Skip to main content

A Novel Encryption Mechanism for Door Lock to Resist Jam–and–Relay Attack

  • Conference paper
  • First Online:
Future Data and Security Engineering (FDSE 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10018))

Included in the following conference series:

  • 1396 Accesses

Abstract

This paper describes a novel encryption mechanism for a smarthome lock controlled by smartphone using auto-changing encrypted public key to resist “jam and relay attack”. This method is still based on rolling code mechanism and makes use of RSA algorithm to encode the public key so that the key is automatically changed at each time of access. This mechanism will make the security vulnerability of several equivalent keys for each access in rolling code mechanism is no longer be exploited. Furthermore, this method creates a new function to the lock: providing one-time-access-key for visitors. The effective mechanism of resisting jam-and-relay attack is proved and the experiment results show that it is still practical with limited resource system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Brain, M.: How Remote Entry Works. http://auto.howstuffworks.com/remote-entry.htm. Accessed 24 June 2015

  2. Kamkar, S.: Drive it like you hacked it: new attacks and tools to wirelessly steal cars. In: Proceedings of 23rd DEF CON Conference (2015)

    Google Scholar 

  3. Internet of Things Global Standards Initiative. ITU. Accessed 26 June 2015

    Google Scholar 

  4. JSCAPE homepage: a software company focused on offering high-quality, platform-independent and easy-to-use managed file transfer products and services

    Google Scholar 

  5. Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, pp. 259–274 (2000)

    Google Scholar 

Download references

Acknowledgement

This research is funded by Ho Chi Minh City University of Technology – VNU-HCM, under grant number T-CK-2016-02.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Viet-Hong Tran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Tran, B.A., Tran, VH. (2016). A Novel Encryption Mechanism for Door Lock to Resist Jam–and–Relay Attack. In: Dang, T., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds) Future Data and Security Engineering. FDSE 2016. Lecture Notes in Computer Science(), vol 10018. Springer, Cham. https://doi.org/10.1007/978-3-319-48057-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48057-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48056-5

  • Online ISBN: 978-3-319-48057-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics