Next Article in Journal
Neural Network for Low-Memory IoT Devices and MNIST Image Recognition Using Kernels Based on Logistic Map
Next Article in Special Issue
Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform
Previous Article in Journal
Multi-Agent Approach Using LoRaWAN Devices: An Airport Case Study
Previous Article in Special Issue
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipment
Article

Forensic Analysis of Fitbit Versa 2 Data on Android

Department of Computer and Information Technology, Purdue University, West Lafayette, IN 47907, USA
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(9), 1431; https://doi.org/10.3390/electronics9091431
Received: 23 July 2020 / Revised: 23 August 2020 / Accepted: 28 August 2020 / Published: 2 September 2020
(This article belongs to the Special Issue Security and Privacy for IoT and Multimedia Services)
The increase in the adoption of wearable fitness trackers has led to their inclusion as valuable evidence used by law enforcement during investigations. The information available in these fitness trackers can be used by law enforcement to prosecute or exonerate an individual. Wearable fitness devices are constantly being released by companies, with new firmware created for each iteration. As technology developers, research and law enforcement must keep pace to take advantage of data that can be used in investigations. The Fitbit line of devices is a popular brand of wearable trackers. This study will investigate what artifacts are generated by the new Fitbit Versa 2 by investigating what data are generated and stored on the smartphone app component of the new device. The artifacts discovered will be related to areas of forensic interest that are relevant to a law enforcement officer or digital forensics practitioner. Previous research and their methodologies used for application and mobile forensics will be used to conduct this research. This study finds the Fitbit Versa 2, and by extension, the Fitbit smartphone application does not store social media message notifications pushed to the tracker by the user’s mobile device. Some credit card information, health-related data, such as heart rate, GPS locations, and other potentially identifying data were found in plaintext. While the exposed data is not enough on its own to pose an immediate serious issue, it can be used as leverage to phish a user for further details. View Full-Text
Keywords: data privacy; digital forensics; internet of things; mobile forensics; security; wearable data privacy; digital forensics; internet of things; mobile forensics; security; wearable
Show Figures

Figure 1

MDPI and ACS Style

Yoon, Y.H.; Karabiyik, U. Forensic Analysis of Fitbit Versa 2 Data on Android. Electronics 2020, 9, 1431. https://doi.org/10.3390/electronics9091431

AMA Style

Yoon YH, Karabiyik U. Forensic Analysis of Fitbit Versa 2 Data on Android. Electronics. 2020; 9(9):1431. https://doi.org/10.3390/electronics9091431

Chicago/Turabian Style

Yoon, Yung H., and Umit Karabiyik. 2020. "Forensic Analysis of Fitbit Versa 2 Data on Android" Electronics 9, no. 9: 1431. https://doi.org/10.3390/electronics9091431

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop