Abstract | There are many vulnerabilities in the day-to-day use of wireless devices that don’t have well-designed protocols, as the manufacturers do not normally take security into consideration. This is mainly due to the added complexity of designing more secure protocols. However, this consequently gave rise to vulnerabilities that can be easily exploited. Most of the devices used in day-to-day life have unsafe protocols. Particularly, I focus on the protocol used in car keyless entry - the communication between the key and the car. Using a software-defined radio, I intercept the signal sent by the key and use it to gain access to the car. Moreover, this study extends to finding possible scenarios where someone with a software-defined radio can gain access to the car, without the owner’s knowledge.
|
---|