Frying PAN: Dissecting Customized Protocol for Personal Area Network

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 274
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorChoi, Ki Bumko
dc.contributor.authorSon, Yun Mokko
dc.contributor.authorLee, Jang Junko
dc.contributor.authorKim, Su Ryeonko
dc.contributor.authorKim, Yong Daeko
dc.date.accessioned2016-04-18T05:04:08Z-
dc.date.available2016-04-18T05:04:08Z-
dc.date.created2015-11-23-
dc.date.created2015-11-23-
dc.date.issued2015-08-22-
dc.identifier.citation16th International Workshop on Information Security Applications, WISA 2015, pp.300 - 312-
dc.identifier.urihttp://hdl.handle.net/10203/204381-
dc.description.abstractA spoofing attack for a wireless communication system is the most common attack method for unauthorized access and control. IEEE 802.15.4 is a standard that defines only physical and medium access control layers for low rate, low power, and low cost wireless systems. This standard is widely used as lower layers for not only several wireless communication standards but also customized protocols by manufacturers. However, security has not been considered seriously in these customized protocols, due to other important features including efficiency and cost. In this paper, in order to empirically analyze the real world threat in these systems, we chose to study three IEEE 802.15.4 based wireless communication systems as targets. We manually analyzed the customized protocols above IEEE 802.15.4 if there exist vulnerabilities to be exploited. For all three systems, we discover significant vulnerabilities. We implemented a spoofing attack for two targets, and we successfully controlled the targets by our spoofing attack. For the last target, we chose not to run the experiment due to significant safety reasons.-
dc.languageEnglish-
dc.publisherSpringer Verlag-
dc.titleFrying PAN: Dissecting Customized Protocol for Personal Area Network-
dc.typeConference-
dc.identifier.scopusid2-s2.0-84962282516-
dc.type.rimsCONF-
dc.citation.beginningpage300-
dc.citation.endingpage312-
dc.citation.publicationname16th International Workshop on Information Security Applications, WISA 2015-
dc.identifier.conferencecountryKO-
dc.identifier.conferencelocationOcean Suites Hotel, Jeju Island-
dc.identifier.doi10.1007/978-3-319-31875-2_25-
dc.contributor.localauthorKim, Yong Dae-
dc.contributor.nonIdAuthorChoi, Ki Bum-
dc.contributor.nonIdAuthorSon, Yun Mok-
dc.contributor.nonIdAuthorLee, Jang Jun-
dc.contributor.nonIdAuthorKim, Su Ryeon-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0