• Title/Summary/Keyword: Bluetooth Security

Search Result 115, Processing Time 0.024 seconds

CCC-NSG : A Security Enhancement of the Bluetooth $E_0$Cipher using a Circular-Clock-Controlled Nonlinear Algorithm (CCC-NSG : 순환 클럭 조절된 비선형 알고리즘을 이용한 블루투스 $E_0$암호화시스템의 안전성 개선)

  • Kim, Hyeong-Rag;Lee, Hoon-Jae;Moon, Sang-Jae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7C
    • /
    • pp.640-648
    • /
    • 2009
  • Summation generator with high period and high linear complexity can be easily implemented by a simple hardware or software and it is proper to apply in mobile security system for ubiquitous environments. However the generator has been some weaknesses from Dawson's divided-and-conquer attack, Golic's correlation attack and Meier's fast correlation attack. In this paper, we propose an improved version($2^{128}$security level) of $E_0$algorithm, CVC-NSG(Circular-Clock-Controlled - Nonlinear Summation Generator), which partially replaces LFSRs with nonlinear FSRs and controls the irregular clock to reinforce it's own weaknesses. Finally, we analyze our proposed design in terms of security and performance.

A Study on Deploying Malicious Code with Beacon and Capture Beacon Signal (비콘을 이용한 악성코드 배포 및 비콘 신호 캡처에 관한 연구)

  • Bang, Min-Je;Kim, Yang-U;Lee, Seong-Won;Cho, Teanam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.474-477
    • /
    • 2018
  • 최근 백화점, 편의점, 미술관 등 다양한 장소에서 비콘을 활용하여 매장 내의 고객에게 쿠폰을 제공하거나 관람객에게 작품 설명 등 서비스를 제공하고 있다. 본 논문에서는 비콘을 이용하여 악성코드를 배포했을 때의 위험성을 분석하고 비콘의 신호 캡처를 통하여 비콘의 정보를 파악하는 방법에 대해 연구하였다.

  • PDF

On Research of Certificates Management on Mobile Device (모바일 기기를 이용한 인증서 관리 연구)

  • Nam, Yong-su;Kim, Tae Yong;Jang, Won Tae;Lee, Hun Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.359-362
    • /
    • 2009
  • Qualified certificates in online financial and security transaction area are currently used for authentication of the user. The authorized user's public key certificates are stored in binary; the private key corresponding to the user's public key certificates is encrypted by the user password, and then is stored in a file. But the present management system to access the public certificates in local has some problems. In this study, we propose that the mobile public certificate management application to avoid the exist problems.

  • PDF

Privacy Analysis and Comparison of Pandemic Contact Tracing Apps

  • Piao, Yanji;Cui, Dongyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4145-4162
    • /
    • 2021
  • During the period of epidemic prevention and control, contact tracing systems are developed in many countries, to stop or slow down the progression of COVID-19 contamination. However, the privacy issues involved in the use of contact tracing apps have also attracted people's attention. First, we divide contact tracing techniques into two types: Bluetooth Low Energy (BLE) based and Global Positioning System (GPS) based techniques. In order to clear understand the system structure and its elements, we create data flow diagram (DFD) of each types. Second, we analyze the possible privacy threats contained in various types of contact tracing apps by applying LINDDUN, which is a threat modeling technique for personal information protection. Third, we make a comparison and analysis of various contact tracing techniques from privacy point of view. These studies can facilitate improve tracing and security performance to contact tracing apps through comparisons between different types.

A Study on the Detecting Accuracy of EM Induction Survey Data of Buried Utility (전자유도 탐사를 이용한 지하매설물 탐지 정확도 분석)

  • Kwon, Hyoung-Seok;Choi, Joonho;Hwang, Daejin;Kim, Munjae;Yoon, Jeoungseob
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.73-81
    • /
    • 2008
  • Electromagnetic induction surveys are one of the useful methods to detect the location and buried depth of underground utilities by measuring horizontal and vertical magnetic fields. It can effectively detects single buried utility with the accuracy of within 20 cm. However when another utility is buried near to target one, the accuracy of utility location considerably decreases due to the distortion of magnetic fields caused from adjacent utility. This study shows the ways to verify the location and buried depth of target utility when magnetic fields does not show symmetric distribution due to adjacent another utility. Using Bluetooth wireless communication tools, we developed the way to records measured magnetic fields to handheld PDA. We investigated the criteria for minimum distance of two adjacent utilities to separate the individual responses through field model test.

  • PDF

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

A Study on Smart Door Lock using Internet of Things (IoT를 이용한 스마트 도어락에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.539-544
    • /
    • 2020
  • The research is on progressing to operate digital door lock with the method to guarantee the security and safety in the meantime to use digital door lock conveniently using Internet of Things (IoT) standardizing various service providing technology using IoT in home network currently. In this study, compose home network interconnecting Raspberry-PI and web server reflection this trend and composed the system to control the door lock after connect Arduino substituting converter function. Making Raspberry-PI using dynamic IP address using existing open source easily maintain DNS information and possible to connect internet network in home network ethernet and finally, making the smartphone can control door lock remotely entering designated address after connect the internet. The connection between home network and Arduino is executed by Raspberry-PI and bluetooth pairing as 1:1 and make random user's access to be impossible. Especially, to make open/close the door lock with smartphone not by using password on the keypad or using RFID card is judged as the method increasing the security make random user's access to be impossible and also increased the usefulness making remote control to be possible.

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

NSG : A Security Enhancement of the E0 Cipher Using Nonlinear Algorithm in Bluetooth System (NSG : 비선형 알고리즘을 이용한 블루투스 E0 암호화시스템의 성능 개선)

  • Kim, Hyeong-Rag;Lee, Hun-Jae;Moon, Sang-Jae
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.357-362
    • /
    • 2009
  • Summation generator can be easily made as a simple hardware or software and it's period and linear complexity are very high. So it is appropriate to mobile security system for ubiquitous environment. But it showed us the weakness by Golic's correlation attack and Meier's fast correlation attack. In this paper, we proposed a Nonlinear Summation Generator(NSG), which is improved by using LFSR and NFSR(nonlinear feedback shift register), is different from $E_0$ algorithm which use only LFSR in summation generator. It enhanced nonlinearity and is hard to decipher even though the correlation attack or fast correlation attack. We also analyzed the security aspects and the performances for the proposed algorithm.

Analysis of IoT Security in Wi-Fi 6 (Wi-Fi 6 환경에서의 IoT 보안 분석)

  • Kim, HyunHo;Song, JongGun
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.1
    • /
    • pp.38-44
    • /
    • 2021
  • Wi-Fi provides some low-power connection solutions that other Bluetooth cannot provide, and at the same time brings many benefits. First, there is a potentially higher data rate: it can reach 230mbps. Wi-Fi coverage is also wider than competitors, and its operating frequency is also 5GHz, which is much less congested than 2.4GHz. Finally, it also supports IP networks, which is important if you want to send data to the cloud without complexity. The 802.11ac standard of the previous generation still accounts for most shipments (80.9%) and revenue (76.2%). However, there is a limit to accepting IoT devices that will continue to increase significantly in the future. To solve this problem, the new Wi-Fi 6 standard is expected to be the solution (IEEE 802.11ax) which is quickly becoming the main driving force of the wireless local area network (WLAN) market. According to IDC market research analysts, in the first quarter of 2020, independent access points (APs) supported by Wi-Fi 6 accounted for 11.8% of shipments, but 21.8% of revenue. In this paper, we have compared and analyzed the IoT connectivity, QoS, and security requirements of devices using Wi-Fi 6 network.