This study presents an in-depth analysis of the security landscape in
Bluetooth Low Energy (BLE) tracking systems, with a particular emphasis on
Apple AirTags and Samsung SmartTags, including their cryptographic frameworks.
Our investigation traverses a wide spectrum of attack vectors such as physical
tampering, firmware exploitation, signal spoofing, eavesdropping, jamming, app
security flaws, Bluetooth security weaknesses, location spoofing, threats to
owner devices, and cloud-related vulnerabilities. Moreover, we delve into the
security implications of the cryptographic methods utilized in these systems.
Our findings reveal that while BLE trackers like AirTags and SmartTags offer
substantial utility, they also pose significant security risks. Notably,
Apple's approach, which prioritizes user privacy by removing intermediaries,
inadvertently leads to device authentication challenges, evidenced by
successful AirTag spoofing instances. Conversely, Samsung SmartTags, designed
to thwart beacon spoofing, raise critical concerns about cloud security and
user privacy. Our analysis also highlights the constraints faced by these
devices due to their design focus on battery life conservation, particularly
the absence of secure boot processes, which leaves them susceptible to OS
modification and a range of potential attacks. The paper concludes with
insights into the anticipated evolution of these tracking systems. We predict
that future enhancements will likely focus on bolstering security features,
especially as these devices become increasingly integrated into the broader IoT
ecosystem and face evolving privacy regulations. This shift is imperative to
address the intricate balance between functionality and security in
next-generation BLE tracking systems