Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs

被引:40
|
作者
Alrabady, AL [1 ]
Mahmud, SM [1 ]
机构
[1] Wayne State Univ, Dept Elect & Comp Engn, Detroit, MI 48202 USA
关键词
dictionary attack; keyless entry; passive-entry vehicles; rolling code; scan attack; vehicle security;
D O I
10.1109/TVT.2004.838829
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Remote control of vehicle functions using a handheld electronic device became a popular feature for vehicles. Such functions include, but are not limited to, locking, unlocking, remote start, window closures, and activation of an alarm. As consumers enjoy the remote access and become more comfortable with the remote functions, original equipment manufacturers (OEMs) have started looking for new features to simplify and reduce the user interface for vehicle access. These new features will provide users with an additional level. of comfort without requiring them to touch or press any button on any remote devices to gain access to the vehicle. While this extra level of comfort is a desirable feature, it introduces several security threats against the vehicle's keyless-entry system. This paper describes a number of attacks against the security-of keyless-entry systems of vehicles and also presents analyzes of several attacks and. compares the vulnerability of the system under different attacks. At the end, some suggestions for improved design are proposed.
引用
收藏
页码:41 / 50
页数:10
相关论文
共 50 条
  • [41] Analysis and Simulation of Cyber Attacks Against Connected and Autonomous Vehicles
    Malik, Shahida
    Sun, Weiqing
    2020 INTERNATIONAL CONFERENCE ON CONNECTED AND AUTONOMOUS DRIVING (METROCAD 2020), 2020, : 62 - 70
  • [42] Reflective Adversarial Attacks against Pedestrian Detection Systems for Vehicles at Night
    Chen, Yuanwan
    Wu, Yalun
    Cui, Xiaoshu
    Li, Qiong
    Liu, Jiqiang
    Niu, Wenjia
    SYMMETRY-BASEL, 2024, 16 (10):
  • [43] Cyber Security in Industrial Control Systems: Analysis of DoS Attacks against PLCs and the Insider Effect
    Ylmaz, Ercan Nurcan
    Ciylan, Bunyamin
    Gonen, Serkan
    Sindiren, Erhan
    Karacayilmaz, Gokce
    2018 6TH INTERNATIONAL ISTANBUL SMART GRIDS AND CITIES CONGRESS AND FAIR (ICSG ISTANBUL 2018), 2018, : 81 - 85
  • [44] Modeling and Security Analysis of Attacks on Machine Learning Systems
    Singhal, Anoop
    PROCEEDINGS OF THE 10TH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2024, 2024, : 1 - 2
  • [45] Security analysis and fault detection against stealthy replay attacks
    Zaman, Amirreza
    Safarinejadian, Behrouz
    Birk, Wolfgang
    INTERNATIONAL JOURNAL OF CONTROL, 2022, 95 (06) : 1562 - 1575
  • [46] Security analysis of drones systems: Attacks, limitations, and recommendations
    Yaacoub, Jean-Paul
    Noura, Hassan
    Salman, Ola
    Chehab, Ali
    INTERNET OF THINGS, 2020, 11
  • [47] Logic Locking With Provable Security Against Power Analysis Attacks
    Sengupta, Abhrajit
    Mazumdar, Bodhisatwa
    Yasin, Muhammad
    Sinanoglu, Ozgur
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (04) : 766 - 778
  • [48] On Reliability and Security of Randomized Detectors Against Sensitivity Analysis Attacks
    El Choubassi, Maha
    Moulin, Pierre
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 273 - 283
  • [49] Provoking Security: Spoofing Attacks against Crypto-Biometric Systems
    Toli, Christina-Angeliki
    Preneel, Bart
    2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2015, : 67 - 72
  • [50] Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
    Apruzzese, Giovanni
    Colajanni, Michele
    Ferretti, Luca
    Marchetti, Mirco
    2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, : 383 - 400