1 |
Jong-Kyung Baek, Jae-Pyo Park, "A study of analysis and improvement of security vulnerability in Bluetooth for data transfer", Journal of the Korea Academia-Industrial cooperation Society, Vol. 12, No. 6 pp. 2801-2806, 2011. DOI: http://dx.doi.org/10.5762/KAIS.2011.12.6.2801
DOI
|
2 |
Bluetooth Smart or Version 4.0+ of the Bluetooth specification, https://www.bluetooth.com/what-is-bluetooth-technology/bluetooth-technology-basics/low-energy.
|
3 |
Jong-Wuk Son, Kook-rae Cho, Bo-Kyu Jang, "Secure Proximity Service Using Beacon", IEEK(Institute of Embedded Engineering of Korea), Preceeding, 2014.
|
4 |
Gi-won Kwon, Sung-hyun Cho, "A Study on the vulnerability of Bluetooth Low Energy Security", KICS(The Korean Institute of Communications and Information Sciences), Winter Preceeding, 2016.
|
5 |
Son-Yong Seung, "A Study of Security Model for Bluetooth Environment", Master's Paper of DongGuk University, 2011.
|
6 |
iBeacon, http://www.ibeacon.com.
|
7 |
Ranging Part of iBeacon, http://en.wikipedia.org/wiki/IBeacon, 2016.
|
8 |
TelephonyManager for telephony services on the device, http://developer.android.com/reference/android/telephony/TelephonyManager.html.
|
9 |
AsyncTask Instructions, http://tigerwoods.tistory.com/28, 2010.
|