A Study on the Security Vulnerability of Bluetooth Low Energy and Improvement Method
- Authors
- 조성현; Kwon, Giwon; Kim, Jeehyeong; Noh, Jaewon
- Issue Date
- Jan-2017
- Publisher
- 대한전자공학회
- Keywords
- Bluetooth Low Energy; Internet of Things; Vulnerability
- Citation
- 2017 International Conference on Electronics, Information, and Communication (ICEIC), pp.763 - 764
- Indexed
- OTHER
- Journal Title
- 2017 International Conference on Electronics, Information, and Communication (ICEIC)
- Start Page
- 763
- End Page
- 764
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/10555
- Abstract
- In this paper, we introduce a security vulnerability of Bluetooth Low Energy(BLE) and propose a n improved security method to solve it . BLE is used to transmit and receive data between nodes such as sensors, wearable devices in the Internet of T hings (IoT) environment. However, there is a possibility that an encryption key for communicating between nodes can be cracked because of the security vulnerability of BLE. The s ecurity vulnerability of BLE is that the length of the Temporary Key (TK) to generate the encryption key is too short. It is a fatal problem in terms of a data security. We describe how an attacke r can crack the encryption key through the vulnerability. To solve this problem, we propose an improved security method that increases the length of the TK. In the conventional BLE, the encryption key can be cracked within 20 sec onds . But, it may take 600, 000,000,000 years when the proposed method is used. Therefore, the proposed method can ensure that it is infeasible to crack the encryption key.
- Files in This Item
-
Go to Link
- Appears in
Collections - COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/10555)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.