Bijoy Kumar Mandal, Debnath Bhattacharyya, Tai-hoon Kim
언어
영어(ENG)
URL
https://www.earticle.net/Article/A218620
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentially dangerous to the privacy of personal information of user. It is the kind of wireless Ad hoc network. Low cost, low power, low complexity and robustness are the basic features of Bluetooth. It works on Radio frequency. Bluetooth communication range is categorized as high, medium and low depending upon power level. High range of Bluetooth communication is up to 91 meter, medium range is up to 9 meter and low range is up to 1 meter. Bluetooth is a recently proposed protocol for local wireless communication and has become a de facto standard for short-range ad hoc radio connections. Security concern is one of the most important problems delaying the mass adoption of Bluetooth. This article provides a study on the security issues behind the Bluetooth standard. After an overview of the general Bluetooth protocol, a security framework is introduced for the description of the Bluetooth security layout. Then both link-level and service-level security schemes are discussed in detail on the basis of the framework. Some weaknesses of the Bluetooth security strategies are analyzed, together with potential risks and possible attacks against the vulnerabilities. Corresponding countermeasures are also proposed in order to improve the Bluetooth security.
목차
Abstract 1. Introduction 2. Bluetooth Architecture and Protocols 2.1. Radio Frequency (RF) Layers 2.2. Base Band Layer 2.3. Link 2 Manager Protocol (LMP) 2.4. Logical Link Control and Adaptation Protocol (L2CAP) 2.5. Radio Frequency Communication Protocol (RFCOMM) 2.6. Service Discovery Protocol (SDP) 2.7. Telephony Control and Signaling Layer (TCS) 2.8. Application Layer 3. Bluetooth Security 3.1. Basic Definitions 3.2. Modes of Security 3.3. Levels of Security 4. Link Level Security 4.1. Key Management Scheme 4.2. Authentication Scheme 4.3. Encryption Scheme 5. Security Level of Service 6. Vulnerability 7. Conclusion References
키워드
Bluetooth SecurityWPANPDABluetooth ProtocolPiconetRFL2CAPRFCOMMLMP
저자
Bijoy Kumar Mandal [ Department of Computer Science and Engineering, Faculty of Engineering and Technology, NSHM Knowledge Campus – Durgapur, Durgapur-713212, India ]
Debnath Bhattacharyya [ Department of Computer Science and Engineering, Faculty of Engineering and Technology, NSHM Knowledge Campus – Durgapur, Durgapur-713212, India ]
Tai-hoon Kim [ Department of Convergence Security, Sungshin Women's University, 249-1, Dongseon-dong 3- ga, Seoul, 136-742, Korea ]
Corresponding Author
보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Security and Its Applications
간기
격월간
pISSN
1738-9976
수록기간
2008~2016
등재여부
SCOPUS
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.8 No.2