© The Institution of Engineering and Technology
In passive keyless entry and start (PKES) systems, the car unlocks or starts the car when the key is in the proximity of the car. In conventional PKES systems, the car determines the physical proximity of the key on the basis of the received signal strength or the round-trip time (RTT). However, the conventional schemes are vulnerable to relay attacks because the relay amplifies the signal and minimises the processing time. A solution to avoid the relay attacks in PKES systems is proposed, where the car verifies the proximity of the key on the basis of the correlation of the channel state information as well as the RTT.
References
-
-
1)
-
1. Ranganathan, A., Capkun, S.: ‘Are we really close? Verifying proximity in wireless systems’, Secur. Priv., 2017, 15, (3), pp. 52–58 (doi: 10.1109/MSP.2017.56).
-
2)
-
6. Kim, G.-H., Lee, K.-H., Kim, S.-S., et al: ‘Vehicle relay attack avoidance methods using RF signal strength’, Commun. Netw. Sci. Res., 2013, 5, pp. 573–577 (doi: 10.4236/cn.2013.53B2103).
-
3)
-
3. Waraksa, T., Fraley, K., Kiefer, R., et al: ‘Passive keyless entry system’. , 1990.
-
4)
-
5. Alrabady, A.I., Mahmud, S.M.: ‘Some attacks against vehicles’ passive entry security systems and their solutions’, Trans. Veh. Technol., 2003, 52, (2), pp. 431–439 (doi: 10.1109/TVT.2003.808759).
-
5)
-
9. Francillon, A., Danev, B., Capkun, S.: ‘Relay attacks on passive keyless entry and start systems in modern cars’. Proc. Network and Distributed System Security (NDSS) Symp., San Diego, CA, USA, February 2011, pp. 1–15.
-
6)
-
4. Hancke, G.P., Mayes, K., Markantonakis, K.: ‘Confidence in smart token proximity: relay attacks revisited’, Comput. Secur., 2009, 28, (7), pp. 615–627 (doi: 10.1016/j.cose.2009.06.001).
-
7)
-
10. Lee, W., Kim, J., Choi, S.-W.: ‘New D2D peer discovery scheme based on spatial correlation of wireless channel’, Trans. Veh. Technol., 2016, 65, (12), pp. 10120–10125 (doi: 10.1109/TVT.2016.2530139).
-
8)
-
2. Alrabady, A.I., Mahmud, S.M.: ‘Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs’, Trans. Veh. Technol., 2005, 54, (1), pp. 41–50 (doi: 10.1109/TVT.2004.838829).
-
9)
-
7. Yang, T., Kong, L., Xin, W., et al: ‘Resisting relay attacks on vehicular passive keyless entry and start systems’. Proc. Int. Conf. Fuzzy Systems and Knowledge Discovery (FSKD), Sichuan, China, May 2012, pp. 2232–2236.
-
10)
-
8. Ólafsdóttir, H., Ranganathan, A., Capkun, S.: ‘On the security of carrier phase-based ranging’. Int. Conf. Cryptographic Hardware and Embedded Systems (CHES), Taipei, Taiwan, September 2017, pp. 490–509.
-
11)
-
6. Premnath, S.N., Jana, S., Croft, J., et al: ‘Secret key extraction from wireless signal strength in real environments’, IEEE Trans. Mob. Comput., 2013, 12, (5), pp. 917–930 (doi: 10.1109/TMC.2012.63).
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2017.4360
Related content
content/journals/10.1049/el.2017.4360
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Correspondence
This article has following corresponding article(s):
in brief