Wireless and integrated chip security keys in modern vehicles Authors: Kidus Yared and Larry Gregory Hankins Course: ECE 478/578 Network Security Professor:

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
RFID Access Control System March, 2003 Softrónica.
1 Security in Wireless Protocols Bluetooth, , ZigBee.
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
Transmission technology William Kemp. Infrared Infrared data travels in shorter (near infrared waves). These waves enable data to be sent and receive.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WLAN vs. 2G/3G Performance, roaming, mobility, security...
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
Parking Space Finder Lucia Wiguno Thursday, April
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
IEEE Wireless Local Area Networks (WLAN’s).
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
What is Influx InfoTech ?. About Influx InfoTech IT products & services company Delivering technology driven business solutions Hi-end infrastructure,
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
© 2003 Cisco Systems, Inc. All Rights Reserved. Cisco Confidential Non-Disclosure Agreement Required WRT54G3G Linksys 3G Broadband Router.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
IWD2243 Wireless & Mobile Security
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Communications & Networks
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
CS556 Idris Khames. What is RFID? RFID stands for radio frequency identification. It is one of automated systems which used to collect data The beginning.
Wireless and Security CSCI 5857: Encoding and Encryption.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Certain security vulnerabilities exist in every mode of wireless communications.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 7 NETWORKS, TELECOMMUNICATIONS, AND MOBILE TECHNOLOGY CHAPTER 7 NETWORKS,
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
PRESENTATION ON WI-FI TECHNOLOGY
RFID Technology What is it? (And why should you care?)
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
CHAPTER TWELVE OVERVIEW
GSM Network Architecture
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Overview of cellular system
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
GPS & GSM BASED CAR SECURITY SYSTEM. Student’s Name with USN No.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
Sniffer for Detecting Lost Mobiles
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
Information Systems Design and Development Security Precautions Computing Science.
MISY 3312: Introduction to Telecommunications Summer 2012 VoIP
SOLUTION LAND TITLES.
Data Communication and Networks
Data Communication and Networks
SOLUTION ID CARDS AND DRIVER’S LICENSES
NEW PRODUCT INTRODUCTION CONEKT™ Mobile Smartphone Access Control Identification Solution June 2018.
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Presentation transcript:

Wireless and integrated chip security keys in modern vehicles Authors: Kidus Yared and Larry Gregory Hankins Course: ECE 478/578 Network Security Professor: Dr. Çetin Kaya Koç Winter, 2005

What is Vehicle Security and Why should We Care?  To be able to know that you are the only person that can access your vehicles operations.  This also leads to the subject of other key operated products that have security features but are not secure enough.

Current Statistics  Number of stolen cars Every 25 seconds, a motor vehicle is stolen in the United States. The odds of a vehicle being stolen were 1 in 190 in 2003 (latest data available). The odds are highest in urban areas Theft Statistics: U.S. motor vehicle thefts rose 1.1 percent in 2003 from 2002, according to the FBI's Uniform Crime Reports. In 2003, 1,260,471 motor vehicles were reported stolen.

What is the Relationship Between Vehicles and Network Security?  Modern Vehicles are equipped with wireless and security keys. As more people rely on them, they become a source for an attack.  These attacks are done through signal detection, and key duplication.  These devices are becoming a standard of future vehicles.  As we integrate products together, cars are one of the top choices to be integrated into the network stream.

What is the Relationship Between Vehicles and Network Security Other Products

What is the Relationship Between Vehicles and Network Security ctd

Terminologies that exist in vehicle security.  Key Grabbing Intercepting signal  GSM/GPRS GPS Global System for Mobile Communication  Satellite controlled vehicle  General Packet Radio Service  Secured Car Keys Integrated chip security in car keys  Smart Cards Microprocessor integrated card keys

Key Grabbing  Monitoring the transmission from a valid radio key (RFID) or infra-red key.

Key Grabbing ctd  Monitoring the transmission from a valid radio key (RFID) or infra-red key. Key Copying (Replay Attack)

GPS Vehicle security – with anti-theft features  The wireless tracking systems based on GSM & GPS offer many advantages. The GSM/GPRS and GPS technologies are international standards and thanks to international GSM roaming agreements and the worldwide availability of GPS it enables cross- border communication of tracking information. Wireless communication offers numerous opportunities for creating value-added services for the driver, service stations, operators and also insurers.

GPRS  Radio technology for GSM networks that adds packet-switching protocols. Shorter set-up time for ISP connections, and offer the possibility to charge by amount of data sent rather than connect time. Promises to support flexible data transmission rates typically up to 20 or 30 Kbps (with a theoretical maximum of Kbps), as well as continuous connection to the network.

Secured Car Keys  Using Radio Frequency Identification (RFID) Keys sends signals and receivers authenticate signals U-channel structured keys with integrated chip

Smart Cards  These are microprocessor integrated cards with storage (RAM/ROM)  These contain writeable memory for multiple applications  Two types of communication between smart cards Contact Contact-less

Smart Cards ctd  Smart card readers Provide: power, data, initialization Provide identity authentication by user possession  Therein lies the problem Smart card readers initialize based on users possession, no authentication needed (same as car key)

Current Security Features  Wireless Keys 1)User or owner sends a signal to vehicles through a wireless unsecured medium. 2)Key is detected by key signal box and verified. User is now able to operate vehicle.  Security Car Keys 1)User or owner applies key to enter vehicle. 2)User uses key to start ignition of vehicle. User is now able to operate vehicle.  GSM/GPRS and GPS recently adopted product. 1)User or owner is authenticated via wireless key, Security Chip key, or calling service center (emergency cases).

GPS disadvantages  Open channel of communication Multiple devices access the same satellite and are able to receive same information  GSM The vulnerability lies in the control center or server for the security system.  OnStar, DoLock, RhinoCo, etc…  If a user gains access to servers database they are able to access and control information and/or commands. Attacker can open/close vehicle door.

Vulnerabilities of Modern Security Keys  Weak Wireless Keys Key is detected via key grabbing, it can be reused without personal knowledge.  Entire key has to be changed (cannot be reprogrammed).  Security Chip Keys  GSM/GPRS and GPS Currently most secured and reliable.  But all have the vulnerability of being attacked with unsecured network protocol system.

Vulnerabilities of Modern Security Keys ctd  As we keys are made to be more than 64 bit encryption, the time it takes to decrypt may be critical. People rely on there vehicle for security.  User Needs Quick key access to their car Reliability

Market for increase security and Vehicles  Siemens ty_Brochure.pdf ty_Brochure.pdf  Black Boxes: The next step in to determining through data recording.  The Current proposed problem is privacy concerns.  RFID Tags VeriChip radio frequency ID  A rectangular antenna ultra thin but with a chip holding read/write memory, the tags fit between laminated paper or plastic and are badges.  Our proposal use of this technology: Useful to determine every element of a cars objects.

Proposal of RFID ctd

Steps to take to make your vehicle more secure  General Concept Determine the level of security needed for your vehicle. Find out architecture of your security key product.

Steps to take to make your vehicle more secure ctd  Minimum of 40 bits with lengths greater than 64 bits proffered key.  Use of a unidirectional encryption algorithm to prevent the key being determined form an analysis of a valid key transmission.  Alternation of key after each transmission.

Summary  Do not rely on your current security unless you know how it is designed. Attributes to look for:  64 bit secured encryption.  Order of time key takes to operate vehicle?  Cover your RFID integrated chip keys with metal (aluminum foil, key case)  Frequently change your key codes (if applicable)

Sources  IEEE Library Sources Algorithms to Evade Keygrabbers Dr. A. R. Deas Systems Silicon plc From J A Howard MA C Eng. MIEE FIIM, Smart Cards J A Howard.  Other Library Sources pdf pdf search.epnet.com.oasis.oregonstate.edu:80/login.aspx?direct=true&db=aph&an= search.epnet.com.oasis.oregonstate.edu:80/login.aspx?direct=true&db=aph&an= GLOBAL SUPPLY CHAIN MANAGEMENT FORUM CASE: GS-38 GSCMF DATE: 10/13/2004 ONSTAR:CONNECTING TO CUSTOMERS THROUGH TELEMATICS By Peter Koudal, Hau L. Lee, Seungjin Whang, Barchi Peleg, and Paresh Rajwat IEEE RFID Tags Take hold Page 12, The Institute March 2005 Vol 29 No. 1 “Black Boxes Get Green light”; Willie D. Jones; pg 14-17; IEEE Spectrum| December 2004

Questions? 