Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel

Mykhaylova, O. та Stefankiv, A. та Nakonechny, T. та Fedynyshyn, T. та Sokolov, Volodymyr (2024) Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel Cybersecurity Providing in Information and Telecommunication Systems 2024, 3654. с. 98-110. ISSN 1613-0073

[thumbnail of O_Mykhaylova_A_Stefankiv_T_Nakonechny_T_Fedynyshyn_V_Sokolov_CPITS_3654_2024.pdf] Текст
O_Mykhaylova_A_Stefankiv_T_Nakonechny_T_Fedynyshyn_V_Sokolov_CPITS_3654_2024.pdf

Download (1MB)
Офіційне посилання: https://ceur-ws.org/Vol-3654/

Анотація

This study focuses on the analysis of replay attacks, which pose a significant risk to remote control systems using the 433 MHz radio frequency band. A replay attack occurs when an attacker intercepts communications between two legitimate parties and resends the intercepted data to activate a remotely controlled system or commit identity theft. Special attention is paid to the study of the EV1527 protocol and its structure, as well as potential vulnerabilities that can be exploited by attackers. The study includes a detailed analysis of the design documentation on modules using the EV1527 protocol, as well as an assessment of the characteristics of the corresponding antennas and the features of working with hardware and software. The work also includes a comparative analysis of the technical means that can be used to carry out the attack and a demonstration of a practical attack using the HackRF One software-controlled transceiver in a laboratory setting. The main goal of the work is to demonstrate the mechanisms for implementing a replay attack on remote control systems with static code and to develop recommendations for improving the security of these systems. The results of the study are aimed at increasing the understanding of potential risks and vulnerabilities, as well as at determining the feasibility of using such protocols in modern physical security and access control systems.

Тип елементу : Стаття
Ключові слова: Radio channel; interception; replay; physical security; PT2262; HackRF One; EV1527; NanoVNA V2.2
Типологія: Статті у базах даних > Scopus
Підрозділи: Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка
Користувач, що депонує: Павло Миколайович Складанний
Дата внесення: 08 Квіт 2024 08:37
Останні зміни: 08 Квіт 2024 08:37
URI: https://elibrary.kubg.edu.ua/id/eprint/48575

Actions (login required)

Перегляд елементу Перегляд елементу