2019
DOI: 10.1080/00051144.2019.1660036
|View full text |Cite
|
Sign up to set email alerts
|

Seamless connectivity architecture and methods for IoT and wearable devices

Abstract: Wearable and Internet of Things (IoT) devices have the potential to improve lifestyle, personalize receiving treatments or introduce assisted living for elderly people. However, service delivery depends on maintaining and troubleshooting device connectivity to smartphones, where user engagement and technology proficiency represent a possible barrier that prevents a wider adoption, especially in the elderly and disabled population. Low-cost and low-power wearable and IoT devices face challenges when operating o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…The Devices layer comprises lightweight devices with low storage and processing capabilities [ 19 ]. Furthermore, the users may not have the appropriate knowledge or skills to assess the malfunctioning or to operate them properly, as in the case of healthcare or ambient assisted living use cases, where non-technical and even cognitive-impaired users are implied [ 20 ]. The attacks met on this layer include physical cloning (counterfeiting) [ 9 , 21 , 22 ], malware, spyware [ 9 ] and physical attacks (intentional damage to the device, theft [ 9 ] especially for those deployed to work autonomously [ 23 ]).…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%
“…The Devices layer comprises lightweight devices with low storage and processing capabilities [ 19 ]. Furthermore, the users may not have the appropriate knowledge or skills to assess the malfunctioning or to operate them properly, as in the case of healthcare or ambient assisted living use cases, where non-technical and even cognitive-impaired users are implied [ 20 ]. The attacks met on this layer include physical cloning (counterfeiting) [ 9 , 21 , 22 ], malware, spyware [ 9 ] and physical attacks (intentional damage to the device, theft [ 9 ] especially for those deployed to work autonomously [ 23 ]).…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%
“…In parallel, today's studies generally investigate the technical, security, and various subsystem characteristics of IoT technologies (Silva et al 2018;Casola et al 2019;Ande et al 2020) to improve the general system. Some recent studies also focus on introducing new business models and new architectures for IoT and devices to support the spread of it to new areas (Lee, 2019;Celic and Magjarevic, 2020).…”
Section: Iot Technologymentioning
confidence: 99%
“…One of the most important issues that wearable device manufacturers encounter is battery depletion. This issue of energy efficiency was addressed by Celic and Magjarevic [102], who proposed seamless connectivity between IoT devices and the network with low cost and power consumption. Their model architecture may deliver solutions for the usability of wearable devices.…”
Section: Challenges and Opportunities Of Wearable And Seamlessly Integrated Devicesmentioning
confidence: 99%