BlueTrack – Imperceptible Tracking of Bluetooth Devices

نویسندگان

  • Marc Haase
  • Matthias Handy
چکیده

Bluetooth enabled devices are potentially vulnerable against passive tracking attacks because of their unique and invariant device address. The contribution of this paper is the exploration of tracking vulnerability of Bluetooth devices. We implemented BlueTrack, a tracking system based on off-the-shelf components. We tested our system at two sites, at a university building with several lecture rooms and at a CeBIT 2004 exhibition stand. The results show that astonishingly many Bluetooth devices can be detected and personalized traces can be recorded.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bluetooth Tracking without Discoverability

Outdoor location-based services are now prevalent due to advances in mobile technology and GPS. Indoors, however, even coarse location remains unavailable. Bluetooth has been identified as a potential location technology that mobile consumer devices already support, easing deployment and maintenance. However, Bluetooth tracking systems to date have relied on the Bluetooth inquiry mode to consta...

متن کامل

Supporting Location and Proximity-Based Studies in Natural Settings

Investigators who want to conduct long-term empirical studies in natural settings pertaining to the location of objects and people have limited options for an indoor positioning technology that is easy-to-deploy and cost-effective. For my dissertation work, I am conducting the development and evaluation of two technologies that try to address this need: PowerLine Positioning and BlueTrack. Powe...

متن کامل

Evaluation of Bluetooth Properties for Indoor Localisation

Current indoor localisation systems make use of common wireless signals such as Bluetooth, WiFi to track the users inside a building. Amongst those, Bluetooth has been widely known for its low-power consumption, small maintenance cost, as well as its wide-spread amongst the commodity devices. Understanding the properties of such wireless signal definitely aids the tracking system design. Howeve...

متن کامل

Ephemeral Identifiers: Mitigating Tracking & Spoofing Threats to BLE Beacons

Bluetooth Low Energy (BLE) beacons broadcast their presence in order to enable proximity-based applications by observer devices. This results in a privacy and security exposure: broadcast devices are typically susceptible to tracking and spoofing based on the IDs used by the beacons. We introduce a scheme consisting of cloud-based Ephemeral Identifiers (EID) which allows only authorized parties...

متن کامل

Potential Bluetooth Vulnerabilities in Smartphones

Smartphone vendors have been increasingly integrating Bluetooth technology into their devices to increase accessible and convenience for users. As the current inclination of integrating PDA and telephony increase, the likelihood of sensitive information being stored on such a device is also increased. Potential Bluetooth vulnerabilities could provide alternative means to compromise Bluetooth-en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004