A (Lack of) Review on Cyber-Security and Privacy Concerns in Hearing Aids

The ever-growing number of cyber-attacks over the last few years has put both individuals, as well as large-scale organisations, in a state-of-emergency situation. In the dawn of a Big Data / Internet-of-Things era, the discovery and use of personal information for individual profiling raises significant information privacy concerns, challenging regulators around the globe. As hearing aids are often the most effective therapeutic measure for an individual with hearing loss, the number of active devices that could be potentially cyber-controlled and used for malicious reasons suggests that this threat is not to be taken lightly. The aim of this paper is to identify how cyber-security and privacy concerns have arisen over the last years based on the advances in the communication protocols used by hearing aids and their security, the identification of potential hacking and cyber-attacking methods aimed at these devices and the need for potential countermeasures and actions to be taken more seriously in order to ensure patients' privacy.

[1]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[2]  Richard C. Hendriks,et al.  Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[3]  Ken Munro Bluetooth: Breaking into Bluetooth , 2008 .

[4]  Andreea Bendovschi,et al.  Cyber-Attacks – Trends, Patterns and Security Countermeasures☆ , 2015 .

[5]  Mohammed Atiquzzaman,et al.  Security threats in Bluetooth technology , 2018, Comput. Secur..

[6]  P. Kitterick,et al.  Hearing aids for mild to moderate hearing loss in adults. , 2017, The Cochrane database of systematic reviews.

[7]  Wenyuan Xu,et al.  WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[8]  Jin Sook Kim,et al.  A Review of Assistive Listening Device and Digital Wireless Technology for Hearing Instruments , 2014, Korean journal of audiology.

[9]  D. Kotz,et al.  Is Bluetooth the right technology for mHealth? , 2010 .

[10]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[11]  Julian Jang,et al.  A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..

[12]  Abderrahim Beni Hssane,et al.  Big data security and privacy in healthcare: A Review , 2017, EUSPN/ICTH.

[13]  Filiep Vanpoucke,et al.  Hearing Device Manufacturers Call for Interoperability and Standardization of Internet and Audiology. , 2016, American journal of audiology.

[14]  Jan Larsen,et al.  Personalizing the Fitting of Hearing Aids by Learning Contextual Preferences From Internet of Things Data , 2017, Comput..

[15]  Jason Galster,et al.  A Qualitative Case Study of Smartphone‐Connected Hearing Aids: Influences on Patients, Clinicians, and Patient‐Clinician Interactions , 2017, Journal of the American Academy of Audiology.

[16]  Konstantin Hyppönen,et al.  Comparative Analysis of Bluetooth Security Attacks , 2013 .

[17]  Yan Huang,et al.  Data Analytics and Decision Support in Cybersecurity: Trends, Methodologies and Applications , 2017 .

[18]  Jakob Eg Larsen,et al.  Rethinking Hearing Aid Fitting by Learning From Behavioral Patterns , 2017, CHI Extended Abstracts.

[19]  United Arab Emirates,et al.  BLUETOOTH SECURITY THREATS AND SOLUTIONS : A SURVEY , 2012 .