{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:07:44Z","timestamp":1760238464264,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"16","license":[{"start":{"date-parts":[[2020,8,9]],"date-time":"2020-08-09T00:00:00Z","timestamp":1596931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In modern cars, the Passive Keyless Entry and Start system (PKES) has been extensively installed. The PKES enables drivers to unlock and start their cars without user interaction. However, it is vulnerable to relay attacks. In this paper, we propose a secure smartphone-type PKES system model based on user context detection. The proposed system uses the barometer and accelerometer embedded in smartphones to detect user context, including human activity and door closing event. These two types of events detection can be used by the PKES to determine the car owner\u2019s position when the car receives an unlocking or a start command. We evaluated the performance of the proposed method using a dataset collected from user activity and 1526 door closing events. The results reveal that the proposed method can accurately and effectively detect user activities and door closing events. Therefore, smartphone-type PKES can prevent relay attacks. Furthermore, we tested the detection of door closing event under multiple environmental settings to demonstrate the robustness of the proposed method.<\/jats:p>","DOI":"10.3390\/s20164446","type":"journal-article","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T05:07:23Z","timestamp":1597036043000},"page":"4446","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["User Context Detection for Relay Attack Resistance in Passive Keyless Entry and Start System"],"prefix":"10.3390","volume":"20","author":[{"given":"Jing","family":"Li","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, No. 38, Zhe-Da Road, Hangzhou 310027, China"}]},{"given":"Yabo","family":"Dong","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, No. 38, Zhe-Da Road, Hangzhou 310027, China"}]},{"given":"Shengkai","family":"Fang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, No. 38, Zhe-Da Road, Hangzhou 310027, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8946-1273","authenticated-orcid":false,"given":"Haowen","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, No. 38, Zhe-Da Road, Hangzhou 310027, China"}]},{"given":"Duanqing","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, No. 38, Zhe-Da Road, Hangzhou 310027, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,8,9]]},"reference":[{"key":"ref_1","unstructured":"(2020, June 10). Will Your Smartphone Replace Your Car Key. Available online: https:\/\/www.consumerreports.org\/automotive-technology\/will-your-smartphone-replace-your-car-key-virtual-key\/."},{"key":"ref_2","unstructured":"(2020, June 10). Volvo Cars Tests Replacing Keys with Smart Phone App. Available online: https:\/\/www.media.volvocars.com\/us\/en-us\/media\/pressreleases\/173880\/volvo-cars-tests-replacing-keys-with-smart-phone-app."},{"key":"ref_3","unstructured":"Francillon, A., Danev, B., and Capkun, S. (2011, January 6\u20139). Relay attacks on passive keyless entry and start systems in modern cars. Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Levi, A., \u00c7etinta\u015f, E., Aydos, M., Ko\u00e7, C.K., and \u00c7a\u011flayan, M.U. (2004, January 27\u201329). Relay attacks on bluetooth authentication and solutions. Proceedings of the International Symposium on Computer and Information Sciences, Kemer, Antalya, Turkey.","DOI":"10.1007\/978-3-540-30182-0_29"},{"key":"ref_5","unstructured":"(2020, June 10). Relay Attack Solihull. Available online: https:\/\/www.youtube.com\/watch?v=8pffcngJJq0."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Yang, T., Kong, L., Xin, W., Hu, J., and Chen, Z. (2012, January 29\u201331). Resisting relay attacks on vehicular passive keyless entry and start systems. Proceedings of the 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, Sichuan, China.","DOI":"10.1109\/FSKD.2012.6234155"},{"key":"ref_7","unstructured":"Brands, S., and Chaum, D. (1993, January 23\u201327). Distance-bounding protocols. Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Choudary, O., and Stajano, F. (2011, January 28\u201330). Make noise and whisper: A solution to relay attacks. Proceedings of the International Workshop on Security Protocols, Cambridge, UK.","DOI":"10.1007\/978-3-642-25867-1_26"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1935974","DOI":"10.1155\/2018\/1935974","article-title":"Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system","volume":"2018","author":"Choi","year":"2018","journal-title":"J. Adv. Transp."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Ranganathan, A., and Capkun, S. (2017). Are we really close? Verifying proximity in wireless systems. IEEE Secur. Priv.","DOI":"10.1109\/MSP.2017.265093234"},{"key":"ref_11","unstructured":"Waraksa, T.J., Fraley, K.D., Kiefer, R.E., Douglas, D.G., and Gilbert, L.H. (1990). Passive Keyless Entry System. (4,942,393), U.S. Patent."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Karani, R., Dhote, S., Khanduri, N., Srinivasan, A., Sawant, R., Gore, G., and Joshi, J. (2016, January 16\u201318). Implementation and design issues for using Bluetooth low energy in passive keyless entry systems. Proceedings of the 2016 IEEE Annual India Conference (INDICON), Bangalore, India.","DOI":"10.1109\/INDICON.2016.7838978"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/MCOM.2015.7010544","article-title":"On the potential of bluetooth low energy technology for vehicular applications","volume":"53","author":"Lin","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kim, C.H., and Avoine, G. (2009, January 12\u201314). RFID distance bounding protocol with mixed challenges to prevent relay attacks. Proceedings of the International Conference on Cryptology and Network Security, Kanazawa, Japan.","DOI":"10.1007\/978-3-642-10433-6_9"},{"key":"ref_15","unstructured":"Hancke, G.P., and Kuhn, M.G. (2005, January 5\u20139). An RFID distance bounding protocol. Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM\u201905), Athens, Greece."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Reid, J., Nieto, J.M.G., Tang, T., and Senadji, B. (2007, January 20\u201322). Detecting relay attacks with timing-based protocols. Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, Singapore.","DOI":"10.1145\/1229285.1229314"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Truong, H.T.T., Gao, X., Shrestha, B., Saxena, N., Asokan, N., and Nurmi, P. (2014, January 24\u201328). Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication. Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom), Budapest, Hungary.","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Krumm, J., and Hinckley, K. (2004, January 7\u201310). The nearme wireless proximity server. Proceedings of the International Conference on Ubiquitous Computing, Nottingham, UK.","DOI":"10.1007\/978-3-540-30119-6_17"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Campbell, B., and Dutta, P. (2014, January 4\u20136). An energy-harvesting sensor architecture and toolkit for building monitoring and event detection. Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings, Memphis, TN, USA.","DOI":"10.1145\/2674061.2674083"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Wang, J., Lounis, K., and Zulkernine, M. (2019, January 15\u201319). CSKES: A Context-based Secure Keyless Entry System. Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA.","DOI":"10.1109\/COMPSAC.2019.00120"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Wang, J., Lounis, K., and Zulkernine, M. (2019, January 15\u201319). Security Features for Proximity Verification. Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA.","DOI":"10.1109\/COMPSAC.2019.10272"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1109\/TSMCC.2012.2198883","article-title":"Sensor-based activity recognition","volume":"42","author":"Chen","year":"2012","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2059","DOI":"10.3390\/s150102059","article-title":"A survey of online activity recognition using mobile phones","volume":"15","author":"Shoaib","year":"2015","journal-title":"Sensors"},{"key":"ref_24","first-page":"13","article-title":"Using mobile phones to determine transportation modes","volume":"6","author":"Reddy","year":"2010","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Hemminki, S., Nurmi, P., and Tarkoma, S. (2013, January 11\u201314). Accelerometer-based transportation mode detection on smartphones. Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, Roma, Italy.","DOI":"10.1145\/2517351.2517367"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wang, S., Chen, C., and Ma, J. (2010, January 17\u201318). Accelerometer based transportation mode recognition on mobile phones. Proceedings of the 2010 Asia-Pacific Conference on Wearable Computing Systems, Shenzhen, China.","DOI":"10.1109\/APWCS.2010.18"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ryder, J., Longstaff, B., Reddy, S., and Estrin, D. (2009, January 29\u201331). Ambulation: A tool for monitoring mobility patterns over time using mobile phones. Proceedings of the 2009 International Conference on Computational Science and Engineering, Vancouver, BC, Canada.","DOI":"10.1109\/CSE.2009.312"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zhang, J., Edwan, E., Zhou, J., Chai, W., and Loffeld, O. (2012, January 23\u201326). Performance investigation of barometer aided GPS\/MEMS-IMU integration. Proceedings of the 2012 IEEE\/ION Position, Location and Navigation Symposium, Myrtle Beach, SC, USA.","DOI":"10.1109\/PLANS.2012.6236933"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sankaran, K., Zhu, M., Guo, X.F., Ananda, A.L., Chan, M.C., and Peh, L.S. (2014, January 3\u20136). Using mobile phone barometer for low-power transportation context detection. Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, Memphis, TN, USA.","DOI":"10.1145\/2668332.2668343"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.comcom.2016.02.011","article-title":"Using barometric pressure data to recognize vertical displacement activities on smartphones","volume":"87","author":"Vanini","year":"2016","journal-title":"Comput. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.eswa.2016.04.032","article-title":"Human activity recognition with smartphone sensors using deep learning neural networks","volume":"59","author":"Ronao","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.patrec.2018.02.010","article-title":"Deep learning for sensor-based activity recognition: A survey","volume":"119","author":"Wang","year":"2019","journal-title":"Pattern Recognit. Lett."},{"key":"ref_33","unstructured":"(2020, June 10). Sensor. Available online: https:\/\/developer.android.com\/reference\/android\/hardware\/Sensor.html#TYPE_PRESSURE\/."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Wu, M., Pathak, P.H., and Mohapatra, P. (2015, January 7\u201311). Monitoring building door events using barometer sensor in smartphones. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Osaka, Japan.","DOI":"10.1145\/2750858.2804257"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ando, T., Kubo, Y., Shizuki, B., and Takahashi, S. (2017, January 22\u201325). CanalSense: Face-related movement recognition system based on sensing air pressure in ear canals. Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology, Qu\u00e9bec City, QC, Canada.","DOI":"10.1145\/3126594.3126649"},{"key":"ref_36","unstructured":"(2020, June 10). LightGBM\u2019s Documentation. Available online: https:\/\/lightgbm.readthedocs.io\/en\/latest\/."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Mahler, M.A., Li, Q., and Li, A. (2017, January 13\u201317). SecureHouse: A home security system based on smartphone sensors. Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), Kona, HI, USA.","DOI":"10.1109\/PERCOM.2017.7917846"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Huang, B., Qi, G., Yang, X., Zhao, L., and Zou, H. (2016, January 12\u201316). Exploiting cyclic features of walking for pedestrian dead reckoning with unconstrained smartphones. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Heidelberg, Germany.","DOI":"10.1145\/2971648.2971742"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Kang, W., Nam, S., Han, Y., and Lee, S. (2012, January 9\u201312). Improved heading estimation for smartphone-based indoor positioning systems. Proceedings of the 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications\u2014(PIMRC), Sydney, NSW, Australia.","DOI":"10.1109\/PIMRC.2012.6362768"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/16\/4446\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:58:27Z","timestamp":1760176707000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/16\/4446"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,9]]},"references-count":39,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2020,8]]}},"alternative-id":["s20164446"],"URL":"https:\/\/doi.org\/10.3390\/s20164446","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,8,9]]}}}