2016 IEEE Annual India Conference (INDICON) 2016
DOI: 10.1109/indicon.2016.7838978
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and design issues for using Bluetooth low energy in passive keyless entry systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…In fact, RF modules in general provide a feature called Received Signal Strength Indicator (RSSI) that indicates the power strength of the Tx signal received by the Rx node. Several studies indicate empirically the relationship between RSSI and distance ([ 23 , 29 , 30 , 33 , 34 ]), but [ 22 ] finds a model that can be used to calculate the distance directly from the RSSI, as described in the following equation: where N is a constant assumed as one, d is the distance in meters between the two devices and a is the power of the Tx at a one-meter distance.…”
Section: Ble Performancementioning
confidence: 99%
See 2 more Smart Citations
“…In fact, RF modules in general provide a feature called Received Signal Strength Indicator (RSSI) that indicates the power strength of the Tx signal received by the Rx node. Several studies indicate empirically the relationship between RSSI and distance ([ 23 , 29 , 30 , 33 , 34 ]), but [ 22 ] finds a model that can be used to calculate the distance directly from the RSSI, as described in the following equation: where N is a constant assumed as one, d is the distance in meters between the two devices and a is the power of the Tx at a one-meter distance.…”
Section: Ble Performancementioning
confidence: 99%
“…The synergy between good performance and ubiquitous diffusion (today, BLE is available in all PCs, tablets and smartphones) makes BLE an excellent candidate for a great variety of applications: in the medical field for e-health applications [ 1 , 2 , 3 ], e.g., in a body area network [ 4 ] (using ECG [ 5 , 6 ], a heart rate sensor [ 7 , 8 ], a blood flowmeter [ 9 ], EMG for prosthetic hand control [ 10 ] and an IMU sensor used for early diagnosis of Parkinson’s disease [ 11 ]; it is also used to monitor respiration, activities and falls [ 8 ]), in automotive applications [ 12 , 13 ], in voice communications [ 14 ], for kinematic tracking [ 15 , 16 ], in domotics for healthcare environments and smart houses [ 17 , 18 , 19 , 20 ], for transmission of M-IMU data in game controlling [ 21 ], in security systems [ 22 , 23 ], to understand crowd dynamic [ 24 ], and so on. It has been successfully used for position detection and distance measurement using beacon communication.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent times, the new PKES replaced the key fob with a smartphone. Karani et al [12] and Lin et al [13] designed and implemented the PKES based on BLE. In the new PKES, the vehicle determines if the key is in proximity and unlocks itself by monitoring the BLE received signal strength indicator (RSSI) measurements from the key.…”
Section: Passive Keyless Entry and Start Systemmentioning
confidence: 99%
“…Attacks such as jamming-and-replay attacks and relay attacks are still effective against most recent RKE systems (Ibrahim et al, 2018), even when many secure schemes have been designed. Although they are interesting from a theoretical point of view, the complexity of these solutions is excessive to implement them into a fob (Karani et al, 2016). This paper presents a lightweight and general solution based on a one message protocol, which guarantees the integrity and validity of the authentication in RKE systems, protecting the communication against the well-known jamming-and-replay and relay attacks, without using complex cryptographic schemes.…”
mentioning
confidence: 99%