Security Analysis of Bluetooth Low Energy Based Smart Wristbands
Title | Security Analysis of Bluetooth Low Energy Based Smart Wristbands |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Zhang, Q., Liang, Z. |
Conference Name | 2017 2nd International Conference on Frontiers of Sensors Technologies (ICFST) |
Keywords | Android software application, Batteries, Biomedical monitoring, Bluetooth, bluetooth low energy, brute-force attacks, Denial of Service attacks, Heart rate, Human Behavior, man-in-the-middle attacks, mobile computing, privacy, pubcrawl, replay attacks, resilience, Resiliency, Scalability, security, security of data, smart watch, smart wristband, smart wristbands, Tools, Trade agreements, wearable computers, wearable devices, wearables security |
Abstract | Wearable devices are being more popular in our daily life. Especially, smart wristbands are booming in the market recently, which can be used to monitor health status, track fitness data, or even do medical tests, etc. For this reason, smart wristbands can obtain a lot of personal data. Hence, users and manufacturers should pay more attention to the security aspects of smart wristbands. However, we have found that some Bluetooth Low Energy based smart wristbands have very weak or even no security protection mechanism, therefore, they are vulnerable to replay attacks, man-in-the-middle attacks, brute-force attacks, Denial of Service (DoS) attacks, etc. We have investigated four different popular smart wristbands and a smart watch. Among them, only the smart watch is protected by some security mechanisms while the other four smart wristbands are not protected. In our experiments, we have also figured out all the message formats of the controlling commands of these smart wristbands and developed an Android software application as a testing tool. Powered by the resolved command formats, this tool can directly control these wristbands, and any other wristbands of these four models, without using the official supporting applications. |
URL | https://ieeexplore.ieee.org/document/8210548/ |
DOI | 10.1109/ICFST.2017.8210548 |
Citation Key | zhang_security_2017 |
- replay attacks
- wearables security
- Wearable devices
- wearable computers
- Trade agreements
- tools
- smart wristbands
- smart wristband
- smart watch
- security of data
- security
- Scalability
- Resiliency
- resilience
- Android software application
- pubcrawl
- privacy
- mobile computing
- man-in-the-middle attacks
- Human behavior
- Heart rate
- Denial of Service attacks
- brute-force attacks
- bluetooth low energy
- Bluetooth
- Biomedical monitoring
- batteries