Earticle

현재 위치 Home

A Design Approach for Wireless Communication Security in Bluetooth Network

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJSIA) 바로가기
  • 간행물
    International Journal of Security and Its Applications SCOPUS 바로가기
  • 통권
    Vol.8 No.2 (2014.03)바로가기
  • 페이지
    pp.341-352
  • 저자
    Bijoy Kumar Mandal, Debnath Bhattacharyya, Tai-hoon Kim
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A218620

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of personal information of user. It is the kind of wireless Ad hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. Bluetooth communication range is categorized as high, medium and low depending upon power level. High range of Bluetooth communication is up to 91 meter, medium range is up to 9 meter and low range is up to 1 meter. Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After an overview of the general Bluetooth protocol, a security framework is introduced for the description of the Bluetooth security layout. Then both link-level and service-level security schemes are discussed in detail on the basis of the framework. Some weaknesses of the Bluetooth security strategies are analyzed, together with potential risks and possible attacks against the vulnerabilities. Corresponding countermeasures are also proposed in order to improve the Bluetooth security.

목차

Abstract
 1. Introduction
 2. Bluetooth Architecture and Protocols
  2.1. Radio Frequency (RF) Layers
  2.2. Base Band Layer
  2.3. Link 2 Manager Protocol (LMP)
  2.4. Logical Link Control and Adaptation Protocol (L2CAP)
  2.5. Radio Frequency Communication Protocol (RFCOMM)
  2.6. Service Discovery Protocol (SDP)
  2.7. Telephony Control and Signaling Layer (TCS)
  2.8. Application Layer
 3. Bluetooth Security
  3.1. Basic Definitions
  3.2. Modes of Security
  3.3. Levels of Security
 4. Link Level Security
  4.1. Key Management Scheme
  4.2. Authentication Scheme
  4.3. Encryption Scheme
 5. Security Level of Service
 6. Vulnerability
 7. Conclusion
 References

키워드

Bluetooth Security WPAN PDA Bluetooth Protocol Piconet RF L2CAP RFCOMM LMP

저자

  • Bijoy Kumar Mandal [ Department of Computer Science and Engineering, Faculty of Engineering and Technology, NSHM Knowledge Campus – Durgapur, Durgapur-713212, India ]
  • Debnath Bhattacharyya [ Department of Computer Science and Engineering, Faculty of Engineering and Technology, NSHM Knowledge Campus – Durgapur, Durgapur-713212, India ]
  • Tai-hoon Kim [ Department of Convergence Security, Sungshin Women's University, 249-1, Dongseon-dong 3- ga, Seoul, 136-742, Korea ] Corresponding Author

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Security and Its Applications
  • 간기
    격월간
  • pISSN
    1738-9976
  • 수록기간
    2008~2016
  • 등재여부
    SCOPUS
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.8 No.2

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장