Vulnerability of Remote Keyless-Entry Systems Against Pulsed Electromagnetic Interference and Possible Improvements

  title={Vulnerability of Remote Keyless-Entry Systems Against Pulsed Electromagnetic Interference and Possible Improvements},
  author={Stefan van de Beek and Frank Leferink},
  journal={IEEE Transactions on Electromagnetic Compatibility},
Remote keyless-entry systems are systems that are widely used to control access to vehicles or buildings. The system is increasingly secured against hacking attacks by use of encryption and code algorithms. However, there are effective hacker attacks that rely on jamming the wireless link from the key fob to the receiver, while the attacker is able to receive the signal from the key fob. In this paper, we show that typical envelope receivers that are often used in remote keyless-entry systems… Expand
On Vehicular Security for RKE and Cryptographic Algorithms: A Survey
RKE, PRKE systems, attacks and threats related to communication channels and study of various symmetric cryptographic algorithms which can be used in the countermeasure of the threats are described. Expand
Key is in the Air: Hacking Remote Keyless Entry Systems
This paper shows how RKS can be exploited to efficiently hijack cars’ locks and specifically designed attack strategies are still effective against them. Expand
Vulnerability analysis of the wireless infrastructure to intentional electromagnetic interference
Contemporary society is greatly dependent upon a set of critical infrastructures (CIs) providing security and quality of life. Electronic systems control the safety-critical functioning of most CIs,Expand
Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems
Security threats and counter measures are discussed for different remote vehicle communication methods namely, remote keyless entry system, dedicated short range communication, cellular scheme, Zigbee, Bluetooth, radio frequency identification, WiFi, WiMAX, and different direct vehicle Communication methods namely on-board diagnosis and universal serial bus. Expand
Cybersecurity challenges in vehicular communications
A three-layer framework (sensing, communication and control) through which automotive security threats can be better understood is proposed, which provides the state-of-the-art review on attacks and threats relevant to the communication layer and presents countermeasures. Expand
Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept
This paper has implemented and conducted attack simulations on two vehicle threat models using a tool called securiCAD and indicates that the approach is useful, Especially if more research of vehicle-specific vulnerabilities, weaknesses, and countermeasures is done in order to provide more accurate analyses and to include this in a more tailored vehicle metamodel. Expand
Effects of intentional electromagnetic interference on an adaptive predistortion algorithm
This paper focuses on power amplifiers linearization based on adaptive predistortion and their susceptibility to IEMI and the idea here is to illuminate the power amplifier with an intentional electromagnetic interference while its model coefficients are being processed. Expand
Information Systems Security and Privacy: 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers
This paper presents a decentralized platform for signing and verifying digital documents that is based on the previously presented SPROOF platform and additionally supports attribute-based authentication. Expand
The interconnected wireless world, a major challenge for EM-coexistence
  • F. Leferink
  • Computer Science
  • 2018 IEEE International Symposium on Electromagnetic Compatibility and 2018 IEEE Asia-Pacific Symposium on Electromagnetic Compatibility (EMC/APEMC)
  • 2018
The Electro-Magnetic Diversity as a concept for achieving EM coexistence is described and generic measures to achieve the EM Compatibility, i.e. the required selectivity and low unwanted emission, are given. Expand
Fundamental Limits in Detecting Whether a Signal Has Been Quantized
This paper considers the requirements on the quantizer to keep the quantization from being detected in additive Gaussian noise and proves that if a signal with length $m$ is sent and a uniform quantizer with $b$ quantization bits is employed for recording, it is proved that it is sufficient for the adversary to avoid detection. Expand


Robustness of remote keyless entry systems to intentional electromagnetic interference
Cars equipped with remote keyless entry systems are very vulnerable to electromagnetic interference because of the wireless link. Carrying the encrypted signal between the key fob and the car, it canExpand
Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs
A number of attacks against the security of keyless-entry systems of vehicles are described and analyzes of several attacks are presented and the vulnerability of the system under different attacks are compared. Expand
Robustness of a TETRA Base Station Receiver Against Intentional EMI
Terrestrial trunked radio (TETRA) is a digital radio standard that was developed to meet the needs of professional mobile radio systems. TETRA is vulnerable to intentional electromagneticExpand
Effect of pulsed interference on an ASK receiver
It is shown that the effect of pulsed interference on the threshold estimate is severe, as compared to that for continuous interference, and can be more disruptive than continuous interference on a wireless link. Expand
Jamming and interference vulnerability of IEEE 802.11p
This work has analyzed interference signal approximations for system performance predictions and the impact on the IEEE 802.11p system in terms of bit and packet error probability and packet delays. Expand
Wireless communications - principles and practice
From the Publisher: The indispensable guide to wireless communications—now fully revised and updated! Wireless Communications: Principles and Practice, Second Edition is the definitive modernExpand
Introduction to Analog and Digital Communication
This book primarily focuses on the design of analog and digital communication systems; and has been structured to cater to the second year engineering undergraduate students of Computer Science,Expand
Adaption Overhead in Time-Varying Cognitive Radio Channels
  • T. Clancy
  • Computer Science
  • 2008 5th IEEE Consumer Communications and Networking Conference
  • 2008
A basic model for analyzing modulation adaption overhead in a point-to-point cognitive radio link is presented, and how quickly a radio can adapt without that overhead actually causing worse overall performance is examined. Expand
Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars
  • Proc. DEF CON 23, 2015.
  • 2015
Tutorial: Effects of Pulsed Interference, IEEE P802.15
  • Working Group for Wireless Personal Area Networks,
  • 2003