References
[1]. Akinsanmi, O., Usman, A. D., Abdulraheem, A.,
Obikoya, G. D., & Bajoga, B. G. (2015). Two-factor
authentication based automobile keyless entry system.
International Journal of Engineering and Applied
Sciences, 2(8).
[2]. Alrabady, A. I., & Mahmud, S. M. (2005). Analysis of
attacks against the security of keyless-entry systems for
vehicles and suggestions for improved designs. IEEE
Transactions on Vehicular Technology, 54(1), 41-50. https://
doi.org/10.1109/TVT.2004.838829
[3]. Davis, B., & DeLong, R. (1996, October). Combined
remote key control and immobilization system for vehicle
security. In 1996, IEEE Workshop on Power Electronics in
Transportation (pp. 125-132). IEEE. https://doi.org/10.1109/
PET.1996.565920
[4]. Faber, B., Michelet, G. C., Weidmann, N., Mukkamala,
R. R., & Vatrapu, R. (2019). BPDIMS: A blockchain-based
personal data and identity management system. In
Proceedings of the 52nd Hawaii International Conference
on System Sciences (pp. 6855- 6864).
[5]. Garcia, F. D., Oswald, D., Kasper, T., & Pavlidès, P.
(2016). Lock it and still lose it—On the (in) security of
th automotive remote keyless entry systems. In 25
{USENIX}Security Symposium.
[6]. Glocker, T., Mantere, T., & Elmusrati, M. (2017, April). A
protocol for a secure remote keyless entry system
applicable in vehicles using symmetric-key cryptography.
In 2017, 8th International Conference on Information and
Communication Systems (ICICS) (pp. 310-315). IEEE.
https://doi.org/10.1109/IACS.2017.7921990
[7]. Husain, R., Khan, R., & Tyagi, R. K. (2020). Security
analysis of various hash algorithms for authentication under
hardware constrained environment. International Journal
of Engineering Technologies and Management Research,
7(6), 131-140. https://doi.org/10.29121/ijetmr.v7.i6.2020.
705,2020
[8]. Indesteege, S., Keller, N., Dunkelman, O., Biham, E., &
Preneel, B. (2008, April). A practical attack on KeeLoq. In
Annual International Conference on the Theory and
Applications of Cryptographic Techniques (pp. 1-18).
Heidelberg, Berlin: Springer. https://doi.org/10.1007/978-3-
540-78967-3_1
[9]. Liu, Y., Zhao, Z., Guo, G., Wang, X., Tan, Z., & Wang, S.
(2017, August). An identity management system based on
blockchain. In 2017, 15th Annual Conference on Privacy,
Security and Trust (PST) (pp. 4401-4409). IEEE.
[10]. Patel, J., Das, M. L., & Nandi, S. (2018, December). On
the security of remote key less entry for vehicles. In 2018,
IEEE International Conference on Advanced Networks and
Telecommunications Systems (ANTS) (pp. 1-6). IEEE. https://
doi.org/10.1109/ANTS.2018.8710105
[11]. Shi, S., He, D., Li, L., Kumar, N., Khan, M. K., & Choo, K.
K. R. (2020). Applications of blockchain in ensuring the
security and privacy of electronic health record systems: A
survey. Computers & Security, 101966. https://doi.org/10.
1016/j.cose.2020.101966
[12]. Tabora, V. (2018, August 21). Signal Amplification
Relay Attack (SARA). Hacker Noon. Retrieved from https://
hackernoon.com/signal-amplification-relay-attack-sara-
609ce6c20d4f