Nothing Special   »   [go: up one dir, main page]

Daza et al., 2019 - Google Patents

LASER: lightweight And SEcure Remote keyless entry protocol (Extended version)

Daza et al., 2019

View PDF
Document ID
12610742422102898787
Author
Daza V
Salleras X
Publication year
Publication venue
arXiv preprint arXiv:1905.05694

External Links

Snippet

Since Remote Keyless Entry (RKE) systems started to be widely used, several vulnerabilities in their protocols have been found. Attacks such as jamming-and-replay attacks and relay attacks are still effective against most recent RKE systems, even when many secure …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Similar Documents

Publication Publication Date Title
US11818681B2 (en) Methods and architectures for secure ranging
EP3425867B1 (en) Communication devices and associated method
EP1882346B1 (en) Communication protocol and electronic communication system, in particular authentication control system, as well as corresponding method
CN111818530A (en) Vehicle, remote device and method for operating vehicle or remote device
EP3861774B1 (en) System and method for authenticating a connection between a user device and a vehicle
Ha et al. A new formal proof model for RFID location privacy
WO2004006535A2 (en) Secure two-message synchronization in wireless networks
KR101675332B1 (en) Data commincaiton method for vehicle, Electronic Control Unit and system thereof
Patel et al. Vehiclechain: Blockchain-based vehicular data transmission scheme for smart city
Patel et al. On the security of remote key less entry for vehicles
KR101284155B1 (en) authentication process using of one time password
CN105187203A (en) Shared secret key establishment method between wireless equipment based on receiving signal intensity
Wagner et al. Take a bite of the reality sandwich: revisiting the security of progressive message authentication codes
Daza et al. LASER: lightweight And SEcure Remote keyless entry protocol (Extended version)
KR20170032210A (en) Data commincaiton method for vehicle, Electronic Control Unit and system thereof
JP7141723B2 (en) Apparatus, system and method for controlling actuators via wireless communication system
Daza et al. Laser: lightweight and secure remote keyless entry protocol
EP3736780A1 (en) A method for remotely controlling features of a device and a remote keyless entry instrument
CN111246412B (en) Method and device for sending positioning information and method and device for verifying sender of positioning information
Sultan et al. A new secure authentication based distance bounding protocol
Gade et al. PAKAMAC: A PUF-based Keyless Automotive Entry System with Mutual Authentication
US20240312272A1 (en) Method for Verifying an Identity of an Electronic Device and Related Device
JP2008217497A (en) Radio communication system communication device, and radio communication method
CN118041395A (en) Adaptive frequency hopping RKE (remote communication equipment) secure communication method, system and equipment and medium
JP2006040225A (en) Wireless lan authentication method and system, radius server, one time id authentication server, client, and authentication program