Browse > Article
http://dx.doi.org/10.5762/KAIS.2016.17.8.311

A Dual Security Technique based on Beacon  

Park, Sang-Min (Dept. of Computer Systems and Engineering, Inha Technical College)
Kim, Chul-Jin (Dept. of Computer Systems and Engineering, Inha Technical College)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.17, no.8, 2016 , pp. 311-317 More about this Journal
Abstract
Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.
Keywords
Dual Security; Beacon; 1st Authentication; 2nd Authentication; Encryption;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Jong-Kyung Baek, Jae-Pyo Park, "A study of analysis and improvement of security vulnerability in Bluetooth for data transfer", Journal of the Korea Academia-Industrial cooperation Society, Vol. 12, No. 6 pp. 2801-2806, 2011. DOI: http://dx.doi.org/10.5762/KAIS.2011.12.6.2801   DOI
2 Bluetooth Smart or Version 4.0+ of the Bluetooth specification, https://www.bluetooth.com/what-is-bluetooth-technology/bluetooth-technology-basics/low-energy.
3 Jong-Wuk Son, Kook-rae Cho, Bo-Kyu Jang, "Secure Proximity Service Using Beacon", IEEK(Institute of Embedded Engineering of Korea), Preceeding, 2014.
4 Gi-won Kwon, Sung-hyun Cho, "A Study on the vulnerability of Bluetooth Low Energy Security", KICS(The Korean Institute of Communications and Information Sciences), Winter Preceeding, 2016.
5 Son-Yong Seung, "A Study of Security Model for Bluetooth Environment", Master's Paper of DongGuk University, 2011.
6 iBeacon, http://www.ibeacon.com.
7 Ranging Part of iBeacon, http://en.wikipedia.org/wiki/IBeacon, 2016.
8 TelephonyManager for telephony services on the device, http://developer.android.com/reference/android/telephony/TelephonyManager.html.
9 AsyncTask Instructions, http://tigerwoods.tistory.com/28, 2010.