{"id":"https://openalex.org/W4404213206","doi":"https://doi.org/10.56553/popets-2025-0037","title":"The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?","display_name":"The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?","publication_year":2024,"publication_date":"2024-11-10","ids":{"openalex":"https://openalex.org/W4404213206","doi":"https://doi.org/10.56553/popets-2025-0037"},"language":"en","primary_location":{"id":"doi:10.56553/popets-2025-0037","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2025-0037","pdf_url":"https://petsymposium.org/popets/2025/popets-2025-0037.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://petsymposium.org/popets/2025/popets-2025-0037.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011149581","display_name":"Liron David","orcid":"https://orcid.org/0000-0002-1502-5257"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]},{"id":"https://openalex.org/I53964585","display_name":"Weizmann Institute of Science","ror":"https://ror.org/0316ej306","country_code":"IL","type":"education","lineage":["https://openalex.org/I53964585"]}],"countries":["IL","US"],"is_corresponding":true,"raw_author_name":"Liron David","raw_affiliation_strings":["Weizmann Institute of Science and Google Research"],"affiliations":[{"raw_affiliation_string":"Weizmann Institute of Science and Google Research","institution_ids":["https://openalex.org/I53964585","https://openalex.org/I1291425158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089579452","display_name":"Avinatan Hassidim","orcid":"https://orcid.org/0000-0002-3855-344X"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]},{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL","US"],"is_corresponding":false,"raw_author_name":"Avinatan Hassidim","raw_affiliation_strings":["Bar-Ilan University and Google Research"],"affiliations":[{"raw_affiliation_string":"Bar-Ilan University and Google Research","institution_ids":["https://openalex.org/I1291425158","https://openalex.org/I13955877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056652727","display_name":"Yossi David","orcid":"https://orcid.org/0000-0001-8020-0317"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]},{"id":"https://openalex.org/I4210117425","display_name":"Google (Israel)","ror":"https://ror.org/02c20ys54","country_code":"IL","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210117425","https://openalex.org/I4210128969"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yossi David","raw_affiliation_strings":["Tel-Aviv University and Google Research"],"affiliations":[{"raw_affiliation_string":"Tel-Aviv University and Google Research","institution_ids":["https://openalex.org/I4210117425","https://openalex.org/I16391192"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030243906","display_name":"Moti Yung","orcid":"https://orcid.org/0000-0003-0848-0873"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Moti Yung","raw_affiliation_strings":["Columbia University and Google Privacy, Security, and Safety Research"],"affiliations":[{"raw_affiliation_string":"Columbia University and Google Privacy, Security, and Safety Research","institution_ids":["https://openalex.org/I1291425158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011149581"],"corresponding_institution_ids":["https://openalex.org/I1291425158","https://openalex.org/I53964585"],"apc_list":null,"apc_paid":null,"fwci":0.7268,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77378686,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"2025","issue":"1","first_page":"707","last_page":"719"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/randomization","display_name":"Randomization","score":0.5649338364601135},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.561881422996521},{"id":"https://openalex.org/keywords/battery","display_name":"Battery (electricity)","score":0.5244845747947693},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5102977752685547},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4841635823249817},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32388776540756226},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.15262329578399658},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1408291757106781},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.14042094349861145},{"id":"https://openalex.org/keywords/bioinformatics","display_name":"Bioinformatics","score":0.09266915917396545},{"id":"https://openalex.org/keywords/clinical-trial","display_name":"Clinical trial","score":0.09026426076889038}],"concepts":[{"id":"https://openalex.org/C204243189","wikidata":"https://www.wikidata.org/wiki/Q1363085","display_name":"Randomization","level":3,"score":0.5649338364601135},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.561881422996521},{"id":"https://openalex.org/C555008776","wikidata":"https://www.wikidata.org/wiki/Q267298","display_name":"Battery (electricity)","level":3,"score":0.5244845747947693},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5102977752685547},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4841635823249817},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32388776540756226},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.15262329578399658},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1408291757106781},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.14042094349861145},{"id":"https://openalex.org/C60644358","wikidata":"https://www.wikidata.org/wiki/Q128570","display_name":"Bioinformatics","level":1,"score":0.09266915917396545},{"id":"https://openalex.org/C535046627","wikidata":"https://www.wikidata.org/wiki/Q30612","display_name":"Clinical trial","level":2,"score":0.09026426076889038},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.56553/popets-2025-0037","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2025-0037","pdf_url":"https://petsymposium.org/popets/2025/popets-2025-0037.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.56553/popets-2025-0037","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2025-0037","pdf_url":"https://petsymposium.org/popets/2025/popets-2025-0037.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4404213206.pdf","grobid_xml":"https://content.openalex.org/works/W4404213206.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2520316949","https://openalex.org/W2120509628","https://openalex.org/W3215259711","https://openalex.org/W2348760775","https://openalex.org/W1978318333","https://openalex.org/W2974762004","https://openalex.org/W4361961354","https://openalex.org/W4361950035","https://openalex.org/W2157319076","https://openalex.org/W4237760388"],"abstract_inverted_index":{"In":[0],"this":[1,92,132,185],"paper,":[2],"we":[3,38,103,152,180],"investigate":[4],"whether":[5],"the":[6,12,51,59,64,72,105,122,126,141,176,188],"privacy":[7,31,46,97,112],"mechanism":[8],"of":[9,15,42,161],"periodically":[10,81],"changing":[11,82],"pseudorandom":[13,83],"identities":[14,84],"Bluetooth":[16],"Low":[17],"Energy":[18],"(BLE)":[19],"beacons":[20,36,79],"is":[21,48,199],"sufficient":[22],"to":[23,183],"ensure":[24],"privacy.":[25,178],"We":[26,75,90,130,164],"consider":[27],"a":[28,95,154],"new":[29,45,110,155],"natural":[30],"notion":[32],"for":[33,172,201],"BLE":[34,100],"broadcasting":[35,66],"which":[37,68,102,198],"call":[39,104],"``Timed-sequence-":[40],"indistinguishability''":[41],"beacons.":[43],"This":[44,109],"definition":[47],"stronger":[49],"than":[50],"well-known":[52],"indistinguishability,":[53],"since":[54],"it":[55],"considers":[56],"not":[57,86],"just":[58],"advertisements'":[60,65],"content,":[61],"but":[62],"also":[63],"times":[67],"are":[69],"observable":[70],"in":[71,187],"physical":[73],"world.":[74],"then":[76],"prove":[77,165],"that":[78,166],"with":[80,149],"do":[85,91],"achieve":[87],"timed-sequence-":[88],"indistinguishability.":[89],"by":[93,117],"presenting":[94],"novel":[96],"attack":[98,113,133],"against":[99,134],"beacons,":[101,173],"``Battery":[106,142],"Insertion":[107,143],"Attack.''":[108],"time-based":[111],"can":[114],"be":[115],"executed":[116],"merely":[118],"inserting":[119],"or":[120],"reinserting":[121],"beacon's":[123,177],"battery":[124],"at":[125],"adversary's":[127],"chosen":[128],"time.":[129],"performed":[131],"an":[135],"actually":[136],"deployed":[137],"beacon.":[138],"To":[139],"mitigate":[140],"Attack''":[144],"and":[145,196],"other":[146],"attacks":[147],"associated":[148],"periodic":[150],"signaling,":[151],"propose":[153],"countermeasure":[156,168,186],"involving":[157],"quasi-periodic":[158],"randomized":[159],"scheduling":[160],"identity":[162],"changes.":[163],"our":[167],"ensures":[169],"timed-sequence":[170],"indistinguishability":[171],"thereby":[174],"enhancing":[175],"Additionally,":[179],"show":[181],"how":[182],"integrate":[184],"attacked":[189],"system":[190],"while":[191],"essentially":[192],"preserving":[193],"its":[194],"feasibility":[195],"utility,":[197],"crucial":[200],"practical":[202],"industrial":[203],"adoption.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-09T07:00:12.390032","created_date":"2025-10-10T00:00:00"}
