Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

Researchers Find Bluetooth Signals Can be Fingerprinted to Track Smartphones

Bluetooth Signals

A new research undertaken by a group of academics from the
University of California San Diego has revealed for the first time
that Bluetooth signals can be fingerprinted to track smartphones
(and therefore, individuals).

The identification, at its core, hinges on imperfections in the
Bluetooth chipset hardware introduced during the manufacturing
process, resulting in a “unique physical-layer fingerprint.”

“To perform a physical-layer fingerprinting attack, the attacker
must be equipped with a Software Defined Radio sniffer: a radio
receiver capable of recording raw IQ radio signals,” the
researchers said[1]
in a new paper[2]
titled[3]
“Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile
Devices.”

CyberSecurity

The attack[4]
is made possible due to the ubiquitous nature of Bluetooth Low
Energy (BLE) beacons that are continuously transmitted by modern
devices to enable crucial functions such as contact tracing[5]
during public health emergencies.

The hardware defects, on the other hand, stem from the fact that
both Wi-Fi and BLE components are often integrated together into a
specialized “combo chip[6],” effectively subjecting
Bluetooth to the same set of metrics that can be used to uniquely
fingerprint Wi-Fi devices: carrier frequency offset[7] and IQ imbalance[8].

Fingerprinting and tracking a device then entails extracting CFO
and I/Q imperfections for each packet by computing the Mahalanobis distance[9]
to determine “how close the features of the new packet” are to its
previously recorded hardware imperfection fingerprint.

“Also, since BLE devices have temporarily stable identifiers in
their packets [i.e., MAC address], we can identify a device based
on the average over multiple packets, increasing identification
accuracy,” the researchers said.

CyberSecurity

That said, there are several challenges to pulling off such an
attack in an adversarial setting, chief among them being that the
ability to uniquely identify a device depends on the BLE chipset
used as well as the chipsets of other devices that are in close
physical proximity to the target.

Other critical factors that could affect the readings include
device temperature, differences in BLE transmit power between
iPhone and Android devices, and the quality of the sniffer radio
used by the malicious actor to execute the fingerprinting
attacks.

“By evaluating the practicality of this attack in the field,
particularly in busy settings such as coffee shops, we found that
certain devices have unique fingerprints, and therefore are
particularly vulnerable to tracking attacks, others have common
fingerprints, they will often be misidentified,” the researchers
concluded.

“BLE does present a location tracking threat for mobile devices.
However an attacker’s ability to track a particular target is
essentially a matter of luck.”

References

  1. ^
    said
    (jacobsschool.ucsd.edu)
  2. ^
    new
    paper
    (cseweb.ucsd.edu)
  3. ^
    titled
    (github.com)
  4. ^
    attack
    (pluralistic.net)
  5. ^
    contact
    tracing
    (en.wikipedia.org)
  6. ^
    combo
    chip
    (thehackernews.com)
  7. ^
    carrier
    frequency offset
    (en.wikipedia.org)
  8. ^
    IQ
    imbalance
    (en.wikipedia.org)
  9. ^
    Mahalanobis distance
    (en.wikipedia.org)

Read more