Posts | Comments

Planet Arduino

Archive for the ‘software-defined radio’ Category

Microcontrollers tend to consume other kinds of electronics. A project you might once have done with a 555 now probably has a cheap microcontroller in it. Music synthesizers? RC controllers? Most likely, all microcontroller-based now. We always thought RF electronics would be immune to that, but the last decade or two has proven us wrong. Software-defined radio or SDR means you get the RF signal to digital as soon as possible and do everything else in software. If you want an introduction to SDR, Elektor now has an inexpensive RF shield for the Arduino. The Si5351-based board uses that oscillator IC to shift RF signals down to audio frequencies and then makes it available to the PC to do more processing.

The board is available alone or as part of a kit that includes a book. There’s also a series of Elektor articles about it. There’s also a review video from Elektor about the board in the video, below.

We peeked at the schematic and the shield is more for letting the Arduino control the radio by changing the oscillator frequency rather than performing the SDR functions. The IQ signals appear on the PC’s soundcard via a microphone or line-in jack, and don’t really route to the Arduino.

That’s a shame because some of the 32-bit Arduinos might be able to do some interesting things with the right hardware. Plus there are many capable CPU and FPGA boards that have Arduino shield-compatible layouts. That could have led to some interesting possibilities.

Then again, having a programmable signal source on the Arduino isn’t a bad thing and compared to the older version of the board, the new board offers easier breakout for the oscillator signals.

If you want to learn more about how SDR works, try starting with spreadsheets. However, if you want to graduate to something more practical, try our series on GNU Radio.

 

 

As we’ve mentioned previously, the integrity of your vehicle in an era where even your car can have a data connection could be a dubious bet at best. Speaking to these concerns, a soon-to-be published paper out of the University of Birmingham in the UK, states that virtually every Volkswagen sold since 1995 can be hacked and unlocked by cloning the vehicle’s keyfob via an Arduino and software defined radio (SDR).

The research team, led by [Flavio Garcia], have described two main vulnerabilities: the first requires combining a cyrptographic key from the vehicle with the signal from the owner’s fob to grant access, while the second takes advantage of the virtually ancient HiTag2 security system that was implemented in the 1990s. The former affects up to 100 million vehicles across the Volkswagen line, while the latter will work on models from Citroen, Peugeot, Opel, Nissan, Alfa Romero, Fiat, Mitsubishi and Ford.

The process isn’t exactly as simple as putting together $40 of electronics and walking away with a vehicle. The would-be thief must be close in order to detect the fob’s unique key — although they only need to do so once for that vehicle! — as well as reverse-engineer the other half of the code from the vehicle’s internal network. Exploiting HiTag2’s vulnerabilities to unlock the vehicle can be achieved within a minute by a well-prepared thief. [Garcia] and his team note that only the VW Golf 7 has been spared from this exploit.

If thievery is not your thing and you’re looking to white-hat hack your vehicle, Volkswagen still has the best option in the form of the loveable Beetle.

[Thanks for the tip therafman!]


Filed under: Arduino Hacks, hardware

As we’ve mentioned previously, the integrity of your vehicle in an era where even your car can have a data connection could be a dubious bet at best. Speaking to these concerns, a soon-to-be published paper out of the University of Birmingham in the UK, states that virtually every Volkswagen sold since 1995 can be hacked and unlocked by cloning the vehicle’s keyfob via an Arduino and software defined radio (SDR).

The research team, led by [Flavio Garcia], have described two main vulnerabilities: the first requires combining a cyrptographic key from the vehicle with the signal from the owner’s fob to grant access, while the second takes advantage of the virtually ancient HiTag2 security system that was implemented in the 1990s. The former affects up to 100 million vehicles across the Volkswagen line, while the latter will work on models from Citroen, Peugeot, Opel, Nissan, Alfa Romero, Fiat, Mitsubishi and Ford.

The process isn’t exactly as simple as putting together $40 of electronics and walking away with a vehicle. The would-be thief must be close in order to detect the fob’s unique key — although they only need to do so once for that vehicle! — as well as reverse-engineer the other half of the code from the vehicle’s internal network. Exploiting HiTag2’s vulnerabilities to unlock the vehicle can be achieved within a minute by a well-prepared thief. [Garcia] and his team note that only the VW Golf 7 has been spared from this exploit.

If thievery is not your thing and you’re looking to white-hat hack your vehicle, Volkswagen still has the best option in the form of the loveable Beetle.

[Thanks for the tip therafman!]


Filed under: Arduino Hacks, hardware


  • Newsletter

    Sign up for the PlanetArduino Newsletter, which delivers the most popular articles via e-mail to your inbox every week. Just fill in the information below and submit.

  • Like Us on Facebook