Cryptology ePrint Archive: Report 2010/332
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Aurelien Francillon and Boris Danev and Srdjan Capkun
Abstract: We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used
in modern cars. We build two efficient and inexpensive attack realizations, wired
and wireless physical-layer relays, that allow the attacker to enter and start a car
by relaying messages between the car and the smart key. Our relays are completely
independent of the modulation, protocol, or presence of strong authentication and
encryption. We perform an extensive evaluation on 10 car models from
8 manufacturers. Our results show that relaying the signal in one
direction only (from the car to the key) is sufficient to perform the attack while
the true distance between the key and car remains large (tested up to 50 meters, non
line-of-sight). We also show that, with our setup, the smart key can be excited from
up to 8 meters. This removes the need for the attacker to get close to the key in
order to establish the relay. We further analyze and discuss critical system
characteristics. Given the generality of the relay attack and the number of
evaluated systems, it is likely that all PKES systems based on similar designs are
also vulnerable to the same attack. Finally, we propose immediate mitigation
measures that minimize the risk of relay attacks as well as recent solutions that
may prevent relay attacks while preserving the convenience of use, for which PKES
systems were initially introduced.
Category / Keywords: implementation / cryptographic protocols
Publication Info: To Appear In Proceedings of NDSS (Network and Distributed System Security Symposium), 2011
Date: received 4 Jun 2010, last revised 21 Oct 2010
Contact author: capkuns at inf ethz ch
Available format(s): PDF | BibTeX Citation
Version: 20101021:205436 (All versions of this report)
Short URL: ia.cr/2010/332
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]