Daza et al., 2019 - Google Patents
LASER: lightweight And SEcure Remote keyless entry protocol (Extended version)Daza et al., 2019
View PDF- Document ID
- 12610742422102898787
- Author
- Daza V
- Salleras X
- Publication year
- Publication venue
- arXiv preprint arXiv:1905.05694
External Links
Snippet
Since Remote Keyless Entry (RKE) systems started to be widely used, several vulnerabilities in their protocols have been found. Attacks such as jamming-and-replay attacks and relay attacks are still effective against most recent RKE systems, even when many secure …
- 238000004891 communication 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11818681B2 (en) | Methods and architectures for secure ranging | |
EP3425867B1 (en) | Communication devices and associated method | |
EP1882346B1 (en) | Communication protocol and electronic communication system, in particular authentication control system, as well as corresponding method | |
CN111818530A (en) | Vehicle, remote device and method for operating vehicle or remote device | |
EP3861774B1 (en) | System and method for authenticating a connection between a user device and a vehicle | |
Ha et al. | A new formal proof model for RFID location privacy | |
WO2004006535A2 (en) | Secure two-message synchronization in wireless networks | |
KR101675332B1 (en) | Data commincaiton method for vehicle, Electronic Control Unit and system thereof | |
Patel et al. | Vehiclechain: Blockchain-based vehicular data transmission scheme for smart city | |
Patel et al. | On the security of remote key less entry for vehicles | |
KR101284155B1 (en) | authentication process using of one time password | |
CN105187203A (en) | Shared secret key establishment method between wireless equipment based on receiving signal intensity | |
Wagner et al. | Take a bite of the reality sandwich: revisiting the security of progressive message authentication codes | |
Daza et al. | LASER: lightweight And SEcure Remote keyless entry protocol (Extended version) | |
KR20170032210A (en) | Data commincaiton method for vehicle, Electronic Control Unit and system thereof | |
JP7141723B2 (en) | Apparatus, system and method for controlling actuators via wireless communication system | |
Daza et al. | Laser: lightweight and secure remote keyless entry protocol | |
EP3736780A1 (en) | A method for remotely controlling features of a device and a remote keyless entry instrument | |
CN111246412B (en) | Method and device for sending positioning information and method and device for verifying sender of positioning information | |
Sultan et al. | A new secure authentication based distance bounding protocol | |
Gade et al. | PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication | |
US20240312272A1 (en) | Method for Verifying an Identity of an Electronic Device and Related Device | |
JP2008217497A (en) | Radio communication system communication device, and radio communication method | |
CN118041395A (en) | Adaptive frequency hopping RKE (remote communication equipment) secure communication method, system and equipment and medium | |
JP2006040225A (en) | Wireless lan authentication method and system, radius server, one time id authentication server, client, and authentication program |