RFID security and privacy: A research survey

A Juels - IEEE journal on selected areas in communications, 2006 - ieeexplore.ieee.org
This paper surveys recent technical research on the problems of privacy and security for
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …

On physical-layer identification of wireless devices

B Danev, D Zanetti, S Capkun - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Physical-layer device identification aims at identifying wireless devices during radio
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …

The security of autonomous driving: Threats, defenses, and future directions

K Ren, Q Wang, C Wang, Z Qin… - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …

Comprehensive experimental analyses of automotive attack surfaces

S Checkoway, D McCoy, B Kantor… - 20th USENIX security …, 2011 - usenix.org
Modern automobiles are pervasively computerized, and hence potentially vulnerable to
attack. However, while previous research has shown that the internal networks within some …

Experimental security analysis of a modern automobile

K Koscher, A Czeskis, F Roesner… - … IEEE symposium on …, 2010 - ieeexplore.ieee.org
Modern automobiles are no longer mere mechanical devices; they are pervasively
monitored and controlled by dozens of digital computers coordinated via internal vehicular …

[PDF][PDF] Relay attacks on passive keyless entry and start systems in modern cars

A Francillon, B Danev… - Proceedings of the …, 2011 - research-collection.ethz.ch
We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used in
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …

The internet of things: A survey from the data-centric perspective

CC Aggarwal, N Ashish, A Sheth - Managing and mining sensor data, 2013 - Springer
Advances in sensor data collection technology, such as pervasive and embedded devices,
and RFID Technology have lead to a large number of smart devices which are connected to …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Architecture, protocols, and security in IoV: Taxonomy, analysis, challenges, and solutions

SM Karim, A Habbal, SA Chaudhry… - Security and …, 2022 - Wiley Online Library
Internet of Vehicles (IoV) is a multinode network that exchanges information in an open,
wireless environment. Various communication activities exist between IoV entities to share …

Lock it and still lose it—on the ({In) Security} of automotive remote keyless entry systems

FD Garcia, D Oswald, T Kasper… - 25th USENIX security …, 2016 - usenix.org
While most automotive immobilizer systems have been shown to be insecure in the last few
years, the security of remote keyless entry systems (to lock and unlock a car) based on …