Browse > Article

A Secure Bluetooth Piconet using Non-Anonymous Group Keys  

서대희 (순천향대학교 전산학과)
이임영 (순천향대학교 정보기술공학부)
Abstract
In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth has weaknesses in its suuity features when its in security services are applied to Home networks. The purpose of this study is to propose a safe Bluetooth scenario with an upgraded suity feature. This paper first reviews the general characteristics and security features of Bluetooth together with an analysis of its weaknesses, and presents the formation and maintenance process of Bluetooth piconet what is created by using ECDSA and group key in the ACL(Asynchronous Connection-less Link) connection through a safe Bluetooth inquiry process.
Keywords
Bluetooth; Piconet; Group-Signature;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://www.bluetooth.com (Bluetooth White Paper)
2 http://www.bluetooth.or.kr (Bluetooth Sepcification v1.1)
3 http://www.cs.hut.fi/Opinnot/Tik-86.174/sectopics.html(Ullgren T, 'Security in Bluetooth Key management in Bluetooth,' 2001)
4 http://www.bel-labs.com/user/markusj/bt.html (Jakobsson M and Wetzel S, 'Security Weakness in Bluetooth,' RSA, 2001)
5 E. Hughes, 'An Encrypted Key Transmission Protocol,' presented at the rump session of CRYPTO '94, Aug 1994
6 서대희, 이임영, 김해숙 '홈 네트워크에 적용한 Bluetooth Security에 관한 연구', 한국통신학회 하계 종합학술발표회논문집(상) Vol23, No.2, pp.36-39, 2001
7 서대희, 이임영, 김영백, 김해숙 'ECC를 이용한 안전한 Piconet에 관한 연구', 한국정보처리학회 2001년도 추계발표 논문집, 제 8권 제 2호, pp.911 - 914, 2001   과학기술학회마을
8 최용락, 소우영, 이재광, 이임영 '컴퓨터 통신보안', 도서출판 그린, 2001.2
9 http://www.niksula.cs.hut/fi/~jiitv/bluesec.html (Juha T.Vainio, 'Bluetooth Security,' jssmd 2000)
10 이임영 '전자상거래 보안입문', 생능출판사, 2001
11 Alfred J. Menezes, Paul C.van Oorschot and Scott A. Vanstone 'HANDBOOK of APPLIED CRYPTOGRAPHY', CRC