The Newer, the More Secure? Standards-Compliant Bluetooth Low Energy Man-in-the-Middle Attacks on Fitness Trackers
Abstract
:1. Introduction
2. Related Work
3. Bluetooth and the Fitness Tracker Ecosystem
3.1. Bluetooth
3.2. Ecosystem
3.3. End-to-End Encryption
3.4. Bluetooth Attacks and Vulnerabilities
3.4.1. Key Negotiation of Bluetooth Attack
Attack Description
Countermeasures
3.4.2. Fixed-Coordinate Invalid Curve Attack
Attack Description
Countermeasures
3.4.3. Secure Connection Downgrade Attack
Attack Description
Countermeasures
3.4.4. BT-Niño Man-in-the-Middle Attack
Attack Description
Countermeasures
3.5. Experimental Setup
4. Results
4.1. Our Findings
4.1.1. Vantage M2, Ignite 3, and Vantage V3
4.1.2. Mi Smart Bands 6, 7, and 8
4.1.3. Vívofit jr. 3 and Bounce
4.2. The Vendors’ Countermeasures
5. Discussion and Future Work
5.1. Bluetooth Attack Summary and Discussion
5.2. Implications of the Attacks
5.3. Recommendations and Best Practices
5.4. Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
E2EE | End-to-end-encryption |
KNOB | Key Negotiation of Bluetooth Attack |
FCIC | Fixed-Coordinate Invalid Curve Attack |
SCD | Secure Connection Downgrade Attack |
Niño | BT-Niño Man-In-The-Middle Attack |
References
- Laricchia, F. Wearables Unit Shipments Worldwide from 2014 to 2028. 2024. Available online: https://www.statista.com/statistics/437871/wearables-worldwide-shipments/ (accessed on 9 August 2024).
- Rawal, J. Fitness Tracker Market Size, Share & Industry Analysis, by Device Type (Smart Watches, Fitness Bands, Smart Glasses, Smart Clothing, and Others), by Application (Heart Rate Tracking, Sleep Measurement, Glucose Measurement, Sports, Running, and Cycling Tracking), by Distribution Channel (Online, Retail, and Others), and Regional Forecast, 2024–2032. 2024. Available online: https://www.fortunebusinessinsights.com/fitness-tracker-market-103358 (accessed on 9 August 2024).
- DELPHI e-Platform. 2012. Available online: http://delphi.ucsd.edu/ (accessed on 24 March 2023).
- All of Us Research Program. 2023. Available online: https://allofus.nih.gov/ (accessed on 24 March 2023).
- HEALTH-X dataLOFT. 2023. Available online: https://www.health-x.org/home (accessed on 24 March 2023).
- ResearchKit and CareKit. 2023. Available online: https://www.apple.com/lae/researchkit/ (accessed on 24 March 2023).
- Apple Research App. 2023. Available online: https://www.apple.com/ios/research-app/ (accessed on 24 March 2023).
- Polar Research Center. 2023. Available online: https://www.polar.com/en/science (accessed on 24 March 2023).
- MIT Generali Vitality. 2023. Available online: https://www.generalivitality.com/media/iyig0hmr/4-1-8_generali_vitality_leistungsbeschreibung_broschuere_210x105mm_sap25018_bd_0420_web_high-2.pdf (accessed on 24 March 2023).
- Big Data—Auch in der Krankenversicherung ein Trend. Available online: https://www.wissen-private-krankenversicherung.de/big-data-krankenversicherung-trend (accessed on 24 March 2023). (Only Available in German).
- Brennan, R.; Kasperowicz, L. How to Use Fitness Trackers to Save on Health Insurance. 2021. Available online: https://clearsurance.com/blog/fitness-trackers-to-save-on-health-insurance-premiums (accessed on 31 March 2023). (Only Available in German).
- Khandelwal, I.; Stollenwerk, K.; Krüger, B.; Weber, A. Posture Classification based on a Spine Shape Monitoring System. In Proceedings of the Computational Science and Its Applications—ICCSA, Saint Petersburg, Russia, 1–4 July 2019. [Google Scholar] [CrossRef]
- Stollenwerk, K.; Müller, J.; Hinkenjann, A.; Krüger, B. Analyzing Spinal Shape Changes During Posture Training Using a Wearable Device. Sensors 2019, 19, 3625. [Google Scholar] [CrossRef] [PubMed]
- European Parliament and the Council. Regulation (EU) 2017/745 of the European Parliament and of the Council of 5 April 2017 on Medical Devices, Amending Directive 2001/83/EC, Regulation (EC) No 178/2002 and Regulation (EC) No 1223/2009 and Repealing Council Directives 90/385/EEC and 93/42/EEC. 2020. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:02017R0745-20200424&from=EN (accessed on 24 March 2023).
- Medical Wearables Platform—Monitoring and Evaluation of Vital Parameters for the Prophylaxis of Diseases. Technical Report, Fraunhofer EMFT. Available online: https://www.emft.fraunhofer.de/content/dam/emft/emft-neu/deutsch/dokumente/Medical%20Wearables.pdf (accessed on 24 March 2023).
- Goyal, R.; Dragoni, N.; Spognardi, A. Mind the Tracker You Wear: A Security Analysis of Wearable Health Trackers. In Proceedings of the SAC’16: 31st Annual ACM Symposium on Applied Computing. Association for Computing Machinery, Pisa, Italy, 4–8 April 2016; pp. 131–136. [Google Scholar] [CrossRef]
- Lotfy, K.; Hale, M.L. Assessing Pairing and Data Exchange Mechanism Security in the Wearable Internet of Things. In Proceedings of the 2016 IEEE International Conference on Mobile Services (MS), San Francisco, CA, USA, 27 June–2 July 2016; pp. 25–32. [Google Scholar] [CrossRef]
- Langone, M.; Setola, R.; Lopez, J. Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method. In Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, 4–8 July 2017; Volume 2. [Google Scholar] [CrossRef]
- Cusack, B.; Antony, B.; Ward, G.; Mody, S. Assessment of security vulnerabilities in wearable devices. In Proceedings of the 15th Australian Information Security Management Conference, Perth, Australia, 5–6 December 2017. [Google Scholar] [CrossRef]
- Gouda, O.M.; Hejji, D.J.; Obaidat, M.S. Privacy Assessment of Fitness Tracker Devices. In Proceedings of the 2020 International Conference on Computer, Information and Telecommunication Systems (CITS), Hangzhou, China, 5–7 October 2020; pp. 1–8. [Google Scholar] [CrossRef]
- Fowler, J. Report: Fitness Tracker Data Breach Exposed 61 Million Records and User Data Online. Available online: https://www.websiteplanet.com/blog/gethealth-leak-report/ (accessed on 5 December 2023).
- The Guardian. Hackers Steal Data of 150 million MyFitnessPal App Users. 30 May 2018. Available online: https://www.theguardian.com/technology/2018/mar/30/hackers-steal-data-150m-myfitnesspal-app-users-under-armour (accessed on 5 December 2023).
- Dhondt, K.; Le Pochat, V.; Voulimeneas, A.; Joosen, W.; Volckaert, S. A Run a Day Won’t Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS’22), Los Angeles, CA, USA, 7–11 November 2022; pp. 801–814. [Google Scholar] [CrossRef]
- Antonioli, D.; Tippenhauer, N.O.; Rasmussen, K. Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy. ACM Trans. Priv. Secur. 2020, 23, 14. [Google Scholar] [CrossRef]
- Biham, E.; Neumann, L. Breaking the Bluetooth Pairing – Fixed Coordinate Invalid Curve Attack. In Proceedings of the Selected Areas in Cryptography—SAC 2019, Waterloo, ON, Canada, 12–16 August 2019; Springer International Publishing: Cham, Switzerland, 2020. [Google Scholar] [CrossRef]
- Antonioli, D.; Tippenhauer, N.O.; Rasmussen, K. BIAS: Bluetooth Impersonation AttackS. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 18–21 May 2020; pp. 549–562. [Google Scholar] [CrossRef]
- Bluetooth Core Specification 5.4; Technical Report; Bluetooth SIG: Kirkland, DC, USA, 2023.
- Hyppönen, K.; Haataja, K.M. ’Niño’ Man-In-The-Middle Attack on Bluetooth Secure Simple Pairing. In Proceedings of the 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet. Institute of Electrical and Electronics Engineers (IEEE), Tashkent, Uzbekistan, 26–28 September 2007; pp. 1–5. [Google Scholar] [CrossRef]
- The New Polar Vantage V2. 2021. Available online: https://www.polar.com/blog/polar-vantage-v2-win-with-heart/ (accessed on 21 March 2023).
- Find Your Rhythm with The New Polar Ignite 3. 2022. Available online: https://www.polar.com/blog/polar-ignite3-find-your-rhythm/ (accessed on 9 August 2024).
- Introducing the New Polar Vantage V3 Powered by Breakthrough Biosensing Technologies. 2023. Available online: https://www.polar.com/blog/introducing-polar-vantage-v3/ (accessed on 6 August 2024).
- Xiaomi Mi Smart Band 6 Gets “Full Screen” AMOLED Display, Mi Smart Projector 2 Pro Also Unveiled. 2021. Available online: https://www.gsmarena.com/xiaomi_mi_smart_band_6_arrives_with_larger_display_mi_smart_projector_2_pro_unveiled-news-48423.php (accessed on 28 March 2022).
- Xiaomi Smart Band 7 Debuts Globally. 2022. Available online: https://www.gsmarena.com/xiaomi_smart_band_7_goes_global-news-54750.php (accessed on 6 August 2024).
- Stables, J. Xiaomi Mi Band 8 Global Edition: Price, Features and Release Date. 2023. Available online: https://www.wareable.com/xiaomi/xiaomi-mi-band-8-specs-features-price (accessed on 6 August 2024).
- vívofit® jr. 3—Disney Princess—Manuals. 2020. Available online: https://support.garmin.com/en-US/?partNumber=010-02441-33&tab=manuals (accessed on 28 March 2022).
- Bounce®—Manuals. 2022. Available online: https://support.garmin.com/en-US/?partNumber=010-02448-20&tab=manuals (accessed on 6 August 2024).
- Mantz, D.; Classen, J.; Schulz, M.; Hollick, M. InternalBlue—Bluetooth Binary Patching and Experimentation Framework. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’19), Seoul, Republic of Korea, 17–21 June 2019; pp. 79–90. [Google Scholar]
- Available online: https://github.com/seemoo-lab/internalblue (accessed on 28 January 2025).
- Das, A.K.; Pathak, P.H.; Chuah, C.N.; Mohapatra, P. Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers. In Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications (HotMobile’16), New York, NY, USA, 23–24 February 2016; pp. 99–104. [Google Scholar] [CrossRef]
- Zhang, Q.; Liang, Z. Security Analysis of Bluetooth Low Energy Based Smart Wristbands. In Proceedings of the 2017 2nd International Conference on Frontiers of Sensors Technologies (ICFST), Shenzhen, China, 14–16 April 2017; pp. 421–425. [Google Scholar] [CrossRef]
- Hannan Bin Azhar, M.A.; Smith, D.; Cain, A. Spying on Kids’ Smart Devices: Beware of Security Vulnerabilities! In Cybersecurity in the Age of Smart Societies; Jahankhani, H., Ed.; Springer International Publishing: Cham, Switzerland, 2023; pp. 123–140. [Google Scholar] [CrossRef]
- Silva-Trujillo, A.G.; González González, M.J.; Rocha Pérez, L.P.; García Villalba, L.J. Cybersecurity Analysis of Wearable Devices: Smartwatches Passive Attack. Sensors 2023, 23, 5438. [Google Scholar] [CrossRef] [PubMed]
- Almenares Mendoza, F.; Alonso, L.; Marín López, A.; Díaz Sánchez, D.; Arias Cabarcos, P. Assessment of Fitness Tracker Security: A Case of Study. Proceedings 2018, 2, 1235. [Google Scholar] [CrossRef]
- Fúster, J.; Solera-Cotanilla, S.; Pérez, J.; Vega-Barbas, M.; Palacios, R.; Alvarez-Campana, M.; López, G. Analysis of security and privacy issues in wearables for minors. Wirel. Netw. 2023, 29, 5437–5453. [Google Scholar] [CrossRef]
- Cyr, B.; Horn, W.; Miao, D.; Specter, M.A. Security Analysis of Wearable Fitness Devices (Fitbit). Mass. Inst. Technol. 2014, 1, 1–14. [Google Scholar]
- Barcena, M.B.; Wueest, C.; Lau, H. How Safe Is Your Quantified Self? 2014. Available online: https://docs.broadcom.com/doc/how-safe-is-your-quantified-self-en (accessed on 8 May 2023).
- Clausing, E.; Schiefer, M.; Lösche, U.; Morgenstern, M. Internet of Things—Security Evaluation of Nine Fitness Trackers, AV-TEST GmbH. 2015. Available online: https://www.av-test.org/fileadmin/pdf/avtest_2015-06_fitness_tracker_english.pdf (accessed on 8 May 2023).
- Clausing, E.; Schiefer, M. Internet of Things: Security Evaluation of 7 Fitness Trackers on Android and the Apple Watch, AV-TEST GmbH. 2016. Available online: https://www.av-test.org/fileadmin/pdf/avtest_2016-07_fitness_tracker_english.pdf (accessed on 8 May 2023).
- Hilts, A.; Parsons, C.; Knockel, J. Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security. 2016. Available online: https://openeffect.ca/reports/Every_Step_You_Fake.pdf (accessed on 8 May 2023).
- Classen, J.; Wegemer, D.; Patras, P.; Spink, T.; Hollick, M. Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware. Proc. ACM Interactive Mobile Wearable Ubiquitous Technol. 2018, 2, 5. [Google Scholar] [CrossRef]
- Moganedi, S.; Pottas, D. Identification of Information Security Controls for Fitness Wearable Manufacturers. In Proceedings of the Information and Cyber Security: 19th International Conference—ISSA 2020, Pretoria, South Africa, 25–26 August 2020; Revised Selected Papers. Springer: Cham, Switzerland, 2020; pp. 112–128. [Google Scholar] [CrossRef]
- What Is End-to-End Encryption? Available online: https://www.ibm.com/topics/end-to-end-encryption (accessed on 14 March 2023).
- Cäsar, M.; Pawelke, T.; Steffan, J.; Terhorst, G. A survey on Bluetooth Low Energy security and privacy. Comput. Netw. 2022, 205, 108712. [Google Scholar] [CrossRef]
- Erratum 10734; Technical Report; Bluetooth SIG: Kirkland, DC, USA, 2018.
- Polar Measurement Data Specification for 3rd Party. 2021. Available online: https://github.com/polarofficial/polar-ble-sdk/blob/4.0.0/technical_documentation/Polar_Measurement_Data_Specification.pdf (accessed on 23 August 2024).
- Casagrande, M.; Losiouk, E.; Conti, M.; Payer, M.; Antonioli, D. BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022, 2022, 330–366. [Google Scholar] [CrossRef]
- Fereidooni, H.; Frassetto, T.; Miettinen, M.; Sadeghi, A.R.; Conti, M. Fitness Trackers: Fit for Health but Unfit for Security and Privacy. In Proceedings of the 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Philadelphia, PA, USA, 17–19 July 2017; pp. 19–24. [Google Scholar] [CrossRef]
- European Parliament and Council. Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on Information and Communications Technology Cybersecurity Certification and Repealing Regulation (EU) No 526/2013 (Cybersecurity Act). 17 April 2019. Available online: https://eur-lex.europa.eu/eli/reg/2019/881/oj (accessed on 6 December 2023).
- European Parliament and Council. Proposal for a Regulation of the European Parliament and of the Council on Horizontal Cybersecurity Requirements for Products with Digital Elements and Amending Regulation (EU) 2019/1020. 15 September 2022. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:52022PC0454 (accessed on 6 December 2023).
- National Cybersecurity Strategy. April 2023. Available online: https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf (accessed on 6 December 2023).
- Lifshitz, L.R. Security by Design: California’s New IoT Security Laws. 28 November 2018. Available online: https://businesslawtoday.org/2018/11/security-design-californias-new-iot-security-laws/ (accessed on 6 December 2023).
- Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default. 13 April 2023. Available online: https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf (accessed on 6 December 2023).
- Turan, M.S.; McKay, K.; Chang, D.; Kang, J.; Kelsey, J. Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions (NIST SP 800-232); Technical Report; NIST: Gaithersburg, MD, USA, 2024.
- Zhang, Y.; Lin, Z. When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-Based Side Channel and Its Countermeasure. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS’22), New York, NY, USA, 4–11 November 2022; pp. 3181–3194. [Google Scholar] [CrossRef]
- Becker, J.K.; Li, D.; Starobinski, D. Tracking Anonymized Bluetooth Devices. Proc. Priv. Enhancing Technol. 2019, 2019, 50–65. [Google Scholar] [CrossRef]
- Locatelli, P.; Perri, M.; Jimenez Gutierrez, D.M.; Lacava, A.; Cuomo, F. Device discovery and tracing in the Bluetooth Low Energy domain. Comput. Commun. 2023, 202, 42–56. [Google Scholar] [CrossRef]
- Sivakumaran, P.; Blasco Alis, J. A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (CODASPY’18), New York, NY, USA, 17–21 March 2018. [Google Scholar] [CrossRef]
- Lacava, A.; Zottola, V.; Bonaldo, A.; Cuomo, F.; Basagni, S. Securing Bluetooth Low Energy networking: An overview of security procedures and threats. Comput. Netw. 2022, 211, 108953. [Google Scholar] [CrossRef]
Bluetooth Vulnerability | Related Work | Consequences |
---|---|---|
Permanent broadcast of static Bluetooth/device address or other static identifier | [16,19,39,41,42,43,44,45,46,47,48,49] | - Tracking/generation of movement profile - Unauthorized connection or pairing attempts → potential access to sensitive data - Tracker and, thus, user identification |
Lack of (strong) mutual authentication between tracker and mobile phone/appropriate app | [44,47,48,50] | - Unauthorized access to sensitive data - Injection of falsified data |
Missing end-to-end encryption | [16,17,18,19,20,40,44,48] | - Sniffing of sensitive data - Injection of falsified data |
∞ | ∞ |
∞ | |
∞ | |
Brand | Device | E2EE | KNOB | FCIC | SCD | Niño |
---|---|---|---|---|---|---|
Polar | Vantage M2, Ignite 3, Vantage V3 | ✗ | ✗ | ✗ | ✓ | ✓ |
Xiaomi | Mi Smart Band 6 | ✗ a | ✗ | ✗ | ✓ | - b |
Mi Smart Band 7 and 8 | ? | ✓ | ✗ | ✓ | - b | |
Garmin | vívofit jr. 3 | ✗ | ✓ | - c | - c | ✓ |
Bounce | ✗ | ✓ | ✗ | ✓ | ✓ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Greß, H.; Krüger, B.; Tischhauser, E. The Newer, the More Secure? Standards-Compliant Bluetooth Low Energy Man-in-the-Middle Attacks on Fitness Trackers. Sensors 2025, 25, 1815. https://doi.org/10.3390/s25061815
Greß H, Krüger B, Tischhauser E. The Newer, the More Secure? Standards-Compliant Bluetooth Low Energy Man-in-the-Middle Attacks on Fitness Trackers. Sensors. 2025; 25(6):1815. https://doi.org/10.3390/s25061815
Chicago/Turabian StyleGreß, Hannah, Björn Krüger, and Elmar Tischhauser. 2025. "The Newer, the More Secure? Standards-Compliant Bluetooth Low Energy Man-in-the-Middle Attacks on Fitness Trackers" Sensors 25, no. 6: 1815. https://doi.org/10.3390/s25061815
APA StyleGreß, H., Krüger, B., & Tischhauser, E. (2025). The Newer, the More Secure? Standards-Compliant Bluetooth Low Energy Man-in-the-Middle Attacks on Fitness Trackers. Sensors, 25(6), 1815. https://doi.org/10.3390/s25061815