Table of Contents Author Guidelines Submit a Manuscript
Journal of Advanced Transportation
Volume 2018, Article ID 1935974, 13 pages
https://doi.org/10.1155/2018/1935974
Research Article

Sound-Proximity: 2-Factor Authentication against Relay Attack on Passive Keyless Entry and Start System

Graduate School of Information Security, Korea University, Seoul, Republic of Korea

Correspondence should be addressed to Dong Hoon Lee; rk.ca.aerok@eelhgnod

Received 28 June 2017; Accepted 7 December 2017; Published 31 January 2018

Academic Editor: Emanuele Crisostomi

Copyright © 2018 Wonsuk Choi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. “Keyless-go,” https://www.mbusa.com/mercedes/owners/videos/detail/videoId-554cd68b2c51d310VgnVCM2000007d184335RCRD. Online; accessed 18-11-2015.
  2. “Massenhaft autos per funksignal geklaut,” http://hessenschau.de/panorama/diebe-klauen-luxusautos-in-serie-per-funkwellenverstaerker,neue-autodiebstahl-methode-100.html. Online; accessed 18-11-2015.
  3. A. Francillon, B. Danev, and S. Capkun, “Relay attacks on passive keyless entry and start systems in modern cars,” In NDSS, 2011. View at Google Scholar
  4. S. Brands and D. Chaum, “Distance-bounding protocols,” in Advances in Cryptology-Eurocrypt '93, vol. 765 of Lecture Notes in Computer Science, pp. 344–359, Springer, Berlin, Germany, 1994. View at Publisher · View at Google Scholar
  5. S. Čapkun, L. Buttyán, and J.-P. Hubaux, “Sector: secure tracking of node encounters in multi-hop wireless networks,” in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21–32, Association for Computing Machinery, Washington, DC, USA, October 2003. View at Scopus
  6. S. Drimer, S. J. Murdoch et al., “Keep your enemies close: Distance bounding against smartcard relay attacks,” in In USENIX Security, vol. 2007, 2007. View at Google Scholar
  7. S. Gezici, Z. Tian, G. B. Giannakis et al., “Localization via ultra-wideband radios: a look at positioning aspects of future sensor networks,” IEEE Signal Processing Magazine, vol. 22, no. 4, pp. 70–84, 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. G. P. Hancke and M. G. Kuhn, “An RFID distance bounding protocol,” in Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 67–73, Greece, September 2005. View at Publisher · View at Google Scholar · View at Scopus
  9. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370–380, 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. N. Karapanos, C. Marforio, C. Soriente, and S. Capkun, “Sound-proof: Usable two-factor authentication based on ambient sound,” https://arxiv.org/pdf/1503.03790.
  11. J.-Y. Lee and R. A. Scholtz, “Ranging in a dense multipath environment using an UWB radio link,” IEEE Journal on Selected Areas in Communications, vol. 20, no. 9, pp. 1677–1683, 2002. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Munilla, A. Ortiz, and A. Peinado, “Distance bounding protocols with void-challenges for RFID,” In Printed handout at the Workshop on RFID Security–RFIDSec 6, vol. 6, 2006. View at Google Scholar
  13. K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, “Proximity-based access control for implantable medical devices,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 410–419, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location Claims,” in Proceedings of the ACM Workshop on Wireless Security, pp. 1–10, San Diego, Calif, USA, September 2003. View at Scopus
  15. N. O. Tippenhauer and S. Čapkun, “ID-based secure distance bounding and localization,” in In Computer Security–ESORICS 2009, vol. 5789, pp. 621–636, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Sedighpour, S. Čapkun, S. Ganeriwal, and M. Srivastava, “Implementation of attacks on ultrasonic ranging systems,” in Proceedings of ACM Conference on Networked Sensor Systems (SenSys), p. 312, San Diego, California, USA, November 2005. View at Publisher · View at Google Scholar
  17. “Starbucks korea lets customers place orders with their mobile phone, more countries to follow,” http://www.nfcworld.com/2014/06/04/329509/starbucks-korea-lets-customers-place-orders-mobile-phone-countries-follow/. Online; accessed 18-11-2015.
  18. “Worldwide craze for o2o, south korea’s yap goes global with o2o,” http://www.prnewswire.com/news-releases/worldwide-craze-for-o2o-south-koreas-yap-goes-global-with-o2o-300042702.html. Online; accessed 18-11-2015.
  19. J. C. Haartsen, “Bluetooth radio system,” IEEE Personal Communications, vol. 7, no. 1, pp. 28–36, 2000. View at Publisher · View at Google Scholar · View at Scopus
  20. R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, vol. 5, no. 1, pp. 25–33, 2006. View at Publisher · View at Google Scholar · View at Scopus
  21. F. J. Bruwer, W. Smit, and G. J. Kuhn, “Microchips and remote control devices comprising same,” US Patent 5517187, 1996.
  22. J. Hering, “The bluesniper “rifle”,” in Proceedings of the 12th DEFCON, Las Vegas, Nevada, 2004.
  23. “Car thieves using $17 power amplifier to hack keyless entry system,” http://www.itproportal.com/2015/04/20/car-thieves-using-17-power-amplifier-hack-keyless-entry-system/. Online; accessed 18-11-2015.
  24. A. I. Alrabady and S. M. Mahmud, “Some attacks against vehicles’ passive entry security systems and their solutions,” IEEE Transactions on Vehicular Technology, vol. 52, no. 2, pp. 431–439, 2003. View at Publisher · View at Google Scholar · View at Scopus
  25. D. Dressen, “Considerations for rfid technology selection,” Atmel Applications Journal, vol. 3, pp. 45–47, 2004. View at Google Scholar
  26. X. Yu, X. Pan, W. Yang, W. Wan, and J. Zhang, “Audio similarity measure based on Renyi's quadratic entropy,” in Proceedings of the 2010 International Conference on Audio, Language and Image Processing, ICALIP 2010, pp. 722–726, Shanghai, China, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. “Gm onstart,” https://www.onstar.com/us/en/get-onstar/equipped-vehicles.html. Online; accessed 18-11-2015.
  28. “7 Apple Watch apps that replace your car keys,” https://www.computerworld.com/article/2923929/wearables/7-apple-watch-apps-that-replace-your-car-keys.html. Online; accessed 03-12-2017.
  29. “CES 2015: Audi and LG have built a smartwatch that controls a car,” http://www.mirror.co.uk/news/technology-science/technology/ces-2015-audi-lg-built-4932283. Online; accessed 18-11-2015.
  30. “Tim cook wants the apple watch to replace your car keys,” http://jalopnik.com/tim-cook-wants-the-apple-watch-to-replace-your-car-keys-1688487763. Online; accessed 03-12-2017.
  31. Ron Kohavi and Foster Provost, “Glossary of terms,” Journal of Machine Learning Research, vol. 30, no. 2-3, pp. 271–274, 1998. View at Google Scholar
  32. E. J. Candès and M. B. Wakin, “An introduction to compressive sampling: a sensing/sampling paradigm that goes against the common knowledge in data acquisition,” IEEE Signal Processing Magazine, vol. 25, no. 2, pp. 21–30, 2008. View at Publisher · View at Google Scholar · View at Scopus
  33. T. Halevi, D. Ma, N. Saxena, and T. Xiang, “Secure proximity detection for NFC devices based on ambient sensor data,” in Computer Security—ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10–12, 2012. Proceedings, vol. 7459 of Lecture Notes in Computer Science, pp. 379–396, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  34. J. Krumm and E. Horvitz, “LOCADIO: inferring motion and location from Wi-Fi signal strengths,” in Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS '04), pp. 4–13, Boston, Mass, USA, August 2004. View at Publisher · View at Google Scholar · View at Scopus
  35. K. P. Fishkin and S. Roy, “Enhancing rfid privacy via antenna energy analysis,” In RFID Privacy Workshop, 2003. View at Google Scholar
  36. C. H. Kim and G. Avoine, “Rfid distance bounding protocol with mixed challenges to prevent relay attacks,” in In Cryptology and Network Security, pp. 119–133, Springer, Berlin, Germany, 2009. View at Google Scholar
  37. G. Sinan, T. Zhi, and B. Giannakis Georgios, “Localization via ultra-wideband radios. IEEE,” IEEE Signal Processing Magazine, vol. 35, no. 2, pp. 131–135, 2005. View at Google Scholar
  38. C. Cremers, K. B. Rasmussen, B. Schmidt, and S. Capkun, “Distance hijacking attacks on distance bounding protocols,” in Proceedings of the 33rd IEEE Symposium on Security and Privacy, S and P 2012, pp. 113–127, San Francisco, CA, USA, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  39. Y. Desmedt, “Major security problems with the “unforgeable” (feige)-fiat-shamir proofs of identity and how to overcome them,” in In SecuriCom, vol. 88, pp. 15–17, 1988. View at Google Scholar
  40. M. Miettinen, N. Asokan, T. D. Nguyen, A.-R. Sadeghi, and M. Sobhani, “Context-based zero-interaction pairing and key evolution for advanced personal devices,” in Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS 2014, pp. 880–891, Association for Computing Machinery, Scottsdale, AZ, USA, November 2014. View at Scopus
  41. B. Shrestha, N. Saxena, H. T. T. Truong, N. Asokan, and N. Asokan, “Drone to the rescue: Relay-resilient authentication using ambient multi-sensing,” in In Financial Cryptography and Data Security, vol. 8437, pp. 349–364, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar · View at Scopus
  42. H. T. T. Truong, X. Gao, B. Shrestha, N. Saxena, N. Asokan, and P. Nurmi, “Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication,” in Proceedings of the 2014 12th IEEE International Conference on Pervasive Computing and Communications, PerCom 2014, pp. 163–171, Budapest, Hungary, March 2014. View at Publisher · View at Google Scholar · View at Scopus
  43. A. Varshavsky, A. Scannell, A. LaMarca, and E. de Lara, “Amigo: Proximity-Based Authentication of Mobile Devices,” in UbiComp 2007: Ubiquitous Computing, vol. 4717 of Lecture Notes in Computer Science, pp. 253–270, Springer, Berlin, Heidelberg, 2007. View at Publisher · View at Google Scholar
  44. B. Thiel, K. Kloch, and P. Lukowicz, “Sound-based proximity detection with mobile phones,” in Proceedings of the 3rd International Workshop on Sensing Applications on Mobile Phones (PhoneSense '12), p. 4, ACM, Toronto, Canada, November 2012. View at Publisher · View at Google Scholar
  45. D. Schürmann and S. Sigg, “Secure communication based on ambient audio,” IEEE Transactions on Mobile Computing, vol. 12, no. 2, pp. 358–370, 2013. View at Publisher · View at Google Scholar · View at Scopus
  46. H. Lu, W. Pan, N. D. Lane, T. Choudhury, and A. T. Campbell, “SoundSense: scalable sound sensing for people-centric applications on mobile phones,” in Proceedings of the 7th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys '09), pp. 165–178, Krakov, Poland, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  47. A. Das, N. Borisov, and M. Caesar, “Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components,” in Proceedings of the 21st ACM Conference on Computer and Communications Security, CCS 2014, pp. 441–452, Scottsdale, AZ, USA, November 2014. View at Publisher · View at Google Scholar · View at Scopus