Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications 2016
DOI: 10.1145/2873587.2873594
|View full text |Cite
|
Sign up to set email alerts
|

Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
51
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 103 publications
(53 citation statements)
references
References 7 publications
2
51
0
Order By: Relevance
“…By contrast, our work fo-cuses on the BLE technology, and specifically uses flaws in Apple's Continuity protocol (Section 2.5) to track devices despite randomization of the Bluetooth hardware identifier. More closely related to this study is previous work on tracking users via Bluetooth identifiers and the discovery of privacy leakages in Bluetooth protocols [22,32,35,38,42,43,65]. Of these studies, most focus on Bluetooth Classic [38,43,65], whereas we study Apple's BLE Continuity protocol messages exclusively.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…By contrast, our work fo-cuses on the BLE technology, and specifically uses flaws in Apple's Continuity protocol (Section 2.5) to track devices despite randomization of the Bluetooth hardware identifier. More closely related to this study is previous work on tracking users via Bluetooth identifiers and the discovery of privacy leakages in Bluetooth protocols [22,32,35,38,42,43,65]. Of these studies, most focus on Bluetooth Classic [38,43,65], whereas we study Apple's BLE Continuity protocol messages exclusively.…”
Section: Related Workmentioning
confidence: 99%
“…Fawaz et al [35] develop a tool aimed at preventing privacy leakages in BLE devices by restricting who can discover, scan, and connect to BLE; to date, this tool has not been widely adopted outside of a laboratory setting. In [32], Das et al examine the privacy leakages present in wearable fitness tracking devices, as well as the ability to track these devices and therefore their owners. Unlike [32], Apple devices implement BLE MAC address randomization, which significantly increases the difficulty of tracking them.…”
Section: Related Workmentioning
confidence: 99%
“…It profoundly helps bringing intelligence to the physical products [35], thereby making all products smartly connected [36]. There are various application of IoT which span across numerous areas such as wearables, smart homes, smart cities, industrial automation and many more [37]. In order to further understand IoT, it is necessary to comprehend the different constructs of IoT.…”
Section: Internet Of Thingsmentioning
confidence: 99%
“…Security is of the utmost importance in many application domains. Although recent revisions of BLE were designed for better security and have fixed several vulnerabilities [80,81], security still remains as a significant challenge for many current and future BLE applications.…”
Section: Privacy and Securitymentioning
confidence: 99%