Wireless and integrated chip security keys in modern vehicles - PowerPoint PPT Presentation

1 / 25
About This Presentation
Title:

Wireless and integrated chip security keys in modern vehicles

Description:

Secured Car Keys. Integrated chip security in car keys. Smart Cards ... Smart card readers initialize based on users possession, no authentication ... – PowerPoint PPT presentation

Number of Views:87
Avg rating:3.0/5.0
Slides: 26
Provided by: Yar89
Category:

less

Transcript and Presenter's Notes

Title: Wireless and integrated chip security keys in modern vehicles


1
Wireless and integrated chip security keys in
modern vehicles
  • Authors Kidus Yared and Larry Gregory
    Hankins
  • Course ECE 478/578 Network Security
  • Professor Dr. Çetin Kaya Koç
  • Winter, 2005

2
What is Vehicle Security andWhy should We Care?
  • To be able to know that you are the only person
    that can access your vehicles operations.
  • This also leads to the subject of other key
    operated products that have security features but
    are not secure enough.

3
Current Statistics
  • Number of stolen cars
  • Every 25 seconds, a motor vehicle is stolen in
    the United States. The odds of a vehicle being
    stolen were 1 in 190 in 2003 (latest data
    available). The odds are highest in urban areas.
  • 2003 Theft Statistics U.S. motor vehicle thefts
    rose 1.1 percent in 2003 from 2002, according to
    the FBI's Uniform Crime Reports. In 2003,
    1,260,471 motor vehicles were reported stolen.

4
What is the Relationship Between Vehicles and
Network Security?
  • Modern Vehicles are equipped with wireless and
    security keys. As more people rely on them, they
    become a source for an attack.
  • These attacks are done through signal detection,
    and key duplication.
  • These devices are becoming a standard of future
    vehicles.
  • As we integrate products together, cars are one
    of the top choices to be integrated into the
    network stream.

5
What is the Relationship Between Vehicles and
Network Security
Other Products
6
What is the Relationship Between Vehicles and
Network Security ctd
7
Terminologies that exist in vehicle security.
  • Key Grabbing
  • Intercepting signal
  • GSM/GPRS GPS
  • Global System for Mobile Communication
  • Satellite controlled vehicle
  • General Packet Radio Service
  • Secured Car Keys
  • Integrated chip security in car keys
  • Smart Cards
  • Microprocessor integrated card keys

8
Key Grabbing
  • Monitoring the transmission from a valid radio
    key (RFID) or infra-red key.

9
Key Grabbing ctd
  • Monitoring the transmission from a valid radio
    key (RFID) or infra-red key.
  • Key Copying (Replay Attack)

10
GPS Vehicle security with anti-theft features
  • The wireless tracking systems based on GSM GPS
    offer many advantages.
  • The GSM/GPRS and GPS technologies are
    international standards and thanks to
    international GSM roaming agreements and the
    worldwide availability of GPS it enables
    cross-border communication of tracking
    information.
  • Wireless communication offers numerous
    opportunities for creating value-added services
    for the driver, service stations, operators and
    also insurers.

11
GPRS
  • Radio technology for GSM networks that adds
    packet-switching protocols.
  • Shorter set-up time for ISP connections, and
    offer the possibility to charge by amount of data
    sent rather than connect time.
  • Promises to support flexible data transmission
    rates typically up to 20 or 30 Kbps (with a
    theoretical maximum of 171.2 Kbps), as well as
    continuous connection to the network.

12
Secured Car Keys
  • Using Radio Frequency Identification (RFID)
  • Keys sends signals and receivers authenticate
    signals
  • U-channel structured keys with integrated chip

13
Smart Cards
  • These are microprocessor integrated cards with
    storage (RAM/ROM)
  • These contain writeable memory for multiple
    applications
  • Two types of communication between smart cards
  • Contact
  • Contact-less

14
Smart Cards ctd
  • Smart card readers
  • Provide power, data, initialization
  • Provide identity authentication by user
    possession
  • Therein lies the problem
  • Smart card readers initialize based on users
    possession, no authentication needed (same as car
    key)

15
Current Security Features
  • Wireless Keys
  • User or owner sends a signal to vehicles through
    a wireless unsecured medium.
  • Key is detected by key signal box and verified.
  • User is now able to operate vehicle.
  • Security Car Keys
  • User or owner applies key to enter vehicle.
  • User uses key to start ignition of vehicle.
  • User is now able to operate vehicle.
  • GSM/GPRS and GPS recently adopted product.
  • User or owner is authenticated via wireless key,
    Security Chip key, or calling service center
    (emergency cases).

16
GPS disadvantages
  • Open channel of communication
  • Multiple devices access the same satellite and
    are able to receive same information
  • GSM
  • The vulnerability lies in the control center or
    server for the security system.
  • OnStar, DoLock, RhinoCo, etc
  • If a user gains access to servers database they
    are able to access and control information and/or
    commands.
  • Attacker can open/close vehicle door.

17
Vulnerabilities of Modern Security Keys
  • Weak Wireless Keys
  • Key is detected via key grabbing, it can be
    reused without personal knowledge.
  • Entire key has to be changed (cannot be
    reprogrammed).
  • Security Chip Keys
  • GSM/GPRS and GPS
  • Currently most secured and reliable.
  • But all have the vulnerability of being attacked
    with unsecured network protocol system.

18
Vulnerabilities of Modern Security Keys ctd
  • As we keys are made to be more than 64 bit
    encryption, the time it takes to decrypt may be
    critical.
  • People rely on there vehicle for security.
  • User Needs
  • Quick key access to their car
  • Reliability

19
Market for increase security and Vehicles
  • Siemens
  • http//communications.siemens.com/repository/887/8
    8732/Siemens_Security_Brochure.pdf
  • http//www.deloitte.com/dtt/cda/doc/content/Stanfo
    rdOnStarCaseStudy.pdf
  • Black Boxes
  • The next step in to determining through data
    recording.
  • The Current proposed problem is privacy concerns.
  • RFID Tags
  • VeriChip radio frequency ID
  • A rectangular antenna ultra thin but with a chip
    holding read/write memory, the tags fit between
    laminated paper or plastic and are badges.
  • Our proposal use of this technology
  • Useful to determine every element of a cars
    objects.

20
Proposal of RFID ctd
21
Steps to take to make your vehicle more secure
  • General Concept
  • Determine the level of security needed for your
    vehicle.
  • Find out architecture of your security key
    product.

22
Steps to take to make your vehicle more secure ctd
  • Minimum of 40 bits with lengths greater than 64
    bits proffered key.
  • Use of a unidirectional encryption algorithm to
    prevent the key being determined form an analysis
    of a valid key transmission.
  • Alternation of key after each transmission.

23
Summary
  • Do not rely on your current security unless you
    know how it is designed.
  • Attributes to look for
  • 64 bit secured encryption.
  • Order of time key takes to operate vehicle?
  • Cover your RFID integrated chip keys with metal
    (aluminum foil, key case) ?
  • Frequently change your key codes (if applicable)

24
Sources
  • IEEE Library Sources
  • Algorithms to Evade Keygrabbers Dr. A. R. Deas
    Systems Silicon plc
  • From J A Howard MA C Eng. MIEE FIIM, Smart Cards
    J A Howard.
  • Other Library Sources
  • http//communications.siemens.com/repository/887/8
    8732/Siemens_Security_Brochure.pdf
  • http//www.electronicsweekly.com/Article10729.htm
  • http//0-search.epnet.com.oasis.oregonstate.edu80
    /login.aspx?directtruedbaphan15913135
  • http//www.iii.org/media/hottopics/insurance/test4
    /
  • GLOBAL SUPPLY CHAIN MANAGEMENT FORUM CASE GS-38
    GSCMF-003-2004 DATE 10/13/2004 ONSTARCONNECTING
    TO CUSTOMERS THROUGH TELEMATICS By Peter Koudal,
    Hau L. Lee, Seungjin Whang, Barchi Peleg, and
    Paresh Rajwat
  • IEEE RFID Tags Take hold Page 12, The Institute
    March 2005 Vol 29 No. 1
  • Black Boxes Get Green light Willie D. Jones
    pg 14-17 IEEE Spectrum December 2004

25
Questions?
Write a Comment
User Comments (0)
About PowerShow.com