• About
  • Advertise
  • Contact
Sunday, October 26, 2025
No Result
View All Result
NEWSLETTER
iotphoenix
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
No Result
View All Result
iotphoenix
No Result
View All Result
Home Mobile

Smartwatches not secure, give away PIN numbers

in Mobile
0 0
0
SHARES
10
VIEWS
Share on FacebookShare on Twitter

Sensors, such as accelerometers, found in wearable devices can be used to reverse engineer a human hand’s movements and trajectories while at an ATM, thus giving away the PIN code, research out of Stevens University found.

The findings bring into question the fundamental security of smartwatches.

Malware installs on devices might be one way the newly discovered hack could work, the scientists say. The software would wait for a mark to use a secure system, such as a keypad-controlled enterprise server, for example, and then collect data from the gyroscope, magnometer, accelerometer and other sensors. (Devices use those sensors to measure fitness and so on.)

+ Also on Network World:Experts to IoT makers: Bake in security +

It would then send the harvested data back to the bandit who uses an algorithm to interpret the collected hand trajectories and map them into millimeter-accurate keypad numbers.

In testing, the crack was found to have 80 percent accuracy on the first try and more than 90 percent accuracy within five tries, researchers atStevens Institute of Technologysay.

The researchers, led by Stevens professor Yingying Chen with the assistance of four graduate students: Chen Wang, Xiaonan Guo, Yan Wang and Bo Liu, tested 5,000 systems with 20 adults over 11 months.

A second way the same attack can be implemented is through a Bluetooth connection between the wearable device and the user’s smartphone. The criminal merely plucks the “fine-grained hand movement” raw data from the radio communication with a nearby sniffer and then runs the same mathematics.

Encryption isn’t good enough in wearable devices where the ‘device and host operating system’ meet.

Fitness fanatics often use a smartphone’s larger screen to view the watch-collected exercise data and see how well they’re doing—or not. Bluetooth is used for the connection.

Distance and direction estimations between consecutive keystrokes are provided through the hand movements in both scenarios. Then the team’s “Backward PIN-sequence Inference Algorithm” breaks the codes.

And it does it with “alarming accuracy without context clues about the keypad,” the researchers say. A lack of context is a big deal. The scientists say the malefactor doesn’t need to know details about the keyboard to perform the felonious deed.

The threat is real, and wearable devices can be exploited, the researchers say.

“This was surprising, even to those of us already working in this area,” says the lead researcher Chen, a multiple time National Science Foundation (NSF) awardee. “It may be easier than we think for criminals to obtain secret information from our wearables by using the right techniques.”

The problem is principally that security isn’t strong enough, the scientists say. Smartwatch “size and computing power doesn’t allow for robust security measures, which makes the data within more vulnerable to attack,” they say.

Indeed some argue that many internet-connected devices at the consumer level, like home IoT, overall aren’t secure. Experts say one reason is because the fast development cycle of the new genresdoesn’t allow enough time for testing. And low profit margins in consumer products, such as home IoT devices, and conceivably wearable tech means corners may get cut.

In any case, encryption isn’t good enough in wearable devices where the device and host operating system meet, the Stevens team says.

They don’t have a solution right now, but the researchers suggest manufacturers “inject a certain type of noise to data so it cannot be used to derive fine-grained hand movements.”

“Further research is needed, and we are also working on countermeasures,” says Chen.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download Best WordPress Themes Free Download
Premium WordPress Themes Download
Premium WordPress Themes Download
Download WordPress Themes Free
udemy paid course free download
download intex firmware
Download WordPress Themes Free
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
Tags: give away PIN numbersSmartwatches not secure
Next Post

6 'data' buzzwords you need to understand

Recommended

Slideshow: Beyond passwords

New Microsoft BizTalk Server coming in Sept.

RFID boosts supply chain performance

Loading

Category

  • Analysis
  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Guest Opinions
  • Hardware
  • Infrastructure
  • Insider Insights
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • New Connections
  • News
  • Open Source
  • Opinion
  • Research
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Videos
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2024 iotphoenix.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Technology Industry

© 2024 iotphoenix.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In