• About
  • Advertise
  • Contact
Wednesday, April 15, 2026
No Result
View All Result
NEWSLETTER
iotgeorgia
  • Home
  • Internet of Things
  • Security
  • Cloud Computing
  • Data Centers
  • Software
  • Mobile
  • Networking
  • Home
  • Internet of Things
  • Security
  • Cloud Computing
  • Data Centers
  • Software
  • Mobile
  • Networking
No Result
View All Result
iotgeorgia
No Result
View All Result
Home Mobile

Smartwatches not secure, give away PIN numbers

in Mobile
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

Sensors, such as accelerometers, found in wearable devices can be used to reverse engineer a human hand’s movements and trajectories while at an ATM, thus giving away the PIN code, research out of Stevens University found.

The findings bring into question the fundamental security of smartwatches.

Malware installs on devices might be one way the newly discovered hack could work, the scientists say. The software would wait for a mark to use a secure system, such as a keypad-controlled enterprise server, for example, and then collect data from the gyroscope, magnometer, accelerometer and other sensors. (Devices use those sensors to measure fitness and so on.)

+ Also on Network World:Experts to IoT makers: Bake in security +

It would then send the harvested data back to the bandit who uses an algorithm to interpret the collected hand trajectories and map them into millimeter-accurate keypad numbers.

In testing, the crack was found to have 80 percent accuracy on the first try and more than 90 percent accuracy within five tries, researchers atStevens Institute of Technologysay.

The researchers, led by Stevens professor Yingying Chen with the assistance of four graduate students: Chen Wang, Xiaonan Guo, Yan Wang and Bo Liu, tested 5,000 systems with 20 adults over 11 months.

A second way the same attack can be implemented is through a Bluetooth connection between the wearable device and the user’s smartphone. The criminal merely plucks the “fine-grained hand movement” raw data from the radio communication with a nearby sniffer and then runs the same mathematics.

Encryption isn’t good enough in wearable devices where the ‘device and host operating system’ meet.

Fitness fanatics often use a smartphone’s larger screen to view the watch-collected exercise data and see how well they’re doing—or not. Bluetooth is used for the connection.

Distance and direction estimations between consecutive keystrokes are provided through the hand movements in both scenarios. Then the team’s “Backward PIN-sequence Inference Algorithm” breaks the codes.

And it does it with “alarming accuracy without context clues about the keypad,” the researchers say. A lack of context is a big deal. The scientists say the malefactor doesn’t need to know details about the keyboard to perform the felonious deed.

The threat is real, and wearable devices can be exploited, the researchers say.

“This was surprising, even to those of us already working in this area,” says the lead researcher Chen, a multiple time National Science Foundation (NSF) awardee. “It may be easier than we think for criminals to obtain secret information from our wearables by using the right techniques.”

The problem is principally that security isn’t strong enough, the scientists say. Smartwatch “size and computing power doesn’t allow for robust security measures, which makes the data within more vulnerable to attack,” they say.

Indeed some argue that many internet-connected devices at the consumer level, like home IoT, overall aren’t secure. Experts say one reason is because the fast development cycle of the new genresdoesn’t allow enough time for testing. And low profit margins in consumer products, such as home IoT devices, and conceivably wearable tech means corners may get cut.

In any case, encryption isn’t good enough in wearable devices where the device and host operating system meet, the Stevens team says.

They don’t have a solution right now, but the researchers suggest manufacturers “inject a certain type of noise to data so it cannot be used to derive fine-grained hand movements.”

“Further research is needed, and we are also working on countermeasures,” says Chen.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download Nulled WordPress Themes
Premium WordPress Themes Download
Download WordPress Themes Free
Download Best WordPress Themes Free Download
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
download samsung firmware
Download WordPress Themes
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
Tags: give away PIN numbersSmartwatches not secure
Next Post

6 'data' buzzwords you need to understand

Recommended

Scientist ‘infected by computer virus’ catches publicity fever

Amazon seeks US exemption to test delivery drones

Popular News

    Facebook Twitter Youtube RSS

    Newsletter

    Subscribe our Newsletter for latest updates.

    Loading

    Category

    • AI
    • Careers
    • Cloud Computing
    • Connected Cars
    • Connected Vehicles
    • Data & Analytics
    • Data Center
    • Data Centers
    • Databases
    • Development
    • Enterprise
    • Hardware
    • Healthcare
    • IIoT
    • Infrastructure
    • Internet of Things
    • IoT
    • IT Leadership
    • Manufacturing
    • Mobile
    • Networking
    • Oil & Gas
    • Open Source
    • Security
    • Smart Cities
    • Smart Homes
    • Software
    • Software Development
    • Standards
    • Technology Industry
    • Uncategorized
    • Unified Communications
    • Virtualization
    • WAN
    • Wearables

    About Us

    Advance IOT information site of Georgia USA

    © 2024 https://iotgeorgia.com.

    No Result
    View All Result
    • Home
    • Internet of Things
    • Security
    • WAN
    • Cloud Computing
    • IoT
    • Data Centers
    • Software
    • Mobile
    • Networking

    © 2024 https://iotgeorgia.com.

    Login to your account below

    Forgotten Password?

    Fill the forms bellow to register

    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In