US20180326946A1 - Bluetooth low energy (ble) passive vehicle access control system for defending the system against relay attacks and method thereof - Google Patents

Bluetooth low energy (ble) passive vehicle access control system for defending the system against relay attacks and method thereof Download PDF

Info

Publication number
US20180326946A1
US20180326946A1 US15/590,269 US201715590269A US2018326946A1 US 20180326946 A1 US20180326946 A1 US 20180326946A1 US 201715590269 A US201715590269 A US 201715590269A US 2018326946 A1 US2018326946 A1 US 2018326946A1
Authority
US
United States
Prior art keywords
vehicle
radio transceiver
external device
key
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US15/590,269
Other versions
US10124768B1 (en
Inventor
Maurizio Bocca
Vivek Jain
Christoph Lang
Huang Lee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Robert Bosch GmbH
Original Assignee
Robert Bosch GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US15/590,269 priority Critical patent/US10124768B1/en
Application filed by Robert Bosch GmbH filed Critical Robert Bosch GmbH
Priority to KR1020197033178A priority patent/KR102604328B1/en
Priority to PCT/EP2018/061467 priority patent/WO2018206418A1/en
Priority to CN201880030627.8A priority patent/CN110582800A/en
Priority to JP2019561932A priority patent/JP2020521073A/en
Priority to EP18722042.1A priority patent/EP3622489A1/en
Assigned to ROBERT BOSCH GMBH reassignment ROBERT BOSCH GMBH ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LANG, CHRISTOPH, JAIN, VIVEK, BOCCA, Maurizio, LEE, HUANG
Application granted granted Critical
Publication of US10124768B1 publication Critical patent/US10124768B1/en
Publication of US20180326946A1 publication Critical patent/US20180326946A1/en
Priority to JP2023214983A priority patent/JP2024029052A/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/101Bluetooth
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/108Encryption
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00555Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks comprising means to detect or avoid relay attacks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Definitions

  • This disclosure relates generally to anti-relay attack access control systems and, more particularly, to a BLE passive vehicle access control system for defending the system against relay attacks and method thereof.
  • Standard Passive Entry Systems (PES) key fobs typically operate on two radio frequencies (RF). For example, low frequency (LF) communication is used for proximity detection and localization required for the Comfort Entry Go (CEG) functionality. Another frequency, such as ultra-high frequency (UHF), is used to extend the communication range for Remote Keyless Entry (RKE) functionality.
  • RF radio frequencies
  • LF low frequency
  • UHF ultra-high frequency
  • RKE Remote Keyless Entry
  • PES Passive Entry Systems
  • PES have strict proximity/localization requirements. For example, with a PES system providing RKE and CEG, a vehicle unlocks the doors only when a driver or a person authorized to access is within a perimeter at ⁇ 2 m from the vehicle. The PES/CEG system further allows the user or the driver to start the engine only when the key fob is inside the vehicle.
  • the current systems require LF, e.g. 125 kHz, antennas both inside and outside the vehicle along with optimal power control to satisfy the proximity/localization requirements.
  • LF e.g. 125 kHz
  • communication link from the key fob to the vehicle for RKE is based on UHF to satisfy both the range requirement ( ⁇ 50 m) and the antenna size requirement (i.e., the antenna needs to fit in a small key fob).
  • relay attacks an attacker uses a relay apparatus such as an analog amplifier to amplify the received signals from either the PES on the vehicle or the key fob and retransmit the received signals back to either the system or the key fob.
  • This attack makes the key fob believes the driver is in proximity of the vehicle, so that the key fob sends an access control command in UHF to the vehicle, which in turn unlocks the vehicle.
  • one attacker may also employ an advanced relay apparatus capable of measuring the power of the received signals and replicating the signals by adjusting the transmit power accordingly.
  • Electronic and wearable devices with integrated keyless passive entry systems are becoming widely used due to several advantages. For example, the user does not require to rely on key fobs for the access of the vehicle and further the user does not require to actively interact with the device nor the key fob with integrated PES in order to access the vehicle. However, these devices with integrated PES are also vulnerable to relay attacks.
  • Embodiments of the disclosure related to a BLE passive vehicle access control system comprise a vehicle, an external device communicatively coupled to the vehicle, a location receiver assembly, the location receiver assembly is configured to determine a coordinate of at least one of the vehicle and the external device, and a processor communicatively coupled to the location receiver assembly, the processor disables a communication between the vehicle and the external device if the coordinate of vehicle and the external device does not match.
  • the location receiver assembly comprises a first location receiver and a second location receiver, wherein the first location receiver determines the coordinate of the vehicle and the second location receiver determines the coordinate of the external device.
  • the coordinate comprises at least one of latitude and longitude, and altitude of the vehicle and the external device.
  • the BLE passive vehicle access control system further comprises a comparator configured to compare the coordinate of the vehicle and the external device.
  • the location receiver assembly is a global positioning system (GPS).
  • the BLE passive vehicle access control system further comprises a magnetometer configured to measure an intensity of magnetic field generated by the vehicle, encrypt the measured magnetic field with a secret magnetic key, and return the measured magnetic field with an encrypted secret magnetic key to the vehicle.
  • the magnetometer is positioned in the external device.
  • an access control system comprises a sensor for measuring at least one of a coordinate or an intensity of a magnetic field of the vehicle and a processor in communication with the sensor is configured to disable a connection between an external device and the vehicle.
  • the sensor is a location receiver, the location receiver is positioned in the vehicle communicatively coupled to an external device to measure the coordinate of the vehicle.
  • the coordinate is at least one of latitude and longitude, and the altitude of the vehicle.
  • the sensor is a magnetometer configured to measure the intensity of the magnetic field generated by the vehicle, the magnetometer is positioned in an external device communicatively coupled to the vehicle.
  • a method comprises measuring at least one of a coordinate of one of a vehicle and an external device and disabling a connection between an external device and the vehicle, wherein the coordinate of the vehicle and the external device does not match in close proximity to each other.
  • the method further comprises measuring an intensity of magnetic field generated by the vehicle, encrypting the measured intensity of the magnetic field with a secret magnetic key, and returning the measured intensity of the magnetic field with the secret magnetic key to the vehicle.
  • FIG. 1 is a block diagram of a system according to a described embodiment of the disclosure
  • FIG. 2A is a graph showing RSS profile data in accordance with the disclosure.
  • FIG. 2B is another graph showing RSS profile data in accordance with the disclosure.
  • FIG. 3 is a block diagram of a system according to another described embodiment of the disclosure.
  • FIG. 4 is a block diagram of a system according to yet another described embodiment of the disclosure.
  • FIG. 5 is a block diagram of a system according to another described embodiment of the disclosure.
  • FIG. 1 illustrates a system 10 in accordance with a disclosure.
  • the system 10 is a passive vehicle access control system comprises a vehicle 12 and an external device 14 communicatively coupled to the vehicle 12 via a communication link.
  • the communication link is a Bluetooth (BT) communication protocol and standard including a Bluetooth Low Energy (BLE) communication protocol.
  • the external device 14 may be any BLE-enabled device such as a key/card device or any other client device.
  • the external device 14 also includes passive vehicle access control functionality generally known to the industry.
  • the key/card device may be a key fob, key card, a client device, an access key, an access card, a smart card, a smart key, or any suitable BLE-enabled device.
  • the client device may be a smart phone, a personal digital assistant (PDA), a tablet, a laptop, a portable personal computer, a phablet, a wearable device, a thin device, a thick device, an entertainment device, an infotainment device, or any suitable portable/wearable device including Bluetooth low energy protocol or any suitable BT communication protocol.
  • the key/card device is a smart key 18 and the client device is a phablet 16 , both with BLE passive vehicle access control.
  • a plurality of wireless transceivers 20 , 22 , 24 , 26 comprises integrated antenna are installed at various locations in and around the vehicle 12 . In one embodiment, the antenna is a directional antenna.
  • wireless transceiver 20 and 24 are installed near the handle of the front doors.
  • Wireless transceiver 22 is installed near the rear end of the vehicle, whereas wireless transceiver 26 is installed at the front end of the vehicle.
  • the wireless transceiver 26 is located at a location near to a dashboard. As can be seen, except the wireless transceiver 26 that faces toward the inside of the vehicle, the rest of the wireless transceivers 20 , 22 , 24 are facing outwardly.
  • transceivers 20 , 22 , 24 , 26 periodically transmit signals such as advertisement beacons to announce the presence of the vehicle 12 to at least one of the smart key 18 or the phablet 16 carried by a driver or an authorized person of the vehicle 12 .
  • advertisement beacons When one of the smart key 18 or the phablet 16 receives these advertisement beacons, one of the smart key 18 or the phablet 16 starts or initiates the connection and authentication process with the vehicle 12 via for example the transceivers 20 , 22 , 24 , 26 .
  • the vehicle 12 and one of the smart key 18 or the phablet 16 continuously exchange data packets.
  • one of the smart key 18 or the phablet 16 periodically transmits beacons while either any number of the transceivers 20 , 22 , 24 , 26 or a BLE-enabled passive vehicle access control device coupled to the transceivers 20 , 22 , 24 , 26 measures Received Signal Strength (RSS) of these beacons in order to estimate the position of one of the smart key 18 or the phablet 16 .
  • the BLE-enabled passive vehicle access control device is also located on the vehicle 12 . In some embodiments, more than one BLE-enabled passive vehicle access control device may be installed in the vehicle 12 and then coupled to any in-vehicle devices via any number of communication links.
  • the BLE enabled passive vehicle access control device is remotely located outside the vehicle 12 and is communicatively coupled to the vehicle 12 via any suitable communication interface.
  • the BLE enabled passive vehicle access control device is located in a network.
  • the network can be, for example, a local-area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a primary network comprising multiple sub-networks located between the vehicle 12 and the external devices 14 , a cloud network, and so forth.
  • the BLE enabled passive vehicle access control device is located on a server.
  • the cloud network can be a public cloud network, a private cloud network, for example,
  • a motion detector 28 disposed in the external device 14 includes an accelerometer, and is configured to detect and distinguish among various types of motion and vibration.
  • the motion detector 28 includes a motion sensor, a gyroscope, a magnetometer, a vibration sensor, or any other suitable sensors.
  • a desired program code in the form of a set of computer-executable instructions or data structures may be stored in the motion detector 28 and the instructions allow the motion detector 28 to detect and distinguish various types of motion and vibration.
  • a processor coupled to the accelerometer 28 receives the measured information including acceleration data, compares the acceleration data with a set of pre-determined criteria as described in detail below, and distinguishes the acceleration data associated with a motion or vibration of the external device 14 . Further, the processor analyzes the acceleration data to determine if a sequence of motion and vibration matches with a set of pre-determined criteria, i.e. an expected sequence of motion and vibration.
  • a set of pre-determined criteria includes a significant or maximum motion, e.g. walking towards or away from the vehicle, a minimum motion, e.g. single step detection, a no motion, e.g. no change in location, a vibration mode, or so forth. If the sequence of motion and vibration does not match with the set of pre-determined criteria, a bi-directional communication between the vehicle 12 and the external device 14 is disabled, which in turn disrupts any relay attacks.
  • the motion detector 28 of the external device 14 or the processor located in the vehicle 12 may be configured to distinguish between a true motion event and a false motion event.
  • the processor located in the vehicle 12 receives the measured information including acceleration data from the motion detector 28 , compares the acceleration data with a set of pre-determined criteria, and distinguishes the acceleration data between a true motion event and false motion event. If the event is determined to be a false motion event, i.e. the external device 14 is not moving, then the bi-directional communication between the vehicle 12 and the external device 14 is disabled to defend the vehicle 12 and the external device 14 against any relay attacks.
  • the processor and the accelerometer may be integrated into the motion detector 28 , in one example.
  • the processor is located somewhere inside the external device 14 and is an independent component from the motion detector 28 .
  • the processor is located in the vehicle 12 and the motion detector 28 is communicatively coupled to the processor.
  • a microprocessor 30 having a set of computer executable instructions including a TX power profiling is provided.
  • the external device 14 and the vehicle 12 transmit to each other several packets.
  • the transmitting device such as the external device 14
  • RX power (RSS) level profile that serves as an authentication before a connection between the external device 14 and the vehicle 12 is estabilished.
  • the receiving end of the communication link in the vehicle 12 measures the RX power (RSS) level of successive incoming signals, compares the RX power level of successive incoming signals with the pre-defined secure pattern stored in a machine readable medium.
  • the machine readable medium may be located in either the vehicle 12 , the external device 14 , the network, or the server. If the RSS of the incoming signals is constant, a communication between the vehicle 12 and the external device 14 is disabled, which in turn disrupts any relay attacks.
  • FIG. 2A shows the graph 40 of the constant RSS profile generated by an attacker.
  • a secret TX power profile generates a specific and secret RSS profile pattern illustrated as a graph 48 .
  • both vehicle 12 and external device 14 are able to detect the presence of a relay attack by measuring the power of the received signals and then comparing the resulting RSS profile with the pre-defined and secure TX power profile.
  • the same packet (message) is transmitted multiple times during the connection and authentication phase by varying transmit power level.
  • each packet (message) is transmitted during the connection and authentication phase by varying the transmit power level.
  • the transmit power level used to transmit the packet (message) may be added to the payload of the encrypted transmitted packet.
  • the receiving end of the communication link in the vehicle 12 measures the RSS of the received packet and adds this value to the payload of the encrypted response packet.
  • the transmitting device 14 further uses this information to adjust its own transmit power level to the same level.
  • FIG. 3 illustrates another system 60 in accordance with a disclosure.
  • the system 60 is identical to the system 10 illustrated in FIG. 1 , except that the system 60 includes a barometric pressure sensor 64 configured to measure barometric pressure, which ultimately translates the measured barometric pressure into altitude value. If the altitude value of the vehicle 12 does not match with the altitude value of the external device 14 , a bi-directional communication between the vehicle 12 and the external device 14 is disabled, which in turn disrupts any relay attacks. This altitude or barometric pressure reading process provides a level of security in controlling the access to the vehicle 12 and to defend the system 60 against relay attacks during the communication established between the vehicle 12 and the external device 14 .
  • the barometric pressure sensor 64 is integrated into the motion detector 28 .
  • the barometric pressure sensor 64 may be a separate component is communicatively coupled to the motion detector 28 .
  • a suitable program code in the form of a set of computer-executable instructions or data structures may be stored in the barometric pressure sensor 64 and the instructions cause the barometric pressure sensor 64 to measure barometric pressure level and compare the resulting altitude of the vehicle 12 and the external device 14 .
  • a processor previously described in FIG. 1 , not only is capable of comparing the acceleration data collected by the accelerometer 28 with a set of pre-determined criteria and distinguishing the acceleration data associated with a motion or vibration of the external device 14 , but the processor is also capable of comparing the altitude of the vehicle 12 and the external device 14 .
  • FIG. 4 illustrates another system 80 in accordance with a disclosure.
  • the system 80 is identical to the system 10 illustrated in FIG. 1 , except that the system 80 includes a location receiver 82 to determine a current location of the system.
  • the location receiver 82 is a global positioning system (GPS) configured to determine current coordinate, such as latitude and longitude, of the system.
  • GPS global positioning system
  • the location receiver 82 may determine altitude of the system 80 other than the latitude and longitude.
  • Each of the external device 14 and the vehicle 12 includes a location receiver 82 .
  • the location receiver 82 of the external device 14 transmits current location details of the external device 14 to the vehicle 12 via suitable communication protocol.
  • the location receiver 82 of the vehicle 12 receives the current location details of the external device 14 and compares the received current location details of the external device 14 with the current location details of the vehicle 12 . If both location details of the vehicle 12 and the external device 14 do not match, a bi-directional communication between the vehicle 12 and the external device 14 is disabled and the authentication process is terminated.
  • an optional comparator may be provided to compare the current location details of both the vehicle 12 and the external device 14 . The bi-directional communication is disabled between the vehicle 12 and the external device 14 and the authentication process is terminated if the current location details of the vehicle 12 and the external device 14 do not match with each other.
  • the comparator may be integrated into the location receiver 82 . In other embodiment, the comparator may be coupled to the location receiver 82 .
  • FIG. 5 illustrates another system 100 in accordance with a disclosure.
  • the system 100 is identical to the system 10 illustrated in FIG. 1 , except that the system 100 is configured to measure an intensity of a magnetic field generated by the vehicle 12 .
  • the vehicle 12 comprises at least one electromagnet E located at the same location as the transceivers 20 , 22 , 24 , 26 .
  • the electromagnet E may be positioned within the transceivers 20 , 22 , 24 , 26 .
  • the electromagnet E may be positioned adjacent to the transceivers 20 , 22 , 24 , 26 .
  • Three electromagnets E are depicted, however, any number of electromagnets may be recommended without departing from the scope of the disclosure.
  • External devices 14 such as a smart key 18 , a thin client 28 , or any suitable devices include at least a sensor 92 such as a magnetometer.
  • a sensor 92 such as a magnetometer.
  • the vehicle 12 When packages from a relay attacker replicating the external device 14 are received by the vehicle 12 , the vehicle 12 generates a magnetic field including a change of intensity according to a randomly generated secret key. Any one of the external devices 14 measure the intensity of the magnetic field generated by the vehicle 12 using the magnetometer 92 .
  • the magnetometer 92 encrypts the measured magnetic field with a secret magnetic key and transmits the measured magnetic field with the encrypted secret magnetic key back to the vehicle 12 . This process confirms the authentic presence of the external device 14 in the proximity of the vehicle 12 .
  • the external devices 14 receives the package comprises the magnetic fingerprint and determines the received package is not transmitted by the vehicle 12 but rather from another unauthorized device such as the attacker.
  • the external device 14 continues to detect any ongoing attacks and stops communication with the vehicle 12 .
  • Embodiments within the scope of the disclosure may also include non-transitory computer-readable storage media or machine-readable medium for carrying or having computer-executable instructions or data structures stored thereon.
  • Such non-transitory computer-readable storage media or machine-readable medium may be any available media that can be accessed by a general purpose or special purpose computer.
  • such non-transitory computer-readable storage media or machine-readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures. Combinations of the above should also be included within the scope of the non-transitory computer-readable storage media or machine-readable medium.
  • Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network.
  • Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
  • Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments.
  • program modules include routines, programs, objects, components, and data structures, etc. that perform particular tasks or implement particular abstract data types.
  • Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A Bluetooth Low-Energy (BLE) passive vehicle access control system integrated into a vehicle and an external device to defend the system against relay attacks is provided. The system includes a location received configured to determine a current location of the system. The location of the system may be in the form of latitude and longitude, altitude, or combination thereof. The system further includes a vehicle and an external device. The location receiver may be integrated into the vehicle, the external device, or both. A processor is communicatively coupled the location receiver to any number of wireless transceivers. A comparator configured to compare the current location of both the vehicle and the external device may be optionally coupled to the location receiver and the processor. Any number of electromagnets for generating a magnetic field may be installed in the vehicle and located adjacent to the transceivers. A magnetometer of the external device measures the intensity of the magnetic field, encrypts the magnetic field with a secret magnetic key, and returns the encrypted magnetic field back to the vehicle.

Description

    FIELD
  • This disclosure relates generally to anti-relay attack access control systems and, more particularly, to a BLE passive vehicle access control system for defending the system against relay attacks and method thereof.
  • BACKGROUND
  • Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to the prior art by inclusion in this section.
  • Standard Passive Entry Systems (PES) key fobs typically operate on two radio frequencies (RF). For example, low frequency (LF) communication is used for proximity detection and localization required for the Comfort Entry Go (CEG) functionality. Another frequency, such as ultra-high frequency (UHF), is used to extend the communication range for Remote Keyless Entry (RKE) functionality. Passive Entry Systems (PES) have strict proximity/localization requirements. For example, with a PES system providing RKE and CEG, a vehicle unlocks the doors only when a driver or a person authorized to access is within a perimeter at ˜2 m from the vehicle. The PES/CEG system further allows the user or the driver to start the engine only when the key fob is inside the vehicle. These localization requirements are hard to satisfy for any wireless technology. Therefore, the current systems require LF, e.g. 125 kHz, antennas both inside and outside the vehicle along with optimal power control to satisfy the proximity/localization requirements. On the other hand, communication link from the key fob to the vehicle for RKE (i.e., when the user explicitly presses the lock/unlock button on the key fob) is based on UHF to satisfy both the range requirement (˜50 m) and the antenna size requirement (i.e., the antenna needs to fit in a small key fob).
  • These systems are vulnerable to relay attacks. In a relay attack, an attacker uses a relay apparatus such as an analog amplifier to amplify the received signals from either the PES on the vehicle or the key fob and retransmit the received signals back to either the system or the key fob. This attack makes the key fob believes the driver is in proximity of the vehicle, so that the key fob sends an access control command in UHF to the vehicle, which in turn unlocks the vehicle. In more advanced attacks, one attacker may also employ an advanced relay apparatus capable of measuring the power of the received signals and replicating the signals by adjusting the transmit power accordingly.
  • Electronic and wearable devices with integrated keyless passive entry systems are becoming widely used due to several advantages. For example, the user does not require to rely on key fobs for the access of the vehicle and further the user does not require to actively interact with the device nor the key fob with integrated PES in order to access the vehicle. However, these devices with integrated PES are also vulnerable to relay attacks.
  • Therefore, there is a long felt need to provide an improved passive vehicle access control system to defend the system against relay attacks.
  • SUMMARY
  • A summary of certain embodiments disclosed herein is set forth below. It should be understood that these aspects are presented merely to provide the reader with a brief summary of these certain embodiments and that these aspects are not intended to limit the scope of this disclosure. Indeed, this disclosure may encompass a variety of aspects that may not be set forth below.
  • Embodiments of the disclosure related to a BLE passive vehicle access control system comprise a vehicle, an external device communicatively coupled to the vehicle, a location receiver assembly, the location receiver assembly is configured to determine a coordinate of at least one of the vehicle and the external device, and a processor communicatively coupled to the location receiver assembly, the processor disables a communication between the vehicle and the external device if the coordinate of vehicle and the external device does not match. The location receiver assembly comprises a first location receiver and a second location receiver, wherein the first location receiver determines the coordinate of the vehicle and the second location receiver determines the coordinate of the external device. The coordinate comprises at least one of latitude and longitude, and altitude of the vehicle and the external device. The BLE passive vehicle access control system further comprises a comparator configured to compare the coordinate of the vehicle and the external device. The location receiver assembly is a global positioning system (GPS). The BLE passive vehicle access control system further comprises a magnetometer configured to measure an intensity of magnetic field generated by the vehicle, encrypt the measured magnetic field with a secret magnetic key, and return the measured magnetic field with an encrypted secret magnetic key to the vehicle. The magnetometer is positioned in the external device.
  • According to another exemplary embodiment of the disclosure, an access control system comprises a sensor for measuring at least one of a coordinate or an intensity of a magnetic field of the vehicle and a processor in communication with the sensor is configured to disable a connection between an external device and the vehicle. The sensor is a location receiver, the location receiver is positioned in the vehicle communicatively coupled to an external device to measure the coordinate of the vehicle. The coordinate is at least one of latitude and longitude, and the altitude of the vehicle. The sensor is a magnetometer configured to measure the intensity of the magnetic field generated by the vehicle, the magnetometer is positioned in an external device communicatively coupled to the vehicle. The magnetometer is further configured to encrypt the measured intensity of the magnetic field with a secret magnetic key and return the measured intensity of the magnetic field with the secret magnetic key to the vehicle. According to another exemplary embodiment of the disclosure, a method comprises measuring at least one of a coordinate of one of a vehicle and an external device and disabling a connection between an external device and the vehicle, wherein the coordinate of the vehicle and the external device does not match in close proximity to each other. The method further comprises measuring an intensity of magnetic field generated by the vehicle, encrypting the measured intensity of the magnetic field with a secret magnetic key, and returning the measured intensity of the magnetic field with the secret magnetic key to the vehicle.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other features, aspects, and advantages of this disclosure will become better understood when the following detailed description of certain exemplary embodiments is read with reference to the accompanying drawings in which like characters represent like arts throughout the drawings, wherein:
  • FIG. 1 is a block diagram of a system according to a described embodiment of the disclosure;
  • FIG. 2A is a graph showing RSS profile data in accordance with the disclosure;
  • FIG. 2B is another graph showing RSS profile data in accordance with the disclosure;
  • FIG. 3 is a block diagram of a system according to another described embodiment of the disclosure;
  • FIG. 4 is a block diagram of a system according to yet another described embodiment of the disclosure; and
  • FIG. 5 is a block diagram of a system according to another described embodiment of the disclosure.
  • DETAILED DESCRIPTION
  • The following description is presented to enable any person skilled in the art to make and use the described embodiments, and is provided in the context of a particular application and its requirements. Various modifications to the described embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the described embodiments. Thus, the described embodiments are not limited to the embodiments shown, but are to be accorded the widest scope consistent with the principles and features disclosed herein.
  • FIG. 1 illustrates a system 10 in accordance with a disclosure. The system 10 is a passive vehicle access control system comprises a vehicle 12 and an external device 14 communicatively coupled to the vehicle 12 via a communication link. As illustrated, the communication link is a Bluetooth (BT) communication protocol and standard including a Bluetooth Low Energy (BLE) communication protocol. The external device 14 may be any BLE-enabled device such as a key/card device or any other client device. The external device 14 also includes passive vehicle access control functionality generally known to the industry. The key/card device may be a key fob, key card, a client device, an access key, an access card, a smart card, a smart key, or any suitable BLE-enabled device. The client device may be a smart phone, a personal digital assistant (PDA), a tablet, a laptop, a portable personal computer, a phablet, a wearable device, a thin device, a thick device, an entertainment device, an infotainment device, or any suitable portable/wearable device including Bluetooth low energy protocol or any suitable BT communication protocol. As illustrated, the key/card device is a smart key 18 and the client device is a phablet 16, both with BLE passive vehicle access control. A plurality of wireless transceivers 20, 22, 24, 26 comprises integrated antenna are installed at various locations in and around the vehicle 12. In one embodiment, the antenna is a directional antenna. Depending on the application, other suitable antenna either integrated into or coupled to the transceivers. For example, wireless transceiver 20 and 24 are installed near the handle of the front doors. Wireless transceiver 22 is installed near the rear end of the vehicle, whereas wireless transceiver 26 is installed at the front end of the vehicle. For instance, the wireless transceiver 26 is located at a location near to a dashboard. As can be seen, except the wireless transceiver 26 that faces toward the inside of the vehicle, the rest of the wireless transceivers 20, 22, 24 are facing outwardly. Any number of transceivers 20, 22, 24, 26 periodically transmit signals such as advertisement beacons to announce the presence of the vehicle 12 to at least one of the smart key 18 or the phablet 16 carried by a driver or an authorized person of the vehicle 12. When one of the smart key 18 or the phablet 16 receives these advertisement beacons, one of the smart key 18 or the phablet 16 starts or initiates the connection and authentication process with the vehicle 12 via for example the transceivers 20, 22, 24, 26. During this process, the vehicle 12 and one of the smart key 18 or the phablet 16 continuously exchange data packets. At the completion of this process, one of the smart key 18 or the phablet 16 periodically transmits beacons while either any number of the transceivers 20, 22, 24, 26 or a BLE-enabled passive vehicle access control device coupled to the transceivers 20, 22, 24, 26 measures Received Signal Strength (RSS) of these beacons in order to estimate the position of one of the smart key 18 or the phablet 16. The BLE-enabled passive vehicle access control device is also located on the vehicle 12. In some embodiments, more than one BLE-enabled passive vehicle access control device may be installed in the vehicle 12 and then coupled to any in-vehicle devices via any number of communication links. In some embodiments, the BLE enabled passive vehicle access control device is remotely located outside the vehicle 12 and is communicatively coupled to the vehicle 12 via any suitable communication interface. In another embodiments, the BLE enabled passive vehicle access control device is located in a network. The network can be, for example, a local-area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a primary network comprising multiple sub-networks located between the vehicle 12 and the external devices 14, a cloud network, and so forth. The yet embodiment, the BLE enabled passive vehicle access control device is located on a server. The cloud network can be a public cloud network, a private cloud network, for example,
  • To increase the level of security in controlling the access to the vehicle and to defend the system 10 against relay attacks performed during the communication established between the vehicle 12 and the external device 14, a motion detector 28 disposed in the external device 14 is provided. The motion detector 28, in one embodiment, includes an accelerometer, and is configured to detect and distinguish among various types of motion and vibration. In some embodiments, the motion detector 28 includes a motion sensor, a gyroscope, a magnetometer, a vibration sensor, or any other suitable sensors. A desired program code in the form of a set of computer-executable instructions or data structures may be stored in the motion detector 28 and the instructions allow the motion detector 28 to detect and distinguish various types of motion and vibration. A processor coupled to the accelerometer 28 receives the measured information including acceleration data, compares the acceleration data with a set of pre-determined criteria as described in detail below, and distinguishes the acceleration data associated with a motion or vibration of the external device 14. Further, the processor analyzes the acceleration data to determine if a sequence of motion and vibration matches with a set of pre-determined criteria, i.e. an expected sequence of motion and vibration. A set of pre-determined criteria includes a significant or maximum motion, e.g. walking towards or away from the vehicle, a minimum motion, e.g. single step detection, a no motion, e.g. no change in location, a vibration mode, or so forth. If the sequence of motion and vibration does not match with the set of pre-determined criteria, a bi-directional communication between the vehicle 12 and the external device 14 is disabled, which in turn disrupts any relay attacks.
  • The motion detector 28 of the external device 14 or the processor located in the vehicle 12 may be configured to distinguish between a true motion event and a false motion event. For example, the processor located in the vehicle 12 receives the measured information including acceleration data from the motion detector 28, compares the acceleration data with a set of pre-determined criteria, and distinguishes the acceleration data between a true motion event and false motion event. If the event is determined to be a false motion event, i.e. the external device 14 is not moving, then the bi-directional communication between the vehicle 12 and the external device 14 is disabled to defend the vehicle 12 and the external device 14 against any relay attacks. The processor and the accelerometer may be integrated into the motion detector 28, in one example. In another example, the processor is located somewhere inside the external device 14 and is an independent component from the motion detector 28. In yet another example, the processor is located in the vehicle 12 and the motion detector 28 is communicatively coupled to the processor.
  • To provide another level of security in controlling the access to the vehicle and to defend the system 10 against relay attacks during the communication established between the vehicle 12 and the external device 14, a microprocessor 30 having a set of computer executable instructions including a TX power profiling is provided. During the connection and authentication phase, the external device 14 and the vehicle 12 transmit to each other several packets. For example, the transmitting device, such as the external device 14, modulates the transmit (TX) power level of successive transmissions according to a specific and secret pattern so to create at a receiving end of the communication link, such as the vehicle 12, an identical RX power (RSS) level profile that serves as an authentication before a connection between the external device 14 and the vehicle 12 is estabilished. The receiving end of the communication link in the vehicle 12 measures the RX power (RSS) level of successive incoming signals, compares the RX power level of successive incoming signals with the pre-defined secure pattern stored in a machine readable medium. The machine readable medium may be located in either the vehicle 12, the external device 14, the network, or the server. If the RSS of the incoming signals is constant, a communication between the vehicle 12 and the external device 14 is disabled, which in turn disrupts any relay attacks. FIG. 2A shows the graph 40 of the constant RSS profile generated by an attacker. Now referring to FIG. 2B, a secret TX power profile generates a specific and secret RSS profile pattern illustrated as a graph 48. As can be seen, both vehicle 12 and external device 14 are able to detect the presence of a relay attack by measuring the power of the received signals and then comparing the resulting RSS profile with the pre-defined and secure TX power profile. In one embodiment, the same packet (message) is transmitted multiple times during the connection and authentication phase by varying transmit power level. In another embodiment, each packet (message) is transmitted during the connection and authentication phase by varying the transmit power level. In yet another embodiment, the transmit power level used to transmit the packet (message) may be added to the payload of the encrypted transmitted packet. The receiving end of the communication link in the vehicle 12measures the RSS of the received packet and adds this value to the payload of the encrypted response packet. In turn, the transmitting device 14 further uses this information to adjust its own transmit power level to the same level.
  • FIG. 3 illustrates another system 60 in accordance with a disclosure. The system 60 is identical to the system 10 illustrated in FIG. 1, except that the system 60 includes a barometric pressure sensor 64 configured to measure barometric pressure, which ultimately translates the measured barometric pressure into altitude value. If the altitude value of the vehicle 12 does not match with the altitude value of the external device 14, a bi-directional communication between the vehicle 12 and the external device 14 is disabled, which in turn disrupts any relay attacks. This altitude or barometric pressure reading process provides a level of security in controlling the access to the vehicle 12 and to defend the system 60 against relay attacks during the communication established between the vehicle 12 and the external device 14. In one embodiment, the barometric pressure sensor 64 is integrated into the motion detector 28. In another embodiment, the barometric pressure sensor 64 may be a separate component is communicatively coupled to the motion detector 28. A suitable program code in the form of a set of computer-executable instructions or data structures may be stored in the barometric pressure sensor 64 and the instructions cause the barometric pressure sensor 64 to measure barometric pressure level and compare the resulting altitude of the vehicle 12 and the external device 14. In some embodiments, a processor, previously described in FIG. 1, not only is capable of comparing the acceleration data collected by the accelerometer 28 with a set of pre-determined criteria and distinguishing the acceleration data associated with a motion or vibration of the external device 14, but the processor is also capable of comparing the altitude of the vehicle 12 and the external device 14.
  • FIG. 4 illustrates another system 80 in accordance with a disclosure. The system 80 is identical to the system 10 illustrated in FIG. 1, except that the system 80 includes a location receiver 82 to determine a current location of the system. In one embodiment, the location receiver 82 is a global positioning system (GPS) configured to determine current coordinate, such as latitude and longitude, of the system. In another embodiment, the location receiver 82 may determine altitude of the system 80 other than the latitude and longitude. Each of the external device 14 and the vehicle 12 includes a location receiver 82. The location receiver 82 of the external device 14 transmits current location details of the external device 14 to the vehicle 12 via suitable communication protocol. The location receiver 82 of the vehicle 12 receives the current location details of the external device 14 and compares the received current location details of the external device 14 with the current location details of the vehicle 12. If both location details of the vehicle 12 and the external device 14 do not match, a bi-directional communication between the vehicle 12 and the external device 14 is disabled and the authentication process is terminated. In some embodiments, an optional comparator may be provided to compare the current location details of both the vehicle 12 and the external device 14. The bi-directional communication is disabled between the vehicle 12 and the external device 14 and the authentication process is terminated if the current location details of the vehicle 12 and the external device 14 do not match with each other. In one embodiment, the comparator may be integrated into the location receiver 82. In other embodiment, the comparator may be coupled to the location receiver 82.
  • FIG. 5 illustrates another system 100 in accordance with a disclosure. The system 100 is identical to the system 10 illustrated in FIG. 1, except that the system 100 is configured to measure an intensity of a magnetic field generated by the vehicle 12. As depicted, the vehicle 12 comprises at least one electromagnet E located at the same location as the transceivers 20, 22, 24, 26. In some embodiments, the electromagnet E may be positioned within the transceivers 20, 22, 24, 26. In another embodiment, the electromagnet E may be positioned adjacent to the transceivers 20, 22, 24, 26. Three electromagnets E are depicted, however, any number of electromagnets may be recommended without departing from the scope of the disclosure. External devices 14 such as a smart key 18, a thin client 28, or any suitable devices include at least a sensor 92 such as a magnetometer. When packages from a relay attacker replicating the external device 14 are received by the vehicle 12, the vehicle 12 generates a magnetic field including a change of intensity according to a randomly generated secret key. Any one of the external devices 14 measure the intensity of the magnetic field generated by the vehicle 12 using the magnetometer 92. The magnetometer 92 encrypts the measured magnetic field with a secret magnetic key and transmits the measured magnetic field with the encrypted secret magnetic key back to the vehicle 12. This process confirms the authentic presence of the external device 14 in the proximity of the vehicle 12. If the magnetic fingerprint is neither identifiable nor measureable by at least one of the external devices 14, the external devices 14 receives the package comprises the magnetic fingerprint and determines the received package is not transmitted by the vehicle 12 but rather from another unauthorized device such as the attacker. The external device 14 continues to detect any ongoing attacks and stops communication with the vehicle 12.
  • The embodiments described above have been shown by way of example, and it should be understood that these embodiments may be susceptible to various modifications and alternative forms. It should be further understood that the claims are not intended to be limited to the particular forms disclosed, but rather to cover all modifications, equivalents, and alternatives falling with the sprit and scope of this disclosure.
  • Embodiments within the scope of the disclosure may also include non-transitory computer-readable storage media or machine-readable medium for carrying or having computer-executable instructions or data structures stored thereon. Such non-transitory computer-readable storage media or machine-readable medium may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such non-transitory computer-readable storage media or machine-readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures. Combinations of the above should also be included within the scope of the non-transitory computer-readable storage media or machine-readable medium.
  • Embodiments may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network.
  • Computer-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, objects, components, and data structures, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.
  • While the patent has been described with reference to various embodiments, it will be understood that these embodiments are illustrative and that the scope of the disclosure is not limited to them. Many variations, modifications, additions, and improvements are possible. More generally, embodiments in accordance with the patent have been described in the context of particular embodiments. Functionalities may be separated or combined in blocks differently in various embodiments of the disclosure or described with different terminology. These and other variations, modifications, additions, and improvements may fall within the scope of the disclosure as defined in the claims that follow.

Claims (15)

1. A Bluetooth Low Energy (BLE) passive vehicle access control system comprising:
a vehicle comprising:
a first radio transceiver; and
an electromagnet configured to generate an electromagnetic field with a varying intensity level based on a randomly generated key, the electromagnet being separate from the first radio transceiver; and
an external device comprising:
a second radio transceiver configured to transmit and receive encrypted data with the first radio transceiver in the vehicle;
a magnetometer, the magnetometer being separate from the second radio transceiver; and
a processor coupled to the first radio transceiver and the magnetometer, the processor being configured to:
generate a fingerprint of an electromagnetic field in a region proximate to the external device based on measurements made using the magnetometer;
transmit the fingerprint to the first radio transceiver in a first encrypted packet using a secret magnetic key to encrypt the fingerprint;
identify that a second encrypted packet received with the second radio transceiver is transmitted from the first radio transceiver in the vehicle only in response to the second encrypted packet including the fingerprint; and
disable communication of the second radio transceiver in response to the second encrypted packet not including the fingerprint.
2-5. (canceled)
6. The BLE passive vehicle access control system of claim 2, the processor being further configured to:
transmit the first encrypted packet including the fingerprint corresponding to measurements of changes in the electromagnetic field intensity using the second radio transceiver, the first encrypted packet being encrypted using the secret magnetic key.
7. (canceled)
8. The BLE passive vehicle access control system of claim 1 wherein the external device is at least one of a key/card device and a client device.
9. The BLE passive vehicle access control system of claim 8 wherein the key/card device is a key fob, key card, an access key, an access card, a smart card, and a smart key.
10. The BLE passive vehicle access control system of claim 8 wherein the client device is a smart phone, a personal digital assistant (PDA), a tablet, a laptop, a portable personal computer, a phablet, a wearable device, a thin device, a thick device, an entertainment device, and an infotainment device.
11. An external device used in an access control system for a vehicle comprising:
a radio transceiver configured to transmit and receive encrypted data;
a magnetometer, the magnetometer being separate from the radio transceiver; and
a processor coupled to the radio transceiver and the magnetometer, the processor being configured to:
generate a fingerprint of an electromagnetic field in a region proximate to the external device based on measurements made using the magnetometer;
transmit the fingerprint to the another radio transceiver in the vehicle in a first encrypted packet using a secret magnetic key to encrypt the fingerprint;
identify that a second encrypted packet received with the radio transceiver is transmitted from the other radio transceiver in the vehicle only in response to the second encrypted packet including the fingerprint; and
disable communication of the radio transceiver in response to the second encrypted packet not including the fingerprint.
12-14. (canceled)
15. The external device of claim 11, processor being further configured to:
transmit the first encrypted packet including the fingerprint corresponding to measurements of changes in the electromagnetic field intensity using the radio transceiver, the first encrypted packet being encrypted using the secret magnetic key.
16. A method for operating an external device in an access control system for a vehicle comprising:
generating, with a processor, a fingerprint of an electromagnetic field in a region proximate to the external device based on measurements made using a magnetometer in the external device;
transmitting, with the processor and a radio transceiver in the external device, the fingerprint to the another radio transceiver in the vehicle in a first encrypted packet using a secret magnetic key to encrypt the fingerprint;
identifying, with the processor, that a second encrypted packet received with the radio transceiver is transmitted from the other radio transceiver in the vehicle only in response to the second encrypted packet including the fingerprint; and
disabling, with the processor, communication of the radio transceiver in response to the second encrypted packet not including the fingerprint.
17. The method of claim 16 further comprising:
transmitting, with the processor and the radio transceiver, the first encrypted packet including the fingerprint corresponding to measurements of changes in the electromagnetic field intensity, the first encrypted packet being encrypted using the secret magnetic key.
18. The external device of claim 11 wherein the external device is at least one of a key/card device and a client device.
19. The external device of claim 18 wherein the key/card device is a key fob, key card, an access key, an access card, a smart card, and a smart key.
20. The external device of claim 19 wherein the client device is a smart phone, a personal digital assistant (PDA), a tablet, a laptop, a portable personal computer, a phablet, a wearable device, a thin device, a thick device, an entertainment device, and an infotainment device.
US15/590,269 2017-05-09 2017-05-09 Bluetooth low energy (BLE) passive vehicle access control system for defending the system against relay attacks and method thereof Active US10124768B1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US15/590,269 US10124768B1 (en) 2017-05-09 2017-05-09 Bluetooth low energy (BLE) passive vehicle access control system for defending the system against relay attacks and method thereof
PCT/EP2018/061467 WO2018206418A1 (en) 2017-05-09 2018-05-04 Bluetooth low energy (ble) passive vehicle access control system for defending the system against relay attacks and method thereof
CN201880030627.8A CN110582800A (en) 2017-05-09 2018-05-04 Bluetooth Low Energy (BLE) passive vehicle access control system and method for protecting system from relay attack
JP2019561932A JP2020521073A (en) 2017-05-09 2018-05-04 BLUETOOTH LOW ENERGY (BLE) PASSIVE VEHICLE ACCESS CONTROL SYSTEM AND METHOD FOR PROTECTING THE SYSTEM FROM RELAY ATTACK
KR1020197033178A KR102604328B1 (en) 2017-05-09 2018-05-04 Bluetooth low energy (BLE) passive vehicle access control system and method thereof for defending the system against relay attacks
EP18722042.1A EP3622489A1 (en) 2017-05-09 2018-05-04 Bluetooth low energy (ble) passive vehicle access control system for defending the system against relay attacks and method thereof
JP2023214983A JP2024029052A (en) 2017-05-09 2023-12-20 Bluetooth low energy (ble) passive vehicle access control system for protecting system from relay attacks and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US15/590,269 US10124768B1 (en) 2017-05-09 2017-05-09 Bluetooth low energy (BLE) passive vehicle access control system for defending the system against relay attacks and method thereof

Publications (2)

Publication Number Publication Date
US10124768B1 US10124768B1 (en) 2018-11-13
US20180326946A1 true US20180326946A1 (en) 2018-11-15

Family

ID=62111086

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/590,269 Active US10124768B1 (en) 2017-05-09 2017-05-09 Bluetooth low energy (BLE) passive vehicle access control system for defending the system against relay attacks and method thereof

Country Status (6)

Country Link
US (1) US10124768B1 (en)
EP (1) EP3622489A1 (en)
JP (2) JP2020521073A (en)
KR (1) KR102604328B1 (en)
CN (1) CN110582800A (en)
WO (1) WO2018206418A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020123580A1 (en) * 2018-12-13 2020-06-18 Carrier Corporation Wireless access control using an electromagnet
DE102020114160A1 (en) 2020-05-27 2021-12-02 Infineon Technologies Ag WEARABLE CHIP STRUCTURE AND METHOD OF OPERATING A WEARABLE CHIP STRUCTURE
US20220217501A1 (en) * 2021-01-05 2022-07-07 Aptiv Technologies Limited Method of Performing Location Dependent Actions in Vehicle

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3473502B1 (en) * 2017-10-18 2020-08-26 Nxp B.V. Passive keyless entry system for preventing relay attacks
US10919493B2 (en) * 2018-02-08 2021-02-16 Ford Global Technologies, Llc Mobile device relay attack detection and power management for vehicles
US10943416B2 (en) 2018-05-09 2021-03-09 Strattec Security Corporation Secured communication in passive entry passive start (PEPS) systems
US11354406B2 (en) * 2018-06-28 2022-06-07 Intel Corporation Physics-based approach for attack detection and localization in closed-loop controls for autonomous vehicles
US10427643B1 (en) * 2018-07-13 2019-10-01 Nxp B.V. Defense against relay attack in passive keyless entry systems
FR3092219B1 (en) * 2019-01-24 2021-03-12 Continental Automotive Method for activating a function of a vehicle by ultra high frequency with portable user equipment and device for activating an associated function
US10926738B1 (en) 2019-12-17 2021-02-23 Robert Bosch Gmbh Method and system for self-learning radio node positions within a vehicle structure
JP7424160B2 (en) * 2020-03-26 2024-01-30 株式会社デンソー security system
CN111775888B (en) * 2020-06-05 2022-02-11 联合汽车电子有限公司 Intelligent key, and method and system for preventing relay attack
US11433851B2 (en) * 2020-12-17 2022-09-06 Aptiv Technologies Limited Vehicle sensor system including barometric pressure sensors
DE102021203112A1 (en) 2021-03-29 2022-09-29 Robert Bosch Gesellschaft mit beschränkter Haftung Method of operating a motor vehicle, system
DE102021203163A1 (en) 2021-03-30 2022-10-06 Robert Bosch Gesellschaft mit beschränkter Haftung Method of operating a motor vehicle, system
DE102021204850A1 (en) 2021-05-12 2022-11-17 Robert Bosch Gesellschaft mit beschränkter Haftung Method of operating a motor vehicle, system
CN113928264A (en) * 2021-10-20 2022-01-14 青海交通职业技术学院 Keyless entry starting system for new energy automobile

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5557254A (en) * 1993-11-16 1996-09-17 Mobile Security Communications, Inc. Programmable vehicle monitoring and security system having multiple access verification devices
US20020033752A1 (en) * 2000-09-19 2002-03-21 Greenwood Jeremy John Security system
US20050038574A1 (en) * 2002-03-21 2005-02-17 Janos Gila Identification system for verifying an authorization for access to an object, or use of an object, in particular a motor vehicle
US20050283839A1 (en) * 2002-09-10 2005-12-22 Ingenia Technology Limited Security device and system
US7301467B2 (en) * 2004-10-19 2007-11-27 Sanyo Electric Co., Ltd. Position detection system, position detection method therefor, position detection communication device, and communication device
US20100191392A1 (en) * 2009-01-29 2010-07-29 Trw Automotive U.S. Llc Apparatus for locating a vehicle electronic key
US20120092129A1 (en) * 2010-10-19 2012-04-19 Honda Motor Co., Ltd. Method to track vehicle key near vehicle for smart entry
US20130332007A1 (en) * 2012-06-08 2013-12-12 Apple Inc. Accessory control with geo-fencing
US20140062774A1 (en) * 2012-08-28 2014-03-06 Disney Enterprises, Inc. Performing seamless positioning using various location techniques
US20140103865A1 (en) * 2012-10-16 2014-04-17 Ford Global Technologies, Llc System and method for reducing interference during wireless charging
US8847731B2 (en) * 2007-10-10 2014-09-30 Samsung Electronics Co., Ltd. System and method for communicating with a vehicle
US20140308971A1 (en) * 2013-04-16 2014-10-16 Lear Corporation Vehicle System for Detecting a Three-Dimensional Location of a Wireless Device
US20150149042A1 (en) * 2013-11-22 2015-05-28 Qualcomm Incorporated System and method for configuring an interior of a vehicle based on preferences provided with multiple mobile computing devices within the vehicle
US20150308396A1 (en) * 2014-04-24 2015-10-29 Ford Global Technologies, Llc Method and Apparatus for Vehicle and Mobile Device Coordination
US9194710B1 (en) * 2014-06-24 2015-11-24 Google Inc. Parked car location
US20150365898A1 (en) * 2013-01-28 2015-12-17 Denso Corporation Mobile communication apparatus and storage medium including program product for mobile communication apparatus
US20150382195A1 (en) * 2011-10-25 2015-12-31 Salesforce.Com, Inc. Preemptive authorization automation
US20160012653A1 (en) * 2014-07-11 2016-01-14 Entrust, Inc. Method and apparatus for providing vehicle security
US20160125675A1 (en) * 2013-05-23 2016-05-05 Siemens Aktiengesellschaft Method for performing automatic opening of a vehicle or a payment process, and associated apparatus
US20160297399A1 (en) * 2013-12-03 2016-10-13 Denso Corporation Vehicular control device
US20170018128A1 (en) * 2015-07-16 2017-01-19 GM Global Technology Operations LLC Vehicle peps system using directional sensors
US20170144628A1 (en) * 2015-05-28 2017-05-25 Boe Technology Group Co., Ltd. Safe driving method, device and system for vehicle
US20170158169A1 (en) * 2013-12-03 2017-06-08 Huf North America Automotive Parts Manufacturing Corp. Vehicle control system to prevent relay attack
US20170193717A1 (en) * 2016-01-04 2017-07-06 Hyundai Motor Company Smart key and method of controlling the same
US20170201860A1 (en) * 2016-01-11 2017-07-13 General Motors Llc Determining vehicle location via signal strength and signal drop event
US20170278330A1 (en) * 2016-03-22 2017-09-28 Ford Global Technologies, Llc Method and apparatus for wireless vehicular access device authentication
US20170308817A1 (en) * 2016-04-21 2017-10-26 Ford Global Technologies, Llc Apparatus and method to reserve, locate and operate a vehicle from an on-demand vehicle service
US20170336516A1 (en) * 2014-12-08 2017-11-23 Invensense International, Inc. Method for positioning a mobile terminal at the moment when a trigger event occurs
US9855918B1 (en) * 2016-08-04 2018-01-02 GM Global Technology Operations LLC Proximity confirming passive access system for vehicle

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102203553B (en) * 2008-10-31 2015-06-10 高通股份有限公司 Using magnetometer with a positioning system
US9554286B2 (en) * 2011-12-02 2017-01-24 Lear Corporation Apparatus and method for detecting a location of a wireless device
US20140067161A1 (en) * 2012-09-05 2014-03-06 GM Global Technology Operations LLC System for preventing relay attack for vehicle entry
JP2014151884A (en) * 2013-02-13 2014-08-25 Toyota Motor Corp Communication system, in-vehicle device, portable device, and communication method
CN104717642A (en) * 2013-12-17 2015-06-17 德尔福电子(苏州)有限公司 Method for preventing relay attack through magnetic field direction angle difference
EP2942758A1 (en) * 2014-05-08 2015-11-11 BASICWORX ENGINEERING GmbH Security device and method of operating a security device
EP3187670B1 (en) * 2014-08-29 2019-05-08 Alps Alpine Co., Ltd. Keyless entry device
JP6314072B2 (en) * 2014-10-23 2018-04-18 オムロンオートモーティブエレクトロニクス株式会社 Portable device, communication device, and communication system
CN105799642B (en) * 2014-12-31 2018-09-07 鸿富锦精密工业(深圳)有限公司 VATS Vehicle Anti-Theft System and anti-stealing method for vehicles
KR102351718B1 (en) * 2014-12-31 2022-01-17 현대모비스 주식회사 Operating method of smart key system
DE102015206009B4 (en) * 2015-04-02 2017-06-08 Volkswagen Aktiengesellschaft Distance determination and authentication of a radio key for a vehicle
US9566945B2 (en) * 2015-05-14 2017-02-14 Lear Corporation Passive entry passive start (PEPS) system with relay attack prevention
DE102015213806A1 (en) * 2015-07-22 2017-01-26 Volkswagen Aktiengesellschaft Position determination with a magnetic field sensor for a vehicle

Patent Citations (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5557254A (en) * 1993-11-16 1996-09-17 Mobile Security Communications, Inc. Programmable vehicle monitoring and security system having multiple access verification devices
US20020033752A1 (en) * 2000-09-19 2002-03-21 Greenwood Jeremy John Security system
US20050038574A1 (en) * 2002-03-21 2005-02-17 Janos Gila Identification system for verifying an authorization for access to an object, or use of an object, in particular a motor vehicle
US20050283839A1 (en) * 2002-09-10 2005-12-22 Ingenia Technology Limited Security device and system
US7301467B2 (en) * 2004-10-19 2007-11-27 Sanyo Electric Co., Ltd. Position detection system, position detection method therefor, position detection communication device, and communication device
US8847731B2 (en) * 2007-10-10 2014-09-30 Samsung Electronics Co., Ltd. System and method for communicating with a vehicle
US20100191392A1 (en) * 2009-01-29 2010-07-29 Trw Automotive U.S. Llc Apparatus for locating a vehicle electronic key
US20120092129A1 (en) * 2010-10-19 2012-04-19 Honda Motor Co., Ltd. Method to track vehicle key near vehicle for smart entry
US20150382195A1 (en) * 2011-10-25 2015-12-31 Salesforce.Com, Inc. Preemptive authorization automation
US9763041B2 (en) * 2012-06-08 2017-09-12 Apple Inc. Accessory control with geo-fencing
US20150105944A1 (en) * 2012-06-08 2015-04-16 Apple Inc. Accessory control with geo-fencing
US20130332007A1 (en) * 2012-06-08 2013-12-12 Apple Inc. Accessory control with geo-fencing
US20140062774A1 (en) * 2012-08-28 2014-03-06 Disney Enterprises, Inc. Performing seamless positioning using various location techniques
US20140103865A1 (en) * 2012-10-16 2014-04-17 Ford Global Technologies, Llc System and method for reducing interference during wireless charging
US20150365898A1 (en) * 2013-01-28 2015-12-17 Denso Corporation Mobile communication apparatus and storage medium including program product for mobile communication apparatus
US20140308971A1 (en) * 2013-04-16 2014-10-16 Lear Corporation Vehicle System for Detecting a Three-Dimensional Location of a Wireless Device
US20160125675A1 (en) * 2013-05-23 2016-05-05 Siemens Aktiengesellschaft Method for performing automatic opening of a vehicle or a payment process, and associated apparatus
US20150149042A1 (en) * 2013-11-22 2015-05-28 Qualcomm Incorporated System and method for configuring an interior of a vehicle based on preferences provided with multiple mobile computing devices within the vehicle
US20160297399A1 (en) * 2013-12-03 2016-10-13 Denso Corporation Vehicular control device
US20170158169A1 (en) * 2013-12-03 2017-06-08 Huf North America Automotive Parts Manufacturing Corp. Vehicle control system to prevent relay attack
US20150308396A1 (en) * 2014-04-24 2015-10-29 Ford Global Technologies, Llc Method and Apparatus for Vehicle and Mobile Device Coordination
US9194710B1 (en) * 2014-06-24 2015-11-24 Google Inc. Parked car location
US20160012653A1 (en) * 2014-07-11 2016-01-14 Entrust, Inc. Method and apparatus for providing vehicle security
US20170336516A1 (en) * 2014-12-08 2017-11-23 Invensense International, Inc. Method for positioning a mobile terminal at the moment when a trigger event occurs
US20170144628A1 (en) * 2015-05-28 2017-05-25 Boe Technology Group Co., Ltd. Safe driving method, device and system for vehicle
US20170018128A1 (en) * 2015-07-16 2017-01-19 GM Global Technology Operations LLC Vehicle peps system using directional sensors
US20170193717A1 (en) * 2016-01-04 2017-07-06 Hyundai Motor Company Smart key and method of controlling the same
US20170201860A1 (en) * 2016-01-11 2017-07-13 General Motors Llc Determining vehicle location via signal strength and signal drop event
US20170278330A1 (en) * 2016-03-22 2017-09-28 Ford Global Technologies, Llc Method and apparatus for wireless vehicular access device authentication
US20170308817A1 (en) * 2016-04-21 2017-10-26 Ford Global Technologies, Llc Apparatus and method to reserve, locate and operate a vehicle from an on-demand vehicle service
US9855918B1 (en) * 2016-08-04 2018-01-02 GM Global Technology Operations LLC Proximity confirming passive access system for vehicle

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020123580A1 (en) * 2018-12-13 2020-06-18 Carrier Corporation Wireless access control using an electromagnet
US11450160B2 (en) 2018-12-13 2022-09-20 Carrier Corporation Wireless access control using an electromagnet
DE102020114160A1 (en) 2020-05-27 2021-12-02 Infineon Technologies Ag WEARABLE CHIP STRUCTURE AND METHOD OF OPERATING A WEARABLE CHIP STRUCTURE
US20220217501A1 (en) * 2021-01-05 2022-07-07 Aptiv Technologies Limited Method of Performing Location Dependent Actions in Vehicle

Also Published As

Publication number Publication date
WO2018206418A1 (en) 2018-11-15
KR20200006533A (en) 2020-01-20
JP2024029052A (en) 2024-03-05
JP2020521073A (en) 2020-07-16
EP3622489A1 (en) 2020-03-18
US10124768B1 (en) 2018-11-13
CN110582800A (en) 2019-12-17
KR102604328B1 (en) 2023-11-23

Similar Documents

Publication Publication Date Title
US10124768B1 (en) Bluetooth low energy (BLE) passive vehicle access control system for defending the system against relay attacks and method thereof
US10532719B2 (en) Bluetooth low energy (BLE) passive vehicle access control system for defending the system against relay attacks and method thereof
US11993228B2 (en) Passive entry/passive start systems and methods for vehicles
US11597350B2 (en) Passive entry/passive start systems and methods for vehicles
US10266148B2 (en) Method, computer program and apparatus for verifying authorization of a mobile communication device
US10427643B1 (en) Defense against relay attack in passive keyless entry systems
JP7152491B2 (en) Smart control method and apparatus for vehicles to protect against RSA using mobile devices
KR102612628B1 (en) Intelligent access system and method for vehicles
CN110612555A (en) Intelligent wireless access system and method for vehicle
Choi et al. Sound‐Proximity: 2‐Factor Authentication against Relay Attack on Passive Keyless Entry and Start System
CN104183036A (en) Movement history assurance for secure passive keyless entry and start systems
US20180276924A1 (en) Vehicle-mounted device, portable device, and vehicle wireless communication system
JP2023118733A (en) Illicit communication prevention system and illicit communication prevention method
JP6702840B2 (en) Wireless communication correctness determination system
CN113449285A (en) Authentication system and authentication method
KR101730773B1 (en) Method and apparatus for controlling remote vehicle entry based on context information
CN115474149A (en) Communication device, computer readable medium, and system

Legal Events

Date Code Title Description
AS Assignment

Owner name: ROBERT BOSCH GMBH, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BOCCA, MAURIZIO;JAIN, VIVEK;LANG, CHRISTOPH;AND OTHERS;SIGNING DATES FROM 20180410 TO 20180503;REEL/FRAME:046400/0800

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4