eas for potential investigation include an investigation
of privacy-preserving opt-out mechanisms. Our work
also opens the door for novel approaches in anony-
mous contact tracing during disease pandemics with-
out the need to deploy new software to user devices.
Further research on de-anonymization attacks of the
approach we have outlined would be of interest, par-
ticularly amongst practical datasets. Finally, multi-
dimensional de-anonymization attacks would prove to
be interesting, where such trackers capture additional
information such as walking or cycling speed, or de-
vice characteristics.
REFERENCES
Abberley, L., Gould, N., Crockett, K., and Cheng, J. (2017).
Modelling road congestion using ontologies for big
data analytics in smart cities. In 2017 International
Smart Cities Conference (ISC2), pages 1–6. IEEE.
Abedi, N., Bhaskar, A., Chung, E., and Miska, M. (2015).
Assessment of antenna characteristic effects on pedes-
trian and cyclists travel-time estimation based on blue-
tooth and wifi mac addresses. Transportation Re-
search Part C: Emerging Technologies, 60:124–141.
Ali, J. (2017). Mechanism for the prevention of password
reuse through anonymized hashes. PeerJ PrePrints,
5:e3322v1.
Alimpia, J. B., Sison, A. M., and Medina, R. P. (2018).
An enhanced hash-based message authentication code
using bcrypt. Proceedings of the International Jour-
nal for Research in Applied Science and Engineering
Technology, 6(4).
Biryukov, A., Dinu, D., and Khovratovich, D. (2016). Ar-
gon2: new generation of memory-hard functions for
password hashing and other applications. In 2016
IEEE European Symposium on Security and Privacy
(EuroS&P), pages 292–302. IEEE.
Blocki, J., Harsha, B., and Zhou, S. (2018). On the eco-
nomics of offline password cracking. In 2018 IEEE
Symposium on Security and Privacy (SP), pages 853–
871. IEEE.
Blogg, M., Semler, C., Hingorani, M., and Troutbeck, R.
(2010). Travel time and origin-destination data col-
lection using bluetooth mac address readers. In Aus-
tralasian transport research forum, volume 36.
Clearview Intelligence Ltd (2020). Product specification
m830 traffic monitoring.
Cragg, S. (2013). Bluetooth detection–cheap but challeng-
ing. In Scottish Transport Applications and Research
Conference (STAR).
Demir, L., Cunche, M., and Lauradoux, C. (2014).
Analysing the privacy policies of wi-fi trackers. In
Proceedings of the 2014 workshop on physical ana-
lytics, pages 39–44.
Demir, L., Kumar, A., Cunche, M., and Lauradoux, C.
(2017). The pitfalls of hashing for privacy. IEEE Com-
munications Surveys & Tutorials, 20(1):551–565.
Ertaul, L., Kaur, M., and Gudise, V. A. K. R. (2016).
Implementation and performance analysis of pbkdf2,
bcrypt, scrypt algorithms. In Proceedings of the Inter-
national Conference on Wireless Networks (ICWN),
page 66. The Steering Committee of The World
Congress in Computer Science, Computer . . . .
Fearn, N. (2019). Privacy warning over tfl plans to track
tube passengers via wifi — computing.
Fuxjaeger, P., Ruehrup, S., Paulin, T., and Rainer, B. (2016).
Towards privacy-preserving wi-fi monitoring for road
traffic analysis. IEEE Intelligent Transportation Sys-
tems Magazine, 8(3):63–74.
Hidayata, A., Terabea, S., and Yaginumaa, H. (2018). Time
travel estimations using mac addresses of bus, pas-
sengers: A point to path-qgis analysis. Geoplanning:
Journal of Geomatics and Planning, 5(2):259–268.
Li, L., Pal, B., Ali, J., Sullivan, N., Chatterjee, R., and Ris-
tenpart, T. (2019). Protocols for checking compro-
mised credentials. In Proceedings of the 2019 ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 1387–1403.
Martin, J., Mayberry, T., Donahue, C., Foppe, L., Brown,
L., Riggins, C., Rye, E. C., and Brown, D. (2017). A
study of mac address randomization in mobile devices
and when it fails. Proceedings on Privacy Enhancing
Technologies, 2017(4):365–383.
Martin, J., Rye, E., and Beverly, R. (2016). Decomposi-
tion of mac address structure for granular device infer-
ence. In Proceedings of the 32nd Annual Conference
on Computer Security Applications, pages 78–88.
Marx, M., Zimmer, E., Mueller, T., Blochberger, M., and
Federrath, H. (2018). Hashing of personally identifi-
able information is not sufficient. SICHERHEIT 2018.
Minch, R. P. (2015). Location privacy in the era of the in-
ternet of things and big data analytics. In 2015 48th
Hawaii International Conference on System Sciences,
pages 1521–1530. IEEE.
Red Hat, Inc. (2020). Generating a new unique mac address.
Sharifi, E., Hamedi, M., Haghani, A., and Sadrsadat, H.
(2011). Analysis of vehicle detection rate for blue-
tooth traffic sensors: A case study in maryland and
delaware. In 18th World Congress on on Intelligent
Transport Systems.
Thomas, K., Pullman, J., Yeo, K., Raghunathan, A., Kelley,
P. G., Invernizzi, L., Benko, B., Pietraszek, T., Patel,
S., Boneh, D., et al. (2019). Protecting accounts from
credential stuffing with password breach alerting. In
28th USENIX Security Symposium USENIX Security
19), pages 1556–1571.
Velisavljevic, V., Cano, E., Dyo, V., and Allen, B. (2016).
Wireless magnetic sensor network for road traffic
monitoring and vehicle classification. Transport and
Telecommunication Journal, 17(4).
Wetzels, J. (2016). Open sesame: The password
hashing competition and argon2. arXiv preprint
arXiv:1602.03097.
Practical Hash-based Anonymity for MAC Addresses
579