{"id":"https://openalex.org/W4401508798","doi":"https://doi.org/10.1109/infocom52122.2024.10621247","title":"BLE Location Tracking Attacks by Exploiting Frequency Synthesizer Imperfection","display_name":"BLE Location Tracking Attacks by Exploiting Frequency Synthesizer Imperfection","publication_year":2024,"publication_date":"2024-05-20","ids":{"openalex":"https://openalex.org/W4401508798","doi":"https://doi.org/10.1109/infocom52122.2024.10621247"},"language":"en","primary_location":{"id":"doi:10.1109/infocom52122.2024.10621247","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom52122.2024.10621247","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080969232","display_name":"Yeming Li","orcid":"https://orcid.org/0000-0002-7267-3322"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yeming Li","raw_affiliation_strings":["Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113330493","display_name":"Hailong Lin","orcid":"https://orcid.org/0009-0005-8358-3065"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hailong Lin","raw_affiliation_strings":["Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086161245","display_name":"Jiamei Lv","orcid":"https://orcid.org/0000-0002-6673-722X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiamei Lv","raw_affiliation_strings":["Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085876298","display_name":"Yi Gao","orcid":"https://orcid.org/0000-0001-7897-5965"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Gao","raw_affiliation_strings":["Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074340955","display_name":"Wei Dong","orcid":"https://orcid.org/0000-0001-6884-3459"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Dong","raw_affiliation_strings":["Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,The State Key Laboratory of Blockchain and Data Security College of Computer Science","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5080969232"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.7252,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75354251,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1860","last_page":"1869"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6328234672546387},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.5529888272285461},{"id":"https://openalex.org/keywords/frequency-synthesizer","display_name":"Frequency synthesizer","score":0.5419455766677856},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23305627703666687},{"id":"https://openalex.org/keywords/phase-locked-loop","display_name":"Phase-locked loop","score":0.19787627458572388},{"id":"https://openalex.org/keywords/jitter","display_name":"Jitter","score":0.06287923455238342}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6328234672546387},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.5529888272285461},{"id":"https://openalex.org/C182099602","wikidata":"https://www.wikidata.org/wiki/Q2660678","display_name":"Frequency synthesizer","level":4,"score":0.5419455766677856},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23305627703666687},{"id":"https://openalex.org/C12707504","wikidata":"https://www.wikidata.org/wiki/Q52637","display_name":"Phase-locked loop","level":3,"score":0.19787627458572388},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.06287923455238342},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom52122.2024.10621247","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom52122.2024.10621247","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W120660591","https://openalex.org/W2004543878","https://openalex.org/W2061534192","https://openalex.org/W2099610798","https://openalex.org/W2103203884","https://openalex.org/W2107208989","https://openalex.org/W2108054098","https://openalex.org/W2155372100","https://openalex.org/W2155886813","https://openalex.org/W2156636826","https://openalex.org/W2161676627","https://openalex.org/W2167284852","https://openalex.org/W2467825424","https://openalex.org/W2768262025","https://openalex.org/W2791659887","https://openalex.org/W2803989302","https://openalex.org/W2919720498","https://openalex.org/W2948907366","https://openalex.org/W2963660578","https://openalex.org/W2986203625","https://openalex.org/W3044898368","https://openalex.org/W3174330873","https://openalex.org/W3216968684","https://openalex.org/W4200018332","https://openalex.org/W4207061535","https://openalex.org/W4210769169","https://openalex.org/W4229080651","https://openalex.org/W4288057775","https://openalex.org/W4294309017","https://openalex.org/W6604929939","https://openalex.org/W6683549911"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"In":[0,91],"recent":[1],"years,":[2],"Bluetooth":[3],"Low":[4],"Energy":[5],"(BLE)":[6],"has":[7],"become":[8],"one":[9,24],"of":[10,33,57,113,118,125],"the":[11,30,50,55,88,108,114,119,122,126,139,189],"most":[12],"wildly":[13],"used":[14],"wireless":[15],"protocols":[16],"and":[17,162,192,197],"it":[18],"is":[19,37,61,65,185],"common":[20,51],"that":[21,54,66,75],"users":[22],"carry":[23],"or":[25],"more":[26],"BLE":[27,34,44,58,73,85,158,177],"devices.":[28],"With":[29],"extensive":[31],"deployment":[32],"devices,":[35,136],"there":[36,69],"a":[38,96,156],"significant":[39],"privacy":[40],"risk":[41,56],"if":[42],"these":[43],"devices":[45,86],"can":[46],"be":[47],"tracked.":[48],"However,":[49],"wisdom":[52],"suggests":[53],"location":[59],"tracking":[60,160,165],"negligible.":[62],"The":[63,170,182],"reason":[64],"researchers":[67],"believe":[68],"are":[70,76,129,179],"no":[71],"stable":[72,77,145,193],"fingerprints":[74],"across":[78],"different":[79,84,135,147,168],"scenarios":[80],"(e.g.,":[81],"temperatures)":[82],"for":[83],"with":[87,138],"same":[89,140],"model.":[90,141],"this":[92],"paper,":[93],"we":[94,153],"introduce":[95],"novel":[97],"physical-layer":[98],"fingerprint":[99],"named":[100],"Transient":[101],"Dynamic":[102],"Fingerprint":[103],"(TDF),":[104],"which":[105],"originated":[106],"from":[107],"negative":[109],"feedback":[110],"control":[111],"process":[112],"frequency":[115,127],"synthesizer.":[116],"Because":[117],"hardware":[120],"imperfection,":[121],"dynamic":[123],"features":[124],"synthesizer":[128],"different,":[130],"making":[131],"TDF":[132,143],"unique":[133],"among":[134],"even":[137],"Furthermore,":[142],"keeps":[144],"under":[146],"thermal":[148],"conditions.":[149],"Based":[150],"on":[151],"TDF,":[152],"propose":[154],"BTrack,":[155],"practical":[157],"device":[159],"system":[161],"evaluate":[163],"its":[164],"performance":[166],"in":[167],"environments.":[169],"results":[171],"show":[172],"BTrack":[173],"works":[174],"well":[175],"once":[176],"beacons":[178],"effectively":[180],"received.":[181],"identification":[183],"accuracy":[184],"35.38%-57.41%":[186],"higher":[187],"than":[188],"existing":[190],"method,":[191],"over":[194],"temperatures,":[195],"distances,":[196],"locations.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
