Vulnerability analysis in RF locking systems of vehicles in Bogotá, Colombia.

Juan Carlos Martinez Quintero, Edith Paola Estupiñan Cuesta, Angie Tatiana Choachi Sarmiento

Abstract


A car electronic security system aims to prevent its theft, the theft of its parts or of elements in its interior. Studying these systems allows identifying and mitigating vulnerabilities. Nowadays, there are different types of attacks on these systems to exploit their vulnerabilities, such as replay, relay, brute-force or jamming attacks, among others. In the last five years in Bogotá, Colombia, the average number of stolen vehicles was 3,073 per year. This research project proposes the detection of vulnerabilities in the security system of vehicles in this city. A sample of 43 vehicles of different brands sold and registered in the city is taken. The replay attack was executed, as well as a modification of the brute-force attack. Results show that most of the implemented security systems in Bogotá are susceptible of being successfully attacked through the proposed methods. The analysis done on the brute-force attack highlights a considerable reduction in time for unlocking the vehicle compared to the conventional attack in more vulnerable RKE systems. Replay attacks turn successful in great part of the sample and, furthermore, it is concluded that the unlocking key code can be generated from the locking one.

Keywords


Brute Force Attack; Replay Attack;Decoding; Software Defined Radio; Locking Systems

Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats

503 Service Unavailable

Service Unavailable

The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later.

Additionally, a 503 Service Unavailable error was encountered while trying to use an ErrorDocument to handle the request.