5
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System

      1 , 1 , 1
      Journal of Advanced Transportation
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Passive keyless entry and start system has been widely used in modern cars. Car owners can open the door or start the engine merely by having the key in their pocket. PKES was originally designed to establish a communication channel between the car and its key within approximately one meter. However, the channel is vulnerable to relay attacks by which attackers unlock the door even if the key is out of range. Even though relay attacks have been recognized as a potential threat for over ten years, such attacks were thought to be impractical due to highly expensive equipment; however, the required cost is gradually practical. Recently, a relay attack has been demonstrated with equipment being sold only under $100. In this paper, we propose a sound-based proximity-detection method to prevent relay attacks on PKES systems. The sound is eligible to be applied to PKES because audio systems are commonly available in cars. We evaluate our method, considering environments where cars are commonly parked, and present the recording time satisfying both usability and security. In addition, we newly define an advanced attack, called the record-and-playback attack, for sound-based proximity detection, demonstrating that our method is robust to such an attack.

          Related collections

          Most cited references3

          • Record: found
          • Abstract: not found
          • Book: not found

          Major security problems with the ‘unforgeable’ (Feige)–Fiat–Shamir proofs of identity and how to overcome them

          (1988)
            Bookmark
            • Record: found
            • Abstract: not found
            • Book: not found

            Rfid distance bounding protocol with mixed challenges to prevent relay attacks

            (2009)
              Bookmark
              • Record: found
              • Abstract: not found
              • Book: not found

              Keep your enemies close: Distance bounding against smartcard relay attacks

              (2007)
                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                Journal
                Journal of Advanced Transportation
                Journal of Advanced Transportation
                Hindawi Limited
                0197-6729
                2042-3195
                2018
                2018
                : 2018
                : 1-13
                Affiliations
                [1 ]Graduate School of Information Security, Korea University, Seoul, Republic of Korea
                Article
                10.1155/2018/1935974
                6562e71c-5cae-4673-be70-ea74ad407a5e
                © 2018

                http://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article