Novel Technique for Secure Keyless Car Authentication using Block-Chain System

Rashid Husain*, Rabia Khan **, Rajesh Kumar Tyagi ***
* Department of Mathematics and Computer Science, Sule Lamido University, Kafin Hausa, Jigawa State, Nigeria.
** Master of Computer Application, Punjab Technical University, India.
*** Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University, Manesar, Gurgaon, Haryana, India.
Periodicity:December - February'2021
DOI : https://doi.org/10.26634/jcom.8.4.18297

Abstract

Security of the vehicles are challenging factor. Nowadays, users prefer comfort and a safe environment for their vehicles. With the development in technology, ancient standard keys for vehicles have been modified by Remote Keyless Entry System (RKES). This new scenario boosts user's safety and convenience. During the development of this new environment, attackers have also found new ways to hack the RKES. In this paper, a novel technique for secure authentication using blockchain technology has been developed which will provide a more secure way for keyless access. Our model is based on a time comparison of various hash algorithms which are widely used in encrypted and blockchain processes for authentication. Many tests were conducted to check the time complexity of hash algorithms for providing a clear outlook about the security and time complexity.

Keywords

Vehicle Security, Remote Keyless Entry System (RKES), Authentication, Blockchain

How to Cite this Article?

Hussain, R., Khan, R., and Tyagi, R. K. (2021). Novel Technique for Secure Keyless Car Authentication using Block-Chain System. i-manager's Journal on Computer Science, 8(4), 1-6. https://doi.org/10.26634/jcom.8.4.18297

References

[1]. Akinsanmi, O., Usman, A. D., Abdulraheem, A., Obikoya, G. D., & Bajoga, B. G. (2015). Two-factor authentication based automobile keyless entry system. International Journal of Engineering and Applied Sciences, 2(8).
[2]. Alrabady, A. I., & Mahmud, S. M. (2005). Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. IEEE Transactions on Vehicular Technology, 54(1), 41-50. https:// doi.org/10.1109/TVT.2004.838829
[3]. Davis, B., & DeLong, R. (1996, October). Combined remote key control and immobilization system for vehicle security. In 1996, IEEE Workshop on Power Electronics in Transportation (pp. 125-132). IEEE. https://doi.org/10.1109/ PET.1996.565920
[4]. Faber, B., Michelet, G. C., Weidmann, N., Mukkamala, R. R., & Vatrapu, R. (2019). BPDIMS: A blockchain-based personal data and identity management system. In Proceedings of the 52nd Hawaii International Conference on System Sciences (pp. 6855- 6864).
[5]. Garcia, F. D., Oswald, D., Kasper, T., & Pavlidès, P. (2016). Lock it and still lose it—On the (in) security of th automotive remote keyless entry systems. In 25 {USENIX}Security Symposium.
[6]. Glocker, T., Mantere, T., & Elmusrati, M. (2017, April). A protocol for a secure remote keyless entry system applicable in vehicles using symmetric-key cryptography. In 2017, 8th International Conference on Information and Communication Systems (ICICS) (pp. 310-315). IEEE. https://doi.org/10.1109/IACS.2017.7921990
[7]. Husain, R., Khan, R., & Tyagi, R. K. (2020). Security analysis of various hash algorithms for authentication under hardware constrained environment. International Journal of Engineering Technologies and Management Research, 7(6), 131-140. https://doi.org/10.29121/ijetmr.v7.i6.2020. 705,2020
[8]. Indesteege, S., Keller, N., Dunkelman, O., Biham, E., & Preneel, B. (2008, April). A practical attack on KeeLoq. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 1-18). Heidelberg, Berlin: Springer. https://doi.org/10.1007/978-3- 540-78967-3_1
[9]. Liu, Y., Zhao, Z., Guo, G., Wang, X., Tan, Z., & Wang, S. (2017, August). An identity management system based on blockchain. In 2017, 15th Annual Conference on Privacy, Security and Trust (PST) (pp. 4401-4409). IEEE.
[10]. Patel, J., Das, M. L., & Nandi, S. (2018, December). On the security of remote key less entry for vehicles. In 2018, IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1-6). IEEE. https:// doi.org/10.1109/ANTS.2018.8710105
[11]. Shi, S., He, D., Li, L., Kumar, N., Khan, M. K., & Choo, K. K. R. (2020). Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Computers & Security, 101966. https://doi.org/10. 1016/j.cose.2020.101966
[12]. Tabora, V. (2018, August 21). Signal Amplification Relay Attack (SARA). Hacker Noon. Retrieved from https:// hackernoon.com/signal-amplification-relay-attack-sara- 609ce6c20d4f
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.