412 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author조성현-
dc.date.accessioned2019-04-29T00:26:05Z-
dc.date.available2019-04-29T00:26:05Z-
dc.date.issued2016-10-
dc.identifier.citation2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), Page. 1-4en_US
dc.identifier.isbn978-1-5090-2743-9-
dc.identifier.urihttps://ieeexplore.ieee.org/document/7804832/-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/102791-
dc.description.abstractIn this paper, we introduce a security vulnerability of Bluetooth Low Energy(BLE) and propose an improved security method to solve it. BLE is used to transmit and receive data between nodes such as sensors, wearable devices in the Internet of Things (IoT) environment. However, there is a possibility that an encryption key for communicating between nodes is cracked because of the security vulnerability of BLE. The security vulnerability of BLE is that the length of the Temporary Key (TK) to generate the encryption key is too short. It is a fatal problem in terms of a data security. We describe how an attacker can crack the encryption key through the vulnerability. To solve this problem, we propose an improved security method that increases the length of the TK. In the conventional BLE, the encryption key can be cracked within 20 seconds. But, it may take 600,000,000,000 years when the proposed method is used. Therefore, the proposed method can ensure that it is infeasible to crack the encryption key.en_US
dc.description.sponsorshipThis work was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (No. NRF-2015R1D1A1A01059473)en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.subjectBluetooth Low Energyen_US
dc.subjectInternet of Thingsen_US
dc.subjectVulnerabilityen_US
dc.titleBluetooth Low Energy Security Vulnerability and Improvement Methoden_US
dc.typeArticleen_US
dc.identifier.doi10.1109/ICCE-Asia.2016.7804832-
dc.relation.page1-4-
dc.contributor.googleauthorKwon, G-
dc.contributor.googleauthorKim, J-
dc.contributor.googleauthorNoh, J-
dc.contributor.googleauthorCho, S-
dc.sector.campusE-
dc.sector.daehakCOLLEGE OF COMPUTING[E]-
dc.sector.departmentDIVISION OF COMPUTER SCIENCE-
dc.identifier.pidchopro-
Appears in Collections:
COLLEGE OF COMPUTING[E](소프트웨어융합대학) > COMPUTER SCIENCE(소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE