Location management strategies increasing privacy in mobile communication
Information systems security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Repairing the bluetooth pairing protocol
Proceedings of the 13th international conference on Security protocols
Location privacy in wireless personal area networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Can Ferris Bueller still have his day off? protecting privacy in the wireless era
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Privacy-preserving 802.11 access-point discovery
Proceedings of the second ACM conference on Wireless network security
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
A new scheme of LBS privacy protection
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Untraceability of RFID protocols
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Mobile location tracking in metro areas: malnets and others
Proceedings of the 17th ACM conference on Computer and communications security
Collaborative cellular-based location system
Euro-Par'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Sense-And-Trace: a privacy preserving distributed geolocation tracking system
SP'12 Proceedings of the 20th international conference on Security Protocols
Hi-index | 0.00 |
We discuss ways to enhance the location privacy of Bluetooth. The principal weakness of Bluetooth with respect to location privacy lies in its disclosure of a device’s permanent identifier, which makes location tracking easy. Bluetooth’s permanent identifier is often disclosed and it is also tightly integrated into lower layers of the Bluetooth stack, and hence susceptible to leakage. We survey known location privacy attacks against Bluetooth, generalize a lesser-known attack, and describe and quantify a more novel attack. The second of these attacks, which recovers a 28-bit identifier via the device’s frequency hop pattern, requires just a few packets and is practicable. Based on a realistic usage scenario, we develop an enhanced privacy framework with stronger unlinkability, using protected stateful pseudonyms and simple primitives.