Submit Search
Upload
IRJET- Cyber Attacks on Smart Cars using SDR
•
0 likes
•
38 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i12/IRJET-V6I1219.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...
Siddharth Rao
Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...
Xura
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Anatol Alizar
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Siddharth Rao
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...
Xura
Providing end to-end secure
Providing end to-end secure
IJNSA Journal
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali Linux
IRJET Journal
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
P1Security
Recommended
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...
Siddharth Rao
Signaling network vulnerabilities exposed, protection strategies for operator...
Signaling network vulnerabilities exposed, protection strategies for operator...
Xura
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
Anatol Alizar
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Siddharth Rao
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...
LTE Masterclass: “Signaling network vulnerabilities and protection strategies...
Xura
Providing end to-end secure
Providing end to-end secure
IJNSA Journal
De-Authentication attack on wireless network 802.11i using Kali Linux
De-Authentication attack on wireless network 802.11i using Kali Linux
IRJET Journal
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
P1Security
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyond
Siddharth Rao
Атаки на мобильные сети
Атаки на мобильные сети
Ekaterina Melnik
Presentation of H323 protocol
Presentation of H323 protocol
Md. Taiseen Azam
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
Communication Devices Inc
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...
Videoguy
Wireless intelligent networking
Wireless intelligent networking
Manish Kumar
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
OnBoard Security, Inc. - a Qualcomm Company
H.323
H.323
Mohd Arif
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Xura
Wireless intelligent network
Wireless intelligent network
suryakant singh
Cyber Security in Transportation
Cyber Security in Transportation
Oren Elimelech
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
sequi_inc
GSM Technology and security impact
GSM Technology and security impact
Ahmad Sharifi
Cyber Security in Civil Aviation
Cyber Security in Civil Aviation
Network Intelligence India
Gsm security
Gsm security
maicuong8
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets Security
Charles Guillemet
Introduction to SIM and USIM
Introduction to SIM and USIM
Naveen Jakhar, I.T.S
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
UltraUploader
Cryptography in GSM
Cryptography in GSM
Tharindu Weerasinghe
Final gsm1
Final gsm1
Arun Kumar
Office Automation System using Internet of Things
Office Automation System using Internet of Things
IRJET Journal
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
More Related Content
What's hot
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyond
Siddharth Rao
Атаки на мобильные сети
Атаки на мобильные сети
Ekaterina Melnik
Presentation of H323 protocol
Presentation of H323 protocol
Md. Taiseen Azam
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
Communication Devices Inc
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...
Videoguy
Wireless intelligent networking
Wireless intelligent networking
Manish Kumar
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
OnBoard Security, Inc. - a Qualcomm Company
H.323
H.323
Mohd Arif
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Xura
Wireless intelligent network
Wireless intelligent network
suryakant singh
Cyber Security in Transportation
Cyber Security in Transportation
Oren Elimelech
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
sequi_inc
GSM Technology and security impact
GSM Technology and security impact
Ahmad Sharifi
Cyber Security in Civil Aviation
Cyber Security in Civil Aviation
Network Intelligence India
Gsm security
Gsm security
maicuong8
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets Security
Charles Guillemet
Introduction to SIM and USIM
Introduction to SIM and USIM
Naveen Jakhar, I.T.S
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
UltraUploader
Cryptography in GSM
Cryptography in GSM
Tharindu Weerasinghe
Final gsm1
Final gsm1
Arun Kumar
What's hot
(20)
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyond
Атаки на мобильные сети
Атаки на мобильные сети
Presentation of H323 protocol
Presentation of H323 protocol
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...
Wireless intelligent networking
Wireless intelligent networking
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
H.323
H.323
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Wireless intelligent network
Wireless intelligent network
Cyber Security in Transportation
Cyber Security in Transportation
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
GSM Technology and security impact
GSM Technology and security impact
Cyber Security in Civil Aviation
Cyber Security in Civil Aviation
Gsm security
Gsm security
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets Security
Introduction to SIM and USIM
Introduction to SIM and USIM
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
Cryptography in GSM
Cryptography in GSM
Final gsm1
Final gsm1
Similar to IRJET- Cyber Attacks on Smart Cars using SDR
Office Automation System using Internet of Things
Office Automation System using Internet of Things
IRJET Journal
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
IRJET- IoT Based Swachch Bharat Abhiyan
IRJET- IoT Based Swachch Bharat Abhiyan
IRJET Journal
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET Journal
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
IRJET Journal
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET Journal
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
Editor IJARCET
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
Editor IJARCET
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET Journal
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET Journal
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT
IJECEIAES
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
IJRTEMJOURNAL
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
journal ijrtem
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
IRJET Journal
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
IRJET Journal
A Voice Controlled Vehicle For The Aid Of Disabled Person
A Voice Controlled Vehicle For The Aid Of Disabled Person
IRJET Journal
IRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET Journal
IRJET- Industrial Safety Device for Employees in Overhead Bridge Crane us...
IRJET- Industrial Safety Device for Employees in Overhead Bridge Crane us...
IRJET Journal
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
IRJET Journal
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
IRJET Journal
Similar to IRJET- Cyber Attacks on Smart Cars using SDR
(20)
Office Automation System using Internet of Things
Office Automation System using Internet of Things
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET- IoT Based Swachch Bharat Abhiyan
IRJET- IoT Based Swachch Bharat Abhiyan
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
A Voice Controlled Vehicle For The Aid Of Disabled Person
A Voice Controlled Vehicle For The Aid Of Disabled Person
IRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Industrial Safety Device for Employees in Overhead Bridge Crane us...
IRJET- Industrial Safety Device for Employees in Overhead Bridge Crane us...
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
koyaldeepu123
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Effects of rheological properties on mixing
Effects of rheological properties on mixing
viprabot1
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ROCENODodongVILLACER
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Recently uploaded
(20)
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Effects of rheological properties on mixing
Effects of rheological properties on mixing
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
IRJET- Cyber Attacks on Smart Cars using SDR
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 108 Cyber Attacks on Smart Cars using SDR Yash M. Kenia B.Tech (Computer), Cyber Security Analyst, Mumbai, India --------------------------------------------------------------------------***---------------------------------------------------------------------------- Abstract - There is a tremendous growth towards the concept of Smart Cities. As these highly efficient technologies flood the globe, there are certain security risks that arise in the due course. With high availability and efficiency arise new vulnerabilities and risks in the field of Information Security. This paper explores the concept of securing the Smart Keyless Cars which use radio frequencies to lock and unlock doors. This paper aims at the vulnerabilities of these keyless smart cars and hacking and exploiting them through the technologies like software defined radio (SDR) using software and devices like GNURadio and HackRF. Further, the countermeasures and mitigation models are also drafted for safeguarding the keyless cars. Keywords - Smart Cities, Cyber Security, Information Security, Smart Devices, and Keyless smart cars. I. INTRODUCTION The traditional key method of locking and unlocking the car required manually inserting the key in the lock. This method was a bit tedious. To ease it, came a concept of keyless cars. This system did not require the user to manually enter the key in the lock to lock or unlock the door. Instead only a button had to be pressed on the key. It uses radio frequencies to lock and unlock the car. When the button on the key is pressed, a specific frequency is emitted by the keys. When the emitted frequency of the key matches with the car’s required frequency, the doors are locked or unlocked. A Software-defined radio (SDR) is a radio communication system which is implemented by software in an embedded system or a computer instead of using the modulators or amplifiers. A common software used for the implementation of SDR is GNURadio Companion. [2] GNURadio is a software development toolkit which pro- vides signal processing blocks for the implementation of SDR and radio signalling and tuning. An external RF hardware can be attached to the computer and the GNURadio provides the interface to perform the logical implementation using these radio frequencies and signals. A commonly used RF hardware is HackRF. It provides a graphical user interface (UI) for the user to build flow graphs. [2] HackRF is a hardware gadget developed by Great Scott Gadgets which works well with GNURadio for implementing the Radio Frequencies, replaying, tuning and signalling. It is a peripheral for the GNURadio companion. The whole concept of SDR can be implemented using GNU and HackRF.[2] This paper shows the concepts of Software-defined radio on the keyless smart cars for capturing and replaying the key frequencies with the concept of Cyber Security attack like Man-in-the-middle attacks and replay attacks. II. PROPOSED SYSTEM A. Attack Models 1) Man in the middle attack (MITM) In Information security, Man in the middle attack is a type of attack in which the attacker secretly relays or alters the communication between two victims who are made to believe that they are directly communicating with each other. The victims are completely unaware of the presence of attacker in the middle. MITM attacks can be either passive or active. Passive MITM attacks are done just to constantly sniff the traffic between two parties. Active MITM attacks are done for the purpose of harming or causing damage to the victims. 2) Replay attack A replay attack in Information Security is a type of attack in which a data transmission between two parties is captured in between and is replayed with or without manipulating it without the knowledge of the two parties. This attack is similar to
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 109 MITM attack and is the lower tier version of it. 3) Relay attack A relay attack is similar to man in the middle attack in which the communication is initiated by the attacker in which the attacker simply relays the message without even manipulating it. B. Threat Models Threat models are typically made during the product de- velopment and design process. If a company producing aparticular product has a good development life cycle, it creates the threat model when product development begins and continuously updates the model as the product moves through the development life cycle. These models are living documents that change as the target changes and as you learn more about a target, so you should update them often.[3] The high-level threats are that an attacker could: • Remotely take over a vehicle • Shut down a vehicle • Spy on vehicle occupants • Unlock a vehicle • Steal a vehicle • Track a vehicle • Thwart safety systems • Install malware on the vehicle Key Fob An attacker could exploit the key fob connection to: • Lock out a key • Brute-force the key fob algorithm • Clone the key fob • Jam the key fob signal [3] III. IMPLEMENTATION This explains the implementation of the Hacking of the keyless smart cars using the technology of Software-defined radio – GNURadio and HackRF. Two phases have been explained here: A. Implementation and Exploitation. 1) Capturing the radio frequencies of the key The following is the flow graph which is used to capture the frequencies: Options: ID is set to the top block and the Generate Options is set to QT GUI. Which is a type of frequency graph for the graphical user interface. These are the basic and default parameters which are set in the GNU Radio Companion. Osmocom Source: The Osmocom source is an abstraction layer that allows us to communicate with different hardware
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 110 devices (HackRF in our case) for software radio. And it is asource which produces digital signals that will be consumed by the next block in the flow graph. This tells the HackRF to switch to the receiving mode via the USB. It has different parameters like the sample rate which we have specified in the earlier stage. We also specify the channel frequency of approximate signal and the car which is set to 433.9M Hz. The RF Gains are set to 0 to avoid any errors and actually are not used in our demo. QT GUI Waterfall Sink: This is the graphical user interface for the user which will show a graphical structure and show the details of the frequencies that are being emitted at every second by the rates of 2M Hz. We define different parameters like the Center Frequency which is set to 0 by default and the Bandwidth for the flow graph in 2M Hz which is kept as the same for the sample rate. The captured frequencies are further stored in a file format in the computer using HackRF and GNU Radio Companion which are based on the technology of Software Defined Radio. [6] The peak denotes the captured frequency of the car key. Fig.1. Flow graph for captured frequency Fig. 2. Captured frequency 2) Replaying the captured frequencies directly on the car Throttle Block: This is the block to refine the frequencies and emit them equally and repeatedly on the car i.e. to match the required frequency to crack the lock.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 111 Fig. 3. Replay flowgraph These frequency flow graphs are replayed over the car repeatedly and the car unlocks. Fig. 4. Replayed frequency B. Mitigation Models and Counter Measures 1) Rolling Code A rolling code also known as hopping code is a mechanism used in keyless smart cars and systems to avoid the replay and relay attacks, where in an attacker captures the radio frequency transmissions and replays it to cause the system or the car to unlock. These applications are widely seen in normal car doors and keyless entry systems. [4] A rolling code in keyless section frameworks to mitigate and avoid replay attacks, where a meddler records the transmission and replays it at a certain time to make the victim ’open’ the lock and use the key to open the car and capture the transmitted frequency. Techniques: 1. A pseudo random number is generated which is crypto- graphically secure from both the receiver andtransmitter end. 2. Transmitter sends next number code in sequence.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 112 3. Receiver compares this to its calculated next number code. 4. A typical implementation compares within the next 256 codes in case receiver missed some transmitted keys[4] 2) KeeLoq KeeLoq”code hopping” encoders encrypt a 0-filled 32-bit block with KeeLoq cipher to produce a 32-bit ”hopping code”. A 32- bit initialization vector is linearly added (XORed) to the 32 least significant bits of the key prior to encryption and after decryption. Figure 2 shows the structure diagram of KEELOQ Encryption. The Counter which is used to shield the frequency numeric code from being captured. Once this encoder detects the press of the button, it reads the input and increments the Sync Counter value. The counter and keys are input to the encryption algorithm and the output is a 32 bit data. This will change with every press of the button of the key fob. And its value will be randomly hoping and generated. Hence, this is the hopping portion of the data or the code. This 32 bit is combined with a fixed 34 bit portion which consists of the information about the serial number from which the code is transmitted to the receiver. [1] Fig. 5. KeeLoq Encryption Algorithm IV. EXPERIMENTAL RESULTS The experimental results are all part of the flow graphs in the GNURadio of the computer which was connected with the HackRF. The frequency of the key was captured and re- played using the above concepts of software-defined radio. The test subject was the Indian version of Honda City i-vtec. This research and experiment has also been performed on Toyota Innova Crysta and Maruti Wagon R. The experiment wassuccessful in performing the man-in-the-middle and Replay attack. V. CONCLUSION AND FUTURE WORK This paper explains how the man in the middle attacks or replaying attacks are possible on the cars and vehicles using tools and techniques and frequency capturing by HackRF. Further, we also see that the same can be countered by the use of KeeLoq algorithm and rolling codes. This provides enough concepts and information on which more such vulnerabilities and loopholes should be patched and every car should at least have a rolling code mechanism in their locking and unlocking.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 113 REFERENCES 1. Y. Hu, Y. Zhang and B. Sun,”Design of RKE System Based on KEELOQ Encryption Technology,” 2009 International Conference on Artificial Intelligence and Computational Intelligence, Shanghai, 2009, pp. 324-327. 2. K. Hein a¨aro, ”Cyber attacking tactical radio networks,” 2015 International Conference on Military Communications and Information Systems (ICMCIS), Cracow, 2015, pp. 1-6. doi: 10.1109/ICMCIS.2015.7158684 3. The Car Hacker’s Handbook: A Guide for Penetration Testers by Craig Smith. ISBN-10: 1-59327-703-2 ISBN-13: 978-1- 59327-703-1 Publisher: William Pollock [4]https://en.wikipedia.org/wiki/Rolling code 4. Oka, Dennis Kengo, et al. ”Survey of vehicle IoT bluetooth devices.” Service- Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on. IEEE, 2014. 5. https://greatscottgadgets.com
Download now