INTERNET OF THINGS IN SPORTS: SECURITY OF SENSOR NETWORKS FOR HEALTH MONITORING
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1067Keywords:
Internet of Things (IoT), sports sensor networks, information security, biometric data, encryption protocols, data protection, health monitoring, wearable devicesAbstract
The article addresses the problem of ensuring the security of sensor networks used for athlete health monitoring within Internet of Things (IoT) ecosystems. It is demonstrated that the digitalisation of sports and the widespread adoption of wearable sensing devices connected to mobile gateways and cloud platforms create a new class of risks related to the confidentiality, integrity, and availability of biometric data. Based on an analysis of international standards and recommendations, including NIST SP 800-213/213A, ENISA guidelines, and ISO/IEC 27001, as well as contemporary research on sports IoT technologies, eHealth, BLE security, and authentication in IoT-enabled healthcare, a conceptual multi-layer security model for sports IoT systems is developed. The proposed approach distinguishes sensor, gateway, server, and application layers, each characterised by its functional role, typical threats, and specific mitigation mechanisms that take into account device resource constraints and real-time operational requirements. At the sensor layer, the study substantiates the use of energy-efficient cryptographic algorithms, BLE LE Secure Connections mode, secure boot, signed OTA firmware updates, and hardware security modules such as Secure Elements for protected key storage. At the gateway layer, the use of MQTT and HTTPS over TLS 1.3, mutual authentication (mTLS), as well as the implementation of edge analytics and on-device AI, is examined to reduce the volume of raw data transmitted and to enhance privacy. The server layer is described as a domain of scalable analytics and identity management, where data-at-rest encryption, centralised key management, short-lived and rotation-enabled JWT tokens, and key revocation mechanisms are applied. At the application layer, a role-based access model for physicians, coaches, analysts, and administrative personnel is proposed, along with multi-factor authentication, protected audit logging, and controlled firmware updates via Signed OTA. Particular attention is given to the confidentiality of geolocation data, the use of pseudonymisation and coordinate coarsening, as well as ethical and legal aspects of processing athletes’ biometric information. The results show that the proposed model can serve as a methodological foundation for designing, auditing, and standardising digital solutions in both professional and recreational sports, including the development of internal security policies in clubs and sports federations. The integration of technical, organisational, and regulatory measures, complemented by mechanisms for validating the reliability of AI-generated decisions and limiting the autonomy of algorithmic outputs, is identified as a prerequisite for building a robust, trustworthy, and resilient health monitoring ecosystem in sports based on the Internet of Things.
Downloads
References
Seçkin, A. Ç., Ateş, B., & Seçkin, M. (2023). Review on wearable technology in sports: Concepts, challenges and opportunities. Applied Sciences, 13(18), 10399. https://doi.org/10.3390/app131810399
Tunc, M. A., Gures, E., & Shayea, I. (2021). A survey on IoT smart healthcare: Emerging technologies, applications, challenges, and future trends. arXiv. https://doi.org/10.48550/arXiv.2109.02042
National Institute of Standards and Technology. (2021a). IoT device cybersecurity guidance for the federal government: Establishing IoT device cybersecurity requirements (NIST SP 800-213). https://doi.org/10.6028/nist.sp.800-213
National Institute of Standards and Technology. (2021b). IoT device cybersecurity guidance for the federal government: IoT device cybersecurity requirement catalog (NIST SP 800-213A). https://doi.org/10.6028/nist.sp.800-213a
European Union Agency for Cybersecurity. (2020). Guidelines for securing the Internet of Things: Secure supply chain for IoT. ENISA. https://doi.org/10.2824/314452
Rescorla, E., Tschofenig, H., & Modadugu, N. (2022). The datagram transport layer security (DTLS) protocol version 1.3 (RFC 9147). RFC Editor. https://doi.org/10.17487/rfc9147
Khan, M., Din, I., Tha’er, M., & Kim, B.-S. (2022). A survey of authentication in Internet of Things-enabled healthcare systems. Sensors, 22(23), 9089. https://doi.org/10.3390/s22239089
Barua, A., Alamin, M. A. A., Hossain, M. S., & Hossain, E. (2022). Security and privacy threats for Bluetooth Low Energy in IoT and wearable devices: A comprehensive survey. IEEE Open Journal of the Communications Society, 2, 251–281. https://doi.org/10.1109/OJCOMS.2022.3149732
Makina, H., Letaifa, A. B., & Rachedi, A. (2023). Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions. Security and Privacy, 7(2). https://doi.org/10.1002/spy2.346
Singh, A., & Chatterjee, K. (2022). Edge computing-based secure health monitoring framework for electronic healthcare systems. Cluster Computing. https://doi.org/10.1007/s10586-022-03717-w
Rancea, A., Anghel, I., & Cioara, T. (2024). Edge computing in healthcare: Innovations, opportunities, and challenges. Future Internet, 16(9), 329. https://doi.org/10.3390/fi16090329
Cao, W., Shen, W., Zhang, Z., & Qin, J. (2023). Privacy-preserving healthcare monitoring for IoT devices under edge computing. Computers & Security, 103464. https://doi.org/10.1016/j.cose.2023.103464
Zhang, B., Chen, C., Lee, I., Lee, K., & Ong, K.-L. (2025). A survey on security and privacy issues in wearable health monitoring devices. Computers & Security, 104453. https://doi.org/10.1016/j.cose.2025.104453
IT Governance Publishing. (2022). ISO/IEC 27001:2022 and the management system requirements (pp. 17–21). https://doi.org/10.2307/j.ctv30qq13d.6
Kuzmenko, D. S., & Ivanov, V. H. (2024). Security of a genealogical information retrieval system: Modern access control mechanisms. In Proceedings of the All-Ukrainian scientific and practical conference “Telecommunications, automation, computer-integrated technologies” (pp. 45–47). Donetsk National Technical University.
Van Hooren, B., Goudsmit, J., Restrepo, J., & Vos, S. (2019). Real-time feedback by wearables in running: Current approaches, challenges and suggestions for improvements. Journal of Sports Sciences, 38(2), 214–230. https://doi.org/10.1080/02640414.2019.1690960
NXP Semiconductors. (2018). A71CH Plug & Trust secure element: Data sheet (Rev. 1.2). https://www.nxp.com/docs/en/data-sheet/A71CH.pdf
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Дмитро Кузьменко , Оксана Коноваленко

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.