Browse > Article
http://dx.doi.org/10.6109/jkiice.2018.22.12.1705

Implementation Wireless Internet Security Connection System Using Bluetooth Beacon in Smart Factory  

Jang, Yun Seong (Dept. of IT Convergence Engineering, Kumoh National Institute of Technology)
Shin, Soo Young (Dept. of IT Convergence Engineering, Kumoh National Institute of Technology)
Abstract
It is currently undergoing the fourth industrial revolution, which is the convergence of ICT and manufacturing, connecting both industrial equipment and production processes to one network and communicating with each other. The fact that they are connected to one network has the advantage of management, but there is a risk of security. In particular, Wi-Fi can be easily accessed by outsiders through a software change of the MAC address or password exposures. In this paper, by applying the method of Beacon using a Bluetooth Low Energy Add in Bluetooth 4.0, we propose a system of black-box approach to secure connections to wireless Internet, users do not have to know the password. We also implemented the proposed system using the raspberry pi and verified the effectiveness of a real-time system by testing the communication.
Keywords
Bluetooth; Beacon; Wi-Fi; Security; Smart Factory;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 M.H. Lee, and A.S. Kim, "Technical model of the Fourth Industrial Revolution, AI+12 Tech," The Journal of The Korean Institute of Communication Sciences, vol. 34, no. 8, pp. 3-8, Aug. 2017.
2 H.S Kim, "Investigation on NFC-based Security System for Smart Work," Journal of Security Engineering, vol. 11, no. 3 (2014), pp. 263-272.   DOI
3 S. Wang, J. Wan, D. Li, and C. Zhang, "Implementing Smart Factory of Industrie 4.0: An Outlook," International Journal of Distributed Sensor Networks, vol. 12, no. 1, pp. 1-10, Jan. 2016.
4 D.W. Kim, S.P. Choi, J.W. Kim, and B.K. Park, "A Study on the Wireless Communication Technology for Smart Factory," Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp. 930-931, 2016.
5 R. Candell, M. Kashef, "Industrial wireless: Problem space, success considerations, technologies, and future direction," 2017 Resilience Week (RWS), pp. 133-139, 2017.
6 T. Heer, O. Kleineberg, The Smart Factory of the Future - Part 2 [Internet]. Available: https://www.belden.com/blog/ndustrial-ethernet/the-smart-factory-of-the-future-part-2.
7 J. P. Tomas, Three smart factory case studies [Internet]. Available: https://enterpriseiotinsights.com/20170830/mart-factory/three-smart-factory-case-studies-tag23-tag99.
8 H.S. Lee. "Embedded System Framework and Its Implementation for Device-to-Device Intelligent Communication of Manufacturing IoT Device considering Smart Factory," Journal of Korean Institute of Intelligent Systems, vol. 27, no. 5, pp. 459-465, Oct. 2017.   DOI
9 J.I. Bang, Industrial Security Strategy in the Age of Smart Factory [Internet]. Available:http://www.industrynews.co.kr/news/articleView.html?idxno=21081.
10 Technitium MAC Address Changer [Internet]. Available: http://technitium.com/tmac/index.html.
11 Bluetooth Alliance, Bluetooth Specifications [Internet]. Available : https://www.bluetooth.com/ko-kr.
12 M.J. Kim. "An Analysis on the Number of Advertisements for Device Discovery in the Bluetooth Low Energy Network," Journal of the Institute of Electronics and Information Engineers, vol. 53, no. 8, pp. 3-12, Aug. 2016.   DOI
13 iBeacon [Internet]. Available : https://developer.apple.com/ibeacon/.
14 Mark up the world using beacons [Internet]. Available: https://developers.google.com/beacons/.
15 D.Y Kim, S.H Kim, and E.H Jin, "The Research on iBeacon technology trend and issue," Korea Computer Congress 2014, pp. 390-392, 2014.
16 How do iBeacons work? [Internet]. Available: http://www.warski.org/blog/2014/01/how-ibeacons-work/.
17 Bluetooth Low Energy Eddystone Beacon Service [Internet]. Available: https://os.mbed.com/teams/Bluetooth-Low-Energy/code/BLE_EddystoneBeacon_Service/.
18 O. Nakhila "Parallel active dictionary attack on wpa2-psk wi-fi networks," Military Communications Conference, MILCOM 2015, pp. 665-670, 2015.
19 V.P. Nambiar, K.H. Muhammad, and M.Z. Muhammad, "Accelerating the AES encryption function in OpenSSL for embedded systems," International Journal of Information and Communication Technology, vol. 2, no. 1-2 , pp. 83-93, Jan. 2009.   DOI
20 K.S Kwon, and K.H. Lee, "Implementation of Home Network Services Using OpenWRT-based Wireless Access Point and Zigbee Communications," Journal of the Korea Institute of Information and Communication Engineering, vol. 22, no. 2, pp. 375-381, Feb. 2018.   DOI
21 M.K. Son, and N.H. Kang, "Design and Implementation of Java Crypto Provider for Android Platform," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 9, pp. 851-858, Sep. 2012.
22 Shrink your code and resources [Internet]. Available: https://developer.android.com/studio/build/shrink-code.html.
23 WiFiManger [Internet]. Available: https://developer.android.com/reference/android/net/wifi/WifiManager.