The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?

Authors: Liron David (Weizmann Institute of Science and Google Research), Avinatan Hassidim (Bar-Ilan University and Google Research), Yossi David (Tel-Aviv University and Google Research), Moti Yung (Columbia University and Google Privacy, Security, and Safety Research)

Volume: 2025
Issue: 1
Pages: 707–719
DOI: https://doi.org/10.56553/popets-2025-0037

Download PDF

Abstract: In this paper, we investigate whether the privacy mechanism of periodically changing the pseudorandom identities of Bluetooth Low Energy (BLE) beacons is sufficient to ensure privacy. We consider a new natural privacy notion for BLE broadcasting beacons which we call ``Timed-sequence- indistinguishability'' of beacons. This new privacy definition is stronger than the well-known indistinguishability, since it considers not just the advertisements' content, but also the advertisements' broadcasting times which are observable in the physical world. We then prove that beacons with periodically changing pseudorandom identities do not achieve timed-sequence- indistinguishability. We do this by presenting a novel privacy attack against BLE beacons, which we call the ``Battery Insertion Attack.'' This new time-based privacy attack can be executed by merely inserting or reinserting the beacon's battery at the adversary's chosen time. We performed this attack against an actually deployed beacon. To mitigate the ``Battery Insertion Attack'' and other attacks associated with periodic signaling, we propose a new countermeasure involving quasi-periodic randomized scheduling of identity changes. We prove that our countermeasure ensures timed-sequence indistinguishability for beacons, thereby enhancing the beacon's privacy. Additionally, we show how to integrate this countermeasure in the attacked system while essentially preserving its feasibility and utility, which is crucial for practical industrial adoption.

Keywords: Privacy, IoT, broadcasting, BLE, Ephemeral IDs, beacons, beacons advertisement, pseudorandom advertisement, time-based attacks, countermeasures, randomized scheduling

Copyright in PoPETs articles are held by their authors. This article is published under a Creative Commons Attribution 4.0 license.