plain text with encrypted traffic, the app might de-
lay sending user data to the server.
• Introducing Randomness for Order of Packets.
The process of mapping an activity to its en-
crypted counterpart could be convoluted by send-
ing activities to a server in a random order.
Randomizing the transmitting sequence makes it
harder for the adversary to establish patterns in
encrypted traffic.
We leave development of a secure traffic transmis-
sion system for future work.
7 CONCLUSION
With a vast number of different commercial smart-
bands readily available, we predict many more wear-
ables leak data while sending them to vendor’s
servers. An “honest but curious” ISP can easily pur-
chase well-known brands of smartbands, and with the
help of the proposed architecture for traffic analysis
identify whether a particular band leaks any user’s
sensitive data. Unlike other attacks on wearables, in
our threat model the adversary only observes the traf-
fic without any intent to modify it. This makes it
extremely laborious to discover the attacker. Even
if detected, it is almost impossible to prove that an
ISP committed an unlawful deed. We show that even
when the connection channel is encrypted, and the
mobile application is reinforced with state-of-the-art
security mechanism, it might still be possible to ob-
tain sensitive information about users. Such data in-
clude frequency of measuring heartbeat and weigh,
the number and duration of workouts, occurrence of
sleep, steps, and food records. Naturally, we do not
discourage usage of modern defense techniques, but
rather challenge vendors to consider bolstering their
security even further. Finally, we propose several
methods for the attack’s mitigation.
REFERENCES
Andrew, H., Christopher, P., and Jeffrey, K. (2016). Ev-
ery step you fake: A comparative analysis of fitness
tracker privacy and security. Open Effect Report.
Arias, O., Wurm, J., Hoang, K., and Jin, Y. (2015). Pri-
vacy and security in internet of things and wearable
devices. IEEE Transactions on Multi-Scale Comput-
ing Systems, 1(2):99–109.
Bissias, G. D., Liberatore, M., Jensen, D., and Levine,
B. N. (2005). Privacy vulnerabilities in encrypted http
streams. In International Workshop on Privacy En-
hancing Technologies, pages 1–11. Springer.
Chen, S., Wang, R., Wang, X., and Zhang, K. (2010). Side-
channel leaks in web applications: A reality today, a
challenge tomorrow. In 2010 IEEE Symposium on Se-
curity and Privacy, pages 191–206. IEEE.
Cheng, H. and Avnur, R. (1998). Traffic analysis of
ssl encrypted web browsing. URL citeseer. ist. psu.
edu/656522. html.
Clausing, D.-I. E., Schiefer, M., L
¨
osche, U., and Morgen-
stern, D.-I. M. (2015a). Security evaluation of nine
fitness trackers. The Independent IT-Security Institute.
Clausing, E. and Schiefer, M. (2016). Internet of things: Se-
curity evaluation of 7 fitness trackers on android and
the apple watch. AV TEST, Germany.
Clausing, E., Schiefer, M., and Morgenstern, M. (2015b).
Internet of things: security evaluation of nine fitness
trackers. AV TEST, The Independent IT-Security in-
stitue, Magdeburg, Germany.
Cyr, B., Horn, W., Miao, D., and Specter, M. (2014). Secu-
rity analysis of wearable fitness devices (fitbit). Mas-
sachusetts Institute of Technology, 1.
Danezis, G. (2009). Traffic analysis of the http protocol
over tls.
Fereidooni, H., Classen, J., Spink, T., Patras, P., Mietti-
nen, M., Sadeghi, A.-R., Hollick, M., and Conti, M.
(2017a). Breaking fitness records without moving:
Reverse engineering and spoofing fitbit. In Interna-
tional Symposium on Research in Attacks, Intrusions,
and Defenses, pages 48–69. Springer.
Fereidooni, H., Frassetto, T., Miettinen, M., Sadeghi, A.-
R., and Conti, M. (2017b). Fitness trackers: fit for
health but unfit for security and privacy. In 2017
IEEE/ACM International Conference on Connected
Health: Applications, Systems and Engineering Tech-
nologies (CHASE), pages 19–24. IEEE.
Goyal, R., Dragoni, N., and Spognardi, A. (2016). Mind
the tracker you wear: a security analysis of wearable
health trackers. In Proceedings of the 31st Annual
ACM Symposium on Applied Computing, pages 131–
136.
Hintz, A. (2002). Fingerprinting websites using traffic anal-
ysis. In International workshop on privacy enhancing
technologies, pages 171–178. Springer.
Liberatore, M. and Levine, B. N. (2006). Inferring the
source of encrypted http connections. In Proceedings
of the 13th ACM conference on Computer and com-
munications security, pages 255–263.
Rahman, M., Carbunar, B., and Banik, M. (2013). Fit and
vulnerable: Attacks and defenses for a health moni-
toring device. arXiv preprint arXiv:1304.5672.
Sun, Q., Simon, D. R., Wang, Y.-M., Russell, W., Padman-
abhan, V. N., and Qiu, L. (2002). Statistical identifi-
cation of encrypted web browsing traffic. In Proceed-
ings 2002 IEEE Symposium on Security and Privacy,
pages 19–30. IEEE.
Zhang, K., Li, Z., Wang, R., Wang, X., and Chen, S. (2010).
Sidebuster: automated detection and quantification of
side-channel leaks in web application development.
In Proceedings of the 17th ACM conference on Com-
puter and communications security, pages 595–606.
Zhang, Q. and Liang, Z. (2017). Security analysis of blue-
tooth low energy based smart wristbands. In 2017
2nd International Conference on Frontiers of Sensors
Technologies (ICFST), pages 421–425. IEEE.
HEALTHINF 2021 - 14th International Conference on Health Informatics
376