Abstract

Abstract: This study illustrates potential avenues for exploitation by utilizing RTL-SDR dongles to reveal Software-Defined Radio's (SDR) vulnerabilities. Using replay attacks, the study reveals the weakness of car key unlocking techniques, concentrating on static codes. The study also shows how RTL-SDR, in conjunction with SDR++ software, may use to intercept communications, posing major privacy concerns and enabling one to listen in on walkie-talkietalks. These findings demonstrate how urgently security measures are required to reduce the risks associated with RTL-SDR exploitation in a variety of industries. As the field of technology advances, the study advances our knowledge of potential threats in wireless communication systems and it emphasizes the security implementations to safeguard against unauthorized access and misuse.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call