Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Mobile Security

Are Bluetooth signals being used to track smartphones?

Christi Rogalski by Christi Rogalski
June 17, 2022
in Mobile Security, Privacy
0
Bluetooth research leads to tracking
77
SHARES
1.3k
VIEWS
Share on FacebookShare on Twitter

Can Bluetooth signals be used to track smartphones? Many people would say “No” to this question. However, a team of engineers at the University of California San Diego thinks otherwise. Their latest report reveals that these engineers were able to demonstrate that Bluetooth signals are effective in identifying and tracking smartphones. Read further to learn more about the new Bluetooth signal discovery.

You might also like

GIFs in messaging apps are tracking you

Google Chrome exposes user extensions to fingerprinting

Chrome Browser Extension Vytal Prevents Privacy Leaks

Bluetooth signals can track smartphones, a team of engineers reveals

If you’re familiar with mobile device technologies, you’re aware that they constantly transmit Bluetooth beacon signals. Yes, mobile devices, such as smartphones and fitness trackers often transmit these signals at an average rate of 500 beacons per minute. These signals make it possible for many features, including Apple Find My, to track lost devices easily.

In the past, many people have argued that Bluetooth signals aren’t effective in tracking mobile devices. However, the research by the UC San Diego engineering team reveals that Bluetooth beacons can accurately track smartphones and other mobile devices. The team presented the study on May 24, 2022, at the IEEE Security & Privacy conference in Oakland, California.

How do Bluetooth signals work for tracking smartphones?

The method of tracking mobile devices with WiFi fingerprints is pretty different from that of Bluetooth beacons. For WiFi, this fingerprinting method is based on a preamble or a long string, which is utilized to define a specific series of transmission criteria. On the other hand, the Bluetooth beacon tracking method is based on a shorter preamble.

According to one of the authors, Hadi Givehchian, the short preamble from Bluetooth beacon signals gives an inaccurate fingerprint. This explains why the tracking approach is not the same as the WiFi fingerprinting technique. Instead of using the same WiFi fingerprinting techniques, the researchers designed a new method, which doesn’t focus on using any preamble. Instead, the method uses Bluetooth signals for the tracking process.

For the tracking process to work, the researchers developed an algorithm that could estimate two different values in the Bluetooth signals. These values are carrier frequency offset (CFO) and I/Q in the Bluetooth Low Energy (BLE) signal. Furthermore, the researchers calculated the imperfections for each packet using the Mahalanobis distance, a measure of the distance between a point P and a distribution D, as Wikipedia defines.

Researchers testing their Bluetooth tracking theory
Researcher, Nishant, testing the Bluetooth tracking theory, source ucsd.edu

Results of real-world experiments

Before arriving at the fact that Bluetooth beacon signals can accurately track smartphones and other mobile devices, the researchers carried out a series of experiments. In one of the experiments, the team of engineers found out that about 40% of the 162 mobile devices seen in public places were identifiable using the Bluetooth signal tracking method.

The researchers also experimented on over 647 mobile devices in a public hallway. This time around, they found out that 47% of the tested devices had unique fingerprints.

Bluetooth signal tracking
Researchers were able to detect unique fingerprints for 47% of 647 devices. – ucsd.edu

Furthermore, the researchers noted some factors that could affect Bluetooth beacon tracking. These factors include changes in ambient temperature and power ratio for various devices. Even though attackers can face these challenges, they will still have the ability to track many devices with this new Bluetooth tracking technique. The researchers also noted that the tracking process wouldn’t require using any sophisticated equipment.

Currently, the research team is working on a new way to conceal the Bluetooth fingerprints in the Bluetooth device firmware through digital signal processing. They are also looking for a way to apply the newly developed method to other devices. Here’s a brief of what Prof. Dinesh Bharadia of UC San Diego’s Department of Electrical and Computer Engineering said regarding the experiment:

“Every form of communication today is wireless and at risk. We are working to build hardware-level defenses to prevent potential attacks.”

Source: UC San Diego
Tags: BluetoothTracking
Share31Tweet19
Christi Rogalski

Christi Rogalski

Christi began her InfoSec carrier at the Illinois Institute of Technology where she received her Bachelor of Science degree in Applied Cybersecurity and Information Technology. Her passions include learning about new threats in the security world, investing, and playing with her dog, Pablo.

Recommended For You

GIFs in messaging apps are tracking you

by Christi Rogalski
July 19, 2022
0
GIFs in messaging apps are tracking you

Today, the dynamic moving image, GIF sent to a friend or colleague, perfectly expresses our emotions and lightens the mood of the receiver(s). However, several concerns have been...

Read more

Google Chrome exposes user extensions to fingerprinting

by Kyle
July 1, 2022
0
Google Chrome Extension fingerprinting source

Security researcher, z0ccc, has released a new tool that proves that Google Chrome extensions can be fingerprinted which allows tracking of its users online. Tracking users online is...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more

How Apple Stopped $1.5 billion Worth of Fraudulent Transactions in 2021

by Christi Rogalski
June 8, 2022
0
Apple app store security fraud

Apple has recently released statistics on the number of fraudulent and untrustworthy transactions that have passed through the Apple App Store in 2021. In combination, they have stopped...

Read more

Tails OS Developers Warn Users to not use their Operating System

by Kyle
May 28, 2022
0
Tails OS 5.0 zero-day

The developers of the popular Tails OS (operating system) are warning its users to cease use of their tool due to privacy concerns after the discovery of a...

Read more
Next Post
Kaiser Permanente suffers data breach

Healthcare Provider Kaiser Permanente Suffers Data Breach Impacting 70k Patients

Related News

BlueSky Ransomware backdoors KMSAuto activator

BlueSky Ransomware Infects KMSAuto Activator users

July 20, 2022 - Updated on July 22, 2022
BlackCat Ransomware aka “ALPHV” infections on the rise

BlackCat Ransomware aka “ALPHV” infections on the rise

June 16, 2022 - Updated on July 20, 2022
GIFs in messaging apps are tracking you

GIFs in messaging apps are tracking you

July 19, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.