CN114940142B - Automobile anti-theft method and system based on radiation source individual verification and automobile - Google Patents

Automobile anti-theft method and system based on radiation source individual verification and automobile Download PDF

Info

Publication number
CN114940142B
CN114940142B CN202210607235.1A CN202210607235A CN114940142B CN 114940142 B CN114940142 B CN 114940142B CN 202210607235 A CN202210607235 A CN 202210607235A CN 114940142 B CN114940142 B CN 114940142B
Authority
CN
China
Prior art keywords
radiation source
key
signal
verification
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210607235.1A
Other languages
Chinese (zh)
Other versions
CN114940142A (en
Inventor
王翔
赵雨睿
陈颖
黄知涛
王垚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN202210607235.1A priority Critical patent/CN114940142B/en
Publication of CN114940142A publication Critical patent/CN114940142A/en
Application granted granted Critical
Publication of CN114940142B publication Critical patent/CN114940142B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/245Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user where the antenna reception area plays a role
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/241Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user whereby access privileges are related to the identifiers
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/25Means to switch the anti-theft system on or off using biometry
    • B60R25/252Fingerprint recognition
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses an automobile anti-theft method, an automobile anti-theft system and an automobile based on radiation source individual verification, wherein the method comprises the following steps: after a wireless connection is established between a vehicle end and a key end, acquiring a radiation source signal of the key end in real time; verifying the identity of the radiation source by using a wireless transmission encryption algorithm based on the rolling code; verifying the identity of the radiation source by using a radiation source individual verification algorithm based on a label smoothing technology; and if the two verification results are normal, correspondingly controlling unlocking or starting, otherwise, executing alarm by the vehicle end. The application effectively combines the hardware fingerprint verification module and the decryption algorithm module, does not need to carry out additional upgrading and reconstruction on the key improvement, reduces the complexity of system deployment, is easy to realize and has lower cost.

Description

Automobile anti-theft method and system based on radiation source individual verification and automobile
Technical Field
The application relates to the technical field of vehicle signal safety, in particular to an automobile anti-theft method and system based on radiation source individual verification and a vehicle.
Background
The keyless entry system (Passiveless Keyless Entry, PKE) realizes the bidirectional communication and authentication of the vehicle lock system by utilizing the RFID technology, is gradually accepted and accepted by the vast majority of users, and is widely applied to medium-high-end vehicle types. But PKE systems operate in ISM free bands (125 khz,315mhz,434 mhz) where no authority is required, and are susceptible to interference from other radios. The existing PKE system faces attack means such as violent scanning attack, replay code attack, relay attack, forward predictive code attack, dictionary predictive attack, password analysis attack and the like, and along with continuous optimization of an encryption mode, only relay attack is left to be solved.
The relay attack utilizes the relay station to expand or amplify the radio signal, so that the key and the vehicle are considered to be positioned in the effective distance of the other party to a certain extent, and the vehicle is stolen by using the relay station to induce the lock to respond to unlocking. The munich holde automobile club tested 237 modern automobiles from 30 brands in 2016, and found 230 of them vulnerable to hackers. In 2017, the team of the Qihu unicorn in China shows a set of low-cost wireless automobile unlocking tools which are developed by the team of the Qihu unicorn in China and only use $22, so that the cost of the unlocking tools is greatly reduced by 90%, and the wireless unlocking distance is greatly increased. In 2020, a hacker in the united states makes keyless relay devices in bulk and sells them, and customers are worldwide. In the case of theft cases today, cases of vehicle theft equipped with no "key entry and one-key start system are increasing. Police indicate that there is currently no good way to guard against this theft.
Aiming at the security threat problem caused by relay attack, the solutions of a vehicle factory and researchers are mainly focused on two aspects. The RF equipment protecting sleeve is used to shield the equipment signal with metal box. When the car owner leaves the car, the key is placed in the metal box, and communication between the key and the outside is blocked. When the vehicle owner opens the door, the key needs to be taken out of the box to wait for the door to respond. For vehicles equipped with keyless start systems, the owner needs to place the key separate from the metal box during travel. By using the method, the vehicle owner must take out the key when unlocking the vehicle, and the convenience of the keyless entry system is lost. And secondly, positioning the key to judge whether the car owner is in the vicinity of riding. The simplest is to locate the key by using the signal amplitude, as in the reference "method and procedure for preventing broadcast relay attack in keyless entry and start-up systems". Since the signal amplitude is susceptible to environmental influences, the key cannot be positioned with high accuracy. Ultra Wide-Band (UWB) positioning technology is introduced into this field. The technology utilizes ultra-wideband signals to realize accurate positioning of the key. However, the positioning technology has high requirement on time estimation, needs to arrange a plurality of antennas on the vehicle body, has high cost and is difficult to realize. In addition, the UWB positioning system is independent of the PKE system, and a Bluetooth system is required to be additionally configured for waking up.
Disclosure of Invention
The application aims to provide an automobile anti-theft method, an automobile anti-theft system and an automobile based on radiation source individual verification, so as to solve relay attack at low cost.
In order to achieve the above purpose, the present application provides the following technical solutions:
an automotive anti-theft method based on radiation source individual verification for a keyless entry system, comprising:
after a wireless connection is established between a vehicle end and a key end, acquiring a radiation source signal of the key end in real time;
verifying the identity of the radiation source by using a wireless transmission encryption algorithm based on the rolling code;
verifying the identity of the radiation source by using a radiation source individual verification algorithm based on a label smoothing technology;
and if the two verification results are normal, correspondingly controlling unlocking or starting, otherwise, executing alarm by the vehicle end.
Further, the radiation source individual verification algorithm based on the label smoothing technology verifies the identity of the radiation source, comprising:
preprocessing the radiation source signal to obtain a filtered and normalized radiation source signal;
extracting key fingerprint features contained in the signals by using a trained depth residual error network;
comparing the extracted key fingerprint characteristics with a template in a fingerprint characteristic library, and predicting the key identity by using OpenMax to obtain a verification result of the radiation source identity.
Further, the training step of the depth residual network model includes:
collecting a plurality of radiation source signals of a key end and preprocessing the radiation source signals to form a training set;
constructing a depth residual error network;
training the depth residual error network by using a training set and label smoothing technology to obtain a trained depth residual error network and a fingerprint feature library corresponding to the key end.
Further, pre-processing the radiation source signal, comprising:
band-pass filtering is carried out on the radiation source signal to obtain a baseband signal;
and carrying out amplitude normalization processing on the baseband signal.
Another object of the present application is to provide an automotive anti-theft system based on radiation source individual verification, comprising a vehicle end and a key end,
the vehicle end includes:
the wireless radio frequency transceiver module is connected with the main control chip and is used for receiving UHF signals by using an antenna;
the low-frequency transmitting module is connected with the main control chip and used for transmitting an LF signal to the key end;
the decryption algorithm module is connected with the main control chip and used for decoding the received UHF signals;
the fingerprint verification module is connected with the main control chip and is used for verifying the identity of the received UHF signal by a radiation source individual verification algorithm based on a label smoothing technology;
the execution component module is connected with the main control chip and used for controlling the opening and closing of the door lock and the alarming of the vehicle;
the main control chip is used for reading and transmitting the data of each module and controlling each module to work;
the key end includes:
the low-frequency receiving module is connected with the main control chip and is used for receiving the LF signal sent by the vehicle end and waking up the key end;
the wireless radio frequency transceiver module is connected with the main control chip and is used for transmitting UHF signals by using the antenna;
the encryption algorithm module is connected with the main control chip and used for encrypting the rolling code of the UHF signal sent by the wireless radio frequency transceiver module;
the button switch is connected with the main control chip and is used for triggering a control command and transmitting UHF signals with the control command by using the wireless radio frequency transceiver module;
the main control chip is used for reading and transmitting the data of each module and controlling each module to work.
It is a further object of the present application to provide a vehicle comprising an automotive anti-theft system based on radiation source individual verification as described above.
The beneficial effects of the application are as follows:
(1) The application has the capability of blocking relay attack. Aiming at the relay forwarding vehicle theft mode, the application provides a second identity authentication by utilizing the difference of the hardware fingerprints so as to prevent vehicle theft events and improve the safety of vehicles.
(2) The application also has a mode of preventing the false key from stealing the automobile, and can accurately identify the identity of the key when the false key simulates the real key to send out instructions to the automobile, prevent the occurrence of an automobile stealing event and improve the safety of the automobile.
(3) When the key fingerprint is extracted to verify identity, the fingerprint feature extractor is constructed by adopting a radiation source individual verification algorithm based on a label smoothing technology. Compared with the traditional method, the method has higher accuracy, can be better suitable for keys of different models of different manufacturers, and has wider application prospect.
(4) Multiple antennae in the ultra-wideband positioning system need to intercept and analyze signals at the same time, the system has high synchronous requirement, and the system has high requirement on time precision, is difficult to realize, and is not easy to modify and upgrade the existing vehicle type. The application effectively combines the hardware fingerprint verification module and the decryption algorithm module, analyzes on the basis of the existing intercepted signals, has low requirements on time precision and synchronism, and ensures that the system has high response speed and high efficiency.
(5) Compared with an ultra-wideband positioning system which is independent of a keyless entry system, the ultra-wideband positioning system needs to be additionally provided with a Bluetooth system for waking up, and signal receiving antennas are deployed at a plurality of positions of a vehicle body. The keyless entry system integrating the hardware fingerprint verification module at the vehicle end has the advantages of simple system equipment structure, reduced system deployment difficulty, high precision, low implementation difficulty, low implementation cost and the like, is easier to realize miniaturization and integration, is an outstanding advantage as an anti-theft vehicle system, and has wide market prospect.
Drawings
FIG. 1 is a schematic diagram of a vehicle end of an automotive anti-theft system based on radiation source individual verification provided by the application;
FIG. 2 is a schematic diagram of a key end of an automobile anti-theft system based on radiation source individual verification;
fig. 3 is a schematic structural diagram of a repeater according to the present application;
FIG. 4 is a schematic diagram of a ResNet network model of the fingerprint authentication module according to the present application;
FIG. 5 is a graph of experimental results of a keyless entry system at the time of experimental verification provided by the present application;
fig. 6 is a graph of relay attack experimental results at the time of experimental verification provided by the application;
FIG. 7 is a graph comparing the relay attack signal with the original signal during the experimental verification provided by the present application;
FIG. 8 is a graph of experimental results of an individual verification algorithm for verifying radiation sources during experimental verification provided by the application;
FIG. 9 is a flow chart of an automotive anti-theft method based on radiation source individual verification provided by the application;
fig. 10 is a flowchart of a training and testing process of the depth residual network provided by the present application.
Detailed Description
The application is described in further detail below with reference to the attached drawings and embodiments:
examples
The embodiment of the application provides an automobile anti-theft system based on radiation source individual verification, which comprises a vehicle end and a key end,
the vehicle end, as shown in fig. 1, includes:
the wireless radio frequency transceiver module is connected with the main control chip and is used for receiving UHF signals sent by the key end by utilizing the antenna;
the low-frequency transmitting module is connected with the main control chip and used for transmitting an LF signal to the key end;
the decryption algorithm module is connected with the main control chip and used for decoding the received UHF signals;
the fingerprint verification module is connected with the main control chip and is used for verifying the identity of the received UHF signal by a radiation source individual verification algorithm based on a label smoothing technology;
the execution component module is connected with the main control chip and used for controlling the opening and closing of the door lock and the alarming of the vehicle;
the main control chip is used for reading and transmitting the data of each module and controlling each module to work;
the vehicle end also comprises a clock module, a power module and a liquid crystal display module.
The key end, as shown in fig. 2, comprises:
the low-frequency receiving module is connected with the main control chip and is used for receiving the LF signal sent by the vehicle end and waking up the key end;
the wireless radio frequency transceiver module is connected with the main control chip and is used for transmitting UHF signals by using the antenna;
the encryption algorithm module is connected with the main control chip and used for encrypting the rolling code of the UHF signal sent by the wireless radio frequency transceiver module;
the button switch is connected with the main control chip and is used for triggering a control command and transmitting UHF signals with the control command by using the wireless radio frequency transceiver module;
the main control chip is used for reading and transmitting the data of each module and controlling each module to work.
Specifically, for the PKE system based on RFID, under normal conditions, the key end and the vehicle end can interact through wireless control signals to implement the vehicle control function, and the working logic is generally as follows:
the unlocking button on the car door is touched by a hand, the unlocking command is transmitted to the car end, after the car end receives the unlocking command, a low-frequency wake-up signal of 125kHz is transmitted to the key end by the low-frequency transmitting module, and meanwhile, the wireless radio frequency receiving and transmitting module continuously searches for a high-frequency response signal responded in the effective range. And after the key end is awakened, measuring the field intensity of the position where the key end is positioned, and if the field intensity value is larger than the field intensity threshold value of the edge of the identification area, considering that the key end is positioned in the effective area. The key end transmits 433MHz rolling code signal carrying control command to the vehicle end through the wireless radio frequency transceiver module. Then, the vehicle end receives the 433MHz rolling code signal carrying the control command through the wireless radio frequency receiving and transmitting module, decodes and verifies the rolling code encryption information transmitted by the key end through the decryption algorithm module, if successful, the unlocking command is executed through the execution component module, otherwise, the door lock cannot be unlocked, and the execution component module executes the alarm command.
The inventor finds that the wireless signal interaction between the key end and the vehicle end is easy to be attacked by the relay station, thereby causing the problem of low security. Under relay attack, a first relay close to an automobile modulates a low-frequency signal transmitted by an automobile end, so that the low-frequency signal can be transmitted to a second relay close to a key end. The second repeater modulates the signal again to make it the same to the original low frequency signal, and transmits to the key end. The deceptive key end also emits a high-frequency rolling code signal, and the high-frequency rolling code signal is transmitted to the automobile end through the second repeater and the first repeater again. The repeater is constructed as shown in fig. 3, and amplifies and frequency converts only the signal. By increasing the frequency of the signal and increasing the transmission distance of the signal, the relay attack is realized.
The inventor further finds that the technology for determining the identity authentication of the radiation source individual generating the signal according to the existing prior information, which performs characteristic measurement on the received electromagnetic signal, can quickly and accurately identify the identity of the radiation source individual by utilizing hardware information, and is widely applied to the field of specific target identity authentication. Therefore, a fingerprint verification module based on a radiation source individual verification technology is added in the keyless entry system so as to realize soft and hard dual identity authentication by combining the existing key authentication.
Based on the above findings, an embodiment of the present application provides an automobile anti-theft method based on radiation source individual verification, for a keyless entry system, as shown in fig. 9, including:
after a wireless connection is established between a vehicle end and a key end, acquiring a radiation source signal of the key end in real time;
verifying the identity of the radiation source by using a wireless transmission encryption algorithm based on the rolling code;
verifying the identity of the radiation source by using a radiation source individual verification algorithm based on a label smoothing technology;
and if the two verification results are normal, correspondingly controlling unlocking or starting, otherwise, executing alarm by the vehicle end.
Specifically, the vehicle end obtains UHF signals sent by the key end through the wireless radio frequency transceiver module, and the main control chip of the vehicle end transmits UHF signal wave bands to the decryption algorithm module and the fingerprint verification module respectively.
And the decryption algorithm module performs identity verification based on the rolling code encryption algorithm, and if the verification is passed, the verification result is considered to be normal.
The fingerprint verification module performs identity verification based on a radiation source individual verification algorithm of a label smoothing technology, and the verification process is as follows:
s1, preprocessing UHF signals, including:
band-pass filtering is carried out on the UHF signals to obtain baseband signals;
normalizing the baseband signal;
a filtered and normalized UHF signal is obtained.
S2, extracting key fingerprint features contained in the signals by utilizing a trained depth residual error network;
training a depth residual network comprising the steps of:
collecting UHF signals sent by a key end for a plurality of times, and preprocessing according to the preprocessing process to form a training set;
constructing a depth residual error network model, and training the depth residual error network model by adopting a training set and a label smoothing technology to obtain a trained depth residual error network which can serve as a feature extractor and a fingerprint feature library corresponding to a key end;
the depth residual network model is shown in fig. 4, and includes a convolution layer, a maximum pooling layer, eight residual blocks, a global pooling layer, a full connection layer and a SoftMax activation layer, where the SoftMax activation layer outputs probability vectors of targets belonging to various categories:
wherein, the liquid crystal display device comprises a liquid crystal display device,representing the ith element in the probability vector, C is the known number of radiation sources.
In the process of network training, a label smoothing technology is introduced, namely, the weighted average of labels and the average distribution of labels are utilized to calculate the cross entropy. For example, for the sample of the ith radiation source individual, the expected network output probability vector is
Where α is a small super-parameter, C is the number of known sources, p i Is the i-th element in the probability vector. By using the method, the target variable of the network can be wound, the generalization capability and learning speed of the network are greatly improved, and the feature extraction capability of the classification network is improved.
S3, comparing the extracted key fingerprint characteristics with a template in a fingerprint characteristic library, and predicting the key identity by using OpenMax to obtain a verification result of the radiation source identity.
And when the method works, the OpenMax activation layer is utilized to calculate the confidence coefficient of each category. OpenMax constructs the probability of unknown class by using the extremum distribution of the fingerprint characteristics of the known class, corrects the probability of the known class by using the distribution, and obtains a corrected probability vector as
In order to judge whether the target is an unknown class, firstly, the maximum value of the confidence coefficient is compared with a preset threshold. If the confidence coefficient maximum value is smaller than the threshold, judging the unknown class. If the confidence coefficient maximum value is larger than the threshold, taking the label corresponding to the confidence coefficient maximum value as the identification result.
Wherein epsilon is a judgment threshold and i is max Is the last predicted category. If i max E {1,2, …, C }, the radiation source is a known radiation source, the key is the key carried by the owner, and the verification result is normal; otherwise, the radiation source is an unknown radiation source and the vehicle is being subjected to an illegal attack.
A flow chart of the training and testing process of the depth residual network is shown in fig. 10.
Experiment verification
The experimental simulation system comprises 1 radiation source, 2 repeaters, and 1 receiver. The repeater is realized by adopting a combination of 1 receiver and 1 transmitter, and is controlled by a computer. The radiation source is regarded as a transmitting structure in the key and the receiver as receiving equipment at the lock end of the vehicle constitutes a basic keyless entry system. The 2 relays simulate the relay attack vehicle theft equipment used by illegal molecules. The signal processing analysis part of the vehicle end is completed by a computer. The signal adopted in the experiment is BPSK modulated signal, the carrier frequency of the signal is 770MHz, the code rate is 500kHz, the sampling rate of the whole system is 16MHz, and 870MHz is adopted for communication between 2 repeaters.
When the system is simulated to enter a keyless system, a receiver is adopted to directly receive the radiation source signal, the received sampling rate is 16MHz, and the length of the acquired signal is 1M. The experimental results are shown in FIG. 5.
When the relay attack system is simulated, the signals transmitted by the transmitter are forwarded by using 2 relays, and then relay attack is carried out on the keyless system. The 1 st repeater has a receiving frequency of 770MHz, a transmitting frequency of 870MHz, the 2 nd repeater has a receiving frequency of 870MHz and a transmitting frequency of 770MHz. The receiver evaluates to 770MHz and the sampling rate is 16MHz. The experimental results are shown in FIG. 6.
The computer decodes the signal received by the receiver and compares it with the original transmitted signal. The comparison result is shown in FIG. 7. As can be seen from fig. 7, the code element obtained by decoding the relay attack signal is the same as the real signal, and the "relay attack" can deceive the keyless entry system, thereby achieving the purpose of stealing the vehicle.
Then, 3 radiation source signals are collected as real samples, and meanwhile, 10 repeaters are adopted to forward the signals, so that a test set is constructed. In the experiment, the radiation source open set identification technology based on the label smoothing technology is adopted, the unknown class, namely the relay attack signal, is used as the refusal class for judgment, and the experimental result is shown in fig. 8, which shows that the accuracy of the system can be up to 99.7%, and the accuracy of the system is up to 100% in the aspect of resolution of relay attack.
The foregoing is merely exemplary of the present application, and specific technical solutions and/or features that are well known in the art have not been described in detail herein. It should be noted that, for those skilled in the art, several variations and modifications can be made without departing from the technical solution of the present application, and these should also be regarded as the protection scope of the present application, which does not affect the effect of the implementation of the present application and the practical applicability of the patent. The protection scope of the present application is subject to the content of the claims, and the description of the specific embodiments and the like in the specification can be used for explaining the content of the claims.

Claims (1)

1. An automotive anti-theft method based on radiation source individual verification for a keyless entry system, comprising:
after a wireless connection is established between a vehicle end and a key end, acquiring a radiation source signal of the key end in real time;
verifying the identity of the radiation source by using a wireless transmission encryption algorithm based on the rolling code;
verifying the radiation source identity using a radiation source individual verification algorithm based on a label smoothing technique, comprising:
preprocessing the radiation source signal to obtain a filtered and normalized radiation source signal;
extracting key fingerprint features contained in the signals by using a trained depth residual error network;
comparing the extracted key fingerprint features with templates in a fingerprint feature library, and predicting the key identity by using OpenMax to obtain a verification result of the radiation source identity;
if the two verification results are normal, unlocking or starting is correspondingly controlled, otherwise, the vehicle end executes alarming;
preprocessing the radiation source signal, including:
band-pass filtering is carried out on the radiation source signal to obtain a baseband signal;
carrying out amplitude normalization processing on the baseband signal;
the training step of the depth residual error network comprises the following steps:
collecting a plurality of radiation source signals of a key end and preprocessing the radiation source signals to form a training set;
constructing a depth residual error network;
training the depth residual error network by using a training set and label smoothing technology to obtain a trained depth residual error network and a fingerprint feature library corresponding to the key end.
CN202210607235.1A 2022-05-31 2022-05-31 Automobile anti-theft method and system based on radiation source individual verification and automobile Active CN114940142B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210607235.1A CN114940142B (en) 2022-05-31 2022-05-31 Automobile anti-theft method and system based on radiation source individual verification and automobile

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210607235.1A CN114940142B (en) 2022-05-31 2022-05-31 Automobile anti-theft method and system based on radiation source individual verification and automobile

Publications (2)

Publication Number Publication Date
CN114940142A CN114940142A (en) 2022-08-26
CN114940142B true CN114940142B (en) 2023-10-13

Family

ID=82909122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210607235.1A Active CN114940142B (en) 2022-05-31 2022-05-31 Automobile anti-theft method and system based on radiation source individual verification and automobile

Country Status (1)

Country Link
CN (1) CN114940142B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116193444A (en) * 2023-02-02 2023-05-30 广东为辰信息科技有限公司 Relay attack vulnerability detection method based on automobile keyless function

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007112341A (en) * 2005-10-21 2007-05-10 Fujitsu Ten Ltd Vehicle owner authentication device
CN101477718A (en) * 2008-12-19 2009-07-08 重庆集诚汽车电子有限责任公司 Passive non-key control system and control method thereof
CN104442699A (en) * 2014-11-27 2015-03-25 安徽机电职业技术学院 Automobile anti-theft device and method based on RFID
CN104796430A (en) * 2015-05-05 2015-07-22 深圳市聚电电子有限公司 Composite PKE (passive keyless entry) automobile encryption and antitheft system
CN106143414A (en) * 2016-08-30 2016-11-23 无锡卓信信息科技股份有限公司 Based on less radio-frequency and the control method of the VATS Vehicle Anti-Theft System of finger-mark check
CN109165678A (en) * 2018-07-28 2019-01-08 中国人民解放军战略支援部队信息工程大学 Emitter Recognition and device based on bispectrum 3-D image textural characteristics
CN112312457A (en) * 2020-10-29 2021-02-02 上海电机学院 Communication radiation source individual identification method based on complex depth residual error network
CN113177558A (en) * 2021-04-13 2021-07-27 电子科技大学 Radiation source individual identification method based on feature fusion of small samples
CN113705446A (en) * 2021-08-27 2021-11-26 电子科技大学 Open set identification method for individual radiation source

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007112341A (en) * 2005-10-21 2007-05-10 Fujitsu Ten Ltd Vehicle owner authentication device
CN101477718A (en) * 2008-12-19 2009-07-08 重庆集诚汽车电子有限责任公司 Passive non-key control system and control method thereof
CN104442699A (en) * 2014-11-27 2015-03-25 安徽机电职业技术学院 Automobile anti-theft device and method based on RFID
CN104796430A (en) * 2015-05-05 2015-07-22 深圳市聚电电子有限公司 Composite PKE (passive keyless entry) automobile encryption and antitheft system
CN106143414A (en) * 2016-08-30 2016-11-23 无锡卓信信息科技股份有限公司 Based on less radio-frequency and the control method of the VATS Vehicle Anti-Theft System of finger-mark check
CN109165678A (en) * 2018-07-28 2019-01-08 中国人民解放军战略支援部队信息工程大学 Emitter Recognition and device based on bispectrum 3-D image textural characteristics
CN112312457A (en) * 2020-10-29 2021-02-02 上海电机学院 Communication radiation source individual identification method based on complex depth residual error network
CN113177558A (en) * 2021-04-13 2021-07-27 电子科技大学 Radiation source individual identification method based on feature fusion of small samples
CN113705446A (en) * 2021-08-27 2021-11-26 电子科技大学 Open set identification method for individual radiation source

Also Published As

Publication number Publication date
CN114940142A (en) 2022-08-26

Similar Documents

Publication Publication Date Title
US9963109B2 (en) Vehicle control system to prevent relay attack
US11670110B2 (en) User authentication using mm-wave sensor for automotive radar systems
CN105051794B (en) Method and device for issuing access authorization
CN202703516U (en) Ultra-wide band passive keyless enter, starting and blocking device
US20140327517A1 (en) Remote control system, and method for automatically locking and/or unlocking at least one movable panel of a motor vehicle and/or for starting a motor vehicle engine using a remote control system
CN108297830B (en) Method and device for protecting a system for passively unlocking a vehicle system against relay station attacks
US20210302536A1 (en) Key FOB Localization Inside Vehicle
JP2008515315A (en) Electronic communication system, in particular access control system for passive keyless entry, and relay attack detection method therefor
WO2015064016A1 (en) Vehicle system, vehicle-mounted device, and portable device
WO2006066378A1 (en) User authentication for contact-less systems
US20180276924A1 (en) Vehicle-mounted device, portable device, and vehicle wireless communication system
CN114940142B (en) Automobile anti-theft method and system based on radiation source individual verification and automobile
CN110049903A (en) Access and/or starting device for vehicle
CN108068759B (en) System and method for preventing relay attack
CN103036865B (en) System and method for the access request to safety means for the certification
KR20190100948A (en) How to Protect Against Relay Attack
CN110562195A (en) Relay attack defense
US6580181B2 (en) In-vehicle key check system having check history memory
CN105835831A (en) Electronic anti-theft system for automotive engine
US20230150453A1 (en) System and method for detection and prevention of relay attack on vehicles keyless system
CN111907473B (en) Wireless signal source identification method and system and vehicle-mounted keyless authentication method and system
CN118247869A (en) Intelligent automobile key anti-fraud safety authentication method based on radio frequency fingerprint
Lounis et al. Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs
Quintero et al. Vulnerability analysis in RF locking systems of vehicles in Bogotá, Colombia.
Rath et al. Modelling and analysis of relay attack devices for passive-entry-passive-start wireless systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant