Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication

被引:1
|
作者
Rizvi, Syed [1 ]
Imler, Jarrett [1 ]
Ritchey, Luke [1 ]
Tokar, Michael [1 ]
机构
[1] Penn State Univ, Dept Informat Sci & Technol, Altoona, PA 16601 USA
关键词
CAR security; threats; attacks; authentication; automobile security; Passive Keyless Entry and Start System;
D O I
10.1109/ciss.2019.8692790
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In most produced modern vehicles, Passive Keyless Entry and Start System (PKES), a newer form of an entry access system, is becoming more and more popular. The PKES system allows the consumer to enter within a certain range and have the vehicle's doors unlock automatically without pressing any buttons on the key. This technology increases the overall convenience to the consumer; however, it is vulnerable to attacks known as relay and amplified relay attacks. A relay attack consists of placing a device near the vehicle and a device near the key to relay the signal between the key and the vehicle. On the other hand, an amplified relay attack uses only a singular amplifier to increase the range of the vehicle sensors to reach the key. By exploiting these two different vulnerabilities within the PKES system, an attacker can gain unauthorized access to the vehicle, leading to damage or even stolen property. To minimize both vulnerabilities, we propose a coordinate tracing system with an additional Bluetooth communication channel. The coordinate tracing system, or PKES Forcefield, traces the authorized key's longitude and latitude in real time using two proposed algorithms, known as the Key Bearing algorithm and the Longitude and Latitude Key (LLK) algorithm. To further add security, a Bluetooth communication channel will be implemented. With an additional channel established, a second frequency can be traced within a secondary PKES Forcefield. The LLK Algorithm computes both locations of frequencies and analyzes the results to form a pattern. Furthermore, the PKES Forcefield movement-tracing allows a vehicle to understand when an attacker attempts to transmit an unauthenticated signal and blocks any signal from being amplified over a fixed range.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Multi-Factor Authentication to Systems Login
    ALSaleem, Bandar Omar
    Alshoshan, Abdullah, I
    [J]. 2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1092 - 1095
  • [22] A secure data backup scheme using multi-factor authentication
    Liu, Yining
    Zhong, Qi
    Chang, Liang
    Xia, Zhe
    He, Debiao
    Cheng, Chi
    [J]. IET INFORMATION SECURITY, 2017, 11 (05) : 250 - 255
  • [23] Multi-factor Authentication Using Accelerometers for the Internet-of-Things
    Murphy, Julian
    Howells, Gareth
    McDonald-Maier, Klaus D.
    [J]. 2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 102 - 106
  • [24] Multi-Factor Stateful Authentication using NFC, and Mobile Phones
    Wilder, Vabrice T.
    Gao, Yujing
    Wang, Shuangbao Paul
    Perez, Alfredo J.
    [J]. 2019 IEEE SOUTHEASTCON, 2019,
  • [25] An efficient multi-factor authentication scheme based CNNs for securing ATMs over cognitive-IoT
    Shalaby, Ahmed
    Gad, Ramadan
    Hemdan, Ezz El-Din
    El-Fishawy, Nawal
    [J]. PEERJ COMPUTER SCIENCE, 2021, : 1 - 28
  • [26] Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
    Pietrzak, Krzysztof
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 3 - 15
  • [27] To Discovery The Cloud Services Authentication An Expert Based System Using Multi-Factor Authentication
    Kumar, G. Senthil
    Kandavel, N.
    Madhavan, K.
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1014 - 1016
  • [28] BAuth-ZKP-A Blockchain-Based Multi-Factor Authentication Mechanism for Securing Smart Cities
    Ahmad, Md. Onais
    Tripathi, Gautami
    Siddiqui, Farheen
    Alam, Mohammad Afshar
    Ahad, Mohd Abdul
    Akhtar, Mohd Majid
    Casalino, Gabriella
    [J]. SENSORS, 2023, 23 (05)
  • [29] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [30] Chaotic masking for securing RFID systems against relay attacks
    Malek, Behzad
    Miri, Ali
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1496 - 1508