BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 한혜경 | - |
dc.contributor.author | 이병문 | - |
dc.date.accessioned | 2022-03-16T09:40:15Z | - |
dc.date.available | 2022-03-16T09:40:15Z | - |
dc.date.created | 2022-03-16 | - |
dc.date.issued | 2022-02 | - |
dc.identifier.issn | 1229-7771 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/83734 | - |
dc.description.abstract | BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed. | - |
dc.language | 한국어 | - |
dc.language.iso | ko | - |
dc.publisher | 한국멀티미디어학회 | - |
dc.relation.isPartOf | 멀티미디어학회논문지 | - |
dc.title | BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법 | - |
dc.title.alternative | Countermeasure against MITM attack Integrity Violation in a BLE Network | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 2 | - |
dc.identifier.bibliographicCitation | 멀티미디어학회논문지, v.25, no.2, pp.221 - 236 | - |
dc.identifier.kciid | ART002817300 | - |
dc.description.isOpenAccess | N | - |
dc.citation.endPage | 236 | - |
dc.citation.startPage | 221 | - |
dc.citation.title | 멀티미디어학회논문지 | - |
dc.citation.volume | 25 | - |
dc.citation.number | 2 | - |
dc.contributor.affiliatedAuthor | 한혜경 | - |
dc.contributor.affiliatedAuthor | 이병문 | - |
dc.subject.keywordAuthor | BLE | - |
dc.subject.keywordAuthor | MITM attack | - |
dc.subject.keywordAuthor | Data Forgery Detection | - |
dc.subject.keywordAuthor | Integrity Violation | - |
dc.subject.keywordAuthor | Diffie Hellman | - |
dc.subject.keywordAuthor | Message Authentication Code | - |
dc.description.journalRegisteredClass | kci | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.