Are Fitness Trackers fit for Security?

Study investigating fraud opportunities with fitness trackers reveals serious security flaws

80 million steps per day: Manipulated step count from one of the examined fitness trackers (cloud service on the left, smartphone app on the right)

They may look like a normal watch but are capable to do much more than just showing the time: So called "fitness trackers" are collecting data on their users' lifestyle and health status on a large scale helping them with training or losing weight. The popularity of these devices is constantly growing. Worldwide, nearly 20 million fitness trackers have been sold in the first quarter of 2016 (Source: IDC). Many of them track via GPS the kilometers the user run, measure heart rate and pulse or check if the user is asleep. "These data are not only used for the original purpose but are increasingly being used by third parties", explains Ahmad-Reza Sadeghi, system security professor at the cybersecurity profile area (CYSEC) of TU Darmstadt.

Data collected by fitness trackers have been used as evidence in court trials in the US, as reported by Forbes Magazine in 2014. Police and attorneys have started to recognize wearable devices as the human body's "black box", the NY Daily News wrote in April 2016. Some health insurance companies recently started to offer discounts if the insured persons provide personal data from their fitness trackers. This could attract scammers who manipulate the tracked data to fraudulently gain financial benefits or even influence a court trial, says Sadeghi. This makes it all the more important that transmission, processing and storing of the sensitive personal data meet high security standards.

To investigate this, Sadeghi and his team conducted a study in cooperation with the University of Padua (Italy) on 17 different fitness trackers including devices from less well-known manufacturers as well as devices from popular brands like Xiaomi, Garmin and Jawbone. The researchers concentrated on manipulating the data on their way to the cloud server by a "man-in-the-middle" attack and examined the security of communication protocols used by the fitness trackers.

The result: Although all cloud-based tracking systems use an encrypted protocol like HTTPS to transfer data, the researchers were able to falsify data in all cases. Out of all fitness trackers examined, only devices from four manufacturers took some minor measures to protect data integrity, i.e. to ensure that data remain intact and unaltered. "These hurdles cannot stop a motivated attacker. Scammers can manipulate the data even with very little IT knowledge", Sadeghi warns, as none of the trackers employ End-to-End encryption or other effective tamper protection measures when synchronizing data.

Five of the examined fitness trackers did not provide a possibility to synchronize fitness data with an online service. However, these manufacturers store the collected fitness data in plain-text, i.e. un-encrypted and readable by everyone, on the smartphone which introduces a potential risk of unauthorized data leakage should the smartphone be stolen or infected with malware. This is another serious security flaw of fitness trackers the researchers from TU Darmstadt and University of Padua found.

"Health insurances and all other companies who want to use fitness trackers for their services should seek advice from security experts before doing so", Sadeghi suggests. The flaws found in the study could be fixed with known standard technologies, "it's just that the manufacturers have to put some more effort in employing these technologies in their products."





A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang