원문정보
초록
영어
Many applications using the Bluetooth technology for the revitalization of smart phones have emerged, and hacking these applications has caused vulnerability of wireless networks. Bluetooth is authenticated through unique address value of each device. However, hackers can attack the information of unique address value in the process. Despite this situation, many people do not know anything about the attack. To prevent this, experts are encouraging to turn off unused network services. However, in their proposed method, many users cannot perform it properly. Therefore, in this paper, a context-aware based algorithm for prevention of Bluetooth device attack was designed so that users have better security options in any situation for digital signage.
목차
1. Introduction
2. Related Works
2.1. Bluetooth Network Architecture
2.2. Bluetooth Vulnerabilities and Attacks
2.3. Bluetooth Device
2.4. Bluetooth Security Mechanism
2.5. Context-Aware
3. CA-based Algorithm for Information Prevention
3.1. Suggested CAIP Algorithm
3.2. Scenario
4. Conclusion
Acknowledgement
References