Breaking the Security of Physical Devices
|
|
|
- Loren Martina Parsons
- 10 years ago
- Views:
Transcription
1 Breaking the Security of Physical Devices Dr Silvio Cesare Qualys 1 Introduction Electronics, computers, mobile phones, microcontrollers are ubiquitous devices in the world we live in. These devices, previously disparate things, are now converging. This allows the security researcher who previously only knew about IT security, or the researcher who only knew electronics, to apply their knowledge across a number of devices which share all these atttributes. This whitepaper looks at some of those physical devices that we commonly see and applies a variety of hardware, software, and radio techniques to break their security. The devices in question examined here include: 1. Baby monitors 2. Home alarm systems 3. Automobiles It is hoped that this paper inspires researchers to look at other real-world devices. 2 Eavesdropping on analog Baby Monitors Baby monitors are common. There are a variety of types that exist, such as IP-based baby monitors, or DECT-based baby monitors. A pre-cursor to IP and DECT-based systems is the analog baby monitor which transmits and receives a radio audio signal. Analog baby monitors are easily obtainable and can be quickly found and purchased on E-Bay. A baby monitoring system works by putting in a listening device in a room with the baby. At a specific frequency an audio signal will be continuously transmitted to another room in where a receiver takes the RF signal and emits the audio. Software defined radio (SDR) represents an ideal solution to tackle eavesdropping on an analog baby monitor. Many types of software define radio devices and dongles exist. The Funcube Dongle [1] is one such device. A cheaper device is based around the TV tuner range of SDRs. These SDR dongles cost little more than $15 [2] and can receive but not transmit on a wide range of frequencies.
2 Also required is an antenna and these can be cheaply purchased on E-Bay. The frequency range of SDR devices can be expanded to receive lower frequencies by using an upconverter. An upconverter moves the signals in lower frequency ranges into a frequency range that the SDR dongles can process. One such upconverter is the Ham It Up [3] upconverter. Determining what frequency the baby monitor is transmitting at is done by using a spectrum analyser. Expensive professional devices are available in conjunction with cheaper hobbyist devices. One such inexpensive device is the RF Explorer [4]. What I found was that the analog baby monitor in my possession was transmitting at 40MHz. Now that the transmitting frequency is known, we need to demodulate the signal back to audio. Software spectrum analysers such as HDSDR [5] on Windows or Gqrx [6] on Linux are useful. These programs can both show signal strength and demodulate the signal using AM or FM. All the pieces of the puzzle are complete, and I know that the signal transmitted by the baby monitor is at 40MHz and through testing the different modulation schemes I found that FM modulation was used. The software spectrum analysers produce audio from the baby monitor and it can be heard quite clearly. It is certainly possible to transmit on the baby monitor frequency, but using the cheap SDR dongles we can only receive. Mitigating eavesdropping attacks can be done by upgrading the baby monitors to IP or DECT-based solutions. DECT has known problems also, however implementations of those attacks are not widespread. 3 Disabling and tampering with RF-based home alarm systems Many home alarms available on the market are controlled by a remote control that enables and disables the security systems. Such home alarms can be bought from home depot and home hardware stores and most have remote control functionality. These remote controls use RF and can be analysed using software defined radio. The security on home alarm systems is not high and often used fixed RF codes to enable and disable the system. Fixed codes are susceptible to replay attacks. An attacker listens to the RF signal waiting for the user to disable the system. The attacker captures this signal, and then later when performing the live attack, replays the captured code. The alarm system is then disabled. This attack works on most home alarm systems. The standard frequencies that the keyfobs use are 315MHz and Mhz.
3 The har dware required to do this attack is different to the baby monitoring attack. An SDR device that can transmit as well as receive is required. A common SDR device is the USRP [7] and the B200 model is used here. GNURadio [8] is the software component of the attack that is used. In capturing the alarm code, the USRP is used as a signal source and a File is used as a sink. To replay the codes, the source is the File and the sink is the USRP. What exactly is the signal that is generated and how do we know that the signal is using a fixed code? To answer this we need to be able to demodulate the signal. Generally, most keyfobs use a combination of AM and PWM to modulate the signal. The presence of an AM carrier wave for a specific length of time designates whether the data being sent is a binary 0 or a binary 1. Typically, a long pulse represents one value, and a short pulse represents another. The pulses used in pulse width modulation (PWM) can be measured and grouped together into clusters. This forms the basis of knowing what the length of a pulse is. Cluster analysis is used as implemented in the pycluster [9] Python library. The mean of each cluster is the length of time for that pulse cluster. The mean of the two means (for 0,1) designates a threshold to classify a pulse as being short or long. A USRP costs close to $1000. A cheaper solution to implement this attack is to buy commercial AM transmitter and receiver modules. These modules cost a hundredth of the price of a USRP. The modules give or take data that can be provided by an Arduino development board. For $50 it is possible to build a device as I have done using these components to implement replay attacks against home alarms. To mitigate replay attacks, it is advisable to buy a commercial-grade alarm system. Typically these systems will not use fixed codes, but codes that change each time they are sent. This is an example of a rolling code. Avoid home depot and hardware shops and pay for a professional installation if security is important. The next attack looks at tampering. One home alarm system that was being tested was dismantled in a physical attack. I discovered that the main IC on the board was clearly labelled as a PIC microcontroller. Test ports were nearby, and an immediate possibility was that the test ports were for device programming. I soldered header pins onto the board and did a continuity test was on each pin to discover ground. The ground pin that was found matched the ICSP (in circuit serial programming) interface used to
4 program PIC microcontrollers. At this point, I attached a device programmer was attached ran device programmer software. What I found was that the device programmer identified the microcontroller in the alarm system. The software was not able to read the firmware on the device as a fuse had been set to protect the code. Howe ver, the data could be read and this data revealed the secret password used to program the keypad on the home alarm system. Ideally, it would be nice to read the firmware from the micocontroller. Some possible attacks include silicon analysis after decapsulation. Another attack could include glitching the device while attempting to read the firmware. It is hard to stop attackers with physical access. The marking on the IC could be removed that would make it more difficult for an attacker. It should be assumed that physical tampering and reversing may be attempted but it is very hard to stop a well resourced attacker. 4 Defeating the keyless entry of a model automobile Automotive remote keyless entry systems represent attractive targets to analyse. The keyfobs can be analysed using software defined radio and the security of these devices has been largely investigated. Perhaps the best known attack was the cryptographic break of the Keeloq [10] rolling code which was used in a large number of remote control systems, including (supposedly) automobiles. I investigated the security of a popular model vehicle. The reason to examine this particular automobile was that one was in my possession. This model car is documented as still being manufactured in particular countries. From my front driveway, I can see other cars of the same make and model on my street. The first method of analysis was to generate a dataset of what happens when a button on the remote is pressed. At first, I simply tried pressing the button repeatedly for a period of time. This was effective, but repetitive and time consuming. I decided to automate this. To do this, I built a button pushing robot. This was effectively a solenoid controlled by an Arduino development board. The button presses were simultaneously analysed using SDR equipment - a B200 USRP and GNURadio. The keyfob transmits at 315MHz which is typical of a keyfob. It is noted that holding down a button on the remote only transmits a single code. On other types of remotes, holding down a button on
5 the remote repeats the code that is being transmitted for the duration of the button press. The codes transmitted use AM and PWM modulation schemes. The code transmitted by the remote is not fixed and changes each time it is sent. A digit in any part of the code can be one of three states, a 1, a 0, or a gap. A gap is important and is part of the code. A 0, and a gap are the same size in terms of timing, and a 1 is twice that size. An implicit gap also follows every 1 or 0. It is clear that there exists a preamble which is the same for every transmission. This preamble includes synchronisation data and then a code which tied to the individual remote as an identification. The preamble also contains a section for defining which button the remote was pressed, either lock, unlock, trunk, or panic. Finally, the remainder of the code is the non-fixed part of the code that changes each time a button is pressed. Because the code changes each time, we can assume this particular remote uses a rolling code. The way a rolling code works is that the remote, which only transmits, and the car, which only receives, both maintain a pseudo random number generator (PRNG). The state of the PRNG on both the keyfob and the car are synchronized. Therefore, the car can predict the next pseudo random number that the keyfob creates. When a button on the remote is pressed, it transmits this pseudo random number and the car can verify it is correct. Receivers typically allow for the next X valid numbers to authenticate the device. This is done so that if the keyfob is pressed less than X times and the car does not receive the transmission, the car will still accept the remote as authentic. The PRNG of the keyfob can be analysed using the dataset of button pushes created earlier. I used phase space analysis [11] to do this analysis. Phase space analysis was used famously for analysing the initial sequence numbers of TCP connections and the software to do this analysis is freely available. This software was used in the analysis against our automobile. The idea is to transform a sequence of numbers into a sequence of 3- dimensional points in space. These points are created by taking the difference between numbers in our original dataset as the value along a particular axis. If the PRNG is strong, the 3- dimensional visualisation should produce a uniform cloud of points. If the PRNG is not strong, the cloud will appear to be non random.
6 Phase space analysis reveals that the sequence of numbers in the car's PRNG can be predicted with a high degree of success given the previous 3 numbers. Therefore, to perform an attack against the car, we to eavesdrop and capture the last 3 codes, then predict the next rolling code using phasespace analysis and transmit the code using the USRP and GNURadio. To increase the range of the transmitter, I use an amplifier in the output stage of the system that is powered by a bench supply. We also need to test that the codes transmitted by the USRP can be accepted by the car before implementing the attack with predicted codes. The way I validated this was by performing a capture and replay of the real remote. If the car is in range of the remote, capturing the code will make it invalid once it has been received by the automobile. I prevented the car from receiving the code by putting the remote inside a Faraday cage. A Faraday cage is an RF shield that blocks RF. Faraday cages can be made as metal cages, or metal screened cages. An inexpensive version can be simply a $1 Aluminium foil lined freezer bag. I used 2 bags, one inside the other, and this worked effectively. Using the capture and then transmitting the code I want, I verified that the transmission component of the attack potentially works. The actual attack is effective and the predicted rolling codes are correct. A better attack would be a bruteforce of the rolling code. If we look at the rolling code, we can see that the total timing of the entire transmission is one of two sizes and the transmissions alternate between them. There are also fewer gaps than 1s or 0s. We also note that a gap never follows a gap. A theoretical bruteforce attack would capture any 1 transmission by the real remote to obtain the correct preamble. At that point, all numbers in the rolling code range would be generated using the constraints above. This gives us less than 1 million guesses. I implemented the bruteforce and the car successfully unlocks typically under 2 hours. There is something funny happening though when I implement this attack. Some of the codes always unlock the car. What this appears to be, is a manufacturer backdoor that bypasses the rolling code security. It now takes seconds to unlock the car once the backdoor is known. The backdoor is tied into the identification of the remote. This identification is in the preamble of the transmissions, but at this point, I have been unable to determine the algorithm to generate the backdoor given a transmission capture. However, brute forcing can find the backdoor. It's hard to mitigate attacks against cars without a recall. It is possible to replace the keyless entry with a more secure system.
7 Needless to say, newer cars have stronger security, so upgrading the car is als o an option. For car makers, a PRNG could be replaced with a list of codes stored in flash memory that is generated by a true random number generator. Also, obviously, avoid coding in backdoors. In the future I would like to continue this research by doing a silicon level analysis after decapsulating the IC in the keyfob. This could potentially help in recovering the firmware and finding the algorithm to generate backdoors. Conclusion Hardware hacking is fun. Many real-world devices can be attacked using hardware and radio techniques. This leaves much room for analysis by security researchers. Rolling codes and keyfob security is a prime area ready for more investigation and it seems likely that many systems could be vulnerable. References [1] Funcube Dongle. Available: [2] SDR. Available: [3] Ham It Up Available: [4] RF Explorer. Available: [5] HDSDR. Available: [6] Gqrx. Available: [7] USRP. Available: [8] E. Blossom, "GNU radio: tools for exploring the radio frequency spectrum," Linux journal, vol. 2004, p. 4, [9] pycluster. Available: [10] N. Courtois, G. Bard, and D. Wagner, "Algebraic and Slide Attacks on KeeLoq," in Fast Software Encryption. vol. 5086, K. Nyberg, Ed., ed: Springer Berlin Heidelberg, 2008, pp [11] M. Zalewski. Strange Attractors and TCP/IP Sequence Number Analysis. Available:
Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual Signal Analysis
Edith Cowan University Research Online Australian Digital Forensics Conference Security Research Institute Conferences 2013 Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
How To Control A Car Alarm On A Car With A Remote Control System
MODEL CA100 REMOTE CONTROL AUTO ALARM SYSTEM INSTALLATION & OPERATION INSTRUCTIONS WIRING DIAGRAM Black Antenna Wire 6 Pin 6 Pin Mini Connector Valet Switch Blue LED Indicator Blue Wire: (-) 200mA Unlock
Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016
Electronic Access Control Security Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016 Me Matteo Beccaro Founder & Chief Technology Officer at Opposing Force The first Italian company specialize in
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN
INTRODUCTION: REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN Remote keyless entry (RKE) has captivated automobile buyers, as evidenced by the popularity of RKE on new automobiles and as an aftermarket item.
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
From baseband to bitstream and back again: What security researchers really want to do with SDR. Andy Davis, Research Director NCC Group
From baseband to bitstream and back again: What security researchers really want to do with SDR Andy Davis, Research Director NCC Group Agenda Signals basics Modulation schemes Information sources Receiving
INSTALLATION MANUAL VEHICLE SECURITY SYSTEM CE-SS200
INSTALLATION MANUAL VEHICLE SECURITY SYSTEM CE-SS200 FUSION CULTURE TABLE OF CONTENTS There s no point doing something if no one notices. We ve always believed the way to make things happen is by getting
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
1R / 4-BUTTON SERIES
Button 1 1R / 4-BUTTON SERIES VEHICLE SECURITY SYSTEM Standard Features: Two 4-Button Remote Transmitters Status indicator (LED) Valet / override switch Multi-tone siren Dual stage impact detector Remote
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM
Broadcasting your attack: Security testing DAB radio in cars
Broadcasting your attack: Security testing DAB radio in cars Andy Davis, Research Director Image: computerworld.com.au Agenda Who am I and why am I interested in security testing DAB? Overview of DAB How
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
GNU Radio. An introduction. Jesper M. Kristensen Department of Electronic Systems [email protected]. Programmerbare digitale enheder Tuesday 6/3 2007
GNU Radio An introduction Jesper M. Kristensen Department of Electronic Systems [email protected] Programmerbare digitale enheder Tuesday 6/3 2007 Programmerbare digitale enheder GNU Radio 1 / 36 Outline Introduction
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
INSTALLATION MANUAL 3RP / 5RP 4-BUTTON SERIES VEHICLE SECURITY SYSTEMS
3RP / 5RP 4-BUTTON SERIES VEHICLE SECURITY SYSTEMS INSTALLATION MANUAL Before you begin the installation Read the INSTRUCTIONS! Always use a multi-meter when verifying vehicle wiring. Before mounting the
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Presenter: Wenyuan Xu Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh Wenyuan
VEHICLE THEFT/SECURITY SYSTEM
PL VEHICLE THEFT/SECURITY SYSTEM 8Q - 1 VEHICLE THEFT/SECURITY SYSTEM TABLE OF CONTENTS page DESCRIPTION AND OPERATION INTRODUCTION...1 VEHICLE THEFT/SECURITY SYSTEM (VTSS)... 1 (SKIS)... 2 SENTRY KEY
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Video eavesdropping- RF
Security : Forensic Signal Analysis: MPHIL ACS 2009 Security : Forensic Signal Analysis Video eavesdropping- RF Y.K. Roland Tai 1. Introduction 2. History of TEMPEST 3. Type of RF leakages 4. Counter-measures.
How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone
ISSN (e): 2250 3005 Vol, 04 Issue, 7 July 2014 International Journal of Computational Engineering Research (IJCER) Enhanced Wireless Security System With Digital code lock using RF &GSM Technology 1 E.Supraja,
Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera
Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Assignment due today Project part 1 due on next Tuesday Assignment 2 will be online today evening 2nd Discussion session
Car Alarm Series 2 B 2 Buttons
Car Alarm Series 2 B 2 Buttons G22 SE (External - Shock Sensor) Version 3 Software 67 Plus www.geniuscaralarm.com 21 CAR ALARM GENIUS Series 2B 2 Buttons - G22 Se (External Shock Sensor) Module controlled
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
How to hack your way out of home detention
How to hack your way out of home detention About me William @Amm0nRa Turner @Assurance Disclaimer: I own this system (and 0wn it) The following information is for academic purposes only Don t use this
Software Defined Radio
Software Defined Radio GNU Radio and the USRP Overview What is Software Defined Radio? Advantages of Software Defined Radio Traditional versus SDR Receivers SDR and the USRP Using GNU Radio Introduction
Using Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
HAM FOR HACKERS TAKE BACK THE AIRWAVES. JonM DEFCON 16
HAM FOR HACKERS TAKE BACK THE AIRWAVES JonM DEFCON 16 JonM Licensed Amateur Extra the highest class of license in the US Operating since 2000 Radio is just one of my hobbies software security consulting
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
GnuRadio CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: [email protected] web: www.hsc.com
GnuRadio CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: [email protected] web: www.hsc.com PROPRIETARY NOTICE All rights reserved. This publication and its contents are proprietary
Computer Automation Techniques. Arthur Carroll
Computer Automation Techniques Arthur Carroll 1 Three Types of Computers Micro-Controller Single Board Computer Desktop Computer 2 The Micro-Controller Small inexpensive DIP or surface mount chips Roughly
GSM Interfacing Board
Campus Component Pvt. Ltd. DISCLAIMER Information furnished is believed to be accurate and reliable at the time of publication. However, Campus Component Pvt. Ltd. assumes no responsibility arising from
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch
DT3: RF On/Off Remote Control Technology Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch Agenda Radio Frequency Overview Frequency Selection Signals Methods Modulation Methods
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
RF Measurements Using a Modular Digitizer
RF Measurements Using a Modular Digitizer Modern modular digitizers, like the Spectrum M4i series PCIe digitizers, offer greater bandwidth and higher resolution at any given bandwidth than ever before.
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
Technical Service Bulletin
Technical Service Bulletin Page 1 of 54 SUBJECT: ACCESSORY REMOTE ENGINE START Copyright 2011, Mitsubishi Motors North America, Inc. (3789) The information contained in this bulletin is subject to change.
BROADCAST Trasmettitori / Transmitters DBH3 GAP FILLER
INTRODUCTION The equipment described here below is a TRANSMITTER that allows to receive a signal coming from satellite, to demodulate it to have the ASI format, to present it into DVB-H standard by a DVB-H
SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG
Technical Disclosure Commons Defensive Publications Series January 06, 2016 SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG Alexander Faaborg Ariel Sachter-Zeltzer Follow this and additional
Experiment # (4) AM Demodulator
Islamic University of Gaza Faculty of Engineering Electrical Department Experiment # (4) AM Demodulator Communications Engineering I (Lab.) Prepared by: Eng. Omar A. Qarmout Eng. Mohammed K. Abu Foul Experiment
The Bus (PCI and PCI-Express)
4 Jan, 2008 The Bus (PCI and PCI-Express) The CPU, memory, disks, and all the other devices in a computer have to be able to communicate and exchange data. The technology that connects them is called the
Building a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home
Building a Basic Communication Network using XBee DigiMesh Jennifer Byford April 5, 2013 Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Abstract: Using Digi International s in-house
3 Software Defined Radio Technologies
3 Software Defined Radio Technologies 3-1 Software Defined Radio for Next Generation Seamless Mobile Communication Systems In this paper, the configuration of the newly developed small-size software defined
MANUAL FOR RX700 LR and NR
MANUAL FOR RX700 LR and NR 2013, November 11 Revision/ updates Date, updates, and person Revision 1.2 03-12-2013, By Patrick M Affected pages, ETC ALL Content Revision/ updates... 1 Preface... 2 Technical
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
How To Build A Gps Vehicle Tracking System On Android App.Com
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 71-75 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) GPS Vehicle Tracking System Shital Mohol
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Button 1 Button 2. Button 3 Button 4. Programmed Remote Transmitter. Button Function Condition
WWW.STELLAR.COM ST9000 SECURITY SYSTEM Button Function Condition 1 a. Arm and lock doors b. Car finder with sound c. Temporary stop alarm from sounding d. Remote lock doors 1 for 2 sec. Panic Anytime a.
FLYPORT Wi-Fi 802.11G
FLYPORT Wi-Fi 802.11G System on module 802.11g WIFI - Infrastructure mode - softap mode - Ad hoc mode Microchip PIC 24F 16 bit processor Microchip MRF24WG0MA/MB - Native WiFi 802.11g transceiver - PCB
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016
VEHICLE TRACKING SYSTEM WITH ANDROID APP SUPPORT ABSTRACT M. Sudhakar Professor Dept of ECE CMR College of Engineering & Technology Kandlakoya, Medchal Rd, Hyderabad e-mail: [email protected] K.Kalyani PG
IR Communication a learn.sparkfun.com tutorial
IR Communication a learn.sparkfun.com tutorial Available online at: http://sfe.io/t33 Contents Getting Started IR Communication Basics Hardware Setup Receiving IR Example Transmitting IR Example Resources
A Review of Security System for Smart Home Applications
Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department
LDG DTS-4/4R Desktop Coaxial Switch / Remote
LDG DTS-4/4R Desktop Coaxial Switch / Remote LDG Electronics 1445 Parran Road, PO Box 48 St. Leonard MD 20685-2903 USA Phone: 410-586-2177 Fax: 410-586-8475 [email protected] www.ldgelectronics.com
Spectrum analyzer with USRP, GNU Radio and MATLAB
Spectrum analyzer with USRP, GNU Radio and MATLAB António José Costa, João Lima, Lúcia Antunes, Nuno Borges de Carvalho {antoniocosta, jflima, a30423, nbcarvalho}@ua.pt January 23, 2009 Abstract In this
Keyless Entry System Owner s Manual
Keyless Entry System Owner s Manual Contents Introduction... 3 Precautions... 4 Remote Control Transmitter Controls and Functions... 6 Battery Replacement... 8 Remote Control Code Programming How to Program
Single channel data transceiver module WIZ2-434
Single channel data transceiver module WIZ2-434 Available models: WIZ2-434-RS: data input by RS232 (±12V) logic, 9-15V supply WIZ2-434-RSB: same as above, but in a plastic shell. The WIZ2-434-x modules
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Capkun Department of Computer Science ETH Zurich 8092 Zurich, Switzerland {aurelien.francillon,
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
White Paper How are thieves stealing modern vehicles?
SECURITY WHITEPAPER How are thieves stealing modern vehicles? SBD/SEC/2288 1 Introduction Developments in vehicle security over recent years have made it increasingly difficult for thieves to steal vehicles
Streamit s audio streaming solutions for dummies
Streamit s audio streaming solutions for dummies A professional user s perspective. By Wim van Dijk ========================================== If you are used to traditional ways of listening to (or distributing)
ABUS WIRELESS ALARM SYSTEM
ABUS WIRELESS ALARM SYSTEM These installation instructions are published by Security-Center GmbH & Co. KG, Linker Kreuthweg 5, D-86444 Affing/Mühlhausen. All rights including translation reserved. Reproductions
Yun Shield User Manual VERSION: 1.0. Yun Shield User Manual 1 / 22. www.dragino.com
Yun Shield User Manual VERSION: 1.0 Version Description Date 0.1 Initiate 2014-Jun-21 1.0 Release 2014-Jul-08 Yun Shield User Manual 1 / 22 Index: 1 Introduction... 3 1.1 What is Yun Shield... 3 1.2 Specifications...
Broadcasting encryption or systematic #FAIL? Phil
WE 201 EK 2 42 Broadcasting encryption or systematic #FAIL? SUMMARY Intro : Broadcasting something... 1984 : Discret 11 1995 : Syster 1996 2002 : Seca 1 2002 2008 : Seca 2 Conclusion 2/49 Broadcasting
2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
Non-Data Aided Carrier Offset Compensation for SDR Implementation
Non-Data Aided Carrier Offset Compensation for SDR Implementation Anders Riis Jensen 1, Niels Terp Kjeldgaard Jørgensen 1 Kim Laugesen 1, Yannick Le Moullec 1,2 1 Department of Electronic Systems, 2 Center
RFSPACE CLOUD-IQ #CONNECTED SOFTWARE DEFINED RADIO
CLOUD-IQ #CONNECTED SOFTWARE DEFINED RADIO 1 - SPECIFICATIONS Cloud-IQ INTRODUCTION The Cloud-IQ is a high performance, direct sampling software radio with an ethernet interface. It offers outstanding
REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
C4DI Arduino tutorial 4 Things beginning with the letter i
C4DI Arduino tutorial 4 Things beginning with the letter i If you haven t completed the first three tutorials, it might be wise to do that before attempting this one. This tutorial assumes you are using
VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0
VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 1. Installation Requirements 1.1. PC Pentium III processor or higher. Minimum RAM memory: 128 Mbytes Operating system: Windows XP
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
i ChatterBox! Motorcycle Security
i Before you Start the Installation * Please read this manual to become familiar with the requirements necessary to complete the installation. * Use a high quality multi-meter to test all wires before
How To Know If You Are Safe To Use An Antenna (Wired) Or Wireless (Wireless)
1 2 The range of RF spans 3 KHz (3000 Hz) to 300 GHz (300 million Hz) Frequencies of RF devices range from the low frequency AM broadcasts (80 MHz) to higher frequency mobile phones (1900 MHz) smart meters
TX GSM SMS Auto-dial Alarm System. Installation and User Manual
TX GSM SMS Auto-dial Alarm System Installation and User Manual Product Features: 1. 16 wireless zones, 3 wired zones alarm system, suitable for small to medium size offices and homes. 2. The system uses
The irnetbox Manager User Guide
The irnetbox Manager User Guide Chris Dodge RedRat Ltd April 2014 For irnetbox Manager 3.05 1 Contents 1. Introduction...3 2. Initial Network Configuration...3 3. Finding irnetboxes...3 3.1 Device Information
WIRELESS INSTRUMENTATION TECHNOLOGY
BS&B WIRELESS, L.L.C. BS&B WIRELESS, L.L.C. WIRELESS INSTRUMENTATION TECHNOLOGY Printed February 2004 BS&B WIRELESS, L.L.C. 7422-B East 46th Place, Tulsa, OK74145 Phone: 918-622-5950 Fax: 918-665-3904
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 6, June 2014
Real Time Wireless based Train Tracking, Track Identification and Collision avoidance System for Railway Sectors 1 R. Immanuel Rajkumar, 2 Dr.P. E. Sankaranarayanan, and 3 Dr.G.Sundari 1 Research Scholar,
Homebuilt HF Radios for Use Underground Paul R. Jorgenson KE7HR
Homebuilt HF Radios for Use Underground Paul R. Jorgenson KE7HR With the good success in using Amateur Band HF radio for underground communications, I started looking for cheaper alternatives to the $500+
FUNcube Dongle Pro+ User Manual (V4)
FUNcube Dongle Pro+ User Manual (V4) AMSAT-UK FCD2 regulatory statements FCC statement WARNING: MODIFICATION OF THIS DEVICE TO RECEIVE CELLULAR RADIOTELEPHONE SERVICE SIGNALS IS PROHIBITED UNDER FCC RULES
Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
PRO PLM Installation Instructions
PRO PLM Installation Instructions PROFESSIONAL INSTALLATION STRONGLY RECOMMENDED Installation Precautions: Roll down window to avoid locking keys in vehicle during installation Avoid mounting components
WIRING HARNESS FOR AS635P4. BLUE PLUG RED, BLUE, BLACK, WHITE - Plug in dual stage sensor harness
WIRING HARNESS FOR AS635P4 ANTENNA NOT USED 5 PIN WHITE PLUG 2 PIN WHITE PLUG GREEN - PARKING BRAKE INPUT (-) BLUE - NOT USED 3 PIN BLUE PLUG RED, BLUE, BLACK, WHITE - Plug in dual stage sensor harness
Android based Alcohol detection system using Bluetooth technology
For more Project details visit: http://www.projectsof8051.com/android-based-alcohol-detection-system-usingbluetooth-technology/ Code 1435 Project Title Android based Alcohol detection system using Bluetooth
Design of Wireless Home automation and security system using PIC Microcontroller
IJCAES ISSN: 2231-4946 Volume III, Special Issue, August 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on National Conference on Information and Communication
For Auto Locksmit Association only!!! Key Programmer User s Manual
For Auto Locksmit Association only!!! Key Programmer User s Manual BMW CAS1 CAS3 (E60-E64, E65, E7x, E82, E83, E88, E9x,) Key Programmer Version: BMWProg - OBD - v 10.6 - works with ISTA-47 latest 2012
GSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
Hand Gestures Remote Controlled Robotic Arm
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 5 (2013), pp. 601-606 Research India Publications http://www.ripublication.com/aeee.htm Hand Gestures Remote Controlled
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System
Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System Ashish Jadhav 1, Mahesh Kumbhar 2, Mahesh Walunjkar 3 Lecturer, Dept. of Electronics and Telecommunication,
