Security in Bluetooth and Wearable Devices: A Survey
Hardik Kumar1, Hetal Bhaidasna2, Kajol Patel3
1Computer Engineering &Parul Institute of Engineering and Technology Vadodara, India
2 Assistant Professor Computer Engineering Parul Institute of Engineering and Technology-Diploma Vadodara, India
3 Assistant Professor Computer Engineering Parul Institute of Engineering and
Technology-Diploma Vadodara, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The rise of Bluetooth tech & wearable gadgets has greatly changed our personal lives. These devices offer amazing convenience & help us connect in many areas like healthcare, fitness, and daily activities. But, with this fast growth, we need to think about important & privacy issues too. Bluetooth, which many people use to communicate wirelessly, faces various security risks. There are threats like eavesdropping, man-in-the-middle attacks, and device spoofing. All these vulnerabilities could lead to unauthorized access, data leaks, or even messing up how devices work. Wearable devices are especially enticing for cyber attackers since they collect & share sensitive personal information, including health metrics and location info. Protecting these gadgets is important because if something goes wrong with the data, it doesn't just affect personal privacy; it can also impact safety & well-being. This review paper closely examines the security challenges that come with Bluetooth and wearable gadgets. It dives into main security threats and vulnerabilities, discussing how attackers might exploit these weaknesses to gain access or disrupt device operations. Plus, it highlights the consequences of security breaches in wearables. This shows why we need strong security measures to keep our data safe and private. Understanding these security challenges is super important for finding ways to reduce risks. The goal of this paper is to emphasize how vital it is to set up strong security frameworks & good practices. Doing this can help keep our private information safe & make sure users feel secure in a world that's increasingly connected. KEYWORD-: Bluetooth, Wearable device, Security, BLE, Security Technique.