Abstract
Wearable devices are becoming more prevalent in the daily life of society, ranging from smartwatches, and fitness bracelets to accessories and headphones. These devices, both from their hardware manufacturing and wireless firmware development perspectives may possess drawbacks. In recent years security researchers have uncovered a series of vulnerabilities. In this paper we introduce the concept and describe the key ideas towards the development of an automated security evaluation prototype for wireless wearable devices using device fingerprinting, as well as passive and active vulnerability identification. Furthermore we describe the technical approaches, challenges, and implementation choices we faced while developing the first stages of the prototype for this concept and handling full-spectrum Bluetooth analysis with software-defined radio.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bartolucci, M., del Peral-Rosado, J.A., Estatuet-Castillo, R., Garcia-Molina, J.A., Crisci, M., Corazza, G.E.: Synchronisation of low-cost open source sdrs for navigation applications. In: 2016 8th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), pp. 1–7. IEEE (2016)
Bertoncini, C., Rudd, K., Nousain, B., Hinders, M.: Wavelet fingerprinting of radio-frequency identification (RFID) tags. IEEE Trans. Industr. Electron. 59(12), 4843–4850 (2011)
Bluetooth SIG Inc: Assigned numbers. https://www.bluetooth.com/specifications/assigned-numbers/. Accessed 26 Aug 2022
Bratus, S., Cornelius, C., Kotz, D., Peebles, D.: Active behavioral fingerprinting of wireless devices. In: Proceedings of the first ACM Conference on Wireless Network Security, pp. 56–61 (2008)
Caca Labs: zzuf - multi-purpose fuzzer. http://caca.zoy.org/wiki/zzuf. Accessed 30 Aug 2022
Celosia, G., Cunche, M.: Fingerprinting bluetooth-low-energy devices based on the generic attribute profile. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp. 24–31 (2019)
Cilliers, L.: Wearable devices in healthcare: privacy and information security issues. Health Inf. Manag. J. 49(2-3), 150–156 (2020). https://doi.org/10.1177/1833358319851684. PMID: 31146589
Classen, J., Heinrich, A., Reith, R., Hollick, M.: Evil never sleeps: when wireless malware stays on after turning off iphones. In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 146–156. WiSec ’22, Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3507657.3528547
Garbelini, M.E., Chattopadhyay, S., Bedi, V., Sun, S., Kurniawan, E.: Braktooth: causing havoc on bluetooth link manager (2021)
Garbelini, M.E., Wang, C., Chattopadhyay, S., Sumei, S., Kurniawan, E.: \(SweynTooth\): unleashing mayhem over bluetooth low energy. In: 2020 USENIX Annual Technical Conference (USENIX ATC 20), pp. 911–925 (2020)
Garg, P.: Fuzzing: mutation vs. generation. https://resources.infosecinstitute.com/topic/fuzzing-mutation-vs-generation/. Accessed 28 Aug 2022
GitLab: Devsecops with gitlab. https://about.gitlab.com/solutions/dev-sec-ops/. Accessed 30 Aug 2022
GitLab DEVSECOPS blog: What is fuzz testing?. https://about.gitlab.com/topics/devsecops/what-is-fuzz-testing/. Accessed 28 Aug 2022
Givehchian, H., et al.: Evaluating physical-layer ble location tracking attacks on mobile devices. In: IEEE Symposium on Security and Privacy (SP) (2022)
Google: american fuzzy lop. https://github.com/google/AFL Accessed 28 Aug 2022
Great Scott Gadgets: Ubertooth one. https://greatscottgadgets.com/ubertoothone/. Accessed 26 Aug 2022
Hale, M.L., Ellis, D., Gamble, R., Waler, C., Lin, J.: Secu wear: an open source, multi-component hardware/software platform for exploring wearable security. In: 2015 IEEE International Conference on Mobile Services, pp. 97–104. IEEE (2015)
Hale, M.L., Lotfy, K., Gamble, R.F., Walter, C., Lin, J.: Developing a platform to evaluate and assess the security of wearable devices. Digit. Commun. Netw. 5(3), 147–159 (2019)
ImmunitySec: Spike. https://www.kali.org/tools/spike/. Accessed 30 Aug 2022
Ken Research: Worldwide wearable devices cybersecurity market. https://www.kenresearch.com/defense-and-security/security-devices/worldwide-wearable-devices/179018-16.html. Accessed 28 Aug 2022
Klees, G., Ruef, A., Cooper, B., Wei, S., Hicks, M.: Evaluating fuzz testing. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2123–2138. CCS’18, Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3243734.3243804
Köse, M., Taşcioğlu, S., Telatar, Z.: RF fingerprinting of IoT devices based on transient energy spectrum. IEEE Access 7, 18715–18726 (2019). https://doi.org/10.1109/ACCESS.2019.2896696
Laricchia, F.: Number of connected wearable devices worldwide from 2016 to 2022. https://www.statista.com/statistics/487291/global-connected-wearable-devices/. Accessed 28 Aug 2022
Li, B., Cetin, E.: Waveform domain deep learning approach for RF fingerprinting. In: 2021 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–5. IEEE (2021)
Liang, J., Wang, M., Chen, Y., Jiang, Y., Zhang, R.: Fuzz testing in practice: obstacles and solutions. In: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 562–566 (2018). https://doi.org/10.1109/SANER.2018.8330260
Liu, D., Wang, M., Wang, H.: RF fingerprint recognition based on spectrum waterfall diagram. In: 2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 613–616. IEEE (2021)
Lockout: Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework. https://github.com/lockout/Bbuzz. Accessed 28 Aug 2022
Mahmoud, H.A., Arslan, H.: Error vector magnitude to snr conversion for nondata-aided receivers. IEEE Trans. Wireless Commun. 8(5), 2694–2704 (2009)
Miller, C., Peterson, Z.N.: Analysis of mutation and generation-based fuzzing. DefCon vol. 15 (2007). https://defcon.org/images/defcon-15/dc15-presentations/Miller/Whitepaper/dc-15-miller-WP.pdf
Nesenbergs, K., Paikens, P., Blumbergs, B., Rusins, A., Dobelis, E.: Apparatus and method for wireless security analysis of wearable devices (2022). lV Patent application No. EPLV202200000033380
Neumann, C., Heen, O., Onno, S.: An empirical study of passive 802.11 device fingerprinting. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 593–602. IEEE (2012)
Offensive Security: Exploit-DB. https://www.exploit-db.com/ Accessed 26 Aug 2022
OWASP: Fuzzing. https://owasp.org/www-community/Fuzzing Accessed 30 Aug 2022
Peach: Peach fuzzer community edition. https://peachtech.gitlab.io/peach-fuzzer-community/ Accessed 30 Aug 2022
Pereyda, J.: boofuzz: network protocol fuzzing for humans. https://github.com/jtpereyda/boofuzz. Accessed 30 Aug 2022
Ruge, J., Classen, J., Gringoli, F., Hollick, M.: Frankenstein: advanced wireless fuzzing to exploit new bluetooth escalation targets. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 19–36. USENIX Association (2020). https://www.usenix.org/conference/usenixsecurity20/presentation/ruge
Sköld, M., Yang, J., Sunnerud, H., Karlsson, M., Oda, S., Andrekson, P.A.: Constellation diagram analysis of DPSK signal regeneration in a saturated parametric amplifier. Opt. Express 16(9), 5974–5982 (2008)
Soltanieh, N., Norouzi, Y., Yang, Y., Karmakar, N.C.: A review of radio frequency fingerprinting techniques. IEEE J. Radio Freq. Identif. 4(3), 222–233 (2020)
Synopsys: Defensics fuzz testing. https://www.synopsys.com/software-integrity/security-testing/fuzz-testing.html
Xu, Q., Zheng, R., Saad, W., Han, Z.: Device fingerprinting in wireless networks: challenges and opportunities. IEEE Commun. Surveys Tutorials 18(1), 94–104 (2015)
Acknowledgements
This research is funded by the Latvian Council of Science, project “Automated wireless security analysis for wearable devices", project No. LZP-2020/1-0395.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Blumbergs, B., Dobelis, Ē., Paikens, P., Nesenbergs, K., Solovjovs, K., Rušiņš, A. (2022). WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices. In: Reiser, H.P., Kyas, M. (eds) Secure IT Systems. NordSec 2022. Lecture Notes in Computer Science, vol 13700. Springer, Cham. https://doi.org/10.1007/978-3-031-22295-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-22295-5_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-22294-8
Online ISBN: 978-3-031-22295-5
eBook Packages: Computer ScienceComputer Science (R0)