SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT
Keywords:Security Algorithms, Remote Keyless Entry System (RKES), Authentication Protocols, MAC, Hash Algorithms such as SHA, MD5
Protecting passwords is now a big challenge because users want to do all types of work online via user-friendly devices such as mobile, tablets etc. Now, It is difficult to implement the secure heavy weight algorithms such as AES, RSA etc. in hardware constrained devices. It has been observed that users want all types of security services in an online public environment. Authentication is the first and foremost step to enhance security. Various applications are available for real time authentications such as keyless car entry and opening home-doors through security algorithms under remote keyless entry System (RKES). Now, it is the demand of the time to implement the lightweight security algorithms without compromising the security. In order to fulfill this challenge, this paper proposed a strong model for enhancing authentication security. In this work, strong authentication techniques are implemented with the light weight algorithms. This model received good comparison results.
LASER: Lightweight And Secure Remote Keyless entry protocol: Vanesa Daza And Xavier Salleras(2019).
On the security of Remote Keyless Entry for vehicles: Jinita Patel Manik Lal Das sukumar nandi(2018).
A Protocol for Secure Remote Keyless Entry System Applicable in Vehicles using Symmetric –Key Cryptography: Tobias Glocker, Timo Mantere, Mohammad Elmusrati(2017).
Lock it and Still Lose It: On the security of automotive remote keyless entry systems: Flavio D.Garcia, David Oswald, Timo Kasper, Kasper & Oswald GmbH (2016).
Analysis Of Attack Against the Security Of Keyless Entry Systems for Vehicles and Suggestions for Improved Designs: Ansaf Ibrahem Alrabady and Syed Masud Mahumad(2005).
A. Moradi and T. Kasper,” A New Remote Keyless Entry System Resistant to Power Analysis Attacks” in ICICS, 2009 c IEEE. doi:10.1109/ICICS.2009.5397727 DOI: https://doi.org/10.1109/ICICS.2009.5397727
Alrabady and S. M. Mahmud,” Analysis of Attacks Against the Security of Keyless-Entry Systems for Vehicles and Suggestions for Improved Designs.” IEEE Trans. Veh. Technol., vol. 54, no. 1, Jan.2005. DOI: https://doi.org/10.1109/TVT.2004.838829
L. Vincent and G. Chevret,” Customer identification device, keyless access system for vehicle, vehicle sharing system including such a device and methods using such a device.” Patent WO2008044093 A1. Apr,17, 2008.
A. Bogdanov. Attacks on the KeeLoq Block Cipher and Authentication Systems. In RFIDSec 2007. http://rfidsec07.etsit.uma.es/slides/papers/paper- 22.pdf.
S. Chari, J. R. Rao, and P. Rohatgi. Template Attacks. In CHES 2002, volume 2523 of LNCS, pages 13–28. Springer, 2002. DOI: https://doi.org/10.1007/3-540-36400-5_3
N. T. Courtois, G. V. Bard, and D. Wagner. Algebraic and Slide Attacks on KeeLoq. In FSE 2008, volume 5086 of LNCS, pages 97– 115.Springer, 2008. DOI: https://doi.org/10.1007/978-3-540-71039-4_6
T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasi Zadeh, and M. T. M. Shalmani. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In CRYPTO 2008, volume 5157 of LNCS, pages 203–220. Springer, 2008 DOI: https://doi.org/10.1007/978-3-540-85174-5_12
H. Zhong, B. Huang, J. Cui, Y. Xu, and L. Liu, “Conditional privacy preserving authentication using registration list in vehicular ad hoc networks,” IEEE Access, vol. 6, pp. 2241–2250, 2018.
E. Hamdaqa, A. Mars, W. Adi, and S. Mulhem. Clone-resistant vehicular RKE by deploying SUC. In Proceedings of International Conference on Emerging Security Technologies, pp. 221-225, 2017. DOI: https://doi.org/10.1109/EST.2017.8090427
S. Indesteege, N. Keller, O. Dunkelman, E. Biham, and B. Preneel.A Practical Attack on KeeLoq. In Proceeding of the Theory and Applications of Cryptographic Techniques (EUROCRYPT), LNCS 4965, Springer-Verlag, pp. 1–18, 2008. DOI: https://doi.org/10.1007/978-3-540-78967-3_1
D. Rubino. How crooks can steal your car without the key. https://www.autocar.co.uk/car-news/industry/how-crooks-can- stealyourcar-without-key.15
Ibrahim, O. A., Hussain, A. M., Oligeri, G., and Di Pietro,R. (2018). Key is in the air: Hacking remote keyless entry systems. In Proc. of the International Workshop on Cyber Security for Intelligent Transportation Systems (CSIT 2018).
Kamkar, S. Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars. Presentation at DEFCON 23, August 2015.
C. Herder, M. Yu, F. Koushanfar, and S. Devadas. Physical Unclonable Functions and Applications: A Tutorial. In Proceedings of IEEE,102(8):1126–1141, 2014.
D. He, S. Zeadally, B. Xu, and X. Huang, “An efficient identity based conditional privacy-preserving authentication scheme for vehicular ad hoc networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2681–2691, 2015.
D. Lee,” Keyless cars ’increasingly targeted by thieves using computers’.” Internet: www.bbc.com/news/technology-29786320, Oct. 2014 [Apr. 2,2016].
Cryptography and Network Security: Principles and Practice, by William Stallings. (3rd edition)
How to Cite
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section