advanced electronic technologies (PWC,
2014). Wearables are good example of the Internet of
Things (IoT), since they form part of the network of
physical objects or "things" embedded with
electronics, software, sensors and connectivity to enable
objects to exchange data with a manufacturer, operator
and/or other connected devices, without requiring human
intervention [2] .
One of the earliest pieces of wearable technology was the
calculator watch, introduced in the 1980s. The coming of
portable computing in the early 1990s resulted in further
experimentation in the technology with varying degrees
of success [2].
[3] enumerated the state of today’s world of wearable
that our day-to-day apparel and accessories are turning
into networked mobile electronic devices attached to our
body. Today’s market is now flooded with wearable
devices that include wristbands such as Fitbit and
Jawbone, attachable baby monitors such as Mimo and
Sproutling, watches such as the Apple Watch, and
jewellery such as Cuff and Ringly.
Taking a look at the history of computer generations up
to the present, we could divide it into three main types:
mainframe computing, personal computing, and
ubiquitous or pervasive computing[4]. The various
divisions is based on the number of computers per users.
The mainframe computing describes one large computer
connected to many users and the second, personal
computing, as one computer per person while the term
ubiquitous computing however, was used in 1991 by
Paul Weiser. Weiser depicted a world full of embedded
sensing technologies to streamline and enhance life [5].
The Nigerian state at this period is faced with a lot of
kidnapping activities in schools, homes and abduction
for the purpose of ransome collection and other illegal
activities necessitate this reviews.[6] stated that some of
the most interesting applications of wearable technology
will come from three different technologies: Advanced
wearable products, artificial intelligence and big data.
These three technologies if well used in Nigeria in
various aspect of our security systems can help curb the
rate of kidnapping and abduction cases in Nigeria.
A disturbing case of the kidnapped Chibok girls in
Nigeria is yet to be unravelled two years after their
kidnapping from their schools is a pathetic case in Africa.
With advances in telecommunication and networking a
lot of devices are installed in vehicles and at home to
enable tracking activities. Using car immobilizers and
Communications on Applied Electronics 5(10):7-12, September 2016.
trackers are common in Nigeria today and these devices
could be purchased at low prices. Devices such as wrist
watches, pens, glasses with installed cameras are now
available at cheap prices for user to monitor or secure
them. The time is now to incorporate wearable
technology into our society due to different high profile
cases that occurred in the last three to four years.
The success of the wearable technology in medical uses
prompted the research into application into security uses.
This paper takes a look at the possible applications of the
wearable technology to combat the cases of abduction
and kidnapping in Nigeria. The method of research is the
use of case studies and literature search.
2.
Year Function Device picture
1960s Ed Thorpe and Claude Shannon invented a
cigarette pack-sized
pocket computer that was designed to
predict roulette wheels. The device was
easily
concealed in a shoe.
1970s HP releases the HP 01
calculator watch
1980s Steve Mann builds the
WearComp1 – a backpack-based
system capable of displaying data
on a head-mounted micro display
and wireless communications
1990s Steve Mann developed the
“Wearable Wireless Webcam”
2000s First generation iPhone is released,
revolutionizing pocket computing.
2010s A plethora of consumer wearables hit the
market,including Nike FuelBand,
Fitbit, Google Glass
Table 1. Brief history of wearable devices Source (Hadi et al, 2014)
Communications on Applied Electronics 5(10):7-12, September 2016.
2.0 LITERATURE REVIEW
The term ubiquitous or pervasive computing was used in
1991 by Paul Weiser. Weiser depicted a world full of
embedded sensing technologies to streamline and
enhance life [5].
After Weiser’s vision, the Wearable Computers Group in
MIT’s Media Lab was formed [7]. Wearable computing
extends Weiser’s idea of incorporating computing into
our everyday objects and activities. There is a difference,
however, between ubiquitous computing and wearable
computing, in that a wearable computer is incorporated
into the personal space of the user, controlled by the user,
and has both operational and interactional constancy. The
wearables will always be on and accessible[8] .
Ed Thorp and Claude Shannon introduced the first
wearable computer in 1966, as a cigarette-pack sized
analogue computer used to predict the outcome of
roulette wheels. Using four buttons to show the speed of
the wheel, the predicted results were transmitted by radio
to an earpiece. A brief history of wearable is shown in
the Table 1.
2.1 Why Wearable Technology?
Using wearable technology can be categorised into
personal and business usage. The usage for either can be
for: fashion, fitness tracking, to synchronize data and
communication from other gadgets, specific health issue
monitoring, a gauge for alertness and energy levels, as
navigation tools, as media devices and communication
gadgets. With rising crime of abduction and kidnapping
wearable technologies could track or alert the security
personnel of the incident. Also many abductors will
dispossess their prey of common mode of
communication .i.e. the cell phone from their abductees
so that no contact could be made. Hence, wearable
circuits that could be hidden or worn in the body could
track victims of abduction or kidnapping.
2.2 Technologies in Wearable
Wearable technology will come from three different
technologies stated below:
• Advanced wearable products: The three main
wearable technology product categories are
body sensors, smart glasses and smart
watches.
• Artificial intelligence (AI)
platforms: Technologies like Now
(Google), Siri (Apple), Cortana (Microsoft)
and, most recent, IBM’s decision to
Communications on Applied Electronics 5(10):7-12, September 2016.
provide mobile app developers with access to
its supercomputer platform.
• Big data: This provides information about an
individual location, data about an individual’s
search history or ad preferences or even
information about what that person was
looking at 30 days ago there is no shortage of
data[6].
2.3 Advantages of Wearables
Wearables can provide consumer benefits in the areas of
health care and wellness. With wearable devices, data
can be stored locally, or transmitted and stored on a
cloud. These devices can provide increased convenience
and improved health services.
2.3 Disadvantages of Wearables
It raises privacy and security concerns. Wearable devices
challenge traditional privacy principles and pose a
distinct challenge to the collection, use, and storage of
health, location, financial, and other sensitive
information.
2.4 Applications of Wearables
Wearables for health [1]. Health and fitness, and other
medical applications, are areas where wearable’s are
expected to play a transformative role. However, the
application of wearable devices has potential in any
industry where hands-free data collection is valued.
Wearables can be divided based on consumer or non-
consumer applications. These two categories can be
further segmented based on the particular sector the
product targets: General consumer ,Fitness and sports,
Fashion and apparel, Home automation and remote
identification, Gaming and recreation, Defence and
security, Enterprise and industrial, Healthcare.
2.5 Architecture of Wearables
Technology
This architecture shows three parts of wearable
technology:
Data: Data is a binary format and needs storage prior to
transfering the data from one place to another.
Power: It has three main parts i,e how power is
generated, how it is transfered from one place to another
and how it is stored.
Social: wearables are used at so many different places
and plays a role in our culture, social connections and
relationships [9].
`
Fig.1 : Simple architecture of wearable devices[10].
Social
Power
Data
Transfer
Storage
creation
Generation
Sending
Memory
Interaction
“real Life”
Communications on Applied Electronics 5(10):7-12, September 2016.
3.0 PROPOSED ARCHITECTURE
FOR ANTI-KIDNAPPING AND
ABDUCTION USING
WEARABLE DEVICE.
In this paper a definition for wearable technology is
clothing and accessories incorporating computer and
advanced electronic technologies.
Fig. 2: Proposed architecture.
Throughout our research, we used the following
description to define wearable technology. The proposed
architecture in figure 2 comprises of four major block.
The wearable device may be of any form with blue tooth
or wifi capability that ciuld be detected using a form of
monitor i.e a cell phone or ipad connected to google map
for location and positioning and also connected tp the
law enforcement agency in chage of cybercrime for
monitoring in case of any breach of the law.
The wearables used for health are connected self –
monitored devices with smart sensors, and make use of a
web connection, using Bluetooth to connect to your
smartphone. They use these sensors to connect to you as
a person, and they help you to achieve goals such as
staying fit, active, losing weight or being more organised.
Wearables Google map
Monitor
Law
enforcement
Communications on Applied Electronics 5(10):7-12, September 2016.
This devices have the capacity to serve as a security
device and could fit into this architcture.
Smart jewellery is aimed at women, and the most
common usage is to notify the user of texts, calls or
emails when their phone is out of reach. Smart
watches are wrist-worn devices that connect to your
mobile phone to act as mini-windows onto your digital
life. Telling time is an after-thought for smart watches;
they inform you about calls, messages and email
notifications on social media.
The implantables are a group of wearable you have to
carry with you wherever you go. These are devices
attached somewhere under your skin by surgery.
4.0 DISCUSSION
The paper made a research into the various wearables
present in the online store in Nigeria price range to know
the avalability. The table below shows some of the
wearable products on some popular online stores.
Despite the religious and social beliefs of people there is
a gradual increase in awareness of wearables in Nigeria.
Table 2 shows some of the products available. The range
of prices of the various products also ranges $14 to
$200.
Communications on Applied Electronics 5(10):7-12, September 2016.
4.1 Future of Wearables
A survey of current landscape in wearable shows that
there is increased speed for the various chips embedded.
They also longer battery lifespan. The current devices are
also smaller faster and more sensitive. Innovations are
multiplying the rate at which breakthroughs can happen
in wearable. Alongside this shift, there has been the
natural progression in form factors as these same devices
move from our desks and pockets to being subtly
displayed on our bodies and one day even merged with
them. It opens the door for new forms of computing that
impact the way we live, work and socialize [11].
Iinnovations in wearable technology will develop first
through wristbands. A lot of the ideas describe in
Wearable Technology report will be deployed through
these accessories, including ability to control our privacy
by acting as a password device or even interacting with
the environment around us. Other jewellery-like devices
will follow - including rings and necklaces. While there
is a lot of speculation around the use of computerized
glasses, our analysis suggests that while these heads-up
ONLINE STORE
JUMIA.COM KONGA.COM DEALDEY.COM
PRODUCTS
I5 Plus blue tooth
intelligent traker(walkout
monitor)
  
Pedometer heart rate
monitor with fat analyzer
  
Tile tracker bluetooth
tracker-find lost item
  
Generic Car GPS Tracker
with SOS Emergency
Phone Call Black
  
Generic 4.0 Tracer GPS
Locator Wallet Key Pet
Finder
  
Rohs Digital Personal
Safety Alarm Device
 
Spy keyholder,watch,
table clock cap,pen.
USB,sunshade glasses
  
Blood presure monitor
Communications on Applied Electronics 5(10):7-12, September 2016.
displays will offer a unique range of options, they may
not develop the full range of services that other
wearables like smart clothing might offer. Sensors
embedded within clothing will provide a with array of
benefits over the next two to five years, with several
focused on improving our health and wellbeing.
In some years, we will see an initial acceptance of
technology that will embed wearables in our bodies. By
2018, bio-integrated computing will have moved from
the fringes, where it’s at today, to a place where early
adopters will experiment with it. For those of us who
may not be ready for the scalpel, wearables can still take
on and off will still change the way we work, live and
play [11].
Wearable technology is on the rise in both personal and
business use. One out of five American adults have a
wearable device according to the 2014 Price Waterhouse
Coopers Wearable Future Report[12] .
Smartwatches are a second high-profile sector and while
wearable devices have been around for years, it has only
gained mass market attention with introducing new
models by Samsung and later by Apple. The now defunct
Google Glass gained a lot of media attention, but the
project ground to a halt in early 2015, with Google
stopping device sales. In healthcare, wearables have
being in use, for example in detecting health disorders
such as sleep apnea. A study in 2014 by MSI and
McAfee reported that 70% of people think that wearable
technologies will soon send health vitals readings to
physicians[13] .
Medical professionals such as Google Glass
Surgeon even organized themselves into the WATCH
Society (Wearable Technology in Healthcare Society) in
order to search for collaboration and valid use of
wearable technology in healthcare. In professional sports,
wearable technology has applications in monitoring and
real time feedback for athletes[14][15].
Examples of wearables are shown in the figure below:
Fig. 3:Smartwatch respond to save long distance
relationships[11]
Fig. 4:Responsive bracelets send thermoelectric
pulses to heat or cool persons entire body[11].
Fig. 5:Wearable Life blogs camera by snapping
camera throughout the day [11].
Fig. 6: Flexible electronics circuit develop at
University of Tokyo [16]
Communications on Applied Electronics 5(10):7-12, September 2016.
Figure 6 shows one of the most flexible, thinnest and
bendable circuits. These circuits are cheap to make. It
remains functional when crumbled like paper. The sheets
are one fifth of the thickness of common kitchen rap and
30 times lighter than paper.
5. CONCLUSION
From the various literature and case studies this research
shows that there is a wearable future around the corner.
We must be prepared for it.
In this paper, we looked at the various technologies in
place and that are workable, based on where wearable
technology is today and where we believe it is heading.
We are not putting forward any of these options as being
‘good ’or ‘bad’ – the purpose has been to illustrate the
use cases that the enabling technologies might spawn in
the years ahead.
Depending on your perspective, some of the above use
cases might seem abhorrent, or motivational.Regardless,
it is our experience is that if something is possible then it
is likely to enter the marketplace as a commercial
product or service.
Wearable technology is not just about jumping out of hot
air balloons while entering a Google Hangout: this new
category promises a whole panorama of new, value-
added service, but it also raises some very serious
privacy and related questions we think you should know,
if you are not already.
6. ACKNOWLEDGMENTS
I wish to thank CS Laboratory’s Research Support 
Funding Program (CSL-RSFP) for funding this paper.
7. REFERENCES
[1] Hadi, S., Emily M.,  Nirusan, R.
(2014).Wearable Tech: Leveraging Canadian
Innovation to Improve Health, Pg 1-45.
[2] Lexinnova (2016).Wearable technology: patent
landscape analysis, pg1-18.
[3] Janice, P.,  Lin, G.(2015), Privacy, Security,
and Wearable Technology, ABA Section of
Intellectual Property Law, Published in
Landslide, Volume 8, Number 2, ©2015 by the
American Bar Association.pg1-8.
[4] Abowd, G. D. (2012). What next, ubicomp? :
celebrating an intellectual disappearing act.
Paper presented at the Proceedings of the 2012
ACM Conference on Ubiquitous Computing.
[5] Weiser, M. (1991). The computer for the 21st
century. Scientific American, 265(3),
94-104
[6] Andrew, S. (2014).Mind-blowing Uses of
Wearable Technology.
[7] Krumm, J. (2009). Ubiquitous Computing
Fundamentals, Taylor  Francis.
[8] Mann, S. (1999). Definition of a Wearable
Computer. From
http://wearcomp.org/wearcompdef.html
[9] Maidment, D. (2014). Advanced Architectures
and Technologies for the Development of
Wearable Devices .
[10] Mehdi  Alharby(2016):.Purpose, Scope, and
Technical Considerations of Wearable
Technologies, Information Resources
Management (IRM) proceedings,DOI:
10.4018/978-1-5225-0069-8.ch001
[11] PSFK (2016) .The Future of Wearable Tech:
Key Trends Driving The Form And Function
Of Personal Devices, www.psfk.com/future-of-
wearable-tech /iq.intel.com/future-of-wearable-
tech downloaded(13-4-16)
[12] Zalud, B. (2015). The Age of Wearables Is on
Us. SDM: 72–73.
[13] Eichorn, K.  Ross, E. ( 2014). U.S.
Consumers Predict Unprecedented
Connectivity in 2025, but Security and Privacy
Concerns Linger – via ProQuest
[14] Duncan, S.(2009).The Rise of the Virtual
Trainer . Product Design and Development
Communications on Applied Electronics 5(10):7-12, September 2016.
[15] Simon, J.(2013) In pro sports, wearabletech is
already mainstream. Wearable Tech Watch.
[16] Martin K. Et al (2013). An ultra – lightweight
design for imperceptible plastic electronics.
Nature. doi 10.1038/nature 12314

More Related Content

What's hot

SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challengesAnastasios Economides
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of ThingsDesign World
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
FTC Internet of Things Article
FTC Internet of Things ArticleFTC Internet of Things Article
FTC Internet of Things ArticleKimberly Verska
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
IoT advatage and disadvantage
IoT advatage and disadvantageIoT advatage and disadvantage
IoT advatage and disadvantageRubel Biswas
 

What's hot (20)

SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challenges
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Tips on designing for the Internet of Things
Tips on designing for the Internet of ThingsTips on designing for the Internet of Things
Tips on designing for the Internet of Things
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
FTC Internet of Things Article
FTC Internet of Things ArticleFTC Internet of Things Article
FTC Internet of Things Article
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
IoT advatage and disadvantage
IoT advatage and disadvantageIoT advatage and disadvantage
IoT advatage and disadvantage
 

Similar to Wearable Technology for Enhanced Security.

WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
Wearable Technology and IOT Wearable Device Market Size, Share, Growth, Trend...
Wearable Technology and IOT Wearable Device Market Size, Share, Growth, Trend...Wearable Technology and IOT Wearable Device Market Size, Share, Growth, Trend...
Wearable Technology and IOT Wearable Device Market Size, Share, Growth, Trend...NikitaGodse1
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...AIRCC Publishing Corporation
 
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...IJNSA Journal
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutionsijtsrd
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelCSCJournals
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
 
Internet of Things (IOT)-midterm.pptx
Internet of Things (IOT)-midterm.pptxInternet of Things (IOT)-midterm.pptx
Internet of Things (IOT)-midterm.pptxDennis Espiritu
 

Similar to Wearable Technology for Enhanced Security. (20)

WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
Wearable Technology and IOT Wearable Device Market Size, Share, Growth, Trend...
Wearable Technology and IOT Wearable Device Market Size, Share, Growth, Trend...Wearable Technology and IOT Wearable Device Market Size, Share, Growth, Trend...
Wearable Technology and IOT Wearable Device Market Size, Share, Growth, Trend...
 
New DOC Document.doc
New DOC Document.docNew DOC Document.doc
New DOC Document.doc
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compr...
 
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
presentation
presentationpresentation
presentation
 
Iotppt
IotpptIotppt
Iotppt
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
776 s0005
776 s0005776 s0005
776 s0005
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
 
Internet of Things (IOT)-midterm.pptx
Internet of Things (IOT)-midterm.pptxInternet of Things (IOT)-midterm.pptx
Internet of Things (IOT)-midterm.pptx
 

More from Dr. Michael Agbaje

A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSICA REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSICDr. Michael Agbaje
 
Agbaje7survey of softwar process
Agbaje7survey of softwar processAgbaje7survey of softwar process
Agbaje7survey of softwar processDr. Michael Agbaje
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingDr. Michael Agbaje
 
Model based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumoursModel based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumoursDr. Michael Agbaje
 
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONPARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONDr. Michael Agbaje
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureDr. Michael Agbaje
 
Broadcast Monitoring and Applications
Broadcast Monitoring and ApplicationsBroadcast Monitoring and Applications
Broadcast Monitoring and ApplicationsDr. Michael Agbaje
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesDr. Michael Agbaje
 
A 3-dimensional motion sensor and tracking system using vector analysis method
A 3-dimensional  motion sensor and tracking system using vector  analysis methodA 3-dimensional  motion sensor and tracking system using vector  analysis method
A 3-dimensional motion sensor and tracking system using vector analysis methodDr. Michael Agbaje
 
Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)Dr. Michael Agbaje
 

More from Dr. Michael Agbaje (10)

A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSICA REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
A REVIEW OF APPLICATIONS OF THEORY OF COMPUTATION AND AUTOMATA TO MUSIC
 
Agbaje7survey of softwar process
Agbaje7survey of softwar processAgbaje7survey of softwar process
Agbaje7survey of softwar process
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
 
Model based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumoursModel based cellularautomataonspreadofrumours
Model based cellularautomataonspreadofrumours
 
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATIONPARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
PARASITIC COMPUTING: PROBLEMS AND ETHICAL CONSIDERATION
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System Architecture
 
Broadcast Monitoring and Applications
Broadcast Monitoring and ApplicationsBroadcast Monitoring and Applications
Broadcast Monitoring and Applications
 
Effect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital ImagesEffect of Block Sizes on the Attributes of Watermarking Digital Images
Effect of Block Sizes on the Attributes of Watermarking Digital Images
 
A 3-dimensional motion sensor and tracking system using vector analysis method
A 3-dimensional  motion sensor and tracking system using vector  analysis methodA 3-dimensional  motion sensor and tracking system using vector  analysis method
A 3-dimensional motion sensor and tracking system using vector analysis method
 
Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)Heterogenous system architecture(HSA)
Heterogenous system architecture(HSA)
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Wearable Technology for Enhanced Security.

  • 1. Communications on Applied Electronics 5(10):7-12, September 2016. Wearable Technology for Enhanced Security. Agbaje M. Olugbenga(PhD) Babcock University Department of Computer Science Ogun State, Nigeria agbajeolugbenga@gmail.com ABSTRACT Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria. Keywords Computing, electronics,IoT, privacy , software, ubiquitous,wearable. 1. INTRODUCTION The terms “wearable technology“, “wearable devices“, and “wearables” all refer to electronic technologies or computers that are incorporated into items of clothing and accessories which can comfortably be worn on the body. It can perform many of the same computing tasks as mobile phones and laptop computers .It can provide sensory and scanning features not typically seen in mobile and laptop devices, such as biofeedback and tracking of physiological function. Wearables are small electronic devices, often comprising one or more sensors and having computational capability[1]. Wearable technologies are clothing and accessories incorporating computer and advanced electronic technologies (PWC, 2014). Wearables are good example of the Internet of Things (IoT), since they form part of the network of physical objects or "things" embedded with electronics, software, sensors and connectivity to enable objects to exchange data with a manufacturer, operator and/or other connected devices, without requiring human intervention [2] . One of the earliest pieces of wearable technology was the calculator watch, introduced in the 1980s. The coming of portable computing in the early 1990s resulted in further experimentation in the technology with varying degrees of success [2]. [3] enumerated the state of today’s world of wearable that our day-to-day apparel and accessories are turning into networked mobile electronic devices attached to our body. Today’s market is now flooded with wearable devices that include wristbands such as Fitbit and Jawbone, attachable baby monitors such as Mimo and Sproutling, watches such as the Apple Watch, and jewellery such as Cuff and Ringly. Taking a look at the history of computer generations up to the present, we could divide it into three main types: mainframe computing, personal computing, and ubiquitous or pervasive computing[4]. The various divisions is based on the number of computers per users. The mainframe computing describes one large computer connected to many users and the second, personal computing, as one computer per person while the term ubiquitous computing however, was used in 1991 by Paul Weiser. Weiser depicted a world full of embedded sensing technologies to streamline and enhance life [5]. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransome collection and other illegal activities necessitate this reviews.[6] stated that some of the most interesting applications of wearable technology will come from three different technologies: Advanced wearable products, artificial intelligence and big data. These three technologies if well used in Nigeria in various aspect of our security systems can help curb the rate of kidnapping and abduction cases in Nigeria. A disturbing case of the kidnapped Chibok girls in Nigeria is yet to be unravelled two years after their kidnapping from their schools is a pathetic case in Africa. With advances in telecommunication and networking a lot of devices are installed in vehicles and at home to enable tracking activities. Using car immobilizers and
  • 2. Communications on Applied Electronics 5(10):7-12, September 2016. trackers are common in Nigeria today and these devices could be purchased at low prices. Devices such as wrist watches, pens, glasses with installed cameras are now available at cheap prices for user to monitor or secure them. The time is now to incorporate wearable technology into our society due to different high profile cases that occurred in the last three to four years. The success of the wearable technology in medical uses prompted the research into application into security uses. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria. The method of research is the use of case studies and literature search. 2. Year Function Device picture 1960s Ed Thorpe and Claude Shannon invented a cigarette pack-sized pocket computer that was designed to predict roulette wheels. The device was easily concealed in a shoe. 1970s HP releases the HP 01 calculator watch 1980s Steve Mann builds the WearComp1 – a backpack-based system capable of displaying data on a head-mounted micro display and wireless communications 1990s Steve Mann developed the “Wearable Wireless Webcam” 2000s First generation iPhone is released, revolutionizing pocket computing. 2010s A plethora of consumer wearables hit the market,including Nike FuelBand, Fitbit, Google Glass Table 1. Brief history of wearable devices Source (Hadi et al, 2014)
  • 3. Communications on Applied Electronics 5(10):7-12, September 2016. 2.0 LITERATURE REVIEW The term ubiquitous or pervasive computing was used in 1991 by Paul Weiser. Weiser depicted a world full of embedded sensing technologies to streamline and enhance life [5]. After Weiser’s vision, the Wearable Computers Group in MIT’s Media Lab was formed [7]. Wearable computing extends Weiser’s idea of incorporating computing into our everyday objects and activities. There is a difference, however, between ubiquitous computing and wearable computing, in that a wearable computer is incorporated into the personal space of the user, controlled by the user, and has both operational and interactional constancy. The wearables will always be on and accessible[8] . Ed Thorp and Claude Shannon introduced the first wearable computer in 1966, as a cigarette-pack sized analogue computer used to predict the outcome of roulette wheels. Using four buttons to show the speed of the wheel, the predicted results were transmitted by radio to an earpiece. A brief history of wearable is shown in the Table 1. 2.1 Why Wearable Technology? Using wearable technology can be categorised into personal and business usage. The usage for either can be for: fashion, fitness tracking, to synchronize data and communication from other gadgets, specific health issue monitoring, a gauge for alertness and energy levels, as navigation tools, as media devices and communication gadgets. With rising crime of abduction and kidnapping wearable technologies could track or alert the security personnel of the incident. Also many abductors will dispossess their prey of common mode of communication .i.e. the cell phone from their abductees so that no contact could be made. Hence, wearable circuits that could be hidden or worn in the body could track victims of abduction or kidnapping. 2.2 Technologies in Wearable Wearable technology will come from three different technologies stated below: • Advanced wearable products: The three main wearable technology product categories are body sensors, smart glasses and smart watches. • Artificial intelligence (AI) platforms: Technologies like Now (Google), Siri (Apple), Cortana (Microsoft) and, most recent, IBM’s decision to
  • 4. Communications on Applied Electronics 5(10):7-12, September 2016. provide mobile app developers with access to its supercomputer platform. • Big data: This provides information about an individual location, data about an individual’s search history or ad preferences or even information about what that person was looking at 30 days ago there is no shortage of data[6]. 2.3 Advantages of Wearables Wearables can provide consumer benefits in the areas of health care and wellness. With wearable devices, data can be stored locally, or transmitted and stored on a cloud. These devices can provide increased convenience and improved health services. 2.3 Disadvantages of Wearables It raises privacy and security concerns. Wearable devices challenge traditional privacy principles and pose a distinct challenge to the collection, use, and storage of health, location, financial, and other sensitive information. 2.4 Applications of Wearables Wearables for health [1]. Health and fitness, and other medical applications, are areas where wearable’s are expected to play a transformative role. However, the application of wearable devices has potential in any industry where hands-free data collection is valued. Wearables can be divided based on consumer or non- consumer applications. These two categories can be further segmented based on the particular sector the product targets: General consumer ,Fitness and sports, Fashion and apparel, Home automation and remote identification, Gaming and recreation, Defence and security, Enterprise and industrial, Healthcare. 2.5 Architecture of Wearables Technology This architecture shows three parts of wearable technology: Data: Data is a binary format and needs storage prior to transfering the data from one place to another. Power: It has three main parts i,e how power is generated, how it is transfered from one place to another and how it is stored. Social: wearables are used at so many different places and plays a role in our culture, social connections and relationships [9]. ` Fig.1 : Simple architecture of wearable devices[10]. Social Power Data Transfer Storage creation Generation Sending Memory Interaction “real Life”
  • 5. Communications on Applied Electronics 5(10):7-12, September 2016. 3.0 PROPOSED ARCHITECTURE FOR ANTI-KIDNAPPING AND ABDUCTION USING WEARABLE DEVICE. In this paper a definition for wearable technology is clothing and accessories incorporating computer and advanced electronic technologies. Fig. 2: Proposed architecture. Throughout our research, we used the following description to define wearable technology. The proposed architecture in figure 2 comprises of four major block. The wearable device may be of any form with blue tooth or wifi capability that ciuld be detected using a form of monitor i.e a cell phone or ipad connected to google map for location and positioning and also connected tp the law enforcement agency in chage of cybercrime for monitoring in case of any breach of the law. The wearables used for health are connected self – monitored devices with smart sensors, and make use of a web connection, using Bluetooth to connect to your smartphone. They use these sensors to connect to you as a person, and they help you to achieve goals such as staying fit, active, losing weight or being more organised. Wearables Google map Monitor Law enforcement
  • 6. Communications on Applied Electronics 5(10):7-12, September 2016. This devices have the capacity to serve as a security device and could fit into this architcture. Smart jewellery is aimed at women, and the most common usage is to notify the user of texts, calls or emails when their phone is out of reach. Smart watches are wrist-worn devices that connect to your mobile phone to act as mini-windows onto your digital life. Telling time is an after-thought for smart watches; they inform you about calls, messages and email notifications on social media. The implantables are a group of wearable you have to carry with you wherever you go. These are devices attached somewhere under your skin by surgery. 4.0 DISCUSSION The paper made a research into the various wearables present in the online store in Nigeria price range to know the avalability. The table below shows some of the wearable products on some popular online stores. Despite the religious and social beliefs of people there is a gradual increase in awareness of wearables in Nigeria. Table 2 shows some of the products available. The range of prices of the various products also ranges $14 to $200.
  • 7. Communications on Applied Electronics 5(10):7-12, September 2016. 4.1 Future of Wearables A survey of current landscape in wearable shows that there is increased speed for the various chips embedded. They also longer battery lifespan. The current devices are also smaller faster and more sensitive. Innovations are multiplying the rate at which breakthroughs can happen in wearable. Alongside this shift, there has been the natural progression in form factors as these same devices move from our desks and pockets to being subtly displayed on our bodies and one day even merged with them. It opens the door for new forms of computing that impact the way we live, work and socialize [11]. Iinnovations in wearable technology will develop first through wristbands. A lot of the ideas describe in Wearable Technology report will be deployed through these accessories, including ability to control our privacy by acting as a password device or even interacting with the environment around us. Other jewellery-like devices will follow - including rings and necklaces. While there is a lot of speculation around the use of computerized glasses, our analysis suggests that while these heads-up ONLINE STORE JUMIA.COM KONGA.COM DEALDEY.COM PRODUCTS I5 Plus blue tooth intelligent traker(walkout monitor) Pedometer heart rate monitor with fat analyzer Tile tracker bluetooth tracker-find lost item Generic Car GPS Tracker with SOS Emergency Phone Call Black Generic 4.0 Tracer GPS Locator Wallet Key Pet Finder Rohs Digital Personal Safety Alarm Device Spy keyholder,watch, table clock cap,pen. USB,sunshade glasses Blood presure monitor
  • 8. Communications on Applied Electronics 5(10):7-12, September 2016. displays will offer a unique range of options, they may not develop the full range of services that other wearables like smart clothing might offer. Sensors embedded within clothing will provide a with array of benefits over the next two to five years, with several focused on improving our health and wellbeing. In some years, we will see an initial acceptance of technology that will embed wearables in our bodies. By 2018, bio-integrated computing will have moved from the fringes, where it’s at today, to a place where early adopters will experiment with it. For those of us who may not be ready for the scalpel, wearables can still take on and off will still change the way we work, live and play [11]. Wearable technology is on the rise in both personal and business use. One out of five American adults have a wearable device according to the 2014 Price Waterhouse Coopers Wearable Future Report[12] . Smartwatches are a second high-profile sector and while wearable devices have been around for years, it has only gained mass market attention with introducing new models by Samsung and later by Apple. The now defunct Google Glass gained a lot of media attention, but the project ground to a halt in early 2015, with Google stopping device sales. In healthcare, wearables have being in use, for example in detecting health disorders such as sleep apnea. A study in 2014 by MSI and McAfee reported that 70% of people think that wearable technologies will soon send health vitals readings to physicians[13] . Medical professionals such as Google Glass Surgeon even organized themselves into the WATCH Society (Wearable Technology in Healthcare Society) in order to search for collaboration and valid use of wearable technology in healthcare. In professional sports, wearable technology has applications in monitoring and real time feedback for athletes[14][15]. Examples of wearables are shown in the figure below: Fig. 3:Smartwatch respond to save long distance relationships[11] Fig. 4:Responsive bracelets send thermoelectric pulses to heat or cool persons entire body[11]. Fig. 5:Wearable Life blogs camera by snapping camera throughout the day [11]. Fig. 6: Flexible electronics circuit develop at University of Tokyo [16]
  • 9. Communications on Applied Electronics 5(10):7-12, September 2016. Figure 6 shows one of the most flexible, thinnest and bendable circuits. These circuits are cheap to make. It remains functional when crumbled like paper. The sheets are one fifth of the thickness of common kitchen rap and 30 times lighter than paper. 5. CONCLUSION From the various literature and case studies this research shows that there is a wearable future around the corner. We must be prepared for it. In this paper, we looked at the various technologies in place and that are workable, based on where wearable technology is today and where we believe it is heading. We are not putting forward any of these options as being ‘good ’or ‘bad’ – the purpose has been to illustrate the use cases that the enabling technologies might spawn in the years ahead. Depending on your perspective, some of the above use cases might seem abhorrent, or motivational.Regardless, it is our experience is that if something is possible then it is likely to enter the marketplace as a commercial product or service. Wearable technology is not just about jumping out of hot air balloons while entering a Google Hangout: this new category promises a whole panorama of new, value- added service, but it also raises some very serious privacy and related questions we think you should know, if you are not already. 6. ACKNOWLEDGMENTS I wish to thank CS Laboratory’s Research Support Funding Program (CSL-RSFP) for funding this paper. 7. REFERENCES [1] Hadi, S., Emily M., Nirusan, R. (2014).Wearable Tech: Leveraging Canadian Innovation to Improve Health, Pg 1-45. [2] Lexinnova (2016).Wearable technology: patent landscape analysis, pg1-18. [3] Janice, P., Lin, G.(2015), Privacy, Security, and Wearable Technology, ABA Section of Intellectual Property Law, Published in Landslide, Volume 8, Number 2, ©2015 by the American Bar Association.pg1-8. [4] Abowd, G. D. (2012). What next, ubicomp? : celebrating an intellectual disappearing act. Paper presented at the Proceedings of the 2012 ACM Conference on Ubiquitous Computing. [5] Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3), 94-104 [6] Andrew, S. (2014).Mind-blowing Uses of Wearable Technology. [7] Krumm, J. (2009). Ubiquitous Computing Fundamentals, Taylor Francis. [8] Mann, S. (1999). Definition of a Wearable Computer. From http://wearcomp.org/wearcompdef.html [9] Maidment, D. (2014). Advanced Architectures and Technologies for the Development of Wearable Devices . [10] Mehdi Alharby(2016):.Purpose, Scope, and Technical Considerations of Wearable Technologies, Information Resources Management (IRM) proceedings,DOI: 10.4018/978-1-5225-0069-8.ch001 [11] PSFK (2016) .The Future of Wearable Tech: Key Trends Driving The Form And Function Of Personal Devices, www.psfk.com/future-of- wearable-tech /iq.intel.com/future-of-wearable- tech downloaded(13-4-16) [12] Zalud, B. (2015). The Age of Wearables Is on Us. SDM: 72–73. [13] Eichorn, K. Ross, E. ( 2014). U.S. Consumers Predict Unprecedented Connectivity in 2025, but Security and Privacy Concerns Linger – via ProQuest [14] Duncan, S.(2009).The Rise of the Virtual Trainer . Product Design and Development
  • 10. Communications on Applied Electronics 5(10):7-12, September 2016. [15] Simon, J.(2013) In pro sports, wearabletech is already mainstream. Wearable Tech Watch. [16] Martin K. Et al (2013). An ultra – lightweight design for imperceptible plastic electronics. Nature. doi 10.1038/nature 12314