A method for deanonymizing iOS users through the Airdrop protocol.

Keywords: iOS, BLE, randomized MAC address, Advertising messages, definition of smartphone location

Abstract

The paper proposes a tracking algorithm for iOS devices using dynamically randomized MAC addresses and BLE advertisements.

References

1. Padiya S. D., Gulhane V. S. Analysis of Bluetooth versions (4.0, 4.2, 5, 5.1, and 5.2) for IoT applications. In book: Implementing Data Analytics and Architectures for Next Generation Wireless Communications. Chapter: 10. IGI Global, 2021. P. 153-178. DOI: 10.4018/978-1-7998-6988-7.ch010.
2. Cha S.-C., Yeh K.-H., Chen J.-F. Toward a robust security paradigm for Bluetooth low energy-based smart objects in the Internet-of-Things. Sensors. 2017. Vol. 17, no. 2348. P. 1-17. DOI:10.3390/s17102348.
3. Gangwal A., Singh S., Spolaor R., Srivastava A. BLE Whisperer: Exploiting BLE Advertisements for data exfiltra-tion. In book: Computer Security. ESORICS, 2022. DOI: 10.1007/978-3-031-17140-6_34.
4. Kim T.-Yo., Lee H.-J. Vulnerability analysis of Bluetooth communication based on GNU radio. The Journal of the Korean Institute of Information and Communication Engineering. 2016. Vol. 20, Is. 11. P. 2014-2020. DOI: 10.6109/jkiice.2016.20.11.2014.
5. Jameel I., Dungen J. Low-power wireless advertising software library for distributed M2M and contextual IoT. 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). Jan. 2015. P. 597-602. DOI: 10.1109/WF-IoT.2015.7389121.
6. Vanhoef M. A time-memory trade-off attack on WPA3's SAE-PK. ACM Asia Conference on Computer and Com-munications Security (ASIA CCS '22), May 2022. P. 27-37. DOI:10.1145/3494105.3526235

Abstract views: 103
PDF Downloads: 114
Published
2022-12-18
How to Cite
TohoievО. (2022). A method for deanonymizing iOS users through the Airdrop protocol. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (49), 12-17. https://doi.org/10.36910/6775-2524-0560-2022-49-02