TechBicycle tech vulnerability: Remote gear control raises safety concerns

Bicycle tech vulnerability: Remote gear control raises safety concerns

Electronically controlled bicycle equipment ensures convenience and precision. Still, as evidenced by materials published by Northeastern University, it does not ensure safety. Bicycle gear settings can be changed remotely, affecting not only sports performance but also safety.

bike
bike
Images source: © shimano | Tyler Roemer

7:14 PM EDT, September 29, 2024

Shimano DI2 is a group of electronically controlled bicycle equipment. Previously managed by levers and steel cables, mechanical connections have been replaced with electric wires and wireless communication. The equipment can now be configured remotely on a smartphone.

This provides very high precision and helps avoid problems related to the operation of mechanical cables. However, Boston's Northeastern University researchers have shown that this technology can also be dangerous.

Reports from cycling routes indicate that the drivetrain operation affects sports results and safety, and causing a crash can have dire consequences.

Gear settings can be changed remotely

Shimano DI2 uses several wireless communication standards. According to Sekurak, these include Bluetooth Low Energy for configuring the equipment, ANT+ for telemetry, and Shimano's proprietary protocol operating at a frequency of 2,478 MHz for controlling the derailleurs. This last element has proven to be a weak link.

Through spectrum observation, performed using an SDR (software-defined radio), researchers identified all the transmission parameters and recreated and decoded the data transmitted in this wireless communication.

To control the operation of the derailleurs remotely, all you need is a computer and an SDR with broadcasting capability. During tests, repeatable results were obtained at a distance of up to 33 feet, which is usually enough to affect the operation of the derailleurs in a passing bicycle from the roadside.

According to the manufacturer's assurances, updating the derailleurs' software can secure the detected vulnerability. However, it is worth remembering that the race between equipment manufacturers has not ended, and the increasing number of devices communicating wirelessly provides hackers with more opportunities.

Related content
© essanews.com
·

Downloading, reproduction, storage, or any other use of content available on this website—regardless of its nature and form of expression (in particular, but not limited to verbal, verbal-musical, musical, audiovisual, audio, textual, graphic, and the data and information contained therein, databases and the data contained therein) and its form (e.g., literary, journalistic, scientific, cartographic, computer programs, visual arts, photographic)—requires prior and explicit consent from Wirtualna Polska Media Spółka Akcyjna, headquartered in Warsaw, the owner of this website, regardless of the method of exploration and the technique used (manual or automated, including the use of machine learning or artificial intelligence programs). The above restriction does not apply solely to facilitate their search by internet search engines and uses within contractual relations or permitted use as specified by applicable law.Detailed information regarding this notice can be found  here.