| Literature DB >> 35161734 |
Yeṣem Kurt Peker1, Gabriel Bello1, Alfredo J Perez1.
Abstract
Since its inception in 2013, Bluetooth Low Energy (BLE) has become the standard for short-distance wireless communication in many consumer devices, as well as special-purpose devices. In this study, we analyze the security features available in Bluetooth LE standards and evaluate the features implemented in two BLE wearable devices (a Fitbit heart rate wristband and a Polar heart rate chest wearable) and a BLE keyboard to explore which security features in the BLE standards are implemented in the devices. In this study, we used the ComProbe Bluetooth Protocol Analyzer, along with the ComProbe software to capture the BLE traffic of these three devices. We found that even though the standards provide security mechanisms, because the Bluetooth Special Interest Group does not require that manufacturers fully comply with the standards, some manufacturers fail to implement proper security mechanisms. The circumvention of security in Bluetooth devices could leak private data that could be exploited by rogue actors/hackers, thus creating security, privacy, and, possibly, safety issues for consumers and the public. We propose the design of a Bluetooth Security Facts Label (BSFL) to be included on a Bluetooth/BLE enabled device's commercial packaging and conclude that there should be better mechanisms for informing users about the security and privacy provisions of the devices they acquire and use and to educate the public on protection of their privacy when buying a connected device.Entities:
Keywords: BLE keyboards; Bluetooth LE; Bluetooth Smart; fitness trackers; heart rate; privacy; security; usable privacy; usable security; wearables
Mesh:
Year: 2022 PMID: 35161734 PMCID: PMC8839540 DOI: 10.3390/s22030988
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Bluetooth Low Energy (BLE) protocol stack and protocol packet format. (a) BLE Protocol stack; (b) BLE protocol packet format.
Figure 2Experimental setup. The arrows in the figure indicate communication direction among devices/software. The dashed line indicates eavesdropping the communication channel.
Figure 3Polar H7 heart rate data/advertising packets.
Summary of security issues found in BLE devices.
| Device | BLE | Association Model | Address Randomization | Connection |
|---|---|---|---|---|
| Fitbit Charge wristband | 4.1 | Passkey entry | No | Yes |
| Polar H7 | 4.0 | Just works | No | No |
| Bluebyte | 4.0 | Just works | No | No |
Questions to identify security practices when purchasing Bluetooth and BLE devices.
| Question | Rationale |
|---|---|
|
| All Bluetooth qualified devices are listed on the Bluetooth SIG Product Listing Database. Devices (or chips) not listed on this database are violating Bluetooth SIG rights/branding |
|
| No indication of BLE versions/security features could indicate absence of security |
|
| Unknown/less-known companies could have practices that incur in technical debt, sacrificing security and user privacy |
|
| The absence of privacy policies could indicate irregular/bad security and/or privacy practices. Companies could be liable if the privacy policy states that user/sensor data is protected but the BLE device leaks data |
|
| FDA-approved devices must present, as part of their FDA certification process, a study of the security aspects of the device using FDA-recommended information security standards [ |
|
| Privacy laws, such as HIPPAA, COPPA, financial privacy, and GDPR, require privacy practices and protections for devices and systems involved in data collection for medical records, children’s data, financial data, and EU citizens’ data |
Figure 4Design of a Bluetooth Security Facts Label (BSFL) for the Polar H7 wearable. In this example, the QR code for the device’s privacy policy encodes the URL of Polar’s website’s privacy notice.