• Title/Summary/Keyword: Bluetooth Security

Search Result 115, Processing Time 0.024 seconds

Security System to use Bluetooth Communication for Home Automation (Bluetooth 통신을 이용한 홈 오토메이션 보안 시스템)

  • Jung, Yun-Hwa;Yoon, Joo-Dae;Ahn, Gwang-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.889-891
    • /
    • 2005
  • 본 논문에서는 주거생활의 안전을 위해 암호화 코드를 포함한 홈 서버를 설계하고, 블루투스 통신을 이용하여 암호화 코드를 송수신하는 시스템을 구현하였다. 제안한 홈 시큐리티 시스템은 적외선 통신이나 무선랜 등 다양한 인터페이스를 활용할 수 있다는 종점을 가진다. 이와 더불어 제안된 보안 시스템은 건물이나 공장, 자동차 등에서도 적용가능하다. 본 논문에서는 홈 오토메이션을 위한 DES 암호화 알고리즘 기반의 디지털 도어 락 시스템을 제안한다. 암호화 코드를 이용하는 보안 시스템을 구성하면 높은 수준의 보안성을 얻을 수 있고, 키의 분배가 용이하다. 제안하는 보안 시스템은 스마트 폰을 키로 이용함으로써 사용자 편이성을 증대시켰다.

  • PDF

A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services

  • Ortega, Juan A.;Fuentes, Daniel;Alvarez, Juan A.;Gonzalez-Abril, Luis;Velasco, Francisco
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1457-1471
    • /
    • 2011
  • A method to detect Trojan horses in messaging and Bluetooth in mobile phones by means of monitoring the events produced by the infections is presented in this paper. The structure of the detection approach is split into two modules: the first is the Monitoring module which controls connection requests and sent/received files, and the second is the Graphical User module which shows messages and, under suspicious situations, reports the user about a possible malware. Prototypes have been implemented on different mobile operating systems to test its feasibility on real cellphone malware. Experimental results are shown to be promising since this approach effectively detects various known malware.

Protocols for service discovery in a Home Network Enviromnents (홈네트워크 환경의 서비스 검색 프로토콜)

  • Kim, Do-Woo;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.856-859
    • /
    • 2005
  • There are various clients, information appliances, sensors in a home network environments. These devices can dynamically join a network, convey its capabilities, and learn about the presence and capabilities of other devices- all automatically. Most of a home network middleware provide the protocols that discovery devices and services. In this paper we look about service discovery protocol and security that is offered in Jini, UPnP, SLP, Bluetooth.

  • PDF

Design and Implementation of Network Self-Configuration Based on Bluetooth (Bluetooth 기반 네트워크 자동형성 설계 및 구현)

  • Kang, Seong-Ho;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1376-1384
    • /
    • 2008
  • Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.

  • PDF

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

A Design of an Energy-saving Doorbell with Blinking Light Function using IoT Technology (IoT 기술을 활용한 에너지 절약형 전등점멸 초인종 설계)

  • You, Ho-Gyun;Kim, Ye-Eun;Kim, Hee-Jeong;Jang, Woo-Hee;Kook, Joongjin;Lee, Kwangjae
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.2
    • /
    • pp.90-93
    • /
    • 2018
  • This paper is a system that visually informs the hearing impaired to visit other people by blinking the light of a room using the IoT(Internet of Things) technology. The system combines the power of home-use lights with low-power IoT devices to provide visual notifications. Using a current sensor, this system can track user location and then turns on and off the light in that room only to save energy. The proposed idea can create a society that is equal to everyone and can live more conveniently.

Research of Home Application Model for Implementation of Home Automation Server

  • Kim, Yu-Chul;Kim, Hyo-Sup;Lee, Guhn-Song;Cho, Young-Jo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.70.2-70
    • /
    • 2001
  • This paper presents an application model for home automation control. In this work, we propose home application scenarios that are suitable for the home life style and design a control structure integrating various home automation functions, such as lightning, heating, cooling, security, fire protection, telemetering, entertainment and communication. State-of-the-art wired/wireless home networks such as Bluetooth, LonWorks, IEEE1394 and PLC(Power Line Communication) are included in the control structure.

  • PDF

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.