5 CONCLUSIONS AND FUTURE
WORK
BLE devices present a number of privacy and security
issues, both of which are at the heart of recently
proposed EU regulatory control. First and foremost,
devices are powered on by default and often cannot
be turned off. As such, most users are unlikely to be
aware of the advertising packets frequently broadcast
by their devices and their ability to identify individual
devices. This data can be used to identify personal
identifying information, particularly when correlated
with other data. In addition, users may not know
whether high standards in data encryption are being
employed by the device’s software or turned on at all.
Moreover, in many cases it is unclear as to how or
where the data is stored, or the level of encryption
and/or anonymization applied to discrete or
aggregated data stored in the cloud by the provider.
This goes against the transparency required by
regulatory bodies and may have serious implications
for controllers and processors of such data.
It is important that when considering any of the
scenarios discussed in this paper that MAC address
collisions can occur. While they are rare, they could
have a significant impact in some use cases. As such,
when employed in cases where identification of an
individual device has significant consequences, a
secondary check should be carried out to validate the
presence of a device or individual. This will be
addressed in future work.
The emergence of a Bluetooth Mesh standard will
enable existing BLE devices to communicate via a
mesh thereby significantly increasing the range at
which a device can be detected. This has implications
for both the security challenges and benefits
considered in this paper. Further research is also
required to determine the consequences of the
Bluetooth Mesh standard. As with the BLE standard
the way manufacturers implement the new standard
will play a key role in determining the privacy and
security of users. In addition to the privacy risks
outlined in this paper, the IoT poses a large threat to
societal privacy and trust. A much broader range of
threats to privacy are emerging as IoT matures; to
give a single example; private corporations are
constructing large scale unregulated surveillance
networks, marketed as a feature of smart connected
door bells. Aside from the recent attacks on these
devices and potential for them to disrupt the Internet
through Mirai type attacks. The threat to the
Universal Declaration of Human Rights Article 12
(United Nations, 1948) the right to privacy, by private
corporations with global reach demonstrates that
further regulation or enforcement of existing
legislation is required to balance the interests of the
market and the privacy of the individual.
REFERENCES
Hung, M., Gartner, 2017, Leading the IoT,
https://www.gartner.com/imagesrv/books/iot/iotEbook
_digital.pdf, accessed November 2019
European Parliament, 2016 , General Data Protection
Regulation, https://eur-lex.europa.eu/legal-content/EN/
TXT/PDF/?uri=CELEX:32016R0679 , accessed
November 2019
Minerva, R., Biru, A., Rotondi, D., 2015 Towards a
definition of the Internet of Things (IoT), IEEE Internet
of Things
ePrivacy Proposal https://eur-lex.europa.eu/legal-
content/EN/TXT/HTML/?uri=CELEX:52017PC0010
&from=EN accessed January 2020
Voas, J., 2016, Network of ‘Things’, NIST Special
Publication 900-183
www.bluetooth.com, accessed November 2019
https://www.argenox.com/a-ble-advertising-primer/ ,
accessed November 2019
Hilts, A., Parsons, C., Knockel, J., 2016, Every Step You
Fake: A Comparative Analysis of Fitness Tracker
Privacy and Security, Open Effect Report
https://www.contextis.com/en/resources/tools/ramble-ble-
app , accessed November 2019
Kambourakis, G., Kolias, A., 2017, The Mirai botnet of the
IoT Zombie Armies, IEEE Military Communications
Conference MILCOM.
https://www.strava.com/heatmap , accessed November
2019
Ruser, N., 2018, https://twitter.com/Nrg8000, accessed
November 2019
Craddock R., Watson D., Saunders W., 2016 Generic
Pattern of Life and behaviour analysis, IEEE
International Multi-Disciplinary Conference on
Cognitive Methods in Situation Awareness and
Decision Support (CogSIMA)
Issoufaly, T., Tournoux, P., 2017, BLEB : Bleutooth Lowe
Energy Botnet for large scale individual tracking, 1
st
International Conference on Next Generation
Computing Applications (NextComp)
Vanhoef, M., Matte, C., Cunche, M., Cardoso, L., Piessens,
F., Why MAC Address Randomization is not Enough:
An Analysis of Wi-Fi Network Discovery Mechanisms,
ASIA CCS ’16 Proceedings of the 11
th
ACM on Asia
Conference on Computer and Communications
Security, 2016.
https://www.bluetooth.com/blog/introducing-bluetooth-
mesh-networking/ , accessed November 2019
Kao C., Hsiano, R., Chen, P., Pan, M., 2017, A Hybrid
indoor positioning for asset tracking using Bluetooth
low energy and Wi-Fi, IEEE International Conference
of Consumer Electronics, Taiwan (ICCE-TW)