Browse > Article

Study on the Security Threats Factors of A Bluetooth Low Energy  

Jeon, Jeong Hoo (동덕여자대학교/컴퓨터학과)
Publication Information
Abstract
Recently, Wireless communication has been widely used as a short distance communication medium in various industrial fields as well as communication connection between home appliances due to the appearance of the Internet of Things. And Most commonly used wireless communication media include WiFi, Bluetooth, and NFC. Among them, Bluetooth is widely used for communication between smart devices as well as computer peripheral devices. And Bluetooth in the home network fields is being used to control electronic products. However, since Bluetooth security vulnerabilities are known, more and more attacks are being exploited. As the application range of Bluetooth is expanding, it is necessary to prepare countermeasures accordingly. Therefore, this study investigates the security threat factors of through Bluetooth'attack case and attack technology. And By proposing countermeasures against this problem, we intend to utilize it as data for improving the security of wireless network service in the future.
Keywords
Low Energy Bluetooth; Internet of Things; Home networking; Beacon; Security threats factors; Smart Devices; Wireless network service;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 http://blog.skhynix.com/1860, "혁신적인 기술도 무장한 블루투스5.0", SK Hynix 하이라이트, 2016.9.6.
2 http://smartblog.kt.com/5892, "블루투스 5.0이 가져올 일상의 새로운 변화", KT 스마트 블로그, 2017.01.11.
3 전정훈, "사물인터넷 기술동향과 전망에 관한 연구," 융합보안학회, vol.14, no.7, 2014.12
4 강동호 외 2인, "블루투스 보안 기술," 정보통신연구진흥원, 주간기술동향 no.1380, 2009.1
5 유종덕, 이구연, "블루투스 인증 과정에서 보안상의 취약점 분석 및 개선방안에 관한 연구," 한국통신학회, 학술회지 하계 상, pp32-35, 2001.7
6 백종경, 박재표, "블루투스 환경에서 데이터 전송시 보안 취약점 분석 및 개선 방안 관련 연구," 한국산학기술학회논문지, vol.12, no.6, 2011.6
7 김승일외 2인, "저전력 블루투스(BLE) 비콘보안 취약점 연구." 정보보호학회지, vol.26, no36, 2016.6
8 http://macnews.tistory.com/4198, "무선 주변장치 취약점 이용한 신종 해킹 수법 발견. '로지텍.마이크로소프트.델 무선 마우스 및 키보드 제품 20여종'," 2016.2.25.
9 https://phoenixts.com/blog/hacking-bluetooth-devices-bluebugging-bluesnarfing-bluejacking/ "Bluetooth Device attack"
10 Saurabh Dhuri, "Bluetooth Attack and Security," International Journal of Current Trends in Engin eering & Research(IJCTER), vol.3, no.6, pp.76-81, 2017.6
11 남서울대학교 산학협력단, "사물인터넷시대의 개인정보 침해요인 분석 및 실제사례 조사," 개인정보보호위원회, 2015.12