Detailed Information

Cited 0 time in webofscience Cited 2 time in scopus
Metadata Downloads

A Secure Authentication Protocol against the Co-located App Attack in BLE

Full metadata record
DC Field Value Language
dc.contributor.authorAli Raza-
dc.contributor.authorSafiullah Khan-
dc.contributor.authorSeong Oun Hwang-
dc.date.available2020-12-14T02:40:12Z-
dc.date.created2020-11-03-
dc.date.issued2020-10-
dc.identifier.issn2287-5255-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/79265-
dc.description.abstractBluetooth Low Energy (BLE) is used for periodic transmission of smaller data packages called attributes. BLE remains in sleep mode at all times except when participating in a data exchange, which reduces overall energy consumption. For secure communication, BLE devices need to pair first. The pairing has two or three phases. We say two or three phases because the third phase is optional and happens only if the devices are going to bond. The second pairing phase is made using a secure pairing scheme, but the third phase remains vulnerable to an attack named the co-located application (app) attack: a malicious app gets the same level of access to the paired protected data as the legitimate app. We provide an authentication protocol to mitigate this attack. Furthermore, we analyze the security of BLE communications after bonding, with or without our proposed protocol. Moreover, we also analyze the efficiency of the proposed protocol, and conclude that our proposed scheme makes BLE communications secure against the co-located app attack and is efficient enough to be practical.-
dc.language영어-
dc.language.isoen-
dc.publisher대한전자공학회-
dc.relation.isPartOfIEIE Transactions on Smart Processing & Computing-
dc.titleA Secure Authentication Protocol against the Co-located App Attack in BLE-
dc.title.alternativeA Secure Authentication Protocol against the Co-located App Attack in BLE-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.doi10.5573/IEIESPC.2020.9.5.399-
dc.identifier.bibliographicCitationIEIE Transactions on Smart Processing & Computing, v.9, no.5, pp.399 - 404-
dc.identifier.kciidART002638571-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85097232781-
dc.citation.endPage404-
dc.citation.startPage399-
dc.citation.titleIEIE Transactions on Smart Processing & Computing-
dc.citation.volume9-
dc.citation.number5-
dc.contributor.affiliatedAuthorSafiullah Khan-
dc.contributor.affiliatedAuthorSeong Oun Hwang-
dc.subject.keywordAuthorBLE-
dc.subject.keywordAuthorSecure bonding-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorCP-ABE cryptography-
dc.subject.keywordAuthorECC-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hwang, Seong Oun photo

Hwang, Seong Oun
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE