Abstract
This paper describes a novel encryption mechanism for a smarthome lock controlled by smartphone using auto-changing encrypted public key to resist “jam and relay attack”. This method is still based on rolling code mechanism and makes use of RSA algorithm to encode the public key so that the key is automatically changed at each time of access. This mechanism will make the security vulnerability of several equivalent keys for each access in rolling code mechanism is no longer be exploited. Furthermore, this method creates a new function to the lock: providing one-time-access-key for visitors. The effective mechanism of resisting jam-and-relay attack is proved and the experiment results show that it is still practical with limited resource system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Brain, M.: How Remote Entry Works. http://auto.howstuffworks.com/remote-entry.htm. Accessed 24 June 2015
Kamkar, S.: Drive it like you hacked it: new attacks and tools to wirelessly steal cars. In: Proceedings of 23rd DEF CON Conference (2015)
Internet of Things Global Standards Initiative. ITU. Accessed 26 June 2015
JSCAPE homepage: a software company focused on offering high-quality, platform-independent and easy-to-use managed file transfer products and services
Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, pp. 259–274 (2000)
Acknowledgement
This research is funded by Ho Chi Minh City University of Technology – VNU-HCM, under grant number T-CK-2016-02.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Tran, B.A., Tran, VH. (2016). A Novel Encryption Mechanism for Door Lock to Resist Jam–and–Relay Attack. In: Dang, T., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds) Future Data and Security Engineering. FDSE 2016. Lecture Notes in Computer Science(), vol 10018. Springer, Cham. https://doi.org/10.1007/978-3-319-48057-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-48057-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48056-5
Online ISBN: 978-3-319-48057-2
eBook Packages: Computer ScienceComputer Science (R0)