Securing \(\textit {Phone as a Key}\) against relay attacks

  • The smartphone is a central aspect of our daily lives and has driven the shift towards ubiquitous connectivity. More recently, context aware wireless applications have enabled convenient end-user applications such as indoor localization, home automation, or access control. A respective example from the automotive sector is vehicular access using Phone as a Key (PaaK). Like previous vehicular access systems, PaaK must also be protected against unauthorized access. A relay station attack pursues the goal of decreasing the estimated distance between car and key fob (smartphone), granting an attacker access to the car. In this paper, we discuss relay attacks in view of recent PaaK developments. In this context, we investigate two relay detection approaches from the literature and propose a novel hybrid approach towards relay attack mitigation.

Download full text files

Export metadata

Additional Services

Share in Twitter Search Google Scholar
Metadaten
Author:Paul StaatGND, Kai JansenGND, Christian ZengerGND, Christof PaarGND
URN:urn:nbn:de:hbz:294-75462
DOI:https://doi.org/10.13154/294-7546
Parent Title (English):18\(^{th}\) escar Europe : The World's Leading Automotive Cyber Security Conference (Konferenzveröffentlichung)
Document Type:Part of a Book
Language:English
Date of Publication (online):2020/09/29
Date of first Publication:2020/09/29
Publishing Institution:Ruhr-Universität Bochum, Universitätsbibliothek
Tag:Phone as a key; Relay attack; Vehicular access
First Page:47
Last Page:58
Dewey Decimal Classification:Allgemeines, Informatik, Informationswissenschaft / Informatik
open_access (DINI-Set):open_access
Konferenz-/Sammelbände:18th escar Europe : The World's Leading Automotive Cyber Security Conference
Licence (German):License LogoKeine Creative Commons Lizenz - es gelten die Rechteeinräumung und das deutsche Urheberrecht