Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020‏ - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

[HTML][HTML] MIMO radio frequency identification: A brief survey

M Alotaibi, M Murad, SAH Alhuthali, FR Al-Osaimi… - Sensors, 2022‏ - mdpi.com
In this paper, we briefly look at the latest state-ot-the-art in the domain of multi-input multi-
output (MIMO) radio frequency identification (RFID) systems while detailing the work done in …

[PDF][PDF] Access Your Tesla without Your Awareness: Compromising Keyless Entry System of Model 3.

X **e, K Jiang, R Dai, J Lu, L Wang, Q Li, J Yu - NDSS, 2023‏ - ndss-symposium.org
Tesla Model 3 has equipped with Phone Keys and Key Cards in addition to traditional key
fobs for better driving experiences. These new features allow a driver to enter and start the …

From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover

X Zhang, Y Tu, Y Long, L Shan… - … IEEE Symposium on …, 2024‏ - ieeexplore.ieee.org
This paper studies vulnerabilities at the intersection of wearable devices and automated
control systems. Particularly, we focus on exploiting smart glasses as an entry point and …

[HTML][HTML] User context detection for relay attack resistance in passive keyless entry and start system

J Li, Y Dong, S Fang, H Zhang, D Xu - Sensors, 2020‏ - mdpi.com
In modern cars, the Passive Keyless Entry and Start system (PKES) has been extensively
installed. The PKES enables drivers to unlock and start their cars without user interaction …

On Pre-Processing of Generalized Gamma Fading Channel Samples for Secret Key Generation

G Hussain, SJ Nawaz, S Wyne, E Cianca… - IEEE …, 2024‏ - ieeexplore.ieee.org
With the advent of innovative wireless technologies and the rapid growth of diverse
connected devices, ensuring communication security has become a critical challenge for the …

Socioty: Practical cryptography in smart home contexts

TM Jois, G Beck, S Belikovetsky… - Proceedings on …, 2024‏ - petsymposium.org
Smartphones form an important source of trust in modern computing. But, while their mobility
is convenient, smartphones can be stolen or seized, allowing an adversary to impersonate …

A Context-Aware Framework for Analysing Automotive Vehicle Security

T Kumari, A Rakib, A Zaslavsky… - 2024 IEEE 18th …, 2024‏ - ieeexplore.ieee.org
Recent advancements in technology have transformed conventional mechanical vehicles
into sophisticated computer systems on wheels. This transition has elevated their …

Wi-Fi Fingerprint for Indoor Keyless Entry Systems with Ensemble Learning Regression-Classification Model

AG Putrada, N Alamsyah, MN Fauzan - JOIV: International Journal on …, 2023‏ - joiv.org
Keyless entry systems have made human life more comfortable because the possibility of
someone leaving a key is non-existent. However, there is a research opportunity to use Wi …

CommanderGPS: Practical Hidden Command Dissemination Through Pedal Operations

E Yang, G Huang, S Fang - 2024 IEEE Conference on …, 2024‏ - ieeexplore.ieee.org
It is critical to enable a driver to control in-vehicle devices (eg, a smartphone) during driving,
especially when the driver is in danger. Existing in-vehicle communication often relies on …