Nadir Izrael CTO & Founder

Total Page:16

File Type:pdf, Size:1020Kb

Nadir Izrael CTO & Founder Nadir Izrael CTO & Founder ©2017 Armis Inc. - All Rights Reserved It’s 4 AM… 2 Who is your device talking to? ©2017 Armis Inc. All Rights Reserved. 2 Today’s Workplace ©2017 Armis Inc. All Rights Reserved. 3 Health Care ©2017 Armis Inc. - All Rights Reserved Manufacturing ©2017 Armis Inc. - All Rights Reserved Today’s Reality 40% 46% 280% 2015 2016 2017 Businesses can’t see 40% of 46% of US companies had a breach IoT attacks exploded by 280% the devices in their environment or security issue via IoT devices in the first half of 2017 June 2017 Armis Labs June 2017 IDC Aug 2017 TechRepublic/F5 ©2017 Armis Inc. - All Rights Reserved THE NEW ATTACK LANDSCAPE A New Type of Threat ©2017 Armis Inc. - All Rights Reserved A New Class of Threats – Airborne Internet URL Link Download Pair Device ©2017 Armis Inc. - All Rights Reserved New Attack Vector Identified • 5.3B Devices At Risk • Android, Windows, Linux, and iOS • 8 Vulnerabilities (4 critical) • Most serious Bluetooth vulnerability to date • Enables RCE and MiTM ©2017 Armis Inc. - All Rights Reserved Can Spread From Device To Device ©2017 Armis Inc. - All Rights Reserved What Systems Are Impacted • 1 Info Leak • 1 MiTM • 1 Info Leak • 1 RCE • Pre-iOS 10 • 2 RCE • 1 RCE • Pre- tvOS 9 • 1 MiTM • Google Pixel • Windows Desktops • Samsung Gear S3 • iPhone (Smartwatch) • Samsung Galaxy • Windows Laptops • iPad • Samsung Smart TVs • Samsung Galaxy Tab • iPod • Samsung Family Hub • LG Watch Sport • Apple TV (Smart refrigerator) • Pumpkin Car Audio System ©2017 Armis Inc. - All Rights Reserved How Many Devices At Risk? • 8.2B Devices • 2B Monthly Active Devices 2 Billion • 2B Devices Globally 2 Billion • 1B Active Devices (iOS, tvOS, watch OS) • 1B iOS Devices 130 Million • 130M pre-iOS 10 • Linux Is Unknown 1.2 Billion • 8B “Things” In Use Today (Gartner) Armis Estimate • 5.3B Devices At Risk (largest ever) 5.3 Billion ©2017 Armis Inc. - All Rights Reserved How Many Devices Unpatchable? Android Linux Patchable (240M) Patchable (900M) 20% 55% 45% Gingerbread Nougat Ice Cream Sandwich Marshmallow 80% Jelly Bean KitKat Lollipop Unpatchable (960M) Unpatchable (1.1B) ©2017 Armis Inc. - All Rights Reserved How BlueBorne Works High Privileges ©2017 Armis Inc. - All Rights Reserved How BlueTooth Pairs • Bluetooth is “on” and discoverable Bluetooth • User must find and proactively “pair” to the Speakers device ConnectedConnect • Some authentication or PIN to connect • Devices exchange keys, and auto connect without Device 1 Device 2 discoverable mode (Smart Phone) (Bluetooth Speakers) ©2017 Armis Inc. - All Rights Reserved How BlueBorne Works • Bluetooth is “on” Bluetooth • Attacker gets the MAC Bluetooth address 00:2b:09:6f:2b:01 • Attacker initiates Bluetooth RCE and attacks via using a MiTM BlueBorne vulnerability • No user interaction required • No pairing • No approval Attacker Target • Attacker can take over, create (Laptop) (Smart Phone) MiTM, get encryption keys, etc. ©2017 Armis Inc. - All Rights Reserved A BlueBorne Worm Attacker • Worm-like potential • Deliver ransomware • Spread botnet • Steal credentials • More… ©2017 Armis Inc. - All Rights Reserved Info Leak ©2017 Armis Inc. - All Rights Reserved Info Leak (To Desktop) Attacker Linux PC (Laptop) Target (Keyboard) • User connected to Linux desktop Attacker uses info leak to get encryption keys of the keyboard • Attacker intercepts keystrokes without running code or doing MiTM • Attacker can also inject keystrokes to the targeted device ©2017 Armis Inc. - All Rights Reserved Info Leak (Headset) Android (Smartphone) Attacker (Laptop) Target (Headset) • User connected to Android smartphone • Attacker uses info leak to get encryption keys of the headset • Attacker intercepts headset audio (eavesdropping on calls for instance) ©2017 Armis Inc. - All Rights Reserved Man in the Middle Attack ©2017 Armis Inc. - All Rights Reserved MiTM – WiFi Pineapple Corporate Network Internet IMPORTANT User Interaction Required – Users Select The Network WiFi Pineapple ©2017 Armis Inc. - All Rights Reserved MiTM – Bluetooth Pineapple Corporate Network Internet IMPORTANT No User Interaction Required Bluetooth Pineapple ©2017 Armis Inc. - All Rights Reserved Patches Update ©2017 Armis Inc. - All Rights Reserved A BROKEN SECURITY ARCHITECTURE ©2017 Armis Inc. - All Rights Reserved Traditional Approaches Are Insufficient Network NAC Endpoint Security Agent ©2017 Armis Inc. - All Rights Reserved Traditional Approaches Are Insufficient Visibility and control is the least where unmanaged device density is the greatest. ©2017 Armis Inc. - All Rights Reserved Air Gap Will Not Protect Us ©2017 Armis Inc. - All Rights Reserved A Device-Centric Approach Device Tracking Device Type Behavior Connections Reputation Version Data-at-Rest History ©2017 Armis Inc. - All Rights Reserved A Modern Architecture • Modernize, not rip & replace • Monitor from access layer up • Wired and wirelessly • See device behavior • Detect suspicious or malicious behavior ©2017 Armis Inc. - All Rights Reserved A Modern Architecture • Modernize, not rip & replace • Monitor from access layer up • Wired and wirelessly • See device behavior • Detect suspicious or malicious behavior • Must correlate higher in the network • Integration with existing packet capture or perimeter solutions ©2017 Armis Inc. - All Rights Reserved Key Elements of New Architecture No Device Behavioral Integrated Agent Centric Insights Solution ©2017 Armis Inc. - All Rights Reserved ©2017 Armis Inc. - All Rights Reserved.
Recommended publications
  • I in the UNITED STATES DISTRICT COURT for the EASTERN DISTRICT of TEXAS LOGANTREE LP Plaintiff, V. LG ELECTRONICS, INC., and LG
    Case 4:21-cv-00332 Document 1 Filed 04/27/21 Page 1 of 14 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS LOGANTREE LP Plaintiff, v. CIVIL ACTION NO. LG ELECTRONICS, INC., and LG ELECTRONICS USA, INC., JURY DEMAND Defendants. PLAINTIFF’S ORIGINAL COMPLAINT TABLE OF CONTENTS I. PARTIES ................................................................................................................................ 1 II. JURISDICTION AND VENUE ........................................................................................ 2 III. THE PATENT-IN-SUIT ................................................................................................... 3 IV. THE REEXAMINATION ................................................................................................. 4 V. COUNT ONE: INFRINGEMENT OF THE REEXAMINED ‘576 PATENT ............. 7 VI. PRAYER FOR RELIEF.................................................................................................. 11 VII. DEMAND FOR JURY TRIAL ....................................................................................... 12 i Case 4:21-cv-00332 Document 1 Filed 04/27/21 Page 2 of 14 PageID #: 2 TABLE OF AUTHORITIES Cases TC Heartland LLC v. Kraft Foods Grp. Brands LLC, 137 S. Ct. 1514 (2017) .............................. 3 Statutes 28 U.S.C. § 1331 ............................................................................................................................. 2 28 U.S.C. § 1338 ............................................................................................................................
    [Show full text]
  • Survey on Accessibility of Our Personal Data in the Connected World
    PerAwareCity'19 - 4th IEEE International Workshop on Pervasive Context-Aware Smart Cities and Intelligent Transport Systems Yours Truly? Survey on Accessibility of Our Personal Data in the Connected World Manh Nguyen, Md Osman Gani, Vaskar Raychoudhury Department of Computer Science & Software Engineering Miami University Oxford, OH, USA {nguyenmh, gamin, raychov}@miamioh.edu Abstract— Due to the advancement of embedded sensing and Fig. 1 shows a category-wise distribution of devices we have wireless communication technologies, in recent times, there is a studied. One company can have multiple smart devices as sharp rise in the number of smart personal and home (multi-user) products which are usually capable of interacting with each specific devices. Sensors embedded in these devices collect other and sometimes with products from other manufacturers. significant amount of personal data including raw sensor data and E.g., Amazon has a smart home assistant product line up named derived data, such as, motion, location, heart rate, oxygen Echo [7], which has several variations, like Echo, Echo Show, saturation, step counts. This user generated data can be helpful to Echo Dot, Echo Plus, and Echo Spot. Similarly, Awair [36][37] understand their behavior, activity, health, and quality of life and is a Smart Air Quality Monitor with the same product name as can help healthcare providers (if shared with users’ consent), to the Company name and it can interact with devices like Nest get a better insight about patients and their everyday life. The lack [30][31][32][33], Amazon Echo [7] and Google Home [8][9] to of control over these personal data and their flow makes the user keep the user updated about the indoor air quality.
    [Show full text]
  • USER GUIDE V1.1 Connecting Surfers Worldwide Contents
    Imagen BG cover USER GUIDE v1.1 Connecting Surfers Worldwide Contents 1 Welcome to Glassy Zone. 2 Box contents. 2.1 Your GZ. 2.2 Your Charger. 3 How it works. 3.1 Requerimientos del sistema. 4 Getting started. 4.1 The App. 4.2 Navigation. 4.3 First steps. Charge the battery. Pair your GZ with the App. GPS Quickfx. Firmware updates, 5 Modes. 5.1 Surf Mode. 5.2 Steps. 5.3 UV. 5.4 Sleep. Contents 6 Features. 6.1 Sync With Glassy App. 6.2 Memory. 6.3 Batery Life. 7 Settings Wrist choice. 8 Maintenance. 8.1 Chargue. 8.2 Care of your GZ. 9 Technical specifcations. Materials. Strap Size. 10 Terms of sale and warranty. Warranty. Te r m s o f s a l e. Returns. Terms and conditions. 11 Safety warnings and regulations. Glassy Zone User Guide 01. Welcome to Glassy Zone. Welcome to Glassy Zone, the frst wearable device for monitoring surfng, movement and sleep that helps you improve the quality of your surfng. Furthermore, it has an ultraviolet light sensor to alert you about and protect you from solar radiation. At Glassy, we take care of you! Because we are surfers ourselves, we know how hard it is to improve in this sport. We want to help you to reach your objectives, to have you enjoy great sessions and to improve in a way that is fun. Glassy Zone (GZ) has been designed to be as easy as possible to use, but in case you need a hand to get started, WE ARE HERE TO HELP!! Look at this guide and don't hesitate to send us an email at [email protected] about anything you might need! 02.
    [Show full text]
  • Michaela Mihaylova Master Th
    Semester: ICTE4 Aalborg University Copenhagen A.C. Meyers Vænge 15 2450 København SV Title: Semester Coordinator: Henning System for Reducing the Risk of Mortality due to Ischemic Olesen Heart Disease among the Elderly Secretary: Maiken Keller Project Period: 1 February 2017 – 30 June 2017 Semester Theme: Abstract: Master Thesis The world’s population is currently experiencing a trend towards ageing. People now live longer than Supervisor(s): ever before and it is expected that by 2050 one out of every five people will be at least 60-years-old. Per Lynggaard Respectively, of all age groups senior citizens experience the highest mortality rates. Among the global leading causes of death, the foremost is Project group no.: Ischemic Heart Disease. The focus of the current 4SER 4.8 Thesis is to develop a system – hereafter referred to as Vixi - that would aid in reducing the risk of death due to the aforementioned ailment. In order to do so, Members research is conducted into the nature of Ischemic (do not write CPR.nr.): Heart Disease, specifically the exact conditions that can lead to a fatal outcome, along with their Michaela Mihaylova Mihaylova pathology, as well as the technologies that can detect them. From the discovered diagnostic tools, the non- invasive ones are extracted so as to be applied within the service – these are preferred because the Vixi is intended for continuous daily monitoring. The Vixi system is based on the utilization of the following two devices: the smartwatch and the wearable ECG. The data gathered via their various sensors serves as input for Vixi’s main algorithm.
    [Show full text]
  • Cross-Device Computation Coordination for Mobile Collocated Interactions with Wearables
    sensors Article Cross-Device Computation Coordination for Mobile Collocated Interactions with Wearables Hyoseok Yoon * and Choonsung Shin * Korea Electronics Technology Institute, Mapo-gu, Seoul 03924, Korea * Correspondence: [email protected] (H.Y.); [email protected] (C.S.); Tel.: +82-2-6388-6618 (H.Y.) Received: 3 January 2019; Accepted: 12 February 2019; Published: 15 February 2019 Abstract: Mobile devices, wearables and Internet-of-Things are crammed into smaller form factors and batteries, yet they encounter demanding applications such as big data analysis, data mining, machine learning, augmented reality and virtual reality. To meet such high demands in the multi-device ecology, multiple devices should communicate collectively to share computation burdens and stay energy-efficient. In this paper, we present a cross-device computation coordination method for scenarios of mobile collocated interactions with wearables. We formally define a cross-device computation coordination problem and propose a method for solving this problem. Lastly, we demonstrate the feasibility of our approach through experiments and exemplar cases using 12 commercial Android devices with varying computation capabilities. Keywords: context-awareness; cross-device; Internet-of-Things; computation offloading; machine learning; mobile interaction; wearables 1. Introduction Recent rapid developments in low-power microcontrollers, application processors, wireless chips and sensors are paving the way for consumer-level Internet-of-Things (IoT), mobile devices and wearables. At this rate, integrations of IoT in small, mobile and wearable form factors with even smaller batteries will be constantly and ubiquitously emerging. On one hand, IoTs are increasingly required to be stand-alone, always-on and long-lasting to continuously monitor their surroundings.
    [Show full text]
  • Mobilewear: Watches
    MOBILEWEAR: WATCHES Our October 2014 article looked at the advent of the newest wearable technology: the Smartwatch. 3 years on we can see how far sophisticated advances have come and which are the current brands to keep an eye on. Believe it or not, Microsoft released the first digital watch in 1984, discontinued it in 2008 but the concept lived on: Seiko, Pulsar, Swatch, Fossil and Casio all produced watches with some digital capabilities. We are talking about a wristwatch with a screen and the ability to do much more than tell time; it's like having a Smartphone on your wrist. Smartwatches run apps, play back digital media (audio tracks or radio streamed to Bluetooth headphones), make and receive phone calls, have touchscreens which allow you access to functions like a calculator, thermometer, compass, message notifications, GPS navigation, calendar synchronization, health monitors, fitness tracking and more. Some of the current iterations of Smartwatches are not wholly standalone devices because they lack an Internet connection - many of the watches are designed to link directly with other devices that do have Internet connectivity like your Smartphone. Furthermore, some Smartwatches are aimed directly at athletic enthusiasts, i.e. running, sailing, cross-training. They are gaining popularity in spite of their technological hurdles: they must be extremely compact to fit the human wrist, the display screen must interface well to accommodate software developers’ needs, long battery life is a must, and it must be attractively fashionable. So far, no Smartwatch has managed all these elements to perfection regardless of the price point but progress continues and it is expected that 373 million will be sold by 2020.
    [Show full text]
  • Smart Plug Flow Meter Fall Detection Guest Tracking
    IoT sensor integration and back-end development for Sequoia Team: sdmay19-36 Advisor: Daji Qiao Client: Andrew Guillemette Team Website: http://sdmay19-36.sd.ece.iastate.edu/ Problem Statement Four Main Goals Smart Plug Flow Meter Fall Detection Guest Tracking [1] [2] [3] [4] 2 Existing Design 3 Design Extension Conceptual Sketch 4 Functional Requirements FR.1: The sensor hub will be notified when power goes through the smart outlet FR.2: The data from the smart outlet shall be sent to the existing AWS server FR.3: The smartwatch will provide an alert when a fall is detected. FR.4: The guest tracking system will track guests with one meter accuracy. 5 Non-Functional Requirements NFR.1: All products used should be easily available to allow for scale up NFR.2: Number of wires used should be minimized 6 Constraints/Considerations Positional tracking Smart Plug Smart Watch Accuracy Appliances Sensors [5] [7] [9] Setup Interfaces Device Tethering [6] [8] [10] 7 Market Survey Tracking Methods Existing Solutions Smartwatch APIs Smart Plug Apple Watch 4 Wear OS Koogeek Active vs Passive [13] [11] [15] Open Source Fitbit APIs PowerBlade [12] [14] [16] 8 Potential Risks Health Data Security HIPAA Compliance [18] [17] 9 Cost Estimate TP-Link Plug Cost: $15-30 per unit LG Cost: $300 Smartwatch Cost % RPS Location Cost: TBD Tracking Cost Areas 10 Schedule 11 Application Development ● Android App displays data 12 Smart Plug Smart Hub Code TP-Link HS110 [19] Server Backend Code [1] [20] 13 Smart Watch LG Watch Sport Watch Data Code - Android [22] [21]
    [Show full text]
  • User Manual Here's Your Device's Complete Instructions, Specs and More
    ENGLISH USER GUIDE LG-W280A MFL69843601 (1.0) www.lg.com ENGLISH About this user guide Thank you for choosing this LG product. Please carefully read this user guide before using the device for the first time to ensure safe and proper use. • Always use genuine LG accessories. The supplied items are designed only for this device and may not be compatible with other devices. • This device is not suitable for people who have a visual impairment due to the touchscreen keyboard. • Descriptions are based on the device default settings. • Default apps on the device are subject to updates, and support for these apps may be withdrawn without prior notice. If you have any questions about an app provided with the device, please contact a LG Service Center. For user-installed apps, please contact the relevant service provider. • Modifying the device’s operating system or installing software from unofficial sources may damage the device and lead to data corruption or data loss. Such actions will violate your LG licence agreement and void your warranty. • Some content and illustrations may differ from your device, depending on the area, service provider, software version, or OS version, and are subject to change without prior notice. • Software, audio, wallpaper, images, and other media supplied with your device are licenced for limited use. If you extract and use these materials for commercial or other purposes, you may be infringing copyright laws. As a user, you are fully responsible for the illegal use of media. • Additional charges may incur for data services, such as messaging, uploading,downloading, auto-syncing and location services.
    [Show full text]
  • Fast Device Replacement. Expert Tech Support
    Fast device replacement. Expert tech support. As soon as next-day1 device replacement for loss, theft, damage and out-of-warranty malfunctions. Screen repair as soon as the same day for eligible devices in select areas.2 Get more with Multi-Device Protection Pack and Mobile Protection Pack plans: Call or chat with a live, U.S.-based ProTechSM expert who can help you get the most out of your covered devices. Free up space on your phone with secure photo/video storage. Identity protection through IDnotify, a part of Experian. (Requires separate sign up.)3 MULTI-DEVICE PROTECTION PACK $ 99 MO. Multi-Device Insurance, ProTech support and 34 per enrolled 300GB of photo storage for up to three devices account MOBILE PROTECTION PACK $ 99 Mobile Insurance, ProTech support and 11MO. per enrolled 50GB of photo storage for one device number Also available: $ 99 MOBILE INSURANCE 8MO. Mobile Insurance for one device per enrolled number 1 See page 2 under Replacement for Connected Devices for key terms and conditions. 2 See page 2 under Screen Repair for Eligible Connected Devices for key terms and conditions. 3 IDnotify is provided by a third party provider, Experian, and is available to customers enrolled in AT&T Mobile Protection Pack or AT&T Multi-Device Protection Pack, separate from insurance or ProTech benefits. For full terms and conditions for IDnotify, go toIDnotify.com/att . For all questions regarding IDnotify services, call Experian at 877.890.9369 or go to IDnotify.com/att. AT&T Mobile Insurance and AT&T Multi-Device Insurance are underwritten by Continental Casualty Company, Chicago, IL, a CNA Company, and administered by Asurion Protection Services, LLC (in Iowa, Lic.
    [Show full text]
  • MASTER Equipment Grid
    Apple Apple Apple Apple Apple Apple Apple 213 iPhone 8 256 GB iPhone 8 Plus 64 GB Effective 9/29/2017 iPhone 8 64 GB Space Gray iPhone 8 64 GB Silver iPhone 8 64 GB Gold iPhone 8 256 GB Silver iPhone 8 256 GB Gold Space gray Space Gray 2 Year * $249.99 $249.99 $249.99 $399.99 $399.99 $399.99 $349.99 MBS CRU No Commit / NCRP $699.99 $699.99 $699.99 $849.99 $849.99 $849.99 $799.99 Discount Eligibility * Based on Customer eligibility ** ** ** ** ** ** ** Memory 64GB 64GB 64GB 256GB 256GB 256GB 64GB † Indicates device is ineligible for Equipment Discount (CBE). ** Indicates device is ineligible for Equipment Discount unless you are bound by General Terms and Conditions Version 2.0 of higher. The Equipment Discount described in your Agreement applies ONLY to the prices of the corresponding Equipment found on this page. Note that not all Equipment is eligible for the Equipment Discount. Equipment prices may be lower depending on promotional pricing available in various channels (e.g., retail, Premier, National Business Ordering…etc.). Such promotional pricing may also vary by channel. The Equipment Discount may not be applied to or combined with any promotional pricing or any other equipment discount offer. ATT Proprietary (Internal Use Only) CBE_Equipment_Grid_9-29-17v2.xlsx Not for use or disclosure outside the ATT companies except under written agreement. Page 1 Apple Apple Apple Apple Apple Apple Apple 213 iPhone 8 Plus 256 GB Effective 9/29/2017 iPhone 8 Plus 64 GB Silver iPhone 8 Plus 64 GB Gold iPhone 8 Plus 256 GB Silver iPhone 8 Plus 256 GB Gold iPhone X 64 GB Space Gray iPhone X 64 GB Silver Space Gray 2 Year * $349.99 $349.99 $499.99 $499.99 $499.99 $549.99 $549.99 MBS CRU No Commit / NCRP $799.99 $799.99 $949.99 $949.99 $949.99 $999.99 $999.99 Discount Eligibility * Based on Customer eligibility ** ** ** ** ** ** ** Memory 64GB 64GB 256GB 256GB 256GB 64GB 64GB † Indicates device is ineligible for Equipment Discount (CBE).
    [Show full text]
  • Cross-Device Computation Coordination for Mobile Collocated Interactions with Wearables
    sensors Article Cross-Device Computation Coordination for Mobile Collocated Interactions with Wearables Hyoseok Yoon * and Choonsung Shin * Korea Electronics Technology Institute, Mapo-gu, Seoul 03924, Korea * Correspondence: [email protected] (H.Y.); [email protected] (C.S.); Tel.: +82-2-6388-6618 (H.Y.) Received: 3 January 2019; Accepted: 12 February 2019; Published: 15 February 2019 Abstract: Mobile devices, wearables and Internet-of-Things are crammed into smaller form factors and batteries, yet they encounter demanding applications such as big data analysis, data mining, machine learning, augmented reality and virtual reality. To meet such high demands in the multi-device ecology, multiple devices should communicate collectively to share computation burdens and stay energy-efficient. In this paper, we present a cross-device computation coordination method for scenarios of mobile collocated interactions with wearables. We formally define a cross-device computation coordination problem and propose a method for solving this problem. Lastly, we demonstrate the feasibility of our approach through experiments and exemplar cases using 12 commercial Android devices with varying computation capabilities. Keywords: context-awareness; cross-device; Internet-of-Things; computation offloading; machine learning; mobile interaction; wearables 1. Introduction Recent rapid developments in low-power microcontrollers, application processors, wireless chips and sensors are paving the way for consumer-level Internet-of-Things (IoT), mobile devices and wearables. At this rate, integrations of IoT in small, mobile and wearable form factors with even smaller batteries will be constantly and ubiquitously emerging. On one hand, IoTs are increasingly required to be stand-alone, always-on and long-lasting to continuously monitor their surroundings.
    [Show full text]
  • A Feasibility Study of the Use of Smartwatches in Wearable Fall Detection Systems
    sensors Article A Feasibility Study of the Use of Smartwatches in Wearable Fall Detection Systems Francisco Javier González-Cañete * and Eduardo Casilari Departamento de Tecnología Electrónica, Universidad de Málaga, ETSI Telecomunicación, 29071 Málaga, Spain; [email protected] * Correspondence: [email protected]; Tel.: +34-952-137-176 Abstract: Over the last few years, the use of smartwatches in automatic Fall Detection Systems (FDSs) has aroused great interest in the research of new wearable telemonitoring systems for the elderly. In contrast with other approaches to the problem of fall detection, smartwatch-based FDSs can benefit from the widespread acceptance, ergonomics, low cost, networking interfaces, and sensors that these devices provide. However, the scientific literature has shown that, due to the freedom of movement of the arms, the wrist is usually not the most appropriate position to unambiguously characterize the dynamics of the human body during falls, as many conventional activities of daily living that involve a vigorous motion of the hands may be easily misinterpreted as falls. As also stated by the literature, sensor-fusion and multi-point measurements are required to define a robust and reliable method for a wearable FDS. Thus, to avoid false alarms, it may be necessary to combine the analysis of the signals captured by the smartwatch with those collected by some other low-power sensor placed at a point closer to the body’s center of gravity (e.g., on the waist). Under this architecture of Body Area Network (BAN), these external sensing nodes must be wirelessly connected to the smartwatch to Citation: González-Cañete, F.J.; transmit their measurements.
    [Show full text]