• Title/Summary/Keyword: 블루네트워크

Search Result 96, Processing Time 0.031 seconds

Development of Voice, Data Integrated Access Point for Ubiquitous Home/Office (유비쿼터스 홈/오피스를 위한 음성, 데이터 통합 액세스 포인트 개발에 관한 연구)

  • Lee Sang-Hak;Kim Dae-Hwan;Chung Tae-Choong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.1
    • /
    • pp.5-14
    • /
    • 2004
  • "언제, 어디에서, 어떤 형태의 접속"도 가능하게 하는 유비쿼터스 네트워크 환경의 실현을 위해 음성, 데이터의 통합은 우선 지원되어야 할 애플리케이션이다. 블루투스는 음성, 데이터의 동시 처리가 가능한 무선 개인 영역 네트워크(WPAN: Wireless Personal Area Network) 표준이다. 저가, 저전력의 무선 통신을 기반으로 휴대폰, 무전 전화기(Cordless Telephone) 의 음성 통화와 노트북, PDA 등의 정보기기의 인터넷 접속을 가능하게 한다. 본 논문에서는 블루투스의 음성, 데이터 통합처리를 구현한 블루투스 액세스 포인트(Access Point)에 대해 기술한다. 근거리 무선 데이터 통신과 유실 네트워크의 연결을 이루어 노트북, PDA 등 단말기의 인터넷 동시 접속을 지원하며 블루투스 폰의 VoIP 통화를 구현하였다. 개발 완료된 시스템의 테스트 결과 다양한 벤더들의 제품들과 호환성을 이루어 표준안을 만족하였으며 성능 면에서 역시 규격에서 제시한 최대치에 근접한 매우 우수함을 나타내었다.

  • PDF

A Bluetooth Scatternet Reformation Algorithm based on Node Types (노드 형태에 따른 블루투스 스캐터넷 재형성 알고리즘)

  • Lee Han Wook;Kauh S. Ken
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.110-122
    • /
    • 2005
  • Bluetooth has been reputed as a wireless networking technology supplying ad-hoc networks between digital devices. In particular, bluetooth scatternet is a most essential part for dynamic ad-hoc networks. But past researches on bluetooth scatternet has hardly treated dynamic scatternet environment. In this paper, we proposed a scatternet reformation algorithm for the case that some nodes escape from the scatternet. The proposed algorithm is a general algorithm which can be applied to many types of bluetooth scatternet regardless of the topology. The proposed algorithm has short reformation time delay because the process has only page process (not including inquiry process ). The algorithm is operated based on Recovery Node Vector which is composed of Recovery Master and Recovery Slave. In this paper, we performed the real hardware experiments for evaluating the performance of the proposed algorithm. In that experiments, we measured the reformation time and reformation probability. In comparison with the case including inquiry process, the proposed algorithm had the improvement in reformation time delay and we obtained high success rate over 97%.

Study on the Security Threats Factors of A Bluetooth Low Energy (저전력 블루투스의 보안 위협 요인들에 관한 연구)

  • Jeon, Jeong Hoo
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.3-9
    • /
    • 2017
  • Recently, Wireless communication has been widely used as a short distance communication medium in various industrial fields as well as communication connection between home appliances due to the appearance of the Internet of Things. And Most commonly used wireless communication media include WiFi, Bluetooth, and NFC. Among them, Bluetooth is widely used for communication between smart devices as well as computer peripheral devices. And Bluetooth in the home network fields is being used to control electronic products. However, since Bluetooth security vulnerabilities are known, more and more attacks are being exploited. As the application range of Bluetooth is expanding, it is necessary to prepare countermeasures accordingly. Therefore, this study investigates the security threat factors of through Bluetooth'attack case and attack technology. And By proposing countermeasures against this problem, we intend to utilize it as data for improving the security of wireless network service in the future.

Design of the Home Network Sonics Using Bluetooth (블루투스를 이용한 홈 네트워크 서비스 설계)

  • 박승성;김종원;이경일;권순량
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.520-522
    • /
    • 2003
  • 최근 이동단말과 인터넷의 비약적인 발전으로 인해 댁 내에서도 냉장고, 세탁기, TV 등과 같은 가전기기들을 효과적으로 제어하는 홈 네트워크에 많은 관심이 모아지고 있다. 홈 네트워크 시스템은 하드웨어부분의 유.무선기술과 서로 다른 가전기기들을 제어할 수 있는 미들웨어 기술 그리고 응용프로그램으로 구성된다. 본 논문에서는 홈 네트워크 무선기술 중에서 블루투스 기반의 홈 네트워크서비스의 설계에 대해서 기술한다.

  • PDF

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF

Implementation of IoT using Raspberry Pi and Bluetooth Serial Communication (라즈베리파이와 블루투스 시리얼 통신을 활용한 IoT 구현)

  • Choi, Jun-hyeong;Choi, Byeong-yoon;Lee, Sung-jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.202-204
    • /
    • 2021
  • The Internet of Things (IoT) is a term first used by Kevin Ashton, director of MIT's Auto ID Center, in 1999, and refers to the connection of things to the Internet. Bluetooth, one of the wireless networks, is a technology developed as an industry standard for personal short-range wireless communication first developed by Ericsson in 1994. Since the Raspberry Pi has Bluetooth built-in, a wireless network is possible. This paper implements a module for the Internet of Things by implementing serial communication in the Bluetooth built-in Raspberry Pi 3 B+. There was a problem that Bluetooth communication was impossible between raspberries, so the discovery function was activated and serial communication was added to successfully link the communication.

  • PDF

Wireless PDA Handoff for Interoperability between Bluetooth and COMA (블루투스와 COMA 연동 무선 PDA 핸드오프)

  • 송재훈;조성배;이상정
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.262-264
    • /
    • 2003
  • 본 논문에서는 광역 및 근거리 우선 접속을 지원하는 PDA상에서 각 무선접속들 간의 상호 연동 및 핸드오프 방안을 설계하고 제시한다. 즉, 근거리 망인 블루투스와 광역 망인 COMA간의 연동 및 핸드오프 방식을 설계 제안하며 이동성과 연결성을 보장한다. 또한 홈 네트워크 상에서 홈 서버와 PDA간의 상호연동 접속 및 핸드오프 방안을 적용하고 테스트한다.

  • PDF

A Study on Scalable Bluetooth Piconet for Secure Ubiquitous (안전한 유비쿼터스를 위한 확장성 있는 블루투스 피코넷에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.13-24
    • /
    • 2005
  • Due to the changes in the wireless information environment, there has been an increased demand for various types of information. Accordingly, many wireless communication technologies have been studied and developed. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new wars of using it. Thus, this research analyzed the vulnerability on the limited number of slaves in a piconet configuration through the current Bluetooth communication and proposed an expanded Bluetooth piconet formation method, regardless of the number of slaves inside the piconet even if it is not configured in a scatternet. In the proposed method, we applied a security service and resolved the vulnerabilities of the current piconet by configuring an expanded form of the current tree-shaped structure.

A Secure Bluetooth Piconet using Non-Anonymous Group Keys (비익명성 그룹키를 이용한 안전한 블루투스 피코넷)

  • 서대희;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.222-232
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth has weaknesses in its suuity features when its in security services are applied to Home networks. The purpose of this study is to propose a safe Bluetooth scenario with an upgraded suity feature. This paper first reviews the general characteristics and security features of Bluetooth together with an analysis of its weaknesses, and presents the formation and maintenance process of Bluetooth piconet what is created by using ECDSA and group key in the ACL(Asynchronous Connection-less Link) connection through a safe Bluetooth inquiry process.

Design of Koinonia Adaptation Layer Simulator for Bluetooth Using OPNET (OPNET을 이용한 블루투스를 위한 Koinonia 적응형 계층 시뮬레이터 설계)

  • 양만석;홍진표;고재진;민수영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.418-420
    • /
    • 2003
  • 본 논문에서는 무선 근거리 네트워크 (Wireless Personal Area Network : WPAN) 환경에서 Koinonia 라는 새로운 시스템을 제안하고 링크계층에 적응형 계층을 추가하여 구성 및 모델링 함으로써 2.4GHz의 ISM 무선 대역을 이용하여 근거리에 위치한 무선 기기들을 연결하고 음성정보 및 데이타를 전송하는 근거리 무선 네트워크 시스템의 시뮬레이터를 구현 함을 목적으로 하였다.

  • PDF