Another interesting aspect of our example attack is that it relies on multiple
devices with different feature sets to execute the attack. A smartwatch alone may
not pose security risks, but combining features of many wearables may allow for
security vulnerabilities. This concept was investigated by Denning et al. as it
applied to household robots [4].