, Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 5: Preassociation Discovery, IEEE

N. Abedi, A. Bhaskar, and E. Chung, Bluetooth and Wi-Fi MAC address based crowd data collection and monitoring: benefits, challenges and enhancement, 2013.

. Apple, About the security content of iOS 8, pp.2020-2023, 2020.

M. Arapinis, L. Mancini, E. Ritter, M. Ryan, and N. Golde, New privacy issues in mobile telephony: fix and verification, Proceedings of the 2012 ACM conference on Computer and communications security, pp.205-216, 2012.

C. Barnes, F. Verdier, A. Pegatoquet, D. Gaffé, and J. Cottin, Wireless sensor network protocol property validation through the system's simulation in a dedicated framework, 10th International Conference on Signal Processing and Communication Systems (ICSPCS). IEEE, pp.1-9, 2016.

E. Bayse, A. Cavalli, M. Nunez, and F. Zaidi, A passive testing approach based on invariants: application to the WAP, Computer networks, vol.48, pp.247-266, 2005.

K. Johannes, D. Becker, D. Li, and . Starobinski, Tracking Anonymized Bluetooth Devices. Proceedings on Privacy Enhancing Technologies, vol.1, p.17, 2019.

A. Benharref, R. Dssouli, R. Glitho, and M. A. Serhani, Towards the testing of composed web services in 3 rd generation networks, IFIP International Conference on Testing of Communicating Systems, pp.118-133, 2006.

B. Bonné, A. Barzan, P. Quax, and W. Lamotte, WiFiPi: Involuntary tracking of visitors at mass events, 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks, 2013.

, IEEE, pp.1-6

G. Celosia and M. Cunche, Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, MobiQuitous 2019 -16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp.1-10, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02394629

G. Celosia and M. Cunche, Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols, Proceedings on Privacy Enhancing Technologies, vol.2020, pp.26-46, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02394619

G. Combs, Wireshark -The world's foremost and widely-used network protocol analyzer, pp.2020-2023, 1998.

L. Demir, M. Cunche, and C. Lauradoux, Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, pp.39-44, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00968585

K. Fawaz, K. Kim, and K. Shin, Protecting Privacy of BLE Device Users, USENIX Security Symposium, pp.1205-1221, 2016.

J. Freudiger, How talkative is your mobile device?: an experimental study of Wi-Fi probe requests, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, vol.8, 2015.

M. Gruteser and D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis, Mobile Networks and Applications, vol.10, pp.315-325, 2005.

M. Haase and M. Handy, BlueTrack -Imperceptible tracking of bluetooth devices, Ubicomp Poster Proceedings, 2004.

H. Hallal, S. Boroday, A. Ulrich, and A. Petrenko, An automata-based approach to property testing in event traces, IFIP International Conference on Testing of Software and Communicating Systems, pp.180-196, 2003.

Y. Hanna, H. Rajan, and W. Zhang, Slede: a domainspecific verification framework for sensor network security protocol implementations, Proceedings of the first ACM conference on Wireless network security, pp.109-118, 2008.

G. Hogben, Changes to Device Identifiers in Android O, 2017.

, The Store Of The Future: 150+ Startups Transforming Brick-And-Mortar Retail In One Infographic, pp.2020-2023, 2017.

T. Jeron, H. Marchand, S. Pinchinat, and M. Cordier, Supervision patterns in discrete event systems diagnosis, 8th International Workshop on Discrete Event Systems, pp.262-268, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00001113

. Kiminewt, PyShark -Python packet parser using wireshark's tshark, pp.2020-2023, 2020.

E. Constantine, N. Kontokosta, and . Johnson, Urban phenology: Toward a real-time census of the city using Wi-Fi data, Computers, Environment and Urban Systems, vol.64, pp.144-153, 2017.

T. Liebig and A. Wagoum, Modelling Microscopic Pedestrian Mobility using Bluetooth, ICAART, pp.270-275, 2012.

J. Martin, D. Alpuche, K. Bodeman, L. Brown, E. Fenske et al., Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Implementation, 2019.

J. Martin, T. Mayberry, C. Donahue, L. Foppe, L. Brown et al., A study of MAC address randomization in mobile devices and when it fails, Proceedings on Privacy Enhancing Technologies, vol.4, pp.365-383, 2017.

C. Matte, F. Mathieu-cunche, M. Rousseau, and . Vanhoef, Defeating MAC address randomization through timing attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.15-20, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01330476

A. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM conference on embedded network sensor systems, pp.281-294, 2012.

L. Olejnik, Privacy of London Tube Wifi Tracking, pp.2020-2023, 2017.

A. Pfitzmann and M. Hansen, Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology, 2005.

, Android Open Source Project, pp.2020-2023, 2020.

J. Scott-saponas, C. Lester, S. Hartung, T. Agarwal, and . Kohno, Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing, USENIX Security Symposium, pp.55-70, 2007.

S. Bluetooth, Bluetooth Core Specification v4, pp.2020-2023, 2010.

S. Bluetooth, Bluetooth Core Specification v5, vol.2, pp.2020-2023, 2019.

M. Vanhoef, C. Matte, M. Cunche, L. S. Cardoso, and F. Piessens, Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp.413-424, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

M. Versichele, T. Neutens, M. Delafontaine, and N. Van-de-weghe, The use of Bluetooth for analysing spatiotemporal dynamics of human movement at mass events: A case study of the Ghent Festivities, Applied Geography, vol.32, pp.208-220, 2012.

T. Vo-huu, T. Vo-huu, and G. Noubir, Fingerprinting Wi-Fi devices using software defined radios, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.3-14, 2016.