Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Mobile Security

Are Bluetooth signals being used to track smartphones?

Christi Rogalski by Christi Rogalski
June 17, 2022
in Mobile Security, Privacy
0
Bluetooth research leads to tracking
78
SHARES
1.3k
VIEWS
Share on FacebookShare on Twitter

Can Bluetooth signals be used to track smartphones? Many people would say “No” to this question. However, a team of engineers at the University of California San Diego thinks otherwise. Their latest report reveals that these engineers were able to demonstrate that Bluetooth signals are effective in identifying and tracking smartphones. Read further to learn more about the new Bluetooth signal discovery.

You might also like

Android is getting firmware level security improvements

New iOS and iPadOS update pushed to fix zero-day bugs

GIFs in messaging apps are tracking you

Bluetooth signals can track smartphones, a team of engineers reveals

If you’re familiar with mobile device technologies, you’re aware that they constantly transmit Bluetooth beacon signals. Yes, mobile devices, such as smartphones and fitness trackers often transmit these signals at an average rate of 500 beacons per minute. These signals make it possible for many features, including Apple Find My, to track lost devices easily.

In the past, many people have argued that Bluetooth signals aren’t effective in tracking mobile devices. However, the research by the UC San Diego engineering team reveals that Bluetooth beacons can accurately track smartphones and other mobile devices. The team presented the study on May 24, 2022, at the IEEE Security & Privacy conference in Oakland, California.

How do Bluetooth signals work for tracking smartphones?

The method of tracking mobile devices with WiFi fingerprints is pretty different from that of Bluetooth beacons. For WiFi, this fingerprinting method is based on a preamble or a long string, which is utilized to define a specific series of transmission criteria. On the other hand, the Bluetooth beacon tracking method is based on a shorter preamble.

According to one of the authors, Hadi Givehchian, the short preamble from Bluetooth beacon signals gives an inaccurate fingerprint. This explains why the tracking approach is not the same as the WiFi fingerprinting technique. Instead of using the same WiFi fingerprinting techniques, the researchers designed a new method, which doesn’t focus on using any preamble. Instead, the method uses Bluetooth signals for the tracking process.

For the tracking process to work, the researchers developed an algorithm that could estimate two different values in the Bluetooth signals. These values are carrier frequency offset (CFO) and I/Q in the Bluetooth Low Energy (BLE) signal. Furthermore, the researchers calculated the imperfections for each packet using the Mahalanobis distance, a measure of the distance between a point P and a distribution D, as Wikipedia defines.

Researchers testing their Bluetooth tracking theory
Researcher, Nishant, testing the Bluetooth tracking theory, source ucsd.edu

Results of real-world experiments

Before arriving at the fact that Bluetooth beacon signals can accurately track smartphones and other mobile devices, the researchers carried out a series of experiments. In one of the experiments, the team of engineers found out that about 40% of the 162 mobile devices seen in public places were identifiable using the Bluetooth signal tracking method.

The researchers also experimented on over 647 mobile devices in a public hallway. This time around, they found out that 47% of the tested devices had unique fingerprints.

Bluetooth signal tracking
Researchers were able to detect unique fingerprints for 47% of 647 devices. – ucsd.edu

Furthermore, the researchers noted some factors that could affect Bluetooth beacon tracking. These factors include changes in ambient temperature and power ratio for various devices. Even though attackers can face these challenges, they will still have the ability to track many devices with this new Bluetooth tracking technique. The researchers also noted that the tracking process wouldn’t require using any sophisticated equipment.

Currently, the research team is working on a new way to conceal the Bluetooth fingerprints in the Bluetooth device firmware through digital signal processing. They are also looking for a way to apply the newly developed method to other devices. Here’s a brief of what Prof. Dinesh Bharadia of UC San Diego’s Department of Electrical and Computer Engineering said regarding the experiment:

“Every form of communication today is wireless and at risk. We are working to build hardware-level defenses to prevent potential attacks.”

Source: UC San Diego
Tags: BluetoothTracking
Share32Tweet19
Christi Rogalski

Christi Rogalski

Christi began her InfoSec carrier at the Illinois Institute of Technology where she received her Bachelor of Science degree in Applied Cybersecurity and Information Technology. Her passions include learning about new threats in the security world, investing, and playing with her dog, Pablo.

Recommended For You

Android is getting firmware level security improvements

by Paul Anderson
February 22, 2023
0
Android is getting firmware level security improvements

Android is the most widely used mobile operating system in the world, but it is also the most challenging to protect against evolving security threats. Google is working...

Read more

New iOS and iPadOS update pushed to fix zero-day bugs

by Kyle
February 17, 2023 - Updated on February 19, 2023
0
New iOS and iPadOS update pushed to fix zero-day bugs

Cybercriminals and "commercial" spyware developers frequently target iOS devices to carry out surveillance operations, data theft, and other nefarious actions. By identifying a weakness in Apple's iOS WebKit,...

Read more

GIFs in messaging apps are tracking you

by Christi Rogalski
July 19, 2022
0
GIFs in messaging apps are tracking you

Today, the dynamic moving image, GIF sent to a friend or colleague, perfectly expresses our emotions and lightens the mood of the receiver(s). However, several concerns have been...

Read more

Google Chrome exposes user extensions to fingerprinting

by Kyle
July 1, 2022
0
Google Chrome Extension fingerprinting source

Security researcher, z0ccc, has released a new tool that proves that Google Chrome extensions can be fingerprinted which allows tracking of its users online. Tracking users online is...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more
Next Post
Kaiser Permanente suffers data breach

Healthcare Provider Kaiser Permanente Suffers Data Breach Impacting 70k Patients

Related News

Emotet now utilizing Onenote for its spam campaigns

Emotet now utilizing Onenote for its spam campaigns

March 26, 2023
ChipMixer platform tied to crypto laundering scheme – seized by authorities

ChipMixer platform tied to crypto laundering scheme – seized by authorities

March 17, 2023
NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.