BlueTrack – Imperceptible Tracking of Bluetooth Devices
نویسندگان
چکیده
Bluetooth enabled devices are potentially vulnerable against passive tracking attacks because of their unique and invariant device address. The contribution of this paper is the exploration of tracking vulnerability of Bluetooth devices. We implemented BlueTrack, a tracking system based on off-the-shelf components. We tested our system at two sites, at a university building with several lecture rooms and at a CeBIT 2004 exhibition stand. The results show that astonishingly many Bluetooth devices can be detected and personalized traces can be recorded.
منابع مشابه
Bluetooth Tracking without Discoverability
Outdoor location-based services are now prevalent due to advances in mobile technology and GPS. Indoors, however, even coarse location remains unavailable. Bluetooth has been identified as a potential location technology that mobile consumer devices already support, easing deployment and maintenance. However, Bluetooth tracking systems to date have relied on the Bluetooth inquiry mode to consta...
متن کاملSupporting Location and Proximity-Based Studies in Natural Settings
Investigators who want to conduct long-term empirical studies in natural settings pertaining to the location of objects and people have limited options for an indoor positioning technology that is easy-to-deploy and cost-effective. For my dissertation work, I am conducting the development and evaluation of two technologies that try to address this need: PowerLine Positioning and BlueTrack. Powe...
متن کاملEvaluation of Bluetooth Properties for Indoor Localisation
Current indoor localisation systems make use of common wireless signals such as Bluetooth, WiFi to track the users inside a building. Amongst those, Bluetooth has been widely known for its low-power consumption, small maintenance cost, as well as its wide-spread amongst the commodity devices. Understanding the properties of such wireless signal definitely aids the tracking system design. Howeve...
متن کاملEphemeral Identifiers: Mitigating Tracking & Spoofing Threats to BLE Beacons
Bluetooth Low Energy (BLE) beacons broadcast their presence in order to enable proximity-based applications by observer devices. This results in a privacy and security exposure: broadcast devices are typically susceptible to tracking and spoofing based on the IDs used by the beacons. We introduce a scheme consisting of cloud-based Ephemeral Identifiers (EID) which allows only authorized parties...
متن کاملPotential Bluetooth Vulnerabilities in Smartphones
Smartphone vendors have been increasingly integrating Bluetooth technology into their devices to increase accessible and convenience for users. As the current inclination of integrating PDA and telephony increase, the likelihood of sensitive information being stored on such a device is also increased. Potential Bluetooth vulnerabilities could provide alternative means to compromise Bluetooth-en...
متن کامل