Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack

被引:8
|
作者
Silva-Trujillo, Alejandra Guadalupe [1 ,2 ]
Gonzalez, Mauricio Jacobo Gonzalez [1 ,3 ]
Perez, Luis Pablo Rocha [1 ]
Villalba, Luis Javier Garcia [2 ]
机构
[1] Univ Autonoma San Luis Potosi UASLP, Fac Ingn, San Luis Potosi 78290, Mexico
[2] Univ Complutense Madrid UCM, Fac Comp Sci & Engn, Fac Informat, Dept Software Engn & Artificial Intelligence DISIA, Off 431, Madrid 28040, Spain
[3] Inst Tecnol Estudios Super Monterrey, Escuela Ingn & Ciencias, Dept Comp, Campus Puebla, Puebla 72453, Mexico
关键词
Bluetooth; BLE; cybersecurity; secure connections; smartwatch; sniffer; wearable; HEALTH;
D O I
10.3390/s23125438
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wearable devices are starting to gain popularity, which means that a large portion of the population is starting to acquire these products. This kind of technology comes with a lot of advantages, as it simplifies different tasks people do daily. However, as they recollect sensitive data, they are starting to be targets for cybercriminals. The number of attacks on wearable devices forces manufacturers to improve the security of these devices to protect them. Many vulnerabilities have appeared in communication protocols, specifically Bluetooth. We focus on understanding the Bluetooth protocol and what countermeasures have been applied during their updated versions to solve the most common security problems. We have performed a passive attack on six different smartwatches to discover their vulnerabilities during the pairing process. Furthermore, we have developed a proposal of requirements needed for maximum security of wearable devices, as well as the minimum requirements needed to have a secure pairing process between two devices via Bluetooth.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] An Experimental Study of Secret Key Generation For Passive Wi-Fi Wearable Devices
    Chinaei, Mohammad Hossein
    Sivaraman, Vijay
    Ostry, Diethelm
    2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2017,
  • [42] Design of Wearable EEG Devices Specialized for Passive Brain-Computer Interface Applications
    Park, Seonghun
    Han, Chang-Hee
    Im, Chang-Hwan
    SENSORS, 2020, 20 (16) : 1 - 16
  • [43] Smartwatches as chest compression feedback devices: A feasibility study
    Song, Yeongtak
    Chee, Youngjoon
    Oh, Jaehoon
    Ahn, Chiwon
    Lim, Tae Ho
    RESUSCITATION, 2016, 103 : 20 - 23
  • [44] The effect of ECG data variability on side-channel attack success rate in wearable devices
    Perez-Tirador, Pablo
    Jevtic, Ruzica
    Cabezaolias, Carmen
    Romero, Teresa
    Otero, Abraham
    Caffarena, Gabriel
    INTEGRATION-THE VLSI JOURNAL, 2025, 103
  • [45] Analysis and development of an automatic eCall algorithm for wearable devices
    Gelmini, Simone
    Strada, Silvia
    Tanelli, Mara
    Savaresi, Sergio
    Guzzon, Alessandro
    2018 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (CCTA), 2018, : 1240 - 1245
  • [46] Efficiency Analysis of a Conformal SCMR System for Wearable Devices
    Bonan, Yonathan
    Bao, Kun
    Flores, Carlos
    Baza, Kevin
    Georgakopoulos, Stavros V.
    2017 IEEE INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION & USNC/URSI NATIONAL RADIO SCIENCE MEETING, 2017, : 1233 - 1234
  • [47] Data Analysis Model of Wearable Devices in Physical Education
    Dong, Qian
    Qu, Ximei
    Miao, Rong
    BLENDED LEARNING: EDUCATIONAL INNOVATION FOR PERSONALIZED LEARNING, ICBL 2019, 2019, 11546 : 225 - 238
  • [48] The SWOT Analysis of the Wearable Devices in Smart Health Applications
    Yang, Yu
    Yu, Sijun
    Hao, Yuwen
    Xu, Xiao
    Liu, Huiliang
    SMART HEALTH, ICSH 2016, 2017, 10219 : 3 - 8
  • [49] Analysis of Health Applications on Smart phones and Wearable Devices
    Espineli, Juancho
    Niguidula, Jasmin
    6TH INTERNATIONAL CONFERENCE ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY (ACIT 2018), 2018, : 49 - 54
  • [50] Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack
    Giannakas, Filippos
    Troussas, Christos
    Krouska, Akrivi
    Voyiatzis, Ioannis
    Sgouropoulou, Cleo
    INFORMATION SECURITY JOURNAL, 2023, 32 (05): : 371 - 382