Attackers uses short-range wireless protocols, such as Bluetooth or NFC, to establish a command link to the vehicle, typically requiring proximity.