KeFRA Images: Key-fob RKE Replay Attack

Published: 23 June 2022| Version 1 | DOI: 10.17632/zkstkgkxvd.1
Contributors:
,
,

Description

Description This dataset was obtained using a remote controlled electronic access system of a 2016 model vehicle. Ad hoc, the Remote Keyless Entry -RKE, was used to remotely lock or unlock doors. Furthermore, the key-fob is a small handheld remote control device that controls a remote keyless entry system. Acquisition Method Measurements have been taken with different antenna polarizations at different distances (40 cm, 1m, 2m, 3m, 4m and 5m). The RF operating frequency was 433 MHz and the signals were obtained using a Software Defined Radio (SDR) RTL-SDR that is a module tuned to a frequency of 433.427 MHz and with a bandwidth of 2 MHz. Set-up The images are the fast fourier FFT transform of each one of the original signals (Original signal) and each one of the false signals (Fake signal) transmitted by both devices the key-Fob and the Hack RF-SDR. The obtained signal is processed in baseband using the GNU-Radio software to suppress the blank spaces of the signal in time (time without transmission). Then, the fast fourier transform of the resulting signal is obtained. The dataset is made up of three types of signals. a. The first type of signals are the so-called original Key-Fob b. The second type of signals are the so-called retransmitted high-gain signals. They are made up of the original Key-Fob but retransmitted by an open source Hack RF-SDR hardware platform that acts as an attacker in a replay scheme. This device is configured with high RF gain. c. The third type of signals are the so-called low-gain retransmitted signals. They are made up of the original Key-Fob but retransmitted by a Hack RF-SDR device acting as an attacker in a replay scheme. This device is configured with low RF gain. Format Images are stored in .bmp format. Each image has a dimension of 1288 X 421 pixels with 24 bit depth per pixel. The size of each image is 1589 KBytes. Data set a. Key-Fob original file: 110 images. Folder name: Real_Signal b. High-gain retransmitted: 110 images. Folder name: Fake_Signal_High_Gain c. Low-gain retransmitted: 120 images. Folder name: Fake_Signal_Low_Gain The files were named with the following nomenclature: First configuration: unlock(X) Frequency: 433.427MHz Distance: 40 cm File number: 001 File name: unlock(X)_433_427_40_001 Original configuration: unlockO Frequency: 433.427MHz Distance: 40 cm file number: 001 File name: unlockO_433_427_40_001.bmp Low configuration: unlockFSL Frequency: 433.427MHz Distance: 40 cm file number: 001 File name: unlockFSL 433_427_40_001.bmp High configuration: unlockFSH Frequency: 433.427MHz Distance: 40 cm file number: 001 File name: unlockFSH_433_427_40_001.bmp

Files

Steps to reproduce

The images are the fast fourier FFT transform of each one of the original signals (Original signal) and each one of the false signals (Fake signal) transmitted by both devices the key-Fob and the Hack RF-SDR. The obtained signal is processed in baseband using the GNU-Radio software to suppress the blank spaces of the signal in time (time without transmission). Then, the fast fourier transform of the resulting signal is obtained. The dataset is made up of three types of signals. a. The first type of signals are the so-called original Key-Fob b. The second type of signals are the so-called retransmitted high-gain signals. They are made up of the original Key-Fob but retransmitted by an open source Hack RF-SDR hardware platform that acts as an attacker in a replay scheme. This device is configured with high RF gain. c. The third type of signals are the so-called low-gain retransmitted signals. They are made up of the original Key-Fob but retransmitted by a Hack RF-SDR device acting as an attacker in a replay scheme. This device is configured with low RF gain.

Institutions

Universidad Militar Nueva Granada

Categories

Software, Fast Fourier Transform, Image Database, Vehicle, Fingerprint, Radio Frequency Measurement

Licence