How To Attack A Key Card With A Keycard With A Car Key (For A Car)
|
|
- Owen Leonard
- 3 years ago
- Views:
Transcription
1 Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1
2 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In Practice 3. Passive Keyless Entry and Start Systems 4. Relay Attacks 5. Analysis on 10 Models 6. Conclusion System Security Group 2
3 Modern Cars Evolution Increasing amount of electronics in cars For convenience, security and safety Entertainment Engine control Distance radar TPMS (Usenix Security 2010) Key systems On board computers and networks (S&P 2010) System Security Group 3
4 4 Categories of Key Systems Metallic key Remote active open Immobilizer chips Passive Keyless Entry and Start System Security Group 4
5 Car Keys Active Remote Open Active keys: Press a button to open the car Physical key to start the car Need to be close (<100m) Shared cryptographic key between the key and the car Previous attacks: weak cryptography e.g. Keeloq (Eurocrypt 2008, Crypto 2008, Africacrypt 2009) In Microchip devices System Security Group 5
6 Keys With Immobilizer Chips Immobilizer chips Passive RFID Authorizes to start the engine Close proximity: centimeters Are present in most cars today With metallic key With remote open Shared cryptographic key between the key and the car Previous attacks: weak cryptography e.g. Texas Instruments DST Usenix Security 2005 Security Analysis of a Cryptographically-Enabled RFID Device System Security Group 6
7 Passive Keyless Entry and Start PKES / Smart Key Need to be close (<2m) and the car opens Need to be in the car to start the engine No need for human action on the key Allows to open and start the car System Security Group 7
8 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In Practice 3. Passive Keyless Entry and Start Systems 4. Relay Attacks 5. Analysis on 10 Models 6. Conclusion System Security Group 8
9 Protocol Attacks Replay/forge messages On very badly designed systems Requirements: Eavesdrop messages + ability resend them Only a few messages are sufficient No freshness check Can be reused without the presence of the car owner Allows to create a fake key to open/close/start the car Probably no more present on the market now We found one after market system vulnerable to this attack bought on the internet System Security Group 9
10 Radio Jamming Attacks Requirements: A radio device close to the car Jams the frequency of the key system Thief/device needs to be present while the car is closed Jam the close radio message sent by the key car owner Prevents the car from closing User may notice, or not Does not allow by itself to start the car System Security Group 10
11 Cryptographic Attacks On Active Remote Open and Immobilizer Chips Requirements: Require to eavesdrop messages exchanges Sometimes thousands of exchanges Some require physical access to the key Allows to recover cryptographic key Create a fake key from cryptographic key material System Security Group 11
12 Software Attacks Cars are computer systems: Network of computers Critical systems (brakes, etc.) Entertainment Audio, Video Wireless Networks GSM/3G, Wireless interfaces (TPMS) Complexity brings new security problems IEEE S&P 2010, report : from UC San Diego / Washington University Possible attacks to execute malicious code on the on board computers E.g. Prevent breaking/unexpected breaking Infection from internal bus (ODB II) or remote, wireless interfaces This could lead to theft, forced accidents System Security Group 12
13 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: in practice 3. Passive Keyless Entry and Start Systems 4. Relay Attacks 5. Analysis on 10 models 6. Conclusion System Security Group 13
14 PKES Modes of Operation Normal mode of operation: Uses 2 radio channels Key Car Passive Open and Start Active Remote Open Mode: Button on the key One way messages Key Car Like previous remote active open keys Battery depleted mode Passive RFID bidirectional Key Car Key fob immobilizer chip Like immobilizers: centimeters Metallic key in the key fob System Security Group 14
15 Passive Keyless Entry and Start PKES Need to be close (<2m) and the car opens Need to be in the car to start the engine No need for human action on the key System Security Group 15
16 Passive Keyless Entry and Start (Protocol Sketch) 1. Periodic scan (LF) 2. Acknowledge proximity (UHF) 3. Car ID Challenge (LF) 4. Key Response (UHF) LF ( KHz), UHF ( MHz), (1-2 meters) ( meters) System Security Group 16
17 Internals of a PKES Key 433 MHz Antenna 433MHz radio + MCU 130 khz passive RFID 130KHz Coil antenna System Security Group 17
18 PKES Systems: Summary Cryptographic key authentication with challenge response Replaying old signals impossible Timeouts, freshness Car to Key: inductive low frequency signals Signal strength ~ d -3 Physical proximity Detected by reception of messages Induced in key s antenna The system is vulnerable to relay attacks System Security Group 18
19 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: in practice 3. Passive Keyless Entry and Start Systems 4. Relay Attacks 5. Analysis on 10 models 6. Conclusion System Security Group 19
20 Relay-over-cable Attack on PKES Very low cost attack (~50 ) Independent of model / protocol / cryptography System Security Group 20
21 Physical Layer Relay With Cable System Security Group 21
22 Relay Over the Air Attack 130 KHz 2.5 GHz 130 KHz I R L I R L < 30 cm Tested up to 50 m up to 8 m Higher cost, (1000 s? ) Fast and difficult to detect Independent of model / protocol / cryptography System Security Group 22
23 Physical Layer Wireless Relay 2.5 GHz System Security Group 23
24 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In Practice 3. Passive Keyless Entry and Start Systems 4. Relay Attacks 5. Analysis on 10 Models 6. Conclusion System Security Group 24
25 Analysis on 10 Models Car models with PKES 10 models from 8 manufacturers All use LF/UHF technology None uses the exact same protocol Form recorded traces Some use longer messages Strong crypto? System Security Group 25
26 Relay Over Cable vs. Model Cables 10, 30 and 60m Longer distances Depend on the setup M9 M8 M7 M6 M5 M3 M2 M1 No Amplification Amplification System Security Group Distance [m]
27 Key to Antenna Distance Open - Key to Antenna Distance vs. Model Go - Key to Antenna Distance vs. Model M9 M8 M7 M6 M5 M2 No Amplification Amplification Distance [m] M9 M8 M7 M6 M5 M2 No Amplification Amplification Distance [m] System Security Group 27
28 How Much Delay is Accepted by the Car? The largest possible distance of a relay depends on Accepted delay by the car Speed of radio waves (~ speed of light ) Possibility to relay at higher levels? E.g. relay over IP? To know that we need to delay radio signals Various lengths of cable: not practical Scope/signal generator: too slow Software Defined Radios: still too slow System Security Group 28
29 Inserting a Tunable Delay We used a Software Defined Radio: USRP/Gnuradio Minimum delay 15ms Samples processed by a computer Delays added by the USB bus We modified the USRP s FPGA to add flexible delay No processing on the computer From 5µs to 10ms System Security Group 29
30 Tunable Delay: Data path Minimum delay 15ms Data path : Radio => ADC => USRP => USB => PC => USB => USRP => DAC => Radio USRP s FPGA modification with tunable delays From 5µs to 10ms Buffering samples on the device before replay Data Path : Radio => ADC => FPGA (fifo adds delay) => DAC => Radio System Security Group 30
31 Maximum Accepted Delay vs. Model Maximum Accepted Delay vs. Model 35 µs => 5 Km M10 M9 M8 M7 M6 M5 M4 M2 M Delay [ms] 10 ms => 1500 Km Non physical layer relays difficult with most models System Security Group 31
32 Implications of The Attack Relay on a parking lot One antenna near the elevator Attacker at the car while car owner waits for the elevator Keys in locked house, car parked in front of the house E.g. keys left on the kitchen table Put an antenna close to the window, Open and start the car without entering the house Tested in practice System Security Group 32
33 Additionnal Insights When started the car can be driven away without maintaining the relay It would be dangerous to stop the car when the key is not available anymore Some beep, some limit speed No trace of entry/start Legal / Insurance issues System Security Group 33
34 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In Practice 3. Passive Keyless Entry and Start Systems 4. Relay Attacks 5. Analysis on 10 Models 6. Conclusion System Security Group 34
35 Countermeasures Immediate protection mechanisms Shield the key Remove the battery Seriously reduces the convenience of use Long term Build a secure system that securely verifies proximity e.g. : Realization of RF Distance bounding Usenix Security 2010 Boris Danev/ETHZ created a startup to provide solution to this: 3db Technologies GmbH Based on a low power UWB Transciver System Security Group 35
36 Conclusion This is a simple concept, yet extremely efficient attack Real world use of physical layer relay attacks Relays at physical layer are extremely fast, efficient All tested systems so far are vulnerable Completely independent of Protocols, authentication, encryption Techniques to perform secure distance measurement are required, on a budget Still an open problem System Security Group 36
37 Questions? Contact : Aurélien Francillon aurelien.francillon@inf.ethz.ch Boris Danev bdanev@inf.ethz.ch Srdjan Capkun capkuns@inf.ethz.ch System Security Group 37
38 Relevant Work A Practical Attack on KeeLoq, S. Indesteege, N. Keller, E. Biham, O. Dunkelman, and B. Preneel, EUROCRYPT On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme,T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, M. T. Manzuri Shalmani Crypto 2008 Breaking KeeLoq in a Flash -On Extracting Keys at Lightning Speed-, M. Kasper, T. Kasper, A. Moradi, C. Paar. Africacrypt 2009 Security analysis of a cryptographically-enabled RFID device S. C. Bono, M.Green, A. Stubblefield, A. Juels, USENIX Security 2005 System Security Group 38
39 Relevant Work Experimental Security Analysis of a Modern Automobile Taking Control of Cars From Afar Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Wireless Car Sensors Vulnerable to Hackers System Security Group 39
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
More informationRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
More informationRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Capkun Department of Computer Science ETH Zurich 8092 Zurich, Switzerland {aurelien.francillon,
More informationRFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationSecurity and Privacy of RFID Systems. Claude Castelluccia
Security and Privacy of RFID Systems Claude Castelluccia What is RFID? Radio-Frequency Identification Tag Antenna Chip Holds a small amount of unique data a serial number or other unique attribute of the
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationSecurity and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Presenter: Wenyuan Xu Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh Wenyuan
More informationSpecial Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera
Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Assignment due today Project part 1 due on next Tuesday Assignment 2 will be online today evening 2nd Discussion session
More informationRadio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
More informationSecurity in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com
More informationStrengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More informationIn the first part of the talk, some common location-based security vulnerabilities will be presented. In the second part, the state-of-the-art
In the first part of the talk, some common location-based security vulnerabilities will be presented. In the second part, the state-of-the-art countermeasures will be described. 2/63 GPS tracking for cargoes
More informationFor Auto Locksmit Association only!!! Key Programmer User s Manual
For Auto Locksmit Association only!!! Key Programmer User s Manual BMW CAS1 CAS3 (E60-E64, E65, E7x, E82, E83, E88, E9x,) Key Programmer Version: BMWProg - OBD - v 10.6 - works with ISTA-47 latest 2012
More informationRFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
More informationVideo eavesdropping- RF
Security : Forensic Signal Analysis: MPHIL ACS 2009 Security : Forensic Signal Analysis Video eavesdropping- RF Y.K. Roland Tai 1. Introduction 2. History of TEMPEST 3. Type of RF leakages 4. Counter-measures.
More informationWireless Security: Token, WEP, Cellular
Wireless Security: Token, WEP, Cellular 27 May 2015 Lecture 9 Some slides adapted from Jean-Pierre Seifert (TU Berlin) 27 May 2015 SE 425: Communication and Information Security 1 Topics for Today Security
More informationDesign And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
More informationAdvancements in Wireless Access-Control Security. By Vivien Delport Director of Applications. And
Advancements in Wireless Access-Control Security By Vivien Delport Director of Applications And Cristian Toma Applications Engineer Security, Microcontroller & Technology Development Division Microchip
More informationThe Study on RFID Security Method for Entrance Guard System
The Study on RFID Security Method for Entrance Guard System Y.C. Hung 1, C.W. Tsai 2, C.H. Hong 3 1 Andrew@mail.ncyu.edu.tw 2 s0930316@mail.ncyu.edu.tw 3 chhong@csie.ncyu.edu.tw Abstract: The RFID technology
More informationThe cyber crime threat on mobile devices
The cyber crime threat on mobile devices Chris Mitchell Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK www.chrismitchell.net Abstract This paper is concerned with highlighting recent
More informationVarious Attacks and their Countermeasure on all Layers of RFID System
Various Attacks and their Countermeasure on all Layers of RFID System Gursewak Singh, Rajveer Kaur, Himanshu Sharma Abstract RFID (radio frequency identification) system is one of the most widely used
More informationREAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
More informationWHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
More informationOBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications
OBID RFID by FEIG ELECTRONIC OBID classic / OBID classic-pro RFID Reader Technology for Security Applications OBID RFID Reader Technologies RFID Readers from the number 1 manufacturer FEIG ELECTRONIC specialized
More informationSecurity in RFID Networks and Protocols
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432 International Research Publications House http://www. irphouse.com /ijict.htm Security
More informationGPS Vehicle and personal location tracker. User manual
GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationFrequency Hopping for GSM Base Station Tests with Signal Generators SME
Frequency Hopping for GSM Base Station Tests with Signal Generators SME Application Note 1GPAN28E A. Winter 07.95 Products: Signal Generator SME Software Package SME-K1 Introduction One of the problems
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationSecurity and Privacy of Wireless Implantable Medical Devices
Security and Privacy of Wireless Implantable Medical Devices Security Forum 2013 Hagenberg, 17.04.2013 Dipl.-Ing. Dr. Gregor Koenig Outlook Overview Device Hacking Safety & Utility Goals Security & Privacy
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationSecurity Issues in RFID systems. By Nikhil Nemade Krishna C Konda
Security Issues in RFID systems By Nikhil Nemade Krishna C Konda Agenda Introduction to an RFID System Possible Application Areas Need for Security Vulnerabilities of an RFID system Security Measures currently
More informationWhy WireFree: Wireless Gas Detection System Basics and Benefits
Why WireFree: Wireless Gas Detection System Basics and Benefits Anyone who needs gas detection can benefit from using a wireless system. Whether you re just being introduced to the gas detection market,
More informationRFID Security and Privacy: A Research Survey. Vincent Naessens Studiedag Rabbit project
RFID Security and Privacy: A Research Survey Vincent Naessens Studiedag Rabbit project RFID Security and Privacy: A Research Survey 1. Introduction 2. Security and privacy problems 3. Basic RFID tags 4.
More informationIMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More informationChapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
More information50 ways to break RFID privacy
50 ways to break RFID privacy Ton van Deursen 1 University of Luxembourg ton.vandeursen@uni.lu 1 Financial support received from the Fonds National de la Recherche (Luxembourg). RFID privacy 1 / 40 Outline
More informationInternational Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
More informationPrivacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
More informationZigbee-Based Wireless Distance Measuring Sensor System
Zigbee-Based Wireless Distance Measuring Sensor System Ondrej Sajdl 1, Jaromir Zak 1, Radimir Vrba 1 1 Department of Microelectronics, Brno University of Technology, FEEC, Udolni 53, 602 00 Brno, Czech
More informationTurn-Key Passive Entry/ Passive Start Solution
Turn-Key Passive Entry/ Passive Start Solution Dr. Jedidi Kamouaa Atmel provides a passive entry/ passive start (PEPS) system with a complete set of basic building blocks, including hardware and software.
More informationSecure Active RFID Tag System
Secure Active RFID Tag System Isamu Yamada 1, Shinichi Shiotsu 1, Akira Itasaki 2, Satoshi Inano 1, Kouichi Yasaki 2, and Masahiko Takenaka 2 1 Fujitsu Laboratories Ltd. 64 Nishiwaki, Ohkubo-cho, Akashi
More informationAperio Online System Description
Aperio Online Aperio Online System Description Document No: ST-002326-B, Issue date: 4 August 2015 1 The global leader in Aperio Online Mechanical Installation Guide, Document No: ST-002326-PB, Date: Online
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationMDI FAQ. Version 8.1.0a Page 1 of 16
1. Why does the MDI Explorer show MDI units blinking on and off?...3 2. Will MDI program the same modules as a TECH 2?... 3 3. How and when is a SELF TEST performed on the MDI?... 3 4. What if the MDI
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
More informationRFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
More informationNames of Parts. English 1. Mic. Record Button. Status Indicator Micro SD Card Slot Speaker Micro USB Port Strap Hook
User Manual Names of Parts Record Button Mic Status Indicator Micro SD Card Slot Speaker Micro USB Port Strap Hook Video Mode Photo Mode Local Mode Cloud Mode Mode Button Power Button Tripod Mount Clip
More informationSecurity Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
More informationThe Insights into Car Hacking
The Insights into Car Hacking EEL 6931 Advanced Ethical Hacking Group Project Spring 2014 Mark Bacchus FIU - Computer Engineering Department Florida, United States 2394870 Mbacc001@fiu.edu Maria A. Gutierrez
More informationTX GSM SMS Auto-dial Alarm System. Installation and User Manual
TX GSM SMS Auto-dial Alarm System Installation and User Manual Product Features: 1. 16 wireless zones, 3 wired zones alarm system, suitable for small to medium size offices and homes. 2. The system uses
More informationMANUAL FOR RX700 LR and NR
MANUAL FOR RX700 LR and NR 2013, November 11 Revision/ updates Date, updates, and person Revision 1.2 03-12-2013, By Patrick M Affected pages, ETC ALL Content Revision/ updates... 1 Preface... 2 Technical
More informationACRS 2.0 User Manual 1
ACRS 2.0 User Manual 1 FCC Regulatory Information This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference,
More informationFig 1 Death rate in the last four years
Accident Prevention via Bluetooth Jyotika Kapur Abstract-In India there has been an increase of 17.4% in the total number of road accidents during the period of 2011-2012.This percentage has raised eyebrows
More informationGETTING TO KNOW YOUR PRE-PAID TELSTRA WI-FI 4G
GETTING TO KNOW YOUR PRE-PAID TELSTRA WI-FI 4G LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Pre-Paid Telstra Wi-Fi 4G. This guide will help you get connected as quickly and
More informationQuick Start Guide. Rev. 1.0
Quick Start Guide Rev. 1.0 WARNING TO PREVENT SERIOUS INJURY OR DEATH FROM MOVING GARAGE DOORS OR GATES: DO NOT let children use the Gogogate product and app without adult supervision. ONLY operate your
More informationHow To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
More informationSECURITY OF PASSIVE ACCESS VEHICLE ANSAF IBRAHEM ALRABADY DISSERTATION. Submitted to the Graduate School. of Wayne State University, Detroit, Michigan
SECURITY OF PASSIVE ACCESS VEHICLE by ANSAF IBRAHEM ALRABADY DISSERTATION Submitted to the Graduate School of Wayne State University, Detroit, Michigan in partial fulfillment of the requirements for the
More informationWLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
More informationWUA-0605 300Mbps Wireless USB Network Adapter
WUA-0605 300Mbps Wireless USB Network Adapter User Manual V1.0 Certification FCC CE FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
More informationSix-defense zone Display Alarm System. User Manual
Six-defense zone Display Alarm System User Manual Feature 1. Anti-interfere function. When someone interferes it with same frequency, the control unit will activate siren to alarm. 2. Support anti-decode
More informationOverview. 1. GPS data tracking via GSM SMS / GPRS. 2. GPS data logging in internal memory. 3. Alarm alert via GSM SMS / Dialing / GPRS
Vehicle or Personal Position Tracking Vehicle Status and Speed Tracking Auto Accident Report Global Position System (GPS) Navigation System Anti theft Alarm System Overview 1. GPS data tracking via GSM
More informationWireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationCHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
More informationBluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB
Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB ABSTRACT There is a potential for 50-400 million per year Bluetooth nodes within the car market if Bluetooth can be integrated into
More informationUSER MANUAL V5.0 ST100
GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2
More informationChapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
More information5.8GHz Audio/Video Sender
5.8GHz Audio/Video Sender RF-Link / Araneus USA Inc. 44845 Industrial Dr. Fremont, CA. 94538 U.S.A. Tel: +1-510-4135885~5886 Fax: +1-510-6515995 URL: http://www.rflinkusa.com Design and specification subject
More informationVehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
More informationGuide for Performing a Wireless Site Survey. 2.4 GHz IEEE 802.11g/802.11b/802.15.4
Guide for Performing a Wireless Site Survey 2.4 GHz IEEE 802.11g/802.11b/802.15.4 1 Table of Contents Table of Contents 2 Introduction 3 Wireless Characteristics 3 AMX Site Survey Tools 5 Creating a Channel
More informationLocalization System for Roulette and other Table Games
Localization System for Roulette and other Table Games Christoph Ruland 1 1 University of Siegen, Hoelderlinstrasse 3, D-57076 Siegen/Germany; E-Mail: christoph.ruland@uni-siegen.de Tel.: +49-271-740-2522;
More informationPwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
More information:-------------------------------------------------------Instructor---------------------
Yarmouk University Hijjawi Faculty for Engineering Technology Computer Engineering Department CPE-462 Digital Data Communications Final Exam: A Date: 20/05/09 Student Name :-------------------------------------------------------Instructor---------------------
More informationGETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Pre-Paid 3G Wi-Fi. This guide will help you get connected as quickly and
More informationWIRELESS INSTRUMENTATION TECHNOLOGY
BS&B WIRELESS, L.L.C. BS&B WIRELESS, L.L.C. WIRELESS INSTRUMENTATION TECHNOLOGY Printed February 2004 BS&B WIRELESS, L.L.C. 7422-B East 46th Place, Tulsa, OK74145 Phone: 918-622-5950 Fax: 918-665-3904
More informationBSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
More informationHANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
More informationSecurity/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
More informationREMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN
INTRODUCTION: REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN Remote keyless entry (RKE) has captivated automobile buyers, as evidenced by the popularity of RKE on new automobiles and as an aftermarket item.
More informationWireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 ERDİNÇ YILMAZ 200614038
ÇANKAYA ÜNİVERSİTESİ ECE 491 SENIOR PROJECT I 11111 200614038 1 Project Name : Sensor Network System Project company : ROBUTEL Contact : www.robutel.com Project instructor : Yrd. Doç. Dr. Orhan GAZİ Contact
More informationRFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an
More informationVEHICLE TRACKING ALONG WITH THE ADVANCED RTO TECHNOLOGY
VEHICLE TRACKING ALONG WITH THE ADVANCED RTO TECHNOLOGY PROJECT REFERENCE NO. : 37S1335 COLLEGE : JAIN COLLEGE OF ENGINEERING, BELGAUM BRANCH : ELECTRONICS AND COMMUNICATION GUIDEs : PRAKASH B.B AND AKASH
More informationHorst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
More informationGnuRadio CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: whitepaper@hsc.com web: www.hsc.com
GnuRadio CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: whitepaper@hsc.com web: www.hsc.com PROPRIETARY NOTICE All rights reserved. This publication and its contents are proprietary
More informationVIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
More informationCrestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide
Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide The specific patents that cover Crestron products are listed at patents.crestron.com. Crestron, the Crestron logo,
More informationNames of Parts. English. Mic. Record Button. Status Indicator Micro SD Card Slot Speaker Micro USB Port Strap Hook
User Manual Names of Parts Record Button Mic Status Indicator Micro SD Card Slot Speaker Micro USB Port Strap Hook Video Mode Photo Mode Local Mode Cloud Mode Mode Button Power Button Tripod Mount Clip
More informationOffice Cordless Desktop 2.4GHz FAQ
Office Cordless Desktop 2.4GHz FAQ This document is an FAQ (Frequently Asked Questions) about Logitech Office Cordless Desktop 2.4GHz and about the advanced 2.4GHz wireless technology integrated in this
More information1. What is the main difference between the X3 micro and other Bluetooth headsets? 3. How does the X3 micro use the Bluetooth technology?
X3 Micro FAQ X3 Micro General 1. What is the main difference between the X3 micro and other Bluetooth headsets? 2. What is included in the X3 micro package? 3. How does the X3 micro use the Bluetooth technology?
More informationANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
More informationBusiness Opportunities beyond Ultrabroadband: Proximity Services and LTE direct
Business Opportunities beyond Ultrabroadband: Proximity Services and LTE direct Agenda LTE Direct: concept; Service Logic; Use Cases and Scenario Value Proposition: Domestic market; Tetra Vs LTE Direct;
More information