SlideShare a Scribd company logo
SensCrypt: A Secure Protocol for
Managing Low Power Fitness Trackers
Mahmudur Rahman
Bogdan Carbunar, Umut Topkara
1February 3, 2015
Social Sensor Networks
2
wear
Trackers
User
Social sensor
networks
Concerns
 Social sensor networks collect massive personal data
 Source of privacy and security concerns
 Information inferred :
 Locations visited
 Times of user fitness activities
 Times when the user is not at home [PRM]
 Company organizational profiles [TKS13]
[PRM] Please Rob Me. http://www://pleaserobme.com/.
[TSK13] Michael Kota Tsubouchi, Ryoma Kawajiri, and Masamichi Shimosaka. Working
relationship detection from fitbit sensor data. In Proceedings of the UbiComp ’13
Adjunct, pages 115–118, 2013. 3
System Model
4
(a) (b)
System components: (a) Fitbit and (b) Garmin
Adversary Model
5
 Inspect attack
 Listen on system communications
 Inject attack
 Modify, inject, jam system communications
 Capture attack
 Acquire trackers or bases of victims
 Launch other attacks (e.g., Inspect and Inject)
 JTAG attack
 Capture attack +
 Access the memory of captured devices
This Work
 Demonstrate vulnerabilities in the storage and
transmission of fitness data
 Develop tools to attack Fitbit Ultra and Garmin
Forerunner
 SensCrypt: Secure tracker data storage and transmission
6
Vulnerabilities
7
 Fitbit: cleartext login information
 Fitbit and Garmin: cleartext http data processing
 Garmin: faulty authentication during pairing
 Tracker does not authenticate the base
This Work
 Demonstrate vulnerabilities in the storage and
transmission of fitness data
 Develop tools to attack Fitbit Ultra and Garmin
Forerunner
 SensCrypt: Secure tracker data storage and transmission
8
Data Capture (TPDC) attack
9
TPDC outcome on Garmin which includes both GPS
coordinates, heart rate, speed and cadence
 Attack takes less than 13s on both Fitbit and Garmin
Injection (TI) attacks
10
TI outcome on Fitbit. The daily step count is unreasonably
high (167116 steps)
 Attack takes less than 18s on both Fitbit and Garmin
User Account Injection (UAI) attack
11Unreasonable daily step counts (12M+) in Fitbit
 Attack takes only 6s on average
This Work
 Demonstrate vulnerabilities in the storage and
transmission of fitness data
 Develop tools to attack Fitbit Ultra and Garmin
Forerunner
 SensCrypt: Secure tracker data storage and transmission
12
SensCrypt Architecture
13
Encrypted
sensor data
Storage Connectivity
Keys
Authentication
Tracker Base Webserver
Connectivity
Connectivity
Map
Authentication
Data Decoding
RecordData operation
14
Record i
Record i
1. T generates EKT (ctr, i)
2. T xors D[i] with EKT (ctr, i) and EKW (ctr, i)
mem[i] = D[i] EKT (ctr, i) EKW (ctr, i)
Tracker Memory Organization
15
F(KW, 1, i)
clean
F(KW, 1, n). . .
end(a)
start
F(KW, 2, 1) . . . F(KW, 2, i-1) F(KW, 1, i)) F(KW, 1, n)). . .
end
(b)
(a) After (i-1) records have been written
F(KW, 1, 1) . . . F(KW, 1, i-1)
start/clean
encData[1] . . . encData[i-1]
start/dirty
(b) After Upload occurs at state in (a)
Clean/dirty
Upload operation (Extension of Fitbit protocol)
16
1a. [SEND, Beacon]
6b. [TRQ-DATA, tracker id, fitness data]
.....
7b. [WRITE, tracker id, opcode]
7c. [WRITE, Data]
7a. [WRITE, tracker id, opcode]
.....
TRQ − DATA, idT, mem[dirty…clean]
WRITE, idT, EKT(ctr + 1, EKW(ctr + 1, i))
WRITE, idT, EKT(ctr + 1, EKW(ctr + 1, i))
Tracker T Base B
Webserver W
6a. [READ-TRQ, tracker id, opcode]
Sens.io Platform
17
 Prototype tracker:
 Arduino Uno Rev3
 External Bluetooth shield
 SanDisk card shield
Only $52
FitCrypt vs SensCrypt
18
Solutions Fitbit Garmin
SensCrypt 6.02 6.06
FitCrypt-RSA 2300 2300
FitCrypt-ECC 2520 2520
RecordData computation overhead in ms
RecordData:
 SensCrypt is 2-3 orders of magnitude more efficient
19
SensCrypt is 12 times faster than FitCrypt
FitCrypt vs SensCrypt (Cont.)
Solutions T W Communication
SensCrypt 502.13 190.4 153
FitCrypt (Fitbit) 904.56 177.36 162
FitCrypt (Garmin) 9366 322 1686
Upload:
SensCrypt is twice faster than Fitbit’s Upload protocol
Upload computation overhead in ms
Conclusions
20
 Demonstrated vulnerabilities in tracker from Fitbit
and Garmin
 Launched Inspect, Capture, Injection and JTAG-R
attacks
 Presented SensCrypt for secure fitness data storage
and transmission
 Developed cost efficient Sens.io tracker platform
21
Questions ? mrahm004@fiu.edu
22
Extra Slides
SensCrypt properties
23
 Ensure even wear of tracker memory
 No storage overhead on trackers
 Prevent JTAG-R, inspect attack, capture attacks and
also man-in-the-middle and replay attacks
 User friendly: The user is never involved
Reverse Engineering
24
Fitbit Upload
protocol
Garmin Pairing Procedure
25

More Related Content

Similar to SensCrypt.v5

Fit and Vulnerable
Fit and VulnerableFit and Vulnerable
Fit and Vulnerable
Mahmudur Rahman
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
Kuniyasu Suzaki
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Amazon Web Services
 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...
NUS-ISS
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
John Breitenbach
 
Cutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMSTCutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMST
BMST
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Mukesh Chinta
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
Jason Shen
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用
Cybozucommunity
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
Ryu Yamashita
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
JOYZO
 
Internet of Things - Technicals
Internet of Things - TechnicalsInternet of Things - Technicals
Internet of Things - Technicals
Andri Yadi
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
Bit Stew Systems
 
Отчет Audit report RAPID7
 Отчет Audit report RAPID7 Отчет Audit report RAPID7
Отчет Audit report RAPID7
Sergey Yrievich
 
Report PAPID 7
Report PAPID 7Report PAPID 7
Report PAPID 7
Sergey Yrievich
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
TI Safe
 
Cerita
CeritaCerita
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
James Sirota
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijripublishers Ijri
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
MuhammadAwaisQureshi6
 

Similar to SensCrypt.v5 (20)

Fit and Vulnerable
Fit and VulnerableFit and Vulnerable
Fit and Vulnerable
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
 
Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...Architecting cybersecurity to future proof smart cities against emerging cybe...
Architecting cybersecurity to future proof smart cities against emerging cybe...
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
 
Cutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMSTCutting-Edge Network Behavior Audit Technology from BMST
Cutting-Edge Network Behavior Audit Technology from BMST
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
 
Internet of Things - Technicals
Internet of Things - TechnicalsInternet of Things - Technicals
Internet of Things - Technicals
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
 
Отчет Audit report RAPID7
 Отчет Audit report RAPID7 Отчет Audit report RAPID7
Отчет Audit report RAPID7
 
Report PAPID 7
Report PAPID 7Report PAPID 7
Report PAPID 7
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Cerita
CeritaCerita
Cerita
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 

Recently uploaded

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

SensCrypt.v5

  • 1. SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers Mahmudur Rahman Bogdan Carbunar, Umut Topkara 1February 3, 2015
  • 3. Concerns  Social sensor networks collect massive personal data  Source of privacy and security concerns  Information inferred :  Locations visited  Times of user fitness activities  Times when the user is not at home [PRM]  Company organizational profiles [TKS13] [PRM] Please Rob Me. http://www://pleaserobme.com/. [TSK13] Michael Kota Tsubouchi, Ryoma Kawajiri, and Masamichi Shimosaka. Working relationship detection from fitbit sensor data. In Proceedings of the UbiComp ’13 Adjunct, pages 115–118, 2013. 3
  • 4. System Model 4 (a) (b) System components: (a) Fitbit and (b) Garmin
  • 5. Adversary Model 5  Inspect attack  Listen on system communications  Inject attack  Modify, inject, jam system communications  Capture attack  Acquire trackers or bases of victims  Launch other attacks (e.g., Inspect and Inject)  JTAG attack  Capture attack +  Access the memory of captured devices
  • 6. This Work  Demonstrate vulnerabilities in the storage and transmission of fitness data  Develop tools to attack Fitbit Ultra and Garmin Forerunner  SensCrypt: Secure tracker data storage and transmission 6
  • 7. Vulnerabilities 7  Fitbit: cleartext login information  Fitbit and Garmin: cleartext http data processing  Garmin: faulty authentication during pairing  Tracker does not authenticate the base
  • 8. This Work  Demonstrate vulnerabilities in the storage and transmission of fitness data  Develop tools to attack Fitbit Ultra and Garmin Forerunner  SensCrypt: Secure tracker data storage and transmission 8
  • 9. Data Capture (TPDC) attack 9 TPDC outcome on Garmin which includes both GPS coordinates, heart rate, speed and cadence  Attack takes less than 13s on both Fitbit and Garmin
  • 10. Injection (TI) attacks 10 TI outcome on Fitbit. The daily step count is unreasonably high (167116 steps)  Attack takes less than 18s on both Fitbit and Garmin
  • 11. User Account Injection (UAI) attack 11Unreasonable daily step counts (12M+) in Fitbit  Attack takes only 6s on average
  • 12. This Work  Demonstrate vulnerabilities in the storage and transmission of fitness data  Develop tools to attack Fitbit Ultra and Garmin Forerunner  SensCrypt: Secure tracker data storage and transmission 12
  • 13. SensCrypt Architecture 13 Encrypted sensor data Storage Connectivity Keys Authentication Tracker Base Webserver Connectivity Connectivity Map Authentication Data Decoding
  • 14. RecordData operation 14 Record i Record i 1. T generates EKT (ctr, i) 2. T xors D[i] with EKT (ctr, i) and EKW (ctr, i) mem[i] = D[i] EKT (ctr, i) EKW (ctr, i)
  • 15. Tracker Memory Organization 15 F(KW, 1, i) clean F(KW, 1, n). . . end(a) start F(KW, 2, 1) . . . F(KW, 2, i-1) F(KW, 1, i)) F(KW, 1, n)). . . end (b) (a) After (i-1) records have been written F(KW, 1, 1) . . . F(KW, 1, i-1) start/clean encData[1] . . . encData[i-1] start/dirty (b) After Upload occurs at state in (a) Clean/dirty
  • 16. Upload operation (Extension of Fitbit protocol) 16 1a. [SEND, Beacon] 6b. [TRQ-DATA, tracker id, fitness data] ..... 7b. [WRITE, tracker id, opcode] 7c. [WRITE, Data] 7a. [WRITE, tracker id, opcode] ..... TRQ − DATA, idT, mem[dirty…clean] WRITE, idT, EKT(ctr + 1, EKW(ctr + 1, i)) WRITE, idT, EKT(ctr + 1, EKW(ctr + 1, i)) Tracker T Base B Webserver W 6a. [READ-TRQ, tracker id, opcode]
  • 17. Sens.io Platform 17  Prototype tracker:  Arduino Uno Rev3  External Bluetooth shield  SanDisk card shield Only $52
  • 18. FitCrypt vs SensCrypt 18 Solutions Fitbit Garmin SensCrypt 6.02 6.06 FitCrypt-RSA 2300 2300 FitCrypt-ECC 2520 2520 RecordData computation overhead in ms RecordData:  SensCrypt is 2-3 orders of magnitude more efficient
  • 19. 19 SensCrypt is 12 times faster than FitCrypt FitCrypt vs SensCrypt (Cont.) Solutions T W Communication SensCrypt 502.13 190.4 153 FitCrypt (Fitbit) 904.56 177.36 162 FitCrypt (Garmin) 9366 322 1686 Upload: SensCrypt is twice faster than Fitbit’s Upload protocol Upload computation overhead in ms
  • 20. Conclusions 20  Demonstrated vulnerabilities in tracker from Fitbit and Garmin  Launched Inspect, Capture, Injection and JTAG-R attacks  Presented SensCrypt for secure fitness data storage and transmission  Developed cost efficient Sens.io tracker platform
  • 23. SensCrypt properties 23  Ensure even wear of tracker memory  No storage overhead on trackers  Prevent JTAG-R, inspect attack, capture attacks and also man-in-the-middle and replay attacks  User friendly: The user is never involved

Editor's Notes

  1. Before jumping into the system model, let’s discuss the adversary model at first. We assume that … and does not collude with attackers.
  2. The goal of this research work was to significantly extend the state-of-the-art approaches to (detect)……
  3. The goal of this research work was to significantly extend the state-of-the-art approaches to (detect)……
  4. The goal of this research work was to significantly extend the state-of-the-art approaches to (detect)……