Security Analysis of Wearable Fitness Devices (Fitbit)
نویسندگان
چکیده
This report describes an analysis of the Fitbit Flex ecosystem. Our objectives are to describe (1) the data Fitbit collects from its users, (2) the data Fitbit provides to its users, and (3) methods of recovering data not made available to device owners. Our analysis covers four distinct attack vectors. First, we analyze the security and privacy properties of the Fitbit device itself. Next, we observe the Bluetooth traffic sent between the Fitbit device and a smartphone or personal computer during synchronization. Third, we analyze the security of the Fitbit Android app. Finally, we study the security properties of the network traffic between the Fitbit smartphone or computer application and the Fitbit web service. We provide evidence that Fitbit unnecessarily obtains information about nearby Flex devices under certain circumstances. We further show that Fitbit does not provide device owners with all of the data collected. In fact, we find evidence of per-minute activity data that is sent to the Fitbit web service but not provided to the owner. We also discovered that MAC addresses on Fitbit devices are never changed, enabling usercorrelation attacks. BTLE credentials are also exposed on the network during device pairing over TLS, which might be intercepted by MITM attacks. Finally, we demonstrate that actual user activity data is authenticated and not provided in plaintext on an end-to-end basis from the device to the Fitbit web service.
منابع مشابه
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit
Tens of millions of wearable fitness trackers are shipped yearly to consumers who routinely collect information about their exercising patterns. Smartphones push this health-related data to vendors’ cloud platforms, enabling users to analyze summary statistics on-line and adjust their habits. Third-parties including health insurance providers now offer discounts and financial rewards in exchang...
متن کاملThe Effect of the Motivation of Wearable Fitness Devices Use on Exercise Engagement: The Mediating Effect of Exercise Commitment
Background. In the study of wearable device users, it was found that the intentional motives for using wearable devices were a novelty, fun, and popular trends, but whether the needs and functions of device users will change due to the change the time is the focus of this study. Objectives. This study aims to examine the path relationships among motivation of use, exercise commitment, and exer...
متن کاملBreaking Fitness Records without Moving: Reverse Engineering and Spoo ng Fitbit
Tens of millions of wearable tness trackers are shipped yearly to consumers who routinely collect information about their exercising patterns. Smartphones push this health-related data to vendors' cloud platforms, enabling users to analyze summary statistics on-line and adjust their habits. Third-parties including health insurance providers now o er discounts and nancial rewards in exchange for...
متن کاملFit and Vulnerable: Attacks and Defenses for a Health Monitoring Device
The fusion of social networks and wearable sensors is becoming increasingly popular, with systems like Fitbit automating the process of reporting and sharing user fitness data. In this paper we show that while compelling, the integration of health data into social networks is fraught with privacy and security vulnerabilities. Case in point, by reverse engineering the communication protocol, sto...
متن کاملStep Towards Better Security: Attacks and Defenses for Low Power Fitness Trackers
Wearable personal fitness trackers automatically collect sensor data about the user throughout the day and integrate this data into social network accounts. The increasing popular interest in personal telemetry, also called the Quantified Self or ‘‘lifelogging’’, has induced this flourishing new product category. The makers of these trackers have to strike a balance between many constraints inc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014