Browse > Article
http://dx.doi.org/10.14400/JDC.2015.13.8.331

A study on BLE-based ZEP System Attack Techniques and Countermeasures Utilizing the Convergence of Big data Platform and Monitoring System  

Ahn, Ye-Chan (Dept. of Information and Communication, Baekseok University)
Shin, Young-Hyun (Dept. of Information and Communication, Baekseok University)
Lee, Keun-Ho (Dept. of Information and Communication, Baekseok University)
Publication Information
Journal of Digital Convergence / v.13, no.8, 2015 , pp. 331-336 More about this Journal
Abstract
Lately, the development and utilization of technology of the Internet of Things(IoT), and Fintech have been on the rise and amid the emerging convergence of system and service, mobile payment system and location based service technology have received much attention. Considering the fact that smartphone users are currently utilizing mobile payment frequently, many corporations are introducing various methods to the market for easy payment process of consumers by grafting various technologies, and by utilizing the technology based on BLE technology and location based technology, it is emerging as new method applied to payment service such as ZEP, for easy payment process. And by checking the existence of security threats and studying the attack techniques in these payment services, we strive to suggest a method of response based on big data platform.
Keywords
IoT; Bluetooth Low Energy; Fintech; Zero Effort Payment(ZEP); Big Data; Convergence; Integrated security;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Seong-Hoon Lee, Dong-Woo, "A Study on Internet of Things in IT Convergence Period", The Journal of Digital Convergence, Vol. 12, No. 07.6, pp. 267-272, 2014.   DOI   ScienceOn
2 Kwang-Jae Lee, Keun-Ho Lee, "A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service", The Journal of Digital Convergence, Vol 6, No. 2, p65, 2015
3 Joo-Hyeon Park, Chang Geun Song, "The design of an external Bluetooth device and its library based on WIPI for the short-range wireless communication between cellular phone and smart phone", Korean Society of Computer Game, Vol. 24, No. 1, pp. 53-61, 2011.
4 JongHyun Kim, Kwangsue Chung, "An Efficient Beacon Management Technique for Senor Network-Based Indoor Location Systems", 2009.8
5 David Molnary, Stefan Saroi, AlecWolmany, "Zero-Effort Payments: Design, Deployment, and Lessons", 2014.
6 Jun Young Park, Huy Kang Kim, "A Study on the Implementation of outdoor type Virtual Private Network Gateway for Smart Grid", 2011
7 Lee Hyeonjong, "Use of Bug Data Hadoop platform", J-KICS, Vol. 29, No.11, pp. 43-47, 2012
8 http://ko.wikipedia.org/wiki/hadoop
9 J. W. Lee, S.K. Kim, "Complementary research and Analysis for hadoop" in The Korea Society of Computer and Information Winter Conference 2012, vol. 20, no. 2, pp.3-6, 2012
10 Kim Byung-moon"Design and Implementation of Hadoop-Based Mobile Streaming Application for Personalized Multimedia Service" Ph. M.S dissertation, Sejong University, 2014
11 Hyun-wook Kim, Sung-eun Park, Seong-yul Euh "The Distributed Encryption Processing System for Large Capacity Personal Information based on MapReduce", Vol. 18, No. 3, 2014.
12 Bae Jeong-min "Detection of Keywords in malicious packets using Hadoop MapReduce", 2015
13 ]http://view.asiae.co.kr/news/view.htm?idxno=2014120208403506820
14 Byung-chul Kim, "A study on Utilization of Big Data Based on the Personal Information Protection Act ", Journal of Digital Convergence, Vol.12, no.12 pp. 87-92, 2014   DOI
15 Sung-kyu Cho, Moon-seog Jun, "Privacy Leakage Monitoring System Design for Privacy Protection", Journal of Korea Institute of Information Security and Cryptology, Vol 22, No. 1, pp99-106, 2012