Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/3606
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRath, Sowjanya-
dc.contributor.authorBadar, Altaf Q. H.-
dc.contributor.authorBharadwaj, V. Kiran-
dc.date.accessioned2025-12-16T09:27:39Z-
dc.date.available2025-12-16T09:27:39Z-
dc.date.issued2023-
dc.identifier.citation10.1049/icp.2023.1530en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/3606-
dc.descriptionNITWen_US
dc.description.abstractPassive-entry-passive-start (PEPS) is a wireless communication system that enables a driver to enter and start their vehicle without the need of a physical key. In PEPS system, the vehicle sends low-power LF signal to communicate with the key-fob. If the key is in the vicinity of the automobile, it sends a RF signal which the vehicle senses and unlocks the door. In this work, we show how vulnerable these systems can be to external attacks using relay devices. In a relay attack, the objective is to amplify the vehicle signal to transmit to longer distances such that it can communicate with the key-fob and unlock the door, without the knowledge of the owner. This work includes a model of the relay devices developed using MATLAB, as well as a detailed explanation of an attack scenario. A distance-based test case has also been included to conclude the attack. In the introduction section, a few popular techniques which can be used to mitigate relay attacks have been reviewed.en_US
dc.language.isoenen_US
dc.publisherIET Conference Proceedingsen_US
dc.subjectLow Frequency (LF)en_US
dc.subjectLow Noise Amplifier (LNA)en_US
dc.titleModelling and Analysis of Relay Attack Devices for Passive-Entry-Passive-Start Wireless Systemsen_US
dc.typeOtheren_US
Appears in Collections:Electrical Engineering

Files in This Item:
File Description SizeFormat 
194.pdf756.62 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.