Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs

被引:40
|
作者
Alrabady, AL [1 ]
Mahmud, SM [1 ]
机构
[1] Wayne State Univ, Dept Elect & Comp Engn, Detroit, MI 48202 USA
关键词
dictionary attack; keyless entry; passive-entry vehicles; rolling code; scan attack; vehicle security;
D O I
10.1109/TVT.2004.838829
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Remote control of vehicle functions using a handheld electronic device became a popular feature for vehicles. Such functions include, but are not limited to, locking, unlocking, remote start, window closures, and activation of an alarm. As consumers enjoy the remote access and become more comfortable with the remote functions, original equipment manufacturers (OEMs) have started looking for new features to simplify and reduce the user interface for vehicle access. These new features will provide users with an additional level. of comfort without requiring them to touch or press any button on any remote devices to gain access to the vehicle. While this extra level of comfort is a desirable feature, it introduces several security threats against the vehicle's keyless-entry system. This paper describes a number of attacks against the security-of keyless-entry systems of vehicles and also presents analyzes of several attacks and. compares the vulnerability of the system under different attacks. At the end, some suggestions for improved design are proposed.
引用
收藏
页码:41 / 50
页数:10
相关论文
共 50 条
  • [31] Interdependency Analysis in Security Investment against Strategic Attacks
    Mansooreh Ezhei
    Behrouz Tork Ladani
    Information Systems Frontiers, 2020, 22 : 187 - 201
  • [32] Automatic Security Analysis of EPCBC against Differential Attacks
    Yang, Ping
    ChuankunWu
    WentaoZhang
    ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2017, 107 : 176 - 182
  • [33] Updates on the security of FPGAs against power analysis attacks
    Standaert, F. -X.
    Mace, F.
    Peeters, E.
    Quisquater, J. -J.
    RECONFIGURABLE COMPUTING: ARCHITECTURES AND APPLICATIONS, 2006, 3985 : 335 - 346
  • [34] Interdependency Analysis in Security Investment against Strategic Attacks
    Ezhei, Mansooreh
    Ladani, Behrouz
    INFORMATION SYSTEMS FRONTIERS, 2020, 22 (01) : 187 - 201
  • [35] An analysis of password security risk against dictionary attacks
    Thai, Binh Le Thanh
    Tanaka, Hidema
    2022 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, ISITA, 2022, : 229 - 233
  • [36] Security Analysis of Zipper Hash Against Multicollisions Attacks
    Bagheri, Nasour
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2012, 2 (03) : 226 - 231
  • [37] Reference Project for IT-Security protects Systems against Attacks
    不详
    ATP EDITION, 2016, (1-2): : 9 - 9
  • [38] Sensor deception attacks against security in supervisory control systems
    Yao, Jingshi
    Li, Shaoyuan
    Yin, Xiang
    AUTOMATICA, 2024, 159
  • [39] Security of SCADA Systems Against Cyber-Physical Attacks
    Do, Van Long
    Fillatre, Lionel
    Nikiforov, Igor
    Willett, Peter
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2017, 32 (05) : 28 - 45
  • [40] Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks
    Habib, Sohail
    Khan, Hassan
    Hamilton-Wright, Andrew
    Hengartner, Urs
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (02)