SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 108
Cyber Attacks on Smart Cars using SDR
Yash M. Kenia
B.Tech (Computer), Cyber Security Analyst, Mumbai, India
--------------------------------------------------------------------------***----------------------------------------------------------------------------
Abstract - There is a tremendous growth towards the concept of Smart Cities. As these highly efficient technologies flood
the globe, there are certain security risks that arise in the due course. With high availability and efficiency arise new
vulnerabilities and risks in the field of Information Security. This paper explores the concept of securing the Smart Keyless
Cars which use radio frequencies to lock and unlock doors. This paper aims at the vulnerabilities of these keyless smart cars
and hacking and exploiting them through the technologies like software defined radio (SDR) using software and devices like
GNURadio and HackRF. Further, the countermeasures and mitigation models are also drafted for safeguarding the keyless cars.
Keywords - Smart Cities, Cyber Security, Information Security, Smart Devices, and Keyless smart cars.
I. INTRODUCTION
The traditional key method of locking and unlocking the car required manually inserting the key in the lock. This method
was a bit tedious. To ease it, came a concept of keyless cars. This system did not require the user to manually enter the key in
the lock to lock or unlock the door. Instead only a button had to be pressed on the key. It uses radio frequencies to lock and
unlock the car. When the button on the key is pressed, a specific frequency is emitted by the keys. When the emitted frequency
of the key matches with the car’s required frequency, the doors are locked or unlocked.
A Software-defined radio (SDR) is a radio communication system which is implemented by software in an embedded system
or a computer instead of using the modulators or amplifiers. A common software used for the implementation of SDR is
GNURadio Companion. [2]
GNURadio is a software development toolkit which pro- vides signal processing blocks for the implementation of SDR and
radio signalling and tuning. An external RF hardware can be attached to the computer and the GNURadio provides the
interface to perform the logical implementation using these radio frequencies and signals. A commonly used RF hardware is
HackRF. It provides a graphical user interface (UI) for the user to build flow graphs. [2]
HackRF is a hardware gadget developed by Great Scott Gadgets which works well with GNURadio for implementing the
Radio Frequencies, replaying, tuning and signalling. It is a peripheral for the GNURadio companion. The whole concept of SDR
can be implemented using GNU and HackRF.[2]
This paper shows the concepts of Software-defined radio on the keyless smart cars for capturing and replaying the key
frequencies with the concept of Cyber Security attack like Man-in-the-middle attacks and replay attacks.
II. PROPOSED SYSTEM
A. Attack Models
1) Man in the middle attack (MITM)
In Information security, Man in the middle attack is a type of attack in which the attacker secretly relays or alters the
communication between two victims who are made to believe that they are directly communicating with each other. The
victims are completely unaware of the presence of attacker in the middle. MITM attacks can be either passive or active.
Passive MITM attacks are done just to constantly sniff the traffic between two parties. Active MITM attacks are done for the
purpose of harming or causing damage to the victims.
2) Replay attack
A replay attack in Information Security is a type of attack in which a data transmission between two parties is captured in
between and is replayed with or without manipulating it without the knowledge of the two parties. This attack is similar to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 109
MITM attack and is the lower tier version of it.
3) Relay attack
A relay attack is similar to man in the middle attack in which the communication is initiated by the attacker in which
the attacker simply relays the message without even manipulating it.
B. Threat Models
Threat models are typically made during the product de- velopment and design process. If a company producing aparticular
product has a good development life cycle, it creates the threat model when product development begins and continuously
updates the model as the product moves through the development life cycle. These models are living documents that change as
the target changes and as you learn more about a target, so you should update them often.[3]
The high-level threats are that an attacker could:
• Remotely take over a vehicle
• Shut down a vehicle
• Spy on vehicle occupants
• Unlock a vehicle
• Steal a vehicle
• Track a vehicle
• Thwart safety systems
• Install malware on the vehicle
Key Fob An attacker could exploit the key fob connection to:
• Lock out a key
• Brute-force the key fob algorithm
• Clone the key fob
• Jam the key fob signal [3]
III. IMPLEMENTATION
This explains the implementation of the Hacking of the keyless smart cars using the technology of Software-defined radio –
GNURadio and HackRF. Two phases have been explained here:
A. Implementation and Exploitation.
1) Capturing the radio frequencies of the key
The following is the flow graph which is used to capture the frequencies:
Options: ID is set to the top block and the Generate Options is set to QT GUI. Which is a type of frequency graph for the
graphical user interface. These are the basic and default parameters which are set in the GNU Radio Companion.
Osmocom Source: The Osmocom source is an abstraction layer that allows us to communicate with different hardware
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 110
devices (HackRF in our case) for software radio. And it is asource which produces digital signals that will be consumed by the
next block in the flow graph. This tells the HackRF to switch to the receiving mode via the USB. It has different parameters
like the sample rate which we have specified in the earlier stage. We also specify the channel frequency of approximate signal
and the car which is set to 433.9M Hz. The RF Gains are set to 0 to avoid any errors and actually are not used in our demo.
QT GUI Waterfall Sink: This is the graphical user interface for the user which will show a graphical structure and show the
details of the frequencies that are being emitted at every second by the rates of 2M Hz. We define different parameters like the
Center Frequency which is set to 0 by default and the Bandwidth for the flow graph in 2M Hz which is kept as the same for
the sample rate.
The captured frequencies are further stored in a file format in the computer using HackRF and GNU Radio Companion which
are based on the technology of Software Defined Radio. [6]
The peak denotes the captured frequency of the car key.
Fig.1. Flow graph for captured frequency
Fig. 2. Captured frequency
2) Replaying the captured frequencies directly on the car
Throttle Block: This is the block to refine the frequencies and emit them equally and repeatedly on the car i.e. to match the
required frequency to crack the lock.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 111
Fig. 3. Replay flowgraph
These frequency flow graphs are replayed over the car repeatedly and the car unlocks.
Fig. 4. Replayed frequency
B. Mitigation Models and Counter Measures
1) Rolling Code
A rolling code also known as hopping code is a mechanism used in keyless smart cars and systems to avoid the replay and
relay attacks, where in an attacker captures the radio frequency transmissions and replays it to cause the system or the car to
unlock. These applications are widely seen in normal car doors and keyless entry systems. [4]
A rolling code in keyless section frameworks to mitigate and avoid replay attacks, where a meddler records the transmission
and replays it at a certain time to make the victim ’open’ the lock and use the key to open the car and capture the transmitted
frequency.
Techniques:
1. A pseudo random number is generated which is crypto- graphically secure from both the receiver andtransmitter end.
2. Transmitter sends next number code in sequence.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 112
3. Receiver compares this to its calculated next number code.
4. A typical implementation compares within the next 256 codes in case receiver missed some transmitted keys[4]
2) KeeLoq
KeeLoq”code hopping” encoders encrypt a 0-filled 32-bit block with KeeLoq cipher to produce a 32-bit ”hopping code”. A 32-
bit initialization vector is linearly added (XORed) to the 32 least significant bits of the key prior to encryption and after
decryption.
Figure 2 shows the structure diagram of KEELOQ Encryption. The Counter which is used to shield the frequency numeric
code from being captured. Once this encoder detects the press of the button, it reads the input and increments the Sync
Counter value. The counter and keys are input to the encryption algorithm and the output is a 32 bit data. This will change
with every press of the button of the key fob. And its value will be randomly hoping and generated. Hence, this is the hopping
portion of the data or the code. This 32 bit is combined with a fixed 34 bit portion which consists of the information about the
serial number from which the code is transmitted to the receiver. [1]
Fig. 5. KeeLoq Encryption Algorithm
IV. EXPERIMENTAL RESULTS
The experimental results are all part of the flow graphs in the GNURadio of the computer which was connected with the
HackRF. The frequency of the key was captured and re- played using the above concepts of software-defined radio. The test
subject was the Indian version of Honda City i-vtec. This research and experiment has also been performed on Toyota Innova
Crysta and Maruti Wagon R. The experiment wassuccessful in performing the man-in-the-middle and Replay attack.
V. CONCLUSION AND FUTURE WORK
This paper explains how the man in the middle attacks or replaying attacks are possible on the cars and vehicles using tools
and techniques and frequency capturing by HackRF. Further, we also see that the same can be countered by the use of KeeLoq
algorithm and rolling codes. This provides enough concepts and information on which more such vulnerabilities and loopholes
should be patched and every car should at least have a rolling code mechanism in their locking and unlocking.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 113
REFERENCES
1. Y. Hu, Y. Zhang and B. Sun,”Design of RKE System Based on KEELOQ Encryption Technology,” 2009 International
Conference on Artificial Intelligence and Computational Intelligence, Shanghai, 2009, pp. 324-327.
2. K. Hein a¨aro, ”Cyber attacking tactical radio networks,” 2015 International Conference on Military Communications
and Information Systems (ICMCIS), Cracow, 2015, pp. 1-6. doi: 10.1109/ICMCIS.2015.7158684
3. The Car Hacker’s Handbook: A Guide for Penetration Testers by Craig Smith. ISBN-10: 1-59327-703-2 ISBN-13: 978-1-
59327-703-1 Publisher: William Pollock [4]https://en.wikipedia.org/wiki/Rolling code
4. Oka, Dennis Kengo, et al. ”Survey of vehicle IoT bluetooth devices.” Service- Oriented Computing and Applications
(SOCA), 2014 IEEE 7th International Conference on. IEEE, 2014.
5. https://greatscottgadgets.com

More Related Content

What's hot

The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondSiddharth Rao
 
Атаки на мобильные сети
Атаки на мобильные сетиАтаки на мобильные сети
Атаки на мобильные сетиEkaterina Melnik
 
Presentation of H323 protocol
Presentation of H323 protocolPresentation of H323 protocol
Presentation of H323 protocolMd. Taiseen Azam
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Communication Devices Inc
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Videoguy
 
Wireless intelligent networking
Wireless intelligent networkingWireless intelligent networking
Wireless intelligent networkingManish Kumar
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...OnBoard Security, Inc. - a Qualcomm Company
 
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableMobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableXura
 
Wireless intelligent network
Wireless intelligent networkWireless intelligent network
Wireless intelligent networksuryakant singh
 
Cyber Security in Transportation
Cyber Security in TransportationCyber Security in Transportation
Cyber Security in TransportationOren Elimelech
 
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)sequi_inc
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impactAhmad Sharifi
 
Gsm security
Gsm securityGsm security
Gsm securitymaicuong8
 
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets SecurityMIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets SecurityCharles Guillemet
 
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceUltraUploader
 

What's hot (20)

The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyond
 
Атаки на мобильные сети
Атаки на мобильные сетиАтаки на мобильные сети
Атаки на мобильные сети
 
Presentation of H323 protocol
Presentation of H323 protocolPresentation of H323 protocol
Presentation of H323 protocol
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...
 
Wireless intelligent networking
Wireless intelligent networkingWireless intelligent networking
Wireless intelligent networking
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
 
H.323
H.323H.323
H.323
 
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers VulnerableMobile Cybercrime - Don’t Leave Your Customers Vulnerable
Mobile Cybercrime - Don’t Leave Your Customers Vulnerable
 
Wireless intelligent network
Wireless intelligent networkWireless intelligent network
Wireless intelligent network
 
Cyber Security in Transportation
Cyber Security in TransportationCyber Security in Transportation
Cyber Security in Transportation
 
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Gsm security
Gsm securityGsm security
Gsm security
 
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets SecurityMIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets Security
 
Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
 
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
 
Cryptography in GSM
Cryptography in GSMCryptography in GSM
Cryptography in GSM
 
Final gsm1
Final gsm1Final gsm1
Final gsm1
 

Similar to IRJET- Cyber Attacks on Smart Cars using SDR

Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of ThingsIRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
IRJET- IoT Based Swachch Bharat Abhiyan
IRJET-	 IoT Based Swachch Bharat AbhiyanIRJET-	 IoT Based Swachch Bharat Abhiyan
IRJET- IoT Based Swachch Bharat AbhiyanIRJET Journal
 
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET Journal
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Editor IJARCET
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Editor IJARCET
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET Journal
 
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET -  	  Automatic Toll E-Tickting System for Transportation and Finding o...IRJET -  	  Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...IRJET Journal
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTIRJET Journal
 
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEMVEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEMIRJET Journal
 
A Voice Controlled Vehicle For The Aid Of Disabled Person
A Voice Controlled Vehicle For The Aid Of Disabled PersonA Voice Controlled Vehicle For The Aid Of Disabled Person
A Voice Controlled Vehicle For The Aid Of Disabled PersonIRJET Journal
 
IRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print SensorIRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print SensorIRJET Journal
 
IRJET- Industrial Safety Device for Employees in Overhead Bridge Crane us...
IRJET-  	  Industrial Safety Device for Employees in Overhead Bridge Crane us...IRJET-  	  Industrial Safety Device for Employees in Overhead Bridge Crane us...
IRJET- Industrial Safety Device for Employees in Overhead Bridge Crane us...IRJET Journal
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET Journal
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET Journal
 

Similar to IRJET- Cyber Attacks on Smart Cars using SDR (20)

Office Automation System using Internet of Things
Office Automation System using Internet of ThingsOffice Automation System using Internet of Things
Office Automation System using Internet of Things
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IRJET- IoT Based Swachch Bharat Abhiyan
IRJET-	 IoT Based Swachch Bharat AbhiyanIRJET-	 IoT Based Swachch Bharat Abhiyan
IRJET- IoT Based Swachch Bharat Abhiyan
 
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
 
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET -  	  Automatic Toll E-Tickting System for Transportation and Finding o...IRJET -  	  Automatic Toll E-Tickting System for Transportation and Finding o...
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOTVEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
VEHICLE ANTI THEFT DETECTION AND PROTECTION WITH IMAGE CAPTURE USING IOT
 
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEMVEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
VEHICLE TO VEHICLE COMMUNICATION FOR ACCIDENT-AVOIDANCE SYSTEM
 
A Voice Controlled Vehicle For The Aid Of Disabled Person
A Voice Controlled Vehicle For The Aid Of Disabled PersonA Voice Controlled Vehicle For The Aid Of Disabled Person
A Voice Controlled Vehicle For The Aid Of Disabled Person
 
IRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print SensorIRJET- Smart Vehicle Security System using Finger Print Sensor
IRJET- Smart Vehicle Security System using Finger Print Sensor
 
IRJET- Industrial Safety Device for Employees in Overhead Bridge Crane us...
IRJET-  	  Industrial Safety Device for Employees in Overhead Bridge Crane us...IRJET-  	  Industrial Safety Device for Employees in Overhead Bridge Crane us...
IRJET- Industrial Safety Device for Employees in Overhead Bridge Crane us...
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
 
IRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in CarsIRJET- Data Acquistion through Connectivities in Cars
IRJET- Data Acquistion through Connectivities in Cars
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

IRJET- Cyber Attacks on Smart Cars using SDR

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 108 Cyber Attacks on Smart Cars using SDR Yash M. Kenia B.Tech (Computer), Cyber Security Analyst, Mumbai, India --------------------------------------------------------------------------***---------------------------------------------------------------------------- Abstract - There is a tremendous growth towards the concept of Smart Cities. As these highly efficient technologies flood the globe, there are certain security risks that arise in the due course. With high availability and efficiency arise new vulnerabilities and risks in the field of Information Security. This paper explores the concept of securing the Smart Keyless Cars which use radio frequencies to lock and unlock doors. This paper aims at the vulnerabilities of these keyless smart cars and hacking and exploiting them through the technologies like software defined radio (SDR) using software and devices like GNURadio and HackRF. Further, the countermeasures and mitigation models are also drafted for safeguarding the keyless cars. Keywords - Smart Cities, Cyber Security, Information Security, Smart Devices, and Keyless smart cars. I. INTRODUCTION The traditional key method of locking and unlocking the car required manually inserting the key in the lock. This method was a bit tedious. To ease it, came a concept of keyless cars. This system did not require the user to manually enter the key in the lock to lock or unlock the door. Instead only a button had to be pressed on the key. It uses radio frequencies to lock and unlock the car. When the button on the key is pressed, a specific frequency is emitted by the keys. When the emitted frequency of the key matches with the car’s required frequency, the doors are locked or unlocked. A Software-defined radio (SDR) is a radio communication system which is implemented by software in an embedded system or a computer instead of using the modulators or amplifiers. A common software used for the implementation of SDR is GNURadio Companion. [2] GNURadio is a software development toolkit which pro- vides signal processing blocks for the implementation of SDR and radio signalling and tuning. An external RF hardware can be attached to the computer and the GNURadio provides the interface to perform the logical implementation using these radio frequencies and signals. A commonly used RF hardware is HackRF. It provides a graphical user interface (UI) for the user to build flow graphs. [2] HackRF is a hardware gadget developed by Great Scott Gadgets which works well with GNURadio for implementing the Radio Frequencies, replaying, tuning and signalling. It is a peripheral for the GNURadio companion. The whole concept of SDR can be implemented using GNU and HackRF.[2] This paper shows the concepts of Software-defined radio on the keyless smart cars for capturing and replaying the key frequencies with the concept of Cyber Security attack like Man-in-the-middle attacks and replay attacks. II. PROPOSED SYSTEM A. Attack Models 1) Man in the middle attack (MITM) In Information security, Man in the middle attack is a type of attack in which the attacker secretly relays or alters the communication between two victims who are made to believe that they are directly communicating with each other. The victims are completely unaware of the presence of attacker in the middle. MITM attacks can be either passive or active. Passive MITM attacks are done just to constantly sniff the traffic between two parties. Active MITM attacks are done for the purpose of harming or causing damage to the victims. 2) Replay attack A replay attack in Information Security is a type of attack in which a data transmission between two parties is captured in between and is replayed with or without manipulating it without the knowledge of the two parties. This attack is similar to
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 109 MITM attack and is the lower tier version of it. 3) Relay attack A relay attack is similar to man in the middle attack in which the communication is initiated by the attacker in which the attacker simply relays the message without even manipulating it. B. Threat Models Threat models are typically made during the product de- velopment and design process. If a company producing aparticular product has a good development life cycle, it creates the threat model when product development begins and continuously updates the model as the product moves through the development life cycle. These models are living documents that change as the target changes and as you learn more about a target, so you should update them often.[3] The high-level threats are that an attacker could: • Remotely take over a vehicle • Shut down a vehicle • Spy on vehicle occupants • Unlock a vehicle • Steal a vehicle • Track a vehicle • Thwart safety systems • Install malware on the vehicle Key Fob An attacker could exploit the key fob connection to: • Lock out a key • Brute-force the key fob algorithm • Clone the key fob • Jam the key fob signal [3] III. IMPLEMENTATION This explains the implementation of the Hacking of the keyless smart cars using the technology of Software-defined radio – GNURadio and HackRF. Two phases have been explained here: A. Implementation and Exploitation. 1) Capturing the radio frequencies of the key The following is the flow graph which is used to capture the frequencies: Options: ID is set to the top block and the Generate Options is set to QT GUI. Which is a type of frequency graph for the graphical user interface. These are the basic and default parameters which are set in the GNU Radio Companion. Osmocom Source: The Osmocom source is an abstraction layer that allows us to communicate with different hardware
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 110 devices (HackRF in our case) for software radio. And it is asource which produces digital signals that will be consumed by the next block in the flow graph. This tells the HackRF to switch to the receiving mode via the USB. It has different parameters like the sample rate which we have specified in the earlier stage. We also specify the channel frequency of approximate signal and the car which is set to 433.9M Hz. The RF Gains are set to 0 to avoid any errors and actually are not used in our demo. QT GUI Waterfall Sink: This is the graphical user interface for the user which will show a graphical structure and show the details of the frequencies that are being emitted at every second by the rates of 2M Hz. We define different parameters like the Center Frequency which is set to 0 by default and the Bandwidth for the flow graph in 2M Hz which is kept as the same for the sample rate. The captured frequencies are further stored in a file format in the computer using HackRF and GNU Radio Companion which are based on the technology of Software Defined Radio. [6] The peak denotes the captured frequency of the car key. Fig.1. Flow graph for captured frequency Fig. 2. Captured frequency 2) Replaying the captured frequencies directly on the car Throttle Block: This is the block to refine the frequencies and emit them equally and repeatedly on the car i.e. to match the required frequency to crack the lock.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 111 Fig. 3. Replay flowgraph These frequency flow graphs are replayed over the car repeatedly and the car unlocks. Fig. 4. Replayed frequency B. Mitigation Models and Counter Measures 1) Rolling Code A rolling code also known as hopping code is a mechanism used in keyless smart cars and systems to avoid the replay and relay attacks, where in an attacker captures the radio frequency transmissions and replays it to cause the system or the car to unlock. These applications are widely seen in normal car doors and keyless entry systems. [4] A rolling code in keyless section frameworks to mitigate and avoid replay attacks, where a meddler records the transmission and replays it at a certain time to make the victim ’open’ the lock and use the key to open the car and capture the transmitted frequency. Techniques: 1. A pseudo random number is generated which is crypto- graphically secure from both the receiver andtransmitter end. 2. Transmitter sends next number code in sequence.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 112 3. Receiver compares this to its calculated next number code. 4. A typical implementation compares within the next 256 codes in case receiver missed some transmitted keys[4] 2) KeeLoq KeeLoq”code hopping” encoders encrypt a 0-filled 32-bit block with KeeLoq cipher to produce a 32-bit ”hopping code”. A 32- bit initialization vector is linearly added (XORed) to the 32 least significant bits of the key prior to encryption and after decryption. Figure 2 shows the structure diagram of KEELOQ Encryption. The Counter which is used to shield the frequency numeric code from being captured. Once this encoder detects the press of the button, it reads the input and increments the Sync Counter value. The counter and keys are input to the encryption algorithm and the output is a 32 bit data. This will change with every press of the button of the key fob. And its value will be randomly hoping and generated. Hence, this is the hopping portion of the data or the code. This 32 bit is combined with a fixed 34 bit portion which consists of the information about the serial number from which the code is transmitted to the receiver. [1] Fig. 5. KeeLoq Encryption Algorithm IV. EXPERIMENTAL RESULTS The experimental results are all part of the flow graphs in the GNURadio of the computer which was connected with the HackRF. The frequency of the key was captured and re- played using the above concepts of software-defined radio. The test subject was the Indian version of Honda City i-vtec. This research and experiment has also been performed on Toyota Innova Crysta and Maruti Wagon R. The experiment wassuccessful in performing the man-in-the-middle and Replay attack. V. CONCLUSION AND FUTURE WORK This paper explains how the man in the middle attacks or replaying attacks are possible on the cars and vehicles using tools and techniques and frequency capturing by HackRF. Further, we also see that the same can be countered by the use of KeeLoq algorithm and rolling codes. This provides enough concepts and information on which more such vulnerabilities and loopholes should be patched and every car should at least have a rolling code mechanism in their locking and unlocking.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 113 REFERENCES 1. Y. Hu, Y. Zhang and B. Sun,”Design of RKE System Based on KEELOQ Encryption Technology,” 2009 International Conference on Artificial Intelligence and Computational Intelligence, Shanghai, 2009, pp. 324-327. 2. K. Hein a¨aro, ”Cyber attacking tactical radio networks,” 2015 International Conference on Military Communications and Information Systems (ICMCIS), Cracow, 2015, pp. 1-6. doi: 10.1109/ICMCIS.2015.7158684 3. The Car Hacker’s Handbook: A Guide for Penetration Testers by Craig Smith. ISBN-10: 1-59327-703-2 ISBN-13: 978-1- 59327-703-1 Publisher: William Pollock [4]https://en.wikipedia.org/wiki/Rolling code 4. Oka, Dennis Kengo, et al. ”Survey of vehicle IoT bluetooth devices.” Service- Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on. IEEE, 2014. 5. https://greatscottgadgets.com