메뉴 건너뛰기




Volumn , Issue , 2010, Pages

New efficient RF fingerprint-based security solution for bluetooth secure simple pairing

Author keywords

[No Author keywords available]

Indexed keywords

BLUETOOTH DEVICE; BLUETOOTH NETWORKS; INTRUSION DETECTION AND PREVENTION SYSTEMS; RF FINGERPRINTS; SECURE SIMPLE PAIRING; SECURITY SOLUTIONS; SECURITY STANDARDS; SPECIAL INTEREST GROUPS;

EID: 77951757681     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2010.286     Document Type: Conference Paper
Times cited : (7)

References (45)
  • 1
    • 79955113060 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed August 27, 2009]
    • Bluetooth SIG. Bluetooth Specifications 1.0-3.0+HS. [Online]. Available: http://www.bluetooth.com/Bluetooth/Technology/Building/Specifications. [Accessed August 27, 2009].
    • Bluetooth Specifications 1.0-3.0+HS
  • 3
  • 4
  • 5
    • 50049087174 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed August 27, 2009]
    • M. Moser, Busting the Bluetooth Myth - Getting RAW Access. [Online]. Available: http://www.packetstormsecurity.org/papers/wireless/busting-bluetooth- myth.pdf. [Accessed August 27, 2009].
    • Busting the Bluetooth Myth - Getting RAW Access
    • Moser, M.1
  • 9
    • 74549178603 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed August 27, 2009]
    • D. Spill and A. Bittau, BlueSniff Source Codes. [Online]. Available: http://www.cs.ucl.ac.uk/staff/a.bittau/gr-bluetooth.tar.gz. [Accessed August 27, 2009].
    • BlueSniff Source Codes
    • Spill, D.1    Bittau, A.2
  • 11
    • 84935078039 scopus 로고    scopus 로고
    • Security weaknesses in Bluetooth
    • Springer-Verlag
    • M. Jakobsson and S. Wetzel, "Security weaknesses in Bluetooth", Lecture Notes in Computer Science, vol. 2020, pp. 176-191, Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2
  • 12
    • 31344471100 scopus 로고    scopus 로고
    • Man in the middle attacks on Bluetooth
    • Springer-Verlag
    • D. Kügler, "Man in the middle attacks on Bluetooth", Lecture Notes in Computer Science, vol. 2742, pp. 149-161, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2742 , pp. 149-161
    • Kügler, D.1
  • 14
    • 38149072454 scopus 로고    scopus 로고
    • Security Associations in Personal Networks: A Comparative Analysis
    • Springer-Verlag
    • J. Suomalainen, J. Valkonen, and N. Asokan, "Security Associations in Personal Networks: A Comparative Analysis", Lecture Notes in Computer Science, vol. 4572, pp. 43-57, Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4572 , pp. 43-57
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 18
    • 50049124688 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed August 27, 2009]
    • J. Shandle, University Research Aims at More Secure Wi-Fi. [Online]. Available: http://www.eetimes.com/news/latest/showArticle.jhtml?articleID= 192501255. [Accessed August 27, 2009].
    • University Research Aims at More Secure Wi-Fi
    • Shandle, J.1
  • 19
    • 33748995703 scopus 로고    scopus 로고
    • Detecting Impersonation Attacks in Future Wireless and Mobile Networks
    • Springer-Verlag
    • M. Barbeau, J. Hall, and E. Kranakis, "Detecting Impersonation Attacks in Future Wireless and Mobile Networks", Lecture Notes in Computer Science, vol. 4074, pp. 80-95, Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4074 , pp. 80-95
    • Barbeau, M.1    Hall, J.2    Kranakis, E.3
  • 29
    • 0013379958 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed August 27, 2009]
    • NIST/SEMATECH. E-Handbook of Statistical Methods. [Online]. Available: http://www.itl.nist.gov/div898/handbook. [Accessed August 27, 2009].
    • E-Handbook of Statistical Methods
  • 32
    • 0033365847 scopus 로고    scopus 로고
    • Self-Organizing Maps and Learning Vector Quantization for feature sequences
    • P. Somervuo and T. Kohonen, "Self-Organizing Maps and Learning Vector Quantization for Feature Sequences", Neural Processing Letters, vol. 10, no. 2, pp. 151-159, 1999. (Pubitemid 30503364)
    • (1999) Neural Processing Letters , vol.10 , Issue.2 , pp. 151-159
    • Somervuo, P.1    Kohonen, T.2
  • 39
  • 40
    • 77951715301 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed August 27, 2009]
    • The Shmoo Group, Hacking, Moose, Crypto. [Online]. Available: http://www.shmoo.com. [Accessed August 27, 2009].
  • 41
    • 77951743509 scopus 로고    scopus 로고
    • [Online]. Available: [Accessed August 27, 2009]
    • SecuriTeam, BTScanner - Bluetooth Scanner. [Online]. Available: http://www.securiteam.com/tools/6I00P2A8KK.html. [Accessed August 27, 2009].
    • BTScanner - Bluetooth Scanner


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.