Detailed Information

Cited 2 time in webofscience Cited 2 time in scopus
Metadata Downloads

Neutralizing BLE Beacon-based Electronic Attendance System using Signal Imitation Attack

Full metadata record
DC Field Value Language
dc.contributor.authorKim, M.-
dc.contributor.authorLee, J.-
dc.contributor.authorPaek, J.-
dc.date.available2019-03-08T06:57:17Z-
dc.date.issued2018-12-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/3338-
dc.description.abstractMany emerging location- or proximity-based applications use Bluetooth Low Energy (BLE) beacons thanks to the increasing popularity of the technology in mobile systems. An outstanding example is the BLE beacon-based electronic attendance system (BEAS) used in many universities today to increase the efficiency of lectures. Despite its popularity and usefulness, however, BEAS has not been thoroughly analyzed for its potential vulnerabilities. In this paper, we neutralize a university’s BEAS by maliciously cheating attendance (i.e. faking attendance while the subject is not physically present at the location) in various scenarios using signal imitation attack, and investigate its possible vulnerabilities. The BEAS exploited in this work is a commercial system actually used in a well-known university. After the exploitation experiment, we analyze the system’s weaknesses and present possible counter-measures. Furthermore, additional attack methods are shown to re-counteract those possible counter-measures and to discuss the fundamental challenges, deficiencies, and suggestions in electronic attendance systems using BLE beacons. OAPA-
dc.format.extent10-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleNeutralizing BLE Beacon-based Electronic Attendance System using Signal Imitation Attack-
dc.typeArticle-
dc.identifier.doi10.1109/ACCESS.2018.2884488-
dc.identifier.bibliographicCitationIEEE Access, v.6, pp 77921 - 77930-
dc.description.isOpenAccessN-
dc.identifier.wosid000454606700001-
dc.identifier.scopusid2-s2.0-85057814388-
dc.citation.endPage77930-
dc.citation.startPage77921-
dc.citation.titleIEEE Access-
dc.citation.volume6-
dc.type.docTypeArticle in Press-
dc.publisher.location미국-
dc.subject.keywordAuthorProximity-based application-
dc.subject.keywordAuthorelectronic attendance systems-
dc.subject.keywordAuthorBluetooth low energy-
dc.subject.keywordAuthorBLE beacon-
dc.subject.keywordAuthorvulnerability analysis-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Software > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Paek, Jeong Yeup photo

Paek, Jeong Yeup
소프트웨어대학 (소프트웨어학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE