Bluetooth low energy security vulnerability and improvement method

@article{Kwon2016BluetoothLE,
  title={Bluetooth low energy security vulnerability and improvement method},
  author={Giwon Kwon and Jeehyeong Kim and Jaewon Noh and Sunghyun Cho},
  journal={2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)},
  year={2016},
  pages={1-4}
}
In this paper, we introduce a security vulnerability of Bluetooth Low Energy(BLE) and propose an improved security method to solve it. BLE is used to transmit and receive data between nodes such as sensors, wearable devices in the Internet of Things (IoT) environment. However, there is a possibility that an encryption key for communicating between nodes is cracked because of the security vulnerability of BLE. The security vulnerability of BLE is that the length of the Temporary Key (TK) to… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-9 of 9 references

Internet of Things (IoT): A vision, architectural elements, and future directions.

  • Gubbi, Jayavardhana
  • Future Generation Computer Systems
  • 2013
Highly Influential
4 Excerpts

That ‘internet of things

  • Ashton, Kevin
  • thing." RFiD Journal 22.7,
  • 2009
Highly Influential
4 Excerpts

Bluetooth 4.0: an introduction to bluetooth low energy-part I.

  • Galeev, Mikhail
  • EE Times, Design,
  • 2011

Measuring bluetooth low energy power consumption." Texas instruments application note AN092

  • Kamath, Sandeep, Joakim Lindh
  • 2010

" That ‘ internet of things ’ thing

  • Kevin. Ashton
  • 2009

An overview of the Bluetooth wireless technology.

  • Bisdikian, Chatschik
  • IEEE Commun Mag 39.12,
  • 2001

Similar Papers

Loading similar papers…