Bluetooth low energy security vulnerability and improvement method
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, Giwon | - |
dc.contributor.author | Kim, Jeehyeong | - |
dc.contributor.author | Noh, Jaewon | - |
dc.contributor.author | Cho, Sunghyun | - |
dc.date.accessioned | 2021-06-22T15:23:56Z | - |
dc.date.available | 2021-06-22T15:23:56Z | - |
dc.date.created | 2021-01-22 | - |
dc.date.issued | 2017-10 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/11648 | - |
dc.description.abstract | In this paper, we introduce a security vulnerability of Bluetooth Low Energy(BLE) and propose an improved security method to solve it. BLE is used to transmit and receive data between nodes such as sensors, wearable devices in the Internet of Things (IoT) environment. However, there is a possibility that an encryption key for communicating between nodes is cracked because of the security vulnerability of BLE. The security vulnerability of BLE is that the length of the Temporary Key (TK) to generate the encryption key is too short. It is a fatal problem in terms of a data security. We describe how an attacker can crack the encryption key through the vulnerability. To solve this problem, we propose an improved security method that increases the length of the TK. In the conventional BLE, the encryption key can be cracked within 20 seconds. But, it may take 600,000,000,000 years when the proposed method is used. Therefore, the proposed method can ensure that it is infeasible to crack the encryption key. © 2016 IEEE. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Bluetooth low energy security vulnerability and improvement method | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Cho, Sunghyun | - |
dc.identifier.doi | 10.1109/ICCE-Asia.2016.7804832 | - |
dc.identifier.scopusid | 2-s2.0-85011019717 | - |
dc.identifier.wosid | 000392398600109 | - |
dc.identifier.bibliographicCitation | 2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016, pp.1 - 4 | - |
dc.relation.isPartOf | 2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016 | - |
dc.citation.title | 2016 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2016 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 4 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Bluetooth | - |
dc.subject.keywordPlus | Cracks | - |
dc.subject.keywordPlus | Energy security | - |
dc.subject.keywordPlus | Internet of things | - |
dc.subject.keywordPlus | Bluetooth low energies (BLE) | - |
dc.subject.keywordPlus | Bluetooth low energies (BTLE) | - |
dc.subject.keywordPlus | Improvement methods | - |
dc.subject.keywordPlus | Internet of thing (IOT) | - |
dc.subject.keywordPlus | Security methods | - |
dc.subject.keywordPlus | Security vulnerabilities | - |
dc.subject.keywordPlus | Vulnerability | - |
dc.subject.keywordPlus | Wearable devices | - |
dc.subject.keywordPlus | Cryptography | - |
dc.subject.keywordAuthor | Bluetooth low energy | - |
dc.subject.keywordAuthor | Internet of things | - |
dc.subject.keywordAuthor | Vulnerability | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/7804832/ | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.