Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication

被引:1
|
作者
Rizvi, Syed [1 ]
Imler, Jarrett [1 ]
Ritchey, Luke [1 ]
Tokar, Michael [1 ]
机构
[1] Penn State Univ, Dept Informat Sci & Technol, Altoona, PA 16601 USA
关键词
CAR security; threats; attacks; authentication; automobile security; Passive Keyless Entry and Start System;
D O I
10.1109/ciss.2019.8692790
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In most produced modern vehicles, Passive Keyless Entry and Start System (PKES), a newer form of an entry access system, is becoming more and more popular. The PKES system allows the consumer to enter within a certain range and have the vehicle's doors unlock automatically without pressing any buttons on the key. This technology increases the overall convenience to the consumer; however, it is vulnerable to attacks known as relay and amplified relay attacks. A relay attack consists of placing a device near the vehicle and a device near the key to relay the signal between the key and the vehicle. On the other hand, an amplified relay attack uses only a singular amplifier to increase the range of the vehicle sensors to reach the key. By exploiting these two different vulnerabilities within the PKES system, an attacker can gain unauthorized access to the vehicle, leading to damage or even stolen property. To minimize both vulnerabilities, we propose a coordinate tracing system with an additional Bluetooth communication channel. The coordinate tracing system, or PKES Forcefield, traces the authorized key's longitude and latitude in real time using two proposed algorithms, known as the Key Bearing algorithm and the Longitude and Latitude Key (LLK) algorithm. To further add security, a Bluetooth communication channel will be implemented. With an additional channel established, a second frequency can be traced within a secondary PKES Forcefield. The LLK Algorithm computes both locations of frequencies and analyzes the results to form a pattern. Furthermore, the PKES Forcefield movement-tracing allows a vehicle to understand when an attacker attempts to transmit an unauthenticated signal and blocks any signal from being amplified over a fixed range.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential
    Nozaki, Shinnosuke
    Serizawa, Ayumi
    Yoshihira, Mizuho
    Fujita, Masahiro
    Shibata, Yoichi
    Yamanaka, Tadakazu
    Matsuda, Nori
    Ohki, Tetsushi
    Nishigaki, Masakatsu
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 201 - 211
  • [2] Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications
    Ometov, Aleksandr
    Petrov, Vitaly
    Bezzateev, Sergey
    Andreev, Sergey
    Koucheryavy, Yevgeni
    Gerla, Mario
    [J]. IEEE NETWORK, 2019, 33 (02): : 82 - 88
  • [3] Preventing impersonation attacks in MANET with multi-factor authentication
    Glynos, D
    Kotzanikolaou, P
    Douligeris, C
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS, 2005, : 59 - 64
  • [4] Current Multi-factor of Authentication: Approaches, Requirements, Attacks and Challenges
    Mohammed, Ali Hameed Yassir
    Dziyauddin, Rudzidatul Akmam
    Latiff, Liza Abdul
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (01) : 166 - 178
  • [5] Multi-Factor Authentication Using Threshold Cryptography
    Venukumar, Vishnu
    Pathari, Vinod
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1694 - 1698
  • [6] Multi-Factor Authentication as a Service
    Shah, Yogendra
    Choyi, Vinod
    Schmidt, Andreas U.
    Subramanian, Lakshmi
    [J]. 2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 144 - 150
  • [7] MULTI-FACTOR AUTHENTICATION MODELLING
    Dostalek, L.
    Safarik, J.
    [J]. RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2020, (02) : 106 - 116
  • [8] Multi-Factor Authentication: A Survey
    Ometov, Aleksandr
    Bezzateev, Sergey
    Makitalo, Niko
    Andreev, Sergey
    Mikkonen, Tommi
    Koucheryavy, Yevgeni
    [J]. CRYPTOGRAPHY, 2018, 2 (01) : 1 - 31
  • [9] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    [J]. 2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554
  • [10] Multi-Factor Authentication Modeling
    Dostalek, Libor
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446