Cargando…

Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack

Wearable devices are starting to gain popularity, which means that a large portion of the population is starting to acquire these products. This kind of technology comes with a lot of advantages, as it simplifies different tasks people do daily. However, as they recollect sensitive data, they are st...

Descripción completa

Detalles Bibliográficos
Autores principales: Silva-Trujillo, Alejandra Guadalupe, González González, Mauricio Jacobo, Rocha Pérez, Luis Pablo, García Villalba, Luis Javier
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10301545/
https://www.ncbi.nlm.nih.gov/pubmed/37420605
http://dx.doi.org/10.3390/s23125438
_version_ 1785064837003345920
author Silva-Trujillo, Alejandra Guadalupe
González González, Mauricio Jacobo
Rocha Pérez, Luis Pablo
García Villalba, Luis Javier
author_facet Silva-Trujillo, Alejandra Guadalupe
González González, Mauricio Jacobo
Rocha Pérez, Luis Pablo
García Villalba, Luis Javier
author_sort Silva-Trujillo, Alejandra Guadalupe
collection PubMed
description Wearable devices are starting to gain popularity, which means that a large portion of the population is starting to acquire these products. This kind of technology comes with a lot of advantages, as it simplifies different tasks people do daily. However, as they recollect sensitive data, they are starting to be targets for cybercriminals. The number of attacks on wearable devices forces manufacturers to improve the security of these devices to protect them. Many vulnerabilities have appeared in communication protocols, specifically Bluetooth. We focus on understanding the Bluetooth protocol and what countermeasures have been applied during their updated versions to solve the most common security problems. We have performed a passive attack on six different smartwatches to discover their vulnerabilities during the pairing process. Furthermore, we have developed a proposal of requirements needed for maximum security of wearable devices, as well as the minimum requirements needed to have a secure pairing process between two devices via Bluetooth.
format Online
Article
Text
id pubmed-10301545
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-103015452023-06-29 Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack Silva-Trujillo, Alejandra Guadalupe González González, Mauricio Jacobo Rocha Pérez, Luis Pablo García Villalba, Luis Javier Sensors (Basel) Article Wearable devices are starting to gain popularity, which means that a large portion of the population is starting to acquire these products. This kind of technology comes with a lot of advantages, as it simplifies different tasks people do daily. However, as they recollect sensitive data, they are starting to be targets for cybercriminals. The number of attacks on wearable devices forces manufacturers to improve the security of these devices to protect them. Many vulnerabilities have appeared in communication protocols, specifically Bluetooth. We focus on understanding the Bluetooth protocol and what countermeasures have been applied during their updated versions to solve the most common security problems. We have performed a passive attack on six different smartwatches to discover their vulnerabilities during the pairing process. Furthermore, we have developed a proposal of requirements needed for maximum security of wearable devices, as well as the minimum requirements needed to have a secure pairing process between two devices via Bluetooth. MDPI 2023-06-08 /pmc/articles/PMC10301545/ /pubmed/37420605 http://dx.doi.org/10.3390/s23125438 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Silva-Trujillo, Alejandra Guadalupe
González González, Mauricio Jacobo
Rocha Pérez, Luis Pablo
García Villalba, Luis Javier
Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack
title Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack
title_full Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack
title_fullStr Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack
title_full_unstemmed Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack
title_short Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack
title_sort cybersecurity analysis of wearable devices: smartwatches passive attack
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10301545/
https://www.ncbi.nlm.nih.gov/pubmed/37420605
http://dx.doi.org/10.3390/s23125438
work_keys_str_mv AT silvatrujilloalejandraguadalupe cybersecurityanalysisofwearabledevicessmartwatchespassiveattack
AT gonzalezgonzalezmauriciojacobo cybersecurityanalysisofwearabledevicessmartwatchespassiveattack
AT rochaperezluispablo cybersecurityanalysisofwearabledevicessmartwatchespassiveattack
AT garciavillalbaluisjavier cybersecurityanalysisofwearabledevicessmartwatchespassiveattack