Daza, Vanesa; Salleras, Xavier
(SciTePress. Science and Technology Publications, 2019)
Since Remote Keyless Entry (RKE) systems started to be widely used, several vulnerabilities in their protocols have been found. Attacks such as jamming-and-replay attacks and relay attacks are still effective against most ...