Browse > Article
http://dx.doi.org/10.6109/jkiice.2016.20.11.2014

Vulnerability Analysis of Bluetooth Communication based on GNU Radio  

Kim, Tae-Yong (Division of Computer Engineering, Dongseo University)
Lee, Hoon-Jae (Division of Computer Engineering, Dongseo University)
Abstract
In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.
Keywords
GNU Radio platform; Access control; Smart door-lock; Power analysis; Protocol analysis; HackRF;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Bluetooth SIG official site. [Internet]. Available: http://www.bluetooth.org/.
2 GNU Radio site. [Internet]. Available: http://gnuradio.org/.
3 T. Y. Kim and D. S. Lee, "System design for access to subway vent based bluetooth smart door-lock," in Proceeding of the 40th Annual Conference of KIICE, pp. 63-65, October 2016.
4 S. T. Bae and J. K. Kim, "IoT development and security paradigm," KISTEP R&D InI, vol. 14, pp. 44-57, 2016.
5 P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Advances in Cryptology, CRYPTO'99, LNCS 1666, pp. 388-397, August 1999.
6 P. Kocher et al., "Introduction to differential power analysis," Journal of Cryptographic Engineering, vol. 1, no. 1, pp. 5-27, April 2006.   DOI
7 Y. G. Park, H. R. Kim, H. J. Lee, D. C. Park, and U. Y. Pak, "A software power analysis countermeasure using secrete intermediate key," Journal of the Korea Institute of Information and Communication Engineering, vol. 17, no. 12, pp.2883-2890, December 2013.   DOI
8 T. Y. Kim and H. J. Lee, "Software power analysis countermeasure using GNU Radio antenna," in Proceeding of the 40th Annual Conference of KIICE, pp. 70-71, October 2016.