1 |
Wikipedia, Bluetooth [Internet], https://en.wikipedia.org/wiki/Bluetooth.
|
2 |
Tae-ho Kim, iot-wi-fi-bluetooth-z-wave [Internet], http://goodnirvana.blogspot.kr/2015/09/iot-wi-fi-bluetooth-z-wave.html.
|
3 |
Nextdaily, Bluetooth 4.0 [Internet], http://www.nextdaily.co.kr/news/article.html?id=20100616800003.
|
4 |
Bluetooth SIG Proprietary, BLUETOOTH SPECIFICATION Version 4.2, Vol.1, Part A, p.85, 2014.
|
5 |
Bluetooth SIG Proprietary, BLUETOOTH SPECIFICATION Version 4.2, Vol.1, Part A, pp.88-89, 2014.
|
6 |
Haataja, Keijo, and Pekka Toivanen, "Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures," IEEE Transactions on Wireless Communications, Vol.9, Iss.1, pp.384-392, 2010.
DOI
|
7 |
Haataja Keijo, and Pekka Toivanen, "Practical man-in-themiddle attacks against bluetooth secure simple pairing," 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, IEEE, 2008.
|
8 |
Dong-Hoon Lee, "A First Course in Modern Cryptography," seoul: Irun Inc., pp.450-452, 2012.
|
9 |
John Hering, blue snifer rifle [Internet], http://www.smallnetbuilder.com/wireless/wireless-howto/24256-howtobluesniperpt1.
|
10 |
Bluetooth Special Interest Group (SIG), Official Linux Bluetooth protocol stack [Internet], http://www.bluez.org/.
|
11 |
Barnickel, Johannes, Jian Wang, and Ulrike Meyer. "Implementing an attack on bluetooth 2.1+ secure simple pairing in passkey entry mode," 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012.
|