Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법

Full metadata record
DC Field Value Language
dc.contributor.author한혜경-
dc.contributor.author이병문-
dc.date.accessioned2022-03-16T09:40:15Z-
dc.date.available2022-03-16T09:40:15Z-
dc.date.created2022-03-16-
dc.date.issued2022-02-
dc.identifier.issn1229-7771-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/83734-
dc.description.abstractBLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.-
dc.language한국어-
dc.language.isoko-
dc.publisher한국멀티미디어학회-
dc.relation.isPartOf멀티미디어학회논문지-
dc.titleBLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법-
dc.title.alternativeCountermeasure against MITM attack Integrity Violation in a BLE Network-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass2-
dc.identifier.bibliographicCitation멀티미디어학회논문지, v.25, no.2, pp.221 - 236-
dc.identifier.kciidART002817300-
dc.description.isOpenAccessN-
dc.citation.endPage236-
dc.citation.startPage221-
dc.citation.title멀티미디어학회논문지-
dc.citation.volume25-
dc.citation.number2-
dc.contributor.affiliatedAuthor한혜경-
dc.contributor.affiliatedAuthor이병문-
dc.subject.keywordAuthorBLE-
dc.subject.keywordAuthorMITM attack-
dc.subject.keywordAuthorData Forgery Detection-
dc.subject.keywordAuthorIntegrity Violation-
dc.subject.keywordAuthorDiffie Hellman-
dc.subject.keywordAuthorMessage Authentication Code-
dc.description.journalRegisteredClasskci-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Byung Mun photo

Lee, Byung Mun
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE