Securing \(\textit {Phone as a Key}\) against relay attacks
- The smartphone is a central aspect of our daily lives and has driven the shift towards ubiquitous connectivity. More recently, context aware wireless applications have enabled convenient end-user applications such as indoor localization, home automation, or access control. A respective example from the automotive sector is vehicular access using Phone as a Key (PaaK). Like previous vehicular access systems, PaaK must also be protected against unauthorized access. A relay station attack pursues the goal of decreasing the estimated distance between car and key fob (smartphone), granting an attacker access to the car. In this paper, we discuss relay attacks in view of recent PaaK developments. In this context, we investigate two relay detection approaches from the literature and propose a novel hybrid approach towards relay attack mitigation.
Author: | Paul StaatGND, Kai JansenGND, Christian ZengerGND, Christof PaarGND |
---|---|
URN: | urn:nbn:de:hbz:294-75462 |
DOI: | https://doi.org/10.13154/294-7546 |
Parent Title (English): | 18\(^{th}\) escar Europe : The World's Leading Automotive Cyber Security Conference (Konferenzveröffentlichung) |
Document Type: | Part of a Book |
Language: | English |
Date of Publication (online): | 2020/09/29 |
Date of first Publication: | 2020/09/29 |
Publishing Institution: | Ruhr-Universität Bochum, Universitätsbibliothek |
Tag: | Phone as a key; Relay attack; Vehicular access |
First Page: | 47 |
Last Page: | 58 |
Dewey Decimal Classification: | Allgemeines, Informatik, Informationswissenschaft / Informatik |
open_access (DINI-Set): | open_access |
Konferenz-/Sammelbände: | 18th escar Europe : The World's Leading Automotive Cyber Security Conference |
Licence (German): | Keine Creative Commons Lizenz - es gelten die Rechteeinräumung und das deutsche Urheberrecht |