Claim Missing Document
Check
Articles

Found 2 Documents
Search

Vulnerability Assessment of Vehicle Keyless Entry Systems Using the PTES Methodology Akbar, Ulil; Aziz, Muhammad Abdul; Setiawati, Donna; Rohmadi, Yusuf Eko
Jurnal Penelitian Pendidikan IPA Vol 11 No 8 (2025): August
Publisher : Postgraduate, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jppipa.v11i8.11887

Abstract

The growing adoption of keyless entry systems in motor vehicles introduces new challenges in the security of radio-based communication. This study aims to identify and evaluate the vulnerability level of the keyless entry system on the Honda PCX 150 motorcycle against two types of man-in-the-middle-based attacks: replay attack and relay attack. Using the Penetration Testing Execution Standard (PTES) methodology, the study establishes a seven-stage testing procedure, from pre-engagement to reporting. Experiments were conducted using Flipper Zero as the main device, supported by GNU Radio, Software Defined Radio (SDR), and Universal Radio Hacker (URH). Each type of attack was tested 25 times. The results showed a 44% Success rate for the replay attack and 48% for the relay attack. Further analysis revealed that Success occurred not only on repeated frequencies but also on single-occurrence frequencies, with effectiveness rates of 50% and 45%, respectively. These findings indicate the absence of security mechanisms such as rolling code, time or location-based validation, and frequency hopping, allowing intercepted signals to be accepted by the vehicle. The study concludes that the Honda PCX 150's keyless entry system has significant security gaps, potentially exploitable using passive tools. It recommends the implementation of dynamic authentication mechanisms and cryptographic technologies to enhance the security of vehicular radio signal transmissions.
Vulnerability Analysis of Smart Lock Using NIST SP 800-115 Method Aziz, Muhammad Abdul; Sutikno, Tole; Yuliansyah, Herman; Dewi, Ayu Intansari; Rohmadi, Yusuf Eko; Setiawati, Donna
Jurnal Penelitian Pendidikan IPA Vol 11 No 8 (2025): August
Publisher : Postgraduate, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jppipa.v11i8.12219

Abstract

Internet of Things (IoT)-based devices, such as smart locks, are becoming increasingly common in home security systems due to the convenience and efficiency they offer. However, without a strong security system, these devices can become potential targets for attacks. This study aims to evaluate and identify potential security vulnerabilities in the Dekkson ELC 9318 smart lock using the NIST SP 800-115 approach. Three authentication methods were tested in this study: PIN code, fingerprint (biometric), and RFID card. The tools used include Nmap for network scanning, Wireshark for traffic analysis, and Proxmark3 for the RFID card cloning process. The results showed several aspects that could still be improved, such as the PIN protection mechanism against brute-force attacks, the vulnerability of MIFARE Classic RFID cards that can still be replicated under certain conditions, and the need to strengthen authentication at the API endpoint to minimize the risk of unauthorized access. Meanwhile, biometric authentication proved to be more resistant to basic spoofing attempts. This research is expected to provide constructive input for the development of security systems in IoT devices, particularly smart locks.