Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication

被引:1
|
作者
Rizvi, Syed [1 ]
Imler, Jarrett [1 ]
Ritchey, Luke [1 ]
Tokar, Michael [1 ]
机构
[1] Penn State Univ, Dept Informat Sci & Technol, Altoona, PA 16601 USA
关键词
CAR security; threats; attacks; authentication; automobile security; Passive Keyless Entry and Start System;
D O I
10.1109/ciss.2019.8692790
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In most produced modern vehicles, Passive Keyless Entry and Start System (PKES), a newer form of an entry access system, is becoming more and more popular. The PKES system allows the consumer to enter within a certain range and have the vehicle's doors unlock automatically without pressing any buttons on the key. This technology increases the overall convenience to the consumer; however, it is vulnerable to attacks known as relay and amplified relay attacks. A relay attack consists of placing a device near the vehicle and a device near the key to relay the signal between the key and the vehicle. On the other hand, an amplified relay attack uses only a singular amplifier to increase the range of the vehicle sensors to reach the key. By exploiting these two different vulnerabilities within the PKES system, an attacker can gain unauthorized access to the vehicle, leading to damage or even stolen property. To minimize both vulnerabilities, we propose a coordinate tracing system with an additional Bluetooth communication channel. The coordinate tracing system, or PKES Forcefield, traces the authorized key's longitude and latitude in real time using two proposed algorithms, known as the Key Bearing algorithm and the Longitude and Latitude Key (LLK) algorithm. To further add security, a Bluetooth communication channel will be implemented. With an additional channel established, a second frequency can be traced within a secondary PKES Forcefield. The LLK Algorithm computes both locations of frequencies and analyzes the results to form a pattern. Furthermore, the PKES Forcefield movement-tracing allows a vehicle to understand when an attacker attempts to transmit an unauthenticated signal and blocks any signal from being amplified over a fixed range.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] To Discovery The Cloud Services Authentication An Expert Based System Using Multi-Factor Authentication
    Kumar, G. Senthil
    Kandavel, N.
    Madhavan, K.
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 1014 - 1016
  • [32] BAuth-ZKP-A Blockchain-Based Multi-Factor Authentication Mechanism for Securing Smart Cities
    Ahmad, Md. Onais
    Tripathi, Gautami
    Siddiqui, Farheen
    Alam, Mohammad Afshar
    Ahad, Mohd Abdul
    Akhtar, Mohd Majid
    Casalino, Gabriella
    [J]. SENSORS, 2023, 23 (05)
  • [33] Chaotic masking for securing RFID systems against relay attacks
    Malek, Behzad
    Miri, Ali
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1496 - 1508
  • [34] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [35] A Novel Robust Geolocation-Based Multi-Factor Authentication Method for Securing ATM Payment Transactions
    Alabdulatif, Abdullah
    Samarasinghe, Rohan
    Thilakarathne, Navod Neranjan
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (19):
  • [36] Internet Banking Login with Multi-Factor Authentication
    Boonkrong, Sirapat
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (01): : 511 - 535
  • [37] Multi-Factor Authentication in Key Management Systems
    de Souza, Rick Lopes
    Lung, Lau Cheuk
    Custodio, Ricardo Felipe
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 746 - 752
  • [38] A Method of Risk Assessment for Multi-Factor Authentication
    Kim, Jae-Jung
    Hong, Seng-Phil
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (01): : 187 - 198
  • [39] A Systematic Review on Multi-Factor Authentication Framework
    Syahreen, Muhammad
    Hafizah, Noor
    Maarop, Nurazean
    Maslinan, Mayasarah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 1043 - 1050
  • [40] Privacy preserving multi-factor authentication with biometrics
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna
    Modi, Shimon
    Young, Matthew
    Bertino, Elisa
    Elliott, Stephen
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) : 529 - 560