Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism

被引:16
作者
Celosia, Guillaume [1 ]
Cunche, Mathieu [1 ]
机构
[1] Univ Lyon, INSA Lyon, INRIA, CITI, F-69621 Villeurbanne, France
来源
PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19) | 2019年
基金
欧盟地平线“2020”;
关键词
Bluetooth Low Energy; Privacy; Tracking; Address randomization; LOCATION PRIVACY;
D O I
10.1145/3360774.3360777
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Bluetooth Low Energy (BLE) protocol is being included in a growing number of connected objects such as fitness trackers and headphones. As part of the service discovery mechanism of BLE, devices announce themselves by broadcasting radio signals called advertisement packets that can be collected with off-the-shelf hardware and software. To avoid the risk of tracking based on those messages, BLE features an address randomization mechanism that substitutes the device address with random temporary pseudonyms, called Private addresses. In this paper, we analyze the privacy issues associated with the advertising mechanism of BLE, leveraging a large dataset of advertisement packets collected in the wild. First, we identified that some implementations fail at following the BLE specifications on the maximum lifetime and the uniform distribution of random identifiers. Furthermore, we found that the payload of the advertisement packet can hamper the randomization mechanism by exposing counters and static identifiers. In particular, we discovered that advertising data of Apple and Microsoft proximity protocols can be used to defeat the address randomization scheme. Finally, we discuss how some elements of advertising data can be leveraged to identify the type of device, exposing the owner to inventory attacks.
引用
收藏
页码:444 / 453
页数:10
相关论文
共 28 条
[1]  
[Anonymous], 2014, IEEE Std 802-2014 (Revision to IEEE Std 802-2001), P1, DOI 10.1109/IEEESTD.2014.6847097
[2]  
Apple, 2019, IOS SEC IOS 12 3
[3]  
Becker Johannes K., 2019, Proceedings on Privacy Enhancing Technologies, V2019, P50, DOI 10.2478/popets-2019-0036
[4]  
Bluetooth S. I. G., 2010, BLUET COR SPEC V4 0
[5]  
Bluetooth SIG, 2019, BLUET COR SPEC SUPPL
[6]  
Bluetooth SIG, 2019, BLUET COR SPEC V5 1
[7]  
Bluetooth SIG, 2019, TECHNICAL REPORT
[8]  
Bonne B., 2013, P 2013 IEEE 14 INT S, P1, DOI [10.1109/WoWMoM.2013.6583443, DOI 10.1109/WOWMOM.2013.6583443]
[9]  
Chakravarti I. M., 1967, HDB METHODS APPL STA
[10]   Linking wireless devices using information contained in Wi-Fi probe requests [J].
Cunche, Mathieu ;
Kaafar, Mohamed-Ali ;
Boreli, Roksana .
PERVASIVE AND MOBILE COMPUTING, 2014, 11 :56-69