Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.3.335

A Secure Monitoring Mechanism for Short Distance Wireless Communication  

Seo, Dae-Hee (순천향대학교 전산학과)
Lee, Im-Yeong (순천향대학교 정보기술공학부)
Abstract
In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth and WLAN which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth and WLAN has weaknesses in its security features when its in real services are applied to m-commerce. The purpose of this study is to propose techniques that affinity considers to item that is non-security enemy who is although there is no public secure division direct connection in peculiar environment of radio environment as well as limitation security enemy of short distance radio communication. Propose secure monitoring techniques for straggling device to user center also applying proposed way to Bluetooth and WLAN that are short distance communication representative technology based on item that is security enemy and item that is rain suity enemy.
Keywords
Wireless Communication; Bluetooth; WLAN; Secure Monitoring;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://www.hldp.org
2 서대희, 이임영, 김해숙, '홈 네트워크에 적용한 블루투스 Security에 관한 연구,' 한국통신학회 하계종합 학술발표회 논문집(상), 제23권 제2호, pp.36-69, 2001
3 서대희, 이임영, 김영백, 김해숙, 'ECC를 이용한 안전한 피코넷에 관한 연구,' 정보처리학회 2001년도 추계학술발표논문집, 제8권 제2호, pp.911-914, 2001   과학기술학회마을
4 Borisov, Goldberg and Wagner, 'Intercepting Mobile Communications : The Insecurity of 802.11,' The proceedings of the Secenth Annual International Conference on Mobile Computing and Networking, July, 2001   DOI
5 최용락, 소우영, 이재광, 이임영, '컴퓨터 통신보안', 도서출판 그린, 2001
6 Bluetooth White Paper, http://www/bluetooth.com
7 Bluetooth Sepcification v1.1, http://www.bluetooth.or.kr
8 CISCO System, Managing Cisco Network Security, Version 2.0, 2001
9 http://www.infoworld.com/articles/hn/xml/02/02/14020214hnwifispec.xml
10 http://www.drizzle.com/~aboba/IEEE/wireless.pdf
11 CISCO System, http://www,cisco.com
12 Univ.of Maryland, http://www.cs.umd.edu/~waa/wireless.pdf.
13 Juha T. Vainio, 'Bluetooth Security,' jssmd, 2000, http://niksula.cs.hut.fi/~jiitv/bluesec.html.
14 Alfred J. Menezes, Paul C. Van Oorschot and Scott A. Vanstone 'HANDBOOK of APPLIED CRYPTOGRAPHY,' CRC
15 Ullgren,T., 'Security in Bluetooth Key management in Bluetooth,' 2001, http://www.cs.huf.fi/Opinnot/Tik-86.174/sectopics.html
16 Jakobsson, M. and Wetzel S, 'Security Weakness in Bluetooth' RSA, 2001, http://www.bell-labs.com/user/markusj/bt.html
17 Stubblefield, Ioannidis and Rubin, 'Using the Fluhrer, Mantin, and Shamir Attack to Break WEP,' AT & T Labs Technical Report TD-4ZCPZZ, Aug, 2001