Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 조성현 | - |
dc.date.accessioned | 2019-04-29T00:26:05Z | - |
dc.date.available | 2019-04-29T00:26:05Z | - |
dc.date.issued | 2016-10 | - |
dc.identifier.citation | 2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), Page. 1-4 | en_US |
dc.identifier.isbn | 978-1-5090-2743-9 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/document/7804832/ | - |
dc.identifier.uri | https://repository.hanyang.ac.kr/handle/20.500.11754/102791 | - |
dc.description.abstract | In this paper, we introduce a security vulnerability of Bluetooth Low Energy(BLE) and propose an improved security method to solve it. BLE is used to transmit and receive data between nodes such as sensors, wearable devices in the Internet of Things (IoT) environment. However, there is a possibility that an encryption key for communicating between nodes is cracked because of the security vulnerability of BLE. The security vulnerability of BLE is that the length of the Temporary Key (TK) to generate the encryption key is too short. It is a fatal problem in terms of a data security. We describe how an attacker can crack the encryption key through the vulnerability. To solve this problem, we propose an improved security method that increases the length of the TK. In the conventional BLE, the encryption key can be cracked within 20 seconds. But, it may take 600,000,000,000 years when the proposed method is used. Therefore, the proposed method can ensure that it is infeasible to crack the encryption key. | en_US |
dc.description.sponsorship | This work was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (No. NRF-2015R1D1A1A01059473) | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Bluetooth Low Energy | en_US |
dc.subject | Internet of Things | en_US |
dc.subject | Vulnerability | en_US |
dc.title | Bluetooth Low Energy Security Vulnerability and Improvement Method | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICCE-Asia.2016.7804832 | - |
dc.relation.page | 1-4 | - |
dc.contributor.googleauthor | Kwon, G | - |
dc.contributor.googleauthor | Kim, J | - |
dc.contributor.googleauthor | Noh, J | - |
dc.contributor.googleauthor | Cho, S | - |
dc.sector.campus | E | - |
dc.sector.daehak | COLLEGE OF COMPUTING[E] | - |
dc.sector.department | DIVISION OF COMPUTER SCIENCE | - |
dc.identifier.pid | chopro | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.