Utilization and Optimized Implementation of Format Preserving Encryption Algorithm for IoT and BLE Communications |
Lim, Ji-hwan
(Hansung University)
Kwon, Hyuk-dong (Hansung University) Woo, Jae-min (Hansung University) An, Kyu-hwang (Hansung University) Kim, Do-young (Hansung University) Seo, Hwa-jeong (Hansung University) |
1 | M. J. Kim, "An Analysis on the Number of Advertisements for Device Discovery in the Bluetooth Low Energy Network," Journal of the Institute of Electronics and Infornation Engineers, vol. 53, no. 8, pp. 1151-1160, Aug, 2016 |
2 | J. H. Jeon, "Study on the Security Threats Factors of A Bluetooth Low Energy," Journal of the Korea Convergence Security Association, vol. 17, no. 4, pp. 3-9, Oct, 2017 |
3 | Telecommunications Technology Association. TTAK.KO- 12.0275. Format-Preserving Encryption Algorithm FEA [Internet]. Available: https://goo.gl/TVx3Y7 |
4 | C. H. Park, S. Y. Jeong, D. W. Hong and C. H. Seo, "Optimal Implementation of Format Preserving Encryption Algorithm FEA in Various Environments," Journal of the Korea Institute of Information Security & Cryptology, Vol. 28, No. 1, pp. 41-51, Nov, 2017 DOI |
5 | J. H. Lim, G. W. Na, J. M. Woo, and H. J. Seo, "Ransomware Prevention and Steganography Security Enhancement Technology Using Format Preserving Encryption," Journal of the Korea Institute of Information and Communication Engineering, vol. 22, no. 5, pp. 805-811, May, 2018 DOI |
6 | Arduino. Arduino PROGMEM Manual [Internet]. Available: https://www.arduino.cc/reference/en/language/variables/utilities/progmem/ |
7 | Bluetooth. Bluetooth Core Specification Version 5.0 [Internet]. Available: https://goo.gl/44Gbpf |
8 | KISA. BlueBorne Bluetooth attack related security update recommended [Internet]. Available: http://bitly.kr/mKku |
9 | G. W. Kwon, S. H. Cho, "A Study on the vulnerability of Bluetooth Low Energy Security", in Proceeding of the 2016 Winter Conference of the Korean Institute of Communications and Information Sciences, vol. 59, pp.183-184 |