STUDY OF RESISTANCE TO ATTACKS OF REPRODUCING REMOTE CONTROL PROTOCOLS USING THE 433 MHz RADIO CHANNEL
DOI:
https://doi.org/10.18372/2410-7840.26.18837Keywords:
radio channel, interception, replay attack, physical security, PT2262, HackRF One, NanoVNA, EV1527Abstract
This article identifies critical vulnerabilities in the EV1527 protocol that are widely used in remote control systems, particularly home automation systems. Focusing on a detailed analysis of the protocol structure and potential weaknesses, this study assesses the risks of replay attacks that can be carried out by intercepting and retransmitting radio signals. The results of the work demonstrate the significant vulnerability of this protocol to such attacks due to the lack of cryptographic protection of the transmitted data. As part of this work, experimental tests were conducted using the HackRF One software-controlled transceiver, which allowed to reproduction of the attack in controlled laboratory conditions. The experiments confirmed theoretical assumptions about the possibility of implementing such attacks, emphasizing the need to develop more secure communication protocols. HackRF One's application demonstrated how easily attackers can intercept and rebroadcast signals, gaining unauthorized access to remote control systems. This article highlights the importance of transitioning from legacy technologies to modern solutions that include dynamic codes and cryptography to increase security. The use of dynamic codes, such as the HCS301's moving code technology, greatly complicates the possibility of replay attacks because each code transmission is unique. This means that even if the signal is intercepted, an attacker will not be able to repeat it to gain access. The authors recommend the implementation of cryptographic methods, such as the HCS301 moving code technology, which greatly complicates the possibility of repeated attacks. The introduction of such technologies increases the level of security and makes remote control systems more resistant to malicious actions. In addition, the need for constant updating and improvement of security protocols to protect critical infrastructure is emphasized. Given these results, this work indicates an urgent need for updating and improving remote control systems, including the development of new, more attack-resistant protocols, especially in the context of ensuring the security of critical infrastructure facilities. The integration of modern cryptographic methods is a key step to protect against malicious attacks and ensure the reliable operation of remote-control systems.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).