Poster: Power Replay Attack in Electronic Door Locks
نویسندگان
چکیده
Electronic door locks have recently become popular since they have many benefits compared with traditional mechanical locks. For example, in the case of keyless locks which are the most popular types of electronic door locks, a physical key is not needed anymore. They might also be invulnerable to the existing physical attacks against mechanical door locks[1]. Despite these known benefits of electronic door locks, we question whether electronic door locks are really secure enough against any possible intrusion and alterations. Manufacturers often claim that their electronic door locks are secure and against a wide range of attacks despite the fact that several flaws have been recently discovered (e.g, [2] and [3]), but the current focus was only directed to one particular type of adversary attacks by a stranger who tries to open doors from outside — ignoring an insider attacker with temporal access to the inside of a lock. However, the second type of adversary models can also be found in many real life scenarios. For example, a thief who sojourns in a hotel room protected by an electronic door, obtains complete physical access for a prolonged period of time to the electronic door lock. Hence, the thief would have plenty of time to modify some parts of the lock in the room or implement a hidden backdoor switch that could be used to steal the belongings of future guests who will stay later in the same hotel room. We found that the most popular and commercially endorsed electronic door locks cannot cope with this type of threats. An insider attacker can covertly insert malicious hardware components into an electronic door lock to replay a valid DC voltage pulse to illegally open the door. We name this attack the “Power Replay” attack since the inserted component replays a power supplement irrespective of the central processing unit in the target door lock. Our experiments with the four electronic door locks showed the feasibility of power replay attacks: all door locks that we investigated were vulnerable to power replay attacks.
منابع مشابه
Interference Mitigation of Replay Attacks in GPS Receiver using of Finite Impulse Response Filter
The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...
متن کاملCase Studies on E/E Architectures for Power Window and Central Door Locks Systems
Architectural optimization for software-intensive systems is an emerging area. The automotive industry needs optimized architectures in order to develop cheaper, lighter, and more reliable cars which are growing in software complexity. However, there is a lack of benchmarks that are used to evaluate the performance of the optimzation algorithms which target the area of architecture optimization...
متن کاملExemplary Automotive Attack Scenarios: Trojan Horses for Electronic Throttle Control System (ETC) and Replay Attacks on the Power Window System Ausgewählte automotive Angriffs-Szenarien: Trojanische Pferde für das digitale Gaspedal (ETC) und Replay-Angriffe auf elektrische Fernsterheber
The consideration of targeted security attacks is not yet common in the automotive domain where primarily safety requirements are considered. Hence this survey addresses the relatively new field of IT-security in automotive technology in order to motivate further research. With the emergence of automotive technologies like car-to-car (c2c) communication, the challenges increase. In order to sho...
متن کاملPerformance analysis of WM-Bus-based synchronization protocols in Sensor Networks
Smart metering wireless sensor networks need to refer to a common time scale for several reasons. As examples: (i) in power quality, some measures at different nodes of the network are senseless if not synchronized; (ii) in security, in case of lack of synch, a replay attack could result successful; (iii) in billing, different times of the day can be charged differently. Generally, the synchron...
متن کاملNew Approaches to Smart Grid Security with Scada Systems
The use of information technology in electric power grid introduces the vulnerability problem looming the future smart grid. The supervisory control and data acquisition (SCADA) is the first defense, which itself is undermined by potential malicious attacks. This dissertation studies two particular security threats facing the smart grid and SCADA systems: the unobservable attack and the replay ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014