Search : [ author: 정현희 ] (3)

A Secure BLE Integration Authentication System for a BLE Device Control Server based on Physical Web and Eddystone

ChoonSung Nam, Hyunhee Jung, Dongryeol Shin

http://doi.org/

Physical Web and Eddystone can be serviced by a single integrated application on the device by using their servers’ URL. However, they have a limitation that their servers must be customized for service characteristics on a case by case basis. In other words, regardless of the service selected for BLE, it should have a modified linkage application for each device. Hence, we think that a new integrated service platform, which is able to link and support its Beacon from the central server and is also able to support its application, is needed for achieving better service quality. This platform consists of push (Broadcasting for Beacon service) parts and pull (Connection) parts to establish communication. Especially, Pull should be operated and controlled under the authorization (secure) management for safe and trustable communication. It means that BLE must have its new authorization communications protocol to protect its data as much as possible. In this paper, we propose a BLE integrated authorization protocol for a BLE device control server based on Physical Web and Eddystone.

BLE-OTP Authorization Mechanism for iBeacon Network Security

Hyunhee Jung, Dongryeol Shin, Kwangsu Cho, Choonsung Nam

http://doi.org/

Machine to Machine (M2M) technology has gained attention due to the fast diffusion of Internet of Things (IoT) technologies and smart devices. Most wireless network experts believe that Bluetooth Low Energy (BLE) Communications technology in an iBeacon network has amazing advantages in terms of providing communication services at a low cost in smartphone applications. Specifically, BLE does not require any pairing process during its communication phases, so it is possible to send a message to any node without incurring additional transmissions costs if they are within the BLE communication range. However, BLE does not require any security verification during communication, so it has weak security. Therefore, a security authorization process would be necessary to obtain customer confidence. To provide security functions for iBeacon, we think that the iBeacon Message Encryption process and a Decryption (Authorization) process should be designed and implemented. We therefore propose the BLE message Authorization Mechanism based on a One Time Password Algorithm (BLE-OTP). The effectiveness of our mechanism is evaluated by conducting a performance test on an attendance system based on BLE-OTP.

A Subway Arrival Notification System Using iBeacon

Hyun-Hee Jung, Choon-Sung Nam, Dong-Ryeol Shin

http://doi.org/

Concurrent with the more widespread usage of smart devices, mobile users’ desires are becoming much more complex. Most IT experts insist that smart devices should have additional functions to satisfy these requirements. In particular, research has concentrated on LBS (Locationbased Service), because it is considered one of the most common mobile service types. Generally, Wi-Fi has a critical limitation for use for LBS services, because it requires new network connection points whenever its location (Network Zone) changes. Unfortunately, GPS also has a systematic problem in providing LBS service in the indoor environment, because of its inaccuracy in processing data. So, to redress these limitations, iBeacon technology has been designed, and is currently used for LBS service instead of Wi-Fi or GPS. By using iBeacon, which is based on Bluetooth 4.0 LE technology, we propose a M-SAS (Mobile-Subway-Alarm-Service System) that could accurately and timely provide its users with various mLBS (micro LBS) services, such as current user location, and subway arrival time.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr