INTERNET OF THINGS IN SPORTS: SECURITY OF SENSOR NETWORKS FOR HEALTH MONITORING

Authors

DOI:

https://doi.org/10.28925/2663-4023.2026.32.1067

Keywords:

Internet of Things (IoT), sports sensor networks, information security, biometric data, encryption protocols, data protection, health monitoring, wearable devices

Abstract

The article addresses the problem of ensuring the security of sensor networks used for athlete health monitoring within Internet of Things (IoT) ecosystems. It is demonstrated that the digitalisation of sports and the widespread adoption of wearable sensing devices connected to mobile gateways and cloud platforms create a new class of risks related to the confidentiality, integrity, and availability of biometric data. Based on an analysis of international standards and recommendations, including NIST SP 800-213/213A, ENISA guidelines, and ISO/IEC 27001, as well as contemporary research on sports IoT technologies, eHealth, BLE security, and authentication in IoT-enabled healthcare, a conceptual multi-layer security model for sports IoT systems is developed. The proposed approach distinguishes sensor, gateway, server, and application layers, each characterised by its functional role, typical threats, and specific mitigation mechanisms that take into account device resource constraints and real-time operational requirements. At the sensor layer, the study substantiates the use of energy-efficient cryptographic algorithms, BLE LE Secure Connections mode, secure boot, signed OTA firmware updates, and hardware security modules such as Secure Elements for protected key storage. At the gateway layer, the use of MQTT and HTTPS over TLS 1.3, mutual authentication (mTLS), as well as the implementation of edge analytics and on-device AI, is examined to reduce the volume of raw data transmitted and to enhance privacy. The server layer is described as a domain of scalable analytics and identity management, where data-at-rest encryption, centralised key management, short-lived and rotation-enabled JWT tokens, and key revocation mechanisms are applied. At the application layer, a role-based access model for physicians, coaches, analysts, and administrative personnel is proposed, along with multi-factor authentication, protected audit logging, and controlled firmware updates via Signed OTA. Particular attention is given to the confidentiality of geolocation data, the use of pseudonymisation and coordinate coarsening, as well as ethical and legal aspects of processing athletes’ biometric information. The results show that the proposed model can serve as a methodological foundation for designing, auditing, and standardising digital solutions in both professional and recreational sports, including the development of internal security policies in clubs and sports federations. The integration of technical, organisational, and regulatory measures, complemented by mechanisms for validating the reliability of AI-generated decisions and limiting the autonomy of algorithmic outputs, is identified as a prerequisite for building a robust, trustworthy, and resilient health monitoring ecosystem in sports based on the Internet of Things.

Downloads

Download data is not yet available.

References

Seçkin, A. Ç., Ateş, B., & Seçkin, M. (2023). Review on wearable technology in sports: Concepts, challenges and opportunities. Applied Sciences, 13(18), 10399. https://doi.org/10.3390/app131810399

Tunc, M. A., Gures, E., & Shayea, I. (2021). A survey on IoT smart healthcare: Emerging technologies, applications, challenges, and future trends. arXiv. https://doi.org/10.48550/arXiv.2109.02042

National Institute of Standards and Technology. (2021a). IoT device cybersecurity guidance for the federal government: Establishing IoT device cybersecurity requirements (NIST SP 800-213). https://doi.org/10.6028/nist.sp.800-213

National Institute of Standards and Technology. (2021b). IoT device cybersecurity guidance for the federal government: IoT device cybersecurity requirement catalog (NIST SP 800-213A). https://doi.org/10.6028/nist.sp.800-213a

European Union Agency for Cybersecurity. (2020). Guidelines for securing the Internet of Things: Secure supply chain for IoT. ENISA. https://doi.org/10.2824/314452

Rescorla, E., Tschofenig, H., & Modadugu, N. (2022). The datagram transport layer security (DTLS) protocol version 1.3 (RFC 9147). RFC Editor. https://doi.org/10.17487/rfc9147

Khan, M., Din, I., Tha’er, M., & Kim, B.-S. (2022). A survey of authentication in Internet of Things-enabled healthcare systems. Sensors, 22(23), 9089. https://doi.org/10.3390/s22239089

Barua, A., Alamin, M. A. A., Hossain, M. S., & Hossain, E. (2022). Security and privacy threats for Bluetooth Low Energy in IoT and wearable devices: A comprehensive survey. IEEE Open Journal of the Communications Society, 2, 251–281. https://doi.org/10.1109/OJCOMS.2022.3149732

Makina, H., Letaifa, A. B., & Rachedi, A. (2023). Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. Security and Privacy, 7(2). https://doi.org/10.1002/spy2.346

Singh, A., & Chatterjee, K. (2022). Edge computing-based secure health monitoring framework for electronic healthcare systems. Cluster Computing. https://doi.org/10.1007/s10586-022-03717-w

Rancea, A., Anghel, I., & Cioara, T. (2024). Edge computing in healthcare: Innovations, opportunities, and challenges. Future Internet, 16(9), 329. https://doi.org/10.3390/fi16090329

Cao, W., Shen, W., Zhang, Z., & Qin, J. (2023). Privacy-preserving healthcare monitoring for IoT devices under edge computing. Computers & Security, 103464. https://doi.org/10.1016/j.cose.2023.103464

Zhang, B., Chen, C., Lee, I., Lee, K., & Ong, K.-L. (2025). A survey on security and privacy issues in wearable health monitoring devices. Computers & Security, 104453. https://doi.org/10.1016/j.cose.2025.104453

IT Governance Publishing. (2022). ISO/IEC 27001:2022 and the management system requirements (pp. 17–21). https://doi.org/10.2307/j.ctv30qq13d.6

Kuzmenko, D. S., & Ivanov, V. H. (2024). Security of a genealogical information retrieval system: Modern access control mechanisms. In Proceedings of the All-Ukrainian scientific and practical conference “Telecommunications, automation, computer-integrated technologies” (pp. 45–47). Donetsk National Technical University.

Van Hooren, B., Goudsmit, J., Restrepo, J., & Vos, S. (2019). Real-time feedback by wearables in running: Current approaches, challenges and suggestions for improvements. Journal of Sports Sciences, 38(2), 214–230. https://doi.org/10.1080/02640414.2019.1690960

NXP Semiconductors. (2018). A71CH Plug & Trust secure element: Data sheet (Rev. 1.2). https://www.nxp.com/docs/en/data-sheet/A71CH.pdf

Downloads


Abstract views: 66

Published

2026-03-26

How to Cite

Kuzmenko, D., & Konovalenko , O. (2026). INTERNET OF THINGS IN SPORTS: SECURITY OF SENSOR NETWORKS FOR HEALTH MONITORING. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(32), 820–830. https://doi.org/10.28925/2663-4023.2026.32.1067