Executive Summary : | Wearable devices had become so popular due to the compactness and the information they provide. It has the capacity to connect with smart gadgets through wireless medium and can be very effective in transferring information as well as instruction to the smart gadgets. Since, these devices have certain rights to operate the connected smart gadgets, this research, is planned to study the behavior of the system under a side-channel attack environment. Side-channel attacks are generated in an indirect fashion by collecting the available materials and trying to attack the system to gather sensitive information. This study is planned to identify the possible breaches that can happen due to side-channel attacks in wearable devices. |