5  CONCLUSIONS AND FUTURE 
WORK 
BLE devices present a number of privacy and security 
issues,  both  of  which  are  at  the  heart  of  recently 
proposed EU regulatory control. First and foremost, 
devices are powered on by default and often cannot 
be turned off. As such, most users are unlikely to be 
aware of the advertising packets frequently broadcast 
by their devices and their ability to identify individual 
devices.  This  data  can  be  used  to  identify  personal 
identifying information, particularly when correlated 
with  other  data.  In  addition,  users  may  not  know 
whether high standards in data encryption are being 
employed by the device’s software or turned on at all. 
Moreover, in many cases it is unclear as to how or 
where  the  data  is  stored,  or  the  level  of  encryption 
and/or  anonymization  applied  to  discrete  or 
aggregated data stored in the cloud by the provider. 
This  goes  against  the  transparency  required  by 
regulatory bodies and may have serious implications 
for controllers and processors of such data. 
It is important that when considering any of the 
scenarios discussed in this paper  that MAC address 
collisions can occur. While they are rare, they could 
have a significant impact in some use cases. As such, 
when  employed  in  cases  where  identification  of  an 
individual  device  has  significant  consequences,  a 
secondary check should be carried out to validate the 
presence  of  a  device  or  individual.  This  will  be 
addressed in future work. 
The emergence of a Bluetooth Mesh standard will 
enable  existing  BLE  devices  to  communicate  via  a 
mesh  thereby  significantly  increasing  the  range  at 
which a device can be detected. This has implications 
for  both  the  security  challenges  and  benefits 
considered  in  this  paper.  Further  research  is  also 
required  to  determine  the  consequences  of  the 
Bluetooth Mesh standard. As with the BLE standard 
the way manufacturers implement the new  standard 
will  play  a key  role  in  determining  the privacy and 
security  of  users.  In  addition  to  the  privacy  risks 
outlined in this paper, the IoT poses a large threat to 
societal privacy and trust. A much broader range of 
threats  to  privacy  are  emerging  as  IoT  matures;  to 
give  a  single  example;  private  corporations  are 
constructing  large  scale  unregulated  surveillance 
networks, marketed as a feature of  smart connected 
door  bells.  Aside  from  the  recent  attacks  on  these 
devices and potential for them to disrupt the Internet 
through  Mirai  type  attacks.  The  threat  to  the 
Universal  Declaration  of  Human  Rights  Article  12 
(United Nations, 1948) the right to privacy, by private 
corporations  with  global  reach  demonstrates  that 
further  regulation  or  enforcement  of  existing 
legislation is required to balance the interests of the 
market and the privacy of the individual.  
REFERENCES 
Hung,  M.,  Gartner,  2017,  Leading  the  IoT, 
https://www.gartner.com/imagesrv/books/iot/iotEbook
_digital.pdf, accessed November 2019 
European  Parliament,  2016  ,  General  Data  Protection 
Regulation, https://eur-lex.europa.eu/legal-content/EN/ 
TXT/PDF/?uri=CELEX:32016R0679  ,  accessed 
November 2019 
Minerva,  R.,  Biru,  A.,  Rotondi,  D.,  2015  Towards  a 
definition of the Internet of Things (IoT), IEEE Internet 
of Things 
ePrivacy  Proposal  https://eur-lex.europa.eu/legal-
content/EN/TXT/HTML/?uri=CELEX:52017PC0010
&from=EN accessed January 2020 
Voas,  J.,  2016,  Network  of  ‘Things’,  NIST  Special 
Publication 900-183 
www.bluetooth.com, accessed November 2019 
https://www.argenox.com/a-ble-advertising-primer/    , 
accessed November 2019 
Hilts, A., Parsons, C., Knockel, J., 2016,  Every Step You 
Fake:  A  Comparative  Analysis  of  Fitness  Tracker 
Privacy and Security, Open Effect Report 
https://www.contextis.com/en/resources/tools/ramble-ble-
app , accessed November 2019 
Kambourakis, G., Kolias, A., 2017, The Mirai botnet of the 
IoT  Zombie  Armies,  IEEE  Military  Communications 
Conference MILCOM. 
https://www.strava.com/heatmap  ,  accessed  November 
2019 
Ruser,  N.,  2018,  https://twitter.com/Nrg8000,  accessed 
November 2019 
Craddock  R.,  Watson  D.,  Saunders  W.,  2016  Generic 
Pattern  of  Life  and  behaviour  analysis,  IEEE 
International  Multi-Disciplinary  Conference  on 
Cognitive  Methods  in  Situation  Awareness  and 
Decision Support (CogSIMA) 
Issoufaly, T., Tournoux, P., 2017, BLEB : Bleutooth Lowe 
Energy  Botnet  for  large  scale  individual  tracking,  1
st
 
International  Conference  on  Next  Generation 
Computing Applications (NextComp) 
Vanhoef, M., Matte, C., Cunche, M., Cardoso, L., Piessens, 
F.,  Why MAC Address Randomization is not Enough: 
An Analysis of Wi-Fi Network Discovery Mechanisms, 
ASIA CCS ’16 Proceedings of the 11
th
 ACM on Asia 
Conference  on  Computer  and  Communications 
Security, 2016. 
https://www.bluetooth.com/blog/introducing-bluetooth-
mesh-networking/ , accessed November 2019 
Kao  C.,  Hsiano,  R.,  Chen,  P.,  Pan,  M.,  2017,  A  Hybrid 
indoor  positioning  for  asset  tracking  using  Bluetooth 
low energy and Wi-Fi, IEEE International Conference 
of Consumer Electronics, Taiwan (ICCE-TW)