Breaking News
Design How-To

Hardware and software considerations in secure passive immobilizer design

NO RATINGS
More Related Links
View Comments: Newest First | Oldest First | Threaded View
DrFPGA
User Rank
Blogger
re: Hardware and software considerations in secure passive immobilizer design
DrFPGA   12/28/2010 1:20:59 AM
NO RATINGS
As these systems get more complex the chance that a bug allows unauthorized entry into the system increases. Just think what would happen if the keyfob was running under windows! The design needs to be very robust so the use of open source code as a basis for the design seems like a good approach. Hopefully it won't help a hacker identify possible attack vectors...

WKetel
User Rank
Rookie
re: Hardware and software considerations in secure passive immobilizer design
WKetel   12/15/2010 10:18:22 PM
NO RATINGS
I had not realized how complex the key fob system was. But I can offer one way to make it much more resistant to an attack, which is that after 2 or 3 incorrect responses, it would be required to remove the key from the lock and then re-insert the key. This would add many seconds to an attack and make an attack quite a bit more manual, which would be just what thieves are not wanting. Of course, the next question is how often does the correct key require a re-try? If a proper key works the first time 99% of the time, then simply adding a 1 second delay, along with an error message, would slow an attack quite a bit. Clearly, a lot depends on how well the system works with the correct key.

Flash Poll
Radio
LATEST ARCHIVED BROADCAST
EE Times editor Junko Yoshida grills two executives --Rick Walker, senior product marketing manager for IoT and home automation for CSR, and Jim Reich, CTO and co-founder at Palatehome.
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Times on Twitter
EE Times Twitter Feed
Top Comments of the Week