2022
DOI: 10.3390/electronics11203376
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Fake Replay Attack Signals on Remote Keyless Controlled Vehicles Using Pre-Trained Deep Neural Network

Abstract: Keyless systems have replaced the old-fashioned methods of inserting physical keys into keyholes to unlock the door, which are inconvenient and easily exploited by threat actors. Keyless systems use the technology of radio frequency (RF) as an interface to transmit signals from the key fob to the vehicle. However, keyless systems are also susceptible to being compromised by a threat actor who intercepts the transmitted signal and performs a replay attack. In this paper, we propose a transfer learning-based mod… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 42 publications
0
2
0
Order By: Relevance
“…The system evaluation showed the advantage of the cyber-physical dynamic vehicle system delivering high stability and controllability in the vehicle motion using a PID controller and Transceiver. In future, we will seek to adopt intelligent controllers making use of optimizable neural networks systems [16], fuzzy Nero computing, and machine/deep learning models [17,18] in addition to the ability to acquire the data form Heterogeneous Sources.…”
Section: Discussionmentioning
confidence: 99%
“…The system evaluation showed the advantage of the cyber-physical dynamic vehicle system delivering high stability and controllability in the vehicle motion using a PID controller and Transceiver. In future, we will seek to adopt intelligent controllers making use of optimizable neural networks systems [16], fuzzy Nero computing, and machine/deep learning models [17,18] in addition to the ability to acquire the data form Heterogeneous Sources.…”
Section: Discussionmentioning
confidence: 99%
“…Accurate identification of attack types is crucial to system security. At present, denial of service attacks (DOSA), 9‐11 replay attacks, 12‐14 eavesdropping attacks, 15‐17 and FDIA (false data injection attacks) 18‐20 are the main types of common network attacks. DOSA is a depleting attack on the resources of the attacked object, which interrupts the normal communication of the system.…”
Section: Introductionmentioning
confidence: 99%