SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 181
Data Acquistion through Connectivities in Cars
Kaushik Chhappaniya1, Manjiri Kshirsagar2, Mugdha Doke3 Guided by Aishwarya Gore4
1,2,3Student, Second Year EXTC, Pune Vidyarthi Griha’s College of Engineering and Technology, Pune-09
4Penetration Tester, Newton’s Apple, Pune, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - This is the era of the integrating different fields.
Internet cars or connected cars are controlling the market.
Not only the smartphone but also the car holds a lot of
user’s data. Hacking of the car is now a days bit easier for
threatening the society.
Key Words: Internet cars, Hacking
1. INTRODUCTION
The Automotive cyber security is an emerging branch
integrated of automotive and Cyber security .Having a
great combination of cyber physical systems and
connectivity in modern vehicles and mechanical
equipment. But here’s the mess the digital modernization
in connected cars is not only opening a new branch but
also creating a new field for the threat vectors .These are
capable of critically affecting the functionality and safety
of vehicles and also manipulating the other parameters.
Cyber security needed in a sense to protect vehicle
components and vehicle-related data from illegal access,
data acquisition, interference and modification. The report
collects the threats to the system and has a brief
discussion on it right from the data of nodes, sensors,
Electronic Control Unit, software application protection
and secure network connectivity (V2X, Bluetooth
protocols, Wi-Fi protocols).
1.1 Need to Study It
Now a days a research done taken to identify possible
cyber security vulnerabilities are pointing towards, that
not only machines, smartphones, desktops but also cars
can also be ‘hacked’. This is a new threat to automotive
industries.
As complexities in the vehicles is increasing day by day
the available surface to attack on the car security
increases. A single vulnerable device can leave an entire
automobile industry open to attack, and the potential
exposure ranges from inconvenience to massive safety
breakdowns. This creates the threat to the society in a way
that:-
Fig-1: Hacked System
This can be seen in upcoming days if no primitive care is
taken .So hacked car is not only a hacked infotainment
system but also a very ‘harmful weapon’ .In the sense
hackers can change the route and change the controls and
they can also control the whole car (including brakes and
accelerators
2. THE DATA OF USERS STORED IN THEIR
VEHICLES:
Event data records On-board Diagnostic
information
Location information In cabin Information
Apps User Recognition
External information
2.1 Event data records:-
These EDRs came into picture since 1990s.Till today
EDR’s are in 90% of the cars. They store information w.
This information includes speed, accelerator, break
position, seat belt usage and deployment of the airbags.
EDRs are intended to provide the crucial information to
investigate the crash.
2.2 In-Cabin information:-
Many of today’s vehicles contain sensors inside the
vehicle cabin. Microphone cameras and other devices can
collect the data of the occupant. These sensors may be
required for the emergency services and hands free use.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 182
The hard drive storage of the car is storing all the above
information.
2.3 User Recognition:-
1] Some of the today’s cars with advanced systems
recognize their user by physical characteristics.
2] The combination of the different devices like the
smart phone and key. (In Evoque –Range Rover)
3] This may include physical or biometrics like face,
fingerprint or voice.(face recognition in jaguar, land over,
biometric sets in Bently , Driver state warning in
Hyundai, biometric vehicle access in Porsche, voice
recognition in Bentley ,Morris Garages, Aston Martin)[1]
4] These sensors can also track the movement of the
user’s eyes so as to check whether the user is asleep or
not. Driver monitoring system recognizes driver and
signs of distraction. [2]
5] The car may automatically adjust the seats and
infotainment according to your everyday use.
2.4 Apps:-
Many of today’s vehicles give you the freedom to install
third party apps in your car infotainment like Apple
CarPlay, Android Auto, Spot angels. Vehicles also allow an
interface in apps in your smartphone .This apps have their
special app privacy policies.
2.5 On-Board diagnostic information
All vehicles after 1996 are legally required the on-Board
information diagnostic port (OBD-ll). Located generally
underneath the driver’s dashboard. It stores information
like where you travel how aggressively you apply
brakes .The information stored in it can be retrieved by
inserting physically a device into it.
2.6 Location information: -
The location of your vehicle based on the GPS and your
destination can be collected. Also the route the user takes
can be collected. Your home, work and favorite places are
also saved in your car system.
1) Set destination on schedule, live car tracking,
location sharing[3]
2.7 External information:-
Modern vehicles may contain cameras and sensors that
collect the information about the surrounding of the driver
like assisted braking Rear-Parking detection, detect road
or weather conditions ,lane markings and obstacles ,traffic
condition and much more. Surrounding view cameras on
under the mirror in number of cars. [4][5]
3. WIRELESS HACKING
WiFi plays a huge role in the hacking system. It works as a
medium through which intruder can attack .Wireless
networks are those networks which are connected to each
other but not via the wires.eg in laptops, printers. The
standard 802.11 specifies an over-the-air interface
between a mobile device wireless client and a base station
or between two mobile device wireless clients.
The tools used are generally used are wireshark, aircrack,
wifimap, wifitap, wifiite, wpacleansmali, dex2jar [6]
3.1 Wireless Standards:
1] SSID(Service Set Identifier): It is the name of a
wireless local area network (WLAN).All wireless devices
on a WLAN must employ the same SSID in order to
communicate with each other. SSID is also known as ESSID
(Extended Service Set Identifier).
2]BSSID (Basic Service Set Identifier): A BSSID is
nothing but just a MAC address (Media Access Control) or
Physical Address of the Wireless Access Point or the
Wireless router. This is a unique 48 bit key provided by
the manufacturer of the device. It can be in the form of
Hexadecimal. I.e. 0-9, A-F
3] BEACONS: These are the wireless packets which are
broadcasted to maintain the connectivity with the
Wireless Access Point and Client Systems.
4] CHANNEL: It is the frequency at which the Wireless
Signal travels through air. It can vary as per the changes in
the surrounding air.
5] DATA PACKETS: These are the packets which are sent
and received for the transfer of data between Wireless
Access Point and Client Systems. All the data
communicated between two computers travels in the
forms of data packets.
3.2 Use in Infotainment and Having Hands
Free Interaction in Cars
1) Automotive Voice Assistant
Now a days voice assistant are come up along with the
vehicles as we have in Android Devices and iPhone .It
detects by just calling by any specific phrase or message
(like hey MG). The voice assistant can recognize many of
languages and work on your voice too. Using voice
assistant we can open close the windows, doors, sunroofs,
change AC temperature and also many more operations.
Important features of Voice Assistant:
1.1 Drivers use Bluetooth to connect their smartphones to
their car systems to make hands-free calls.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 183
1.2 Getting directions and navigation is also the important
feature of voice assistant. In A Class Mercedes cars we
could just use three words to navigate a location.
1.3 Sending text messages
1.4 Playing Music.
1.5 Asking for local recommendations.[7]
2) Embedded support for LTE
Vehicles now days come up with a support of
embedded SIM card The M2M or Machine to Machine SIM
card is paired with the Internet Protocol (IPv6/IPv4). This
keeps the vehicle connected to the internet and the world.
LTE has so many advantages but the issue is LTE depends
on Multiple Input Multiple Output (MIMO) antennas,
which are too complex. The novelty of LTE system is itself
a great challenge new network developments launching
every day but still LTE is popular technology. The
developers are look for programmable and more secured
LTE modules that will allow them embedded application
and to communicate with others.[8]
3) Emergency call:-
Cars like MG Hector have an E-Call emergency
response system that alerts a SOS in case of an accident.
Also when the airbags are deployed, e-call is activated and
a text message is sent along with the location of the car.
Also, a text message is sent to the registered emergency
contact numbers to notify the respective people about the
mishap. The main advantage of E-Call is the GPS
positioning of the vehicle which needs the help. The road
accidents could reduce by 10% and therefore saves 2,500
lives per year.
[9][10]
3.3 Types of Connectivity:-
Fig-2 Types of connectivity
There are 5 ways a vehicle can be connected to its
surroundings and communicate with them:
1. V2I (Vehicle to Infrastructure): The technology captures
data generated by the vehicle and provides information
about the infrastructure to the driver. The V2I technology
communicates information about safety, mobility or
environment-related conditions.
2. V2V (Vehicle to Vehicle): The technology communicates
information about speed and position of surrounding
vehicles through a wireless exchange of information. The
goal is to avoid accidents, ease traffic congestions and
have a positive impact on the environment.
3. V2C (Vehicle to Cloud): The technology exchanges
information about and for applications of the vehicle with
a cloud system. This allows the vehicle to use information
from other, though the cloud connected industries like
energy, transportation and smart homes and make use
of IoT.
4. V2P (Vehicle to Pedestrian): The technology senses
information about its environment and communicates it to
other vehicles, infrastructure and personal mobile devices.
This enables the vehicle to communicate with pedestrians
and is intended to improve safety and mobility on the
road.
5. V2X (Vehicle to Everything): The technology
interconnects all types of vehicles and infrastructure
systems with another. This connectivity includes cars,
highways, ships, trains and airplanes.
4. ATTACK PROSPECTS:
1] Cars can be hacked and all the controls right from the
steering, brakes, accelerator, transmission ,sunroof,
windshield, and all the other controls. [11]
2] Information can be hacked and modified to increase
sales by the companies and also by the user to change the
statistics, this includes the distance travelled and other
data through which they can fool the insurance companies.
3]Key fob hacking is a new method by using which
attacker can enter a car without actually having its original
key and steal the car.(uses jammer and intercepting the
signal ).
4]Sometimes attacker don’t hack the car intentionally
.They do it just to get fame or for fun.
5]An attacker can hack the infotainment system of the car
and change all the user data. Like the home and work and
other locations in the map.
6]Also an attacker can change the route by hacking the
infotainment system and can create a fatal threat to the
user.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 184
7]The ECU’s in the cars are increasingly day by day and
they can be hacked and the audio, video played can be
changed.
8]By using the surrounding sensors in the car personal
data could be hacked and then the victim can be
blackmailed.
4.1 Prevention:
Intrusion detection system(IDS)—
IDS is the simplest way to prevent vulnerability and have
the ability in detecting the attacks efficiently. Generally,
IDS monitors the activities in the network or directly on
the host, detects, and raises the alarm if there are any
unexpected events occurred in the system. These unusual
events, known as intrusions are they resist their way so
that unauthorized access can be obtained.
The intrusions may come from internal, which resides
inside the targeted system components having legal access
privilege to the network, whereas external intruders may
come from the outside of the targeted network, attempting
to gain illegal access to the system components. It has
categories as follows-, 1. Signature-, 2. Specification- and
hybrid-based. There are 2 categories in IDS 1.Passive
2.Active
Passive IDS only detects the attack on the other hand
active IDS takes preventive action on the attack. A typical
IDS’s architecture is made of sensors, a detection engine,
and finally a reporting module. The sensors are
implemented either in the network (network-based IDS)
or directly at end node (host-based IDS).
Hardware Security modules (AUTOSAR System)—
It is a physical firewall made up of microcontrollers.
Normally it has its own ram and has area for program code
and data. It has timers, hardware accelerators for
cryptographic algorithms. It can access the complete
hardware of the host. It connects the host system as a
firewall. This makes the system secure, authenticated
startup of host monitors. The main use of HSM is it is
freely programmable. With the help of cryptography(code
writing or solving) we perform data transformation which
cannot be accessed by unauthenticated users.[12][13]
Machine learning:-
Today’s most trending point machine learning (ML) can be
opted in this industry also ,to prevent the user from being
the victim. We can implement a system which can test the
user’s car against attacks. The developed system will
attack and find out the vulnerabilities and then solve it
.likewise the designed system can collect lots of test
samples which the system will learn and implement a
immune system which will protect against the threat of
upcoming vulnerabilities .
5. CONCLUSION
Hence we conclude this research creating awareness in
individuals about their data stored in their cars and also
the ways in which the data can be hampered. The
connections they make through the features given in their
cars are used to hack their cars. This is witnessing
dangerous mishaps in the society.
ACKNOWLEDGEMENT
We wish to record our deep sense of gratitude and
profound thanks to Dr. Mrs. M. P. Atre, Electronics and
Telecommunication Department, PVG’s COET, Pune,
Maharashtra, India for showing keen interest, inspiring
guidance, constant encouragement with our work during
this completion of paper.
REFERENCES
[1]https://www.biometricupdate.com/201907/biom
etric-technology-in-development-for-several-auto-
applications
[2] https://www.valeo.com/en/driver-monitoring/
[3]https://www.kia.com/in/uvo.html#uvo-
introduction
[4]https://www.autobytel.com/car-buying-
guides/features/10-cars-with-a-surround-view-
camera-132305/
[5] https://www.buycarparts.co.uk/sensors-pr
[6] https://tools.kali.org/too`ls
[7] https://blog.soundhound.com/how-drivers-are-
actually-using-voice-assistants-in-cars-bb1e3972301b
[8] http://embedded-computing.com/articles/lte-the-
drivers-seat/
[9] https://www.mgmotor.co.in/ismart
[10] https://veillecarto2-0.fr/2018/04/01/ecall-the-
geolocated-emergency-call-becomes-mandatory-
inside-cars/
[11]https://www.youtube.com/watch?v=MK0SrxBC1
xs&feature=youtu.be
[12]https://en.wikipedia.org/wiki/Hardware_securit
y_module
[13]https://www.edn.com/hardware-security-
modules-unleash-autosar/
[14] Information Security principles and practices
ByMark Merkow,Jim Breithupt
[15] Wireless Hacking Exposed By Johnny Cache,
Vincent Liu
[16] Hacking a Terror Network.
[17] Wi-Fi Protocols.

More Related Content

What's hot

Mobile IOT Framework in Emerging Economies
Mobile IOT Framework in Emerging EconomiesMobile IOT Framework in Emerging Economies
Mobile IOT Framework in Emerging EconomiesHCL Technologies
 
IRJET- IoT Based Digital Notice Board Using Raspberry Pi with Audio Alert System
IRJET- IoT Based Digital Notice Board Using Raspberry Pi with Audio Alert SystemIRJET- IoT Based Digital Notice Board Using Raspberry Pi with Audio Alert System
IRJET- IoT Based Digital Notice Board Using Raspberry Pi with Audio Alert SystemIRJET Journal
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)Karteek Irukulla
 
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET Journal
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind PeopleIRJET Journal
 
Sim cards
Sim cardsSim cards
Sim cardsfaizlap
 
IRJET- IoT Based E-Challan Automation for RTO using RFID
IRJET-  	  IoT Based E-Challan Automation for RTO using RFIDIRJET-  	  IoT Based E-Challan Automation for RTO using RFID
IRJET- IoT Based E-Challan Automation for RTO using RFIDIRJET Journal
 
IRJET- Voice Recognition -Butler Bot
IRJET-  	  Voice Recognition -Butler BotIRJET-  	  Voice Recognition -Butler Bot
IRJET- Voice Recognition -Butler BotIRJET Journal
 
IRJET- IoT based Motion Control System of a Robotic car
IRJET-  	  IoT based Motion Control System of a Robotic carIRJET-  	  IoT based Motion Control System of a Robotic car
IRJET- IoT based Motion Control System of a Robotic carIRJET Journal
 
IRJET- An Android Solution for Car Monitoring and Alerting System
IRJET- An Android Solution for Car Monitoring and Alerting SystemIRJET- An Android Solution for Car Monitoring and Alerting System
IRJET- An Android Solution for Car Monitoring and Alerting SystemIRJET Journal
 
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...Associate Professor in VSB Coimbatore
 
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET Journal
 
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET-  	  Car Accident Detection and Notification: An Analytical SurveyIRJET-  	  Car Accident Detection and Notification: An Analytical Survey
IRJET- Car Accident Detection and Notification: An Analytical SurveyIRJET Journal
 
IRJET- Advanced Safety Sytem for the Vehicles
IRJET-  	  Advanced Safety Sytem for the VehiclesIRJET-  	  Advanced Safety Sytem for the Vehicles
IRJET- Advanced Safety Sytem for the VehiclesIRJET Journal
 

What's hot (20)

Mobile IOT Framework in Emerging Economies
Mobile IOT Framework in Emerging EconomiesMobile IOT Framework in Emerging Economies
Mobile IOT Framework in Emerging Economies
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
IRJET- IoT Based Digital Notice Board Using Raspberry Pi with Audio Alert System
IRJET- IoT Based Digital Notice Board Using Raspberry Pi with Audio Alert SystemIRJET- IoT Based Digital Notice Board Using Raspberry Pi with Audio Alert System
IRJET- IoT Based Digital Notice Board Using Raspberry Pi with Audio Alert System
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
 
Smart Vehicle using IoT
Smart Vehicle using IoTSmart Vehicle using IoT
Smart Vehicle using IoT
 
IRJET - Dual Verification ATM for Blind People
IRJET -  	  Dual Verification ATM for Blind PeopleIRJET -  	  Dual Verification ATM for Blind People
IRJET - Dual Verification ATM for Blind People
 
Sim cards
Sim cardsSim cards
Sim cards
 
IRJET- IoT Based E-Challan Automation for RTO using RFID
IRJET-  	  IoT Based E-Challan Automation for RTO using RFIDIRJET-  	  IoT Based E-Challan Automation for RTO using RFID
IRJET- IoT Based E-Challan Automation for RTO using RFID
 
IRJET- Voice Recognition -Butler Bot
IRJET-  	  Voice Recognition -Butler BotIRJET-  	  Voice Recognition -Butler Bot
IRJET- Voice Recognition -Butler Bot
 
IRJET- IoT based Motion Control System of a Robotic car
IRJET-  	  IoT based Motion Control System of a Robotic carIRJET-  	  IoT based Motion Control System of a Robotic car
IRJET- IoT based Motion Control System of a Robotic car
 
smart car
smart carsmart car
smart car
 
IRJET- An Android Solution for Car Monitoring and Alerting System
IRJET- An Android Solution for Car Monitoring and Alerting SystemIRJET- An Android Solution for Car Monitoring and Alerting System
IRJET- An Android Solution for Car Monitoring and Alerting System
 
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
Digital Notice Board in Schools and Colleges by Implementing IoT with Audio A...
 
IRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoTIRJET- Smart Vehicle Automation with Blackbox using IoT
IRJET- Smart Vehicle Automation with Blackbox using IoT
 
IRJET- Car Accident Detection and Notification: An Analytical Survey
IRJET-  	  Car Accident Detection and Notification: An Analytical SurveyIRJET-  	  Car Accident Detection and Notification: An Analytical Survey
IRJET- Car Accident Detection and Notification: An Analytical Survey
 
IRJET - Blind Aid
IRJET - Blind AidIRJET - Blind Aid
IRJET - Blind Aid
 
IRJET- Advanced Safety Sytem for the Vehicles
IRJET-  	  Advanced Safety Sytem for the VehiclesIRJET-  	  Advanced Safety Sytem for the Vehicles
IRJET- Advanced Safety Sytem for the Vehicles
 
A1803030111
A1803030111A1803030111
A1803030111
 

Similar to Data Acquisition and Security Risks in Connected Cars

Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationIRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationIRJET Journal
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT ApplicationIRJET Journal
 
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationAnti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationIJAEMSJORNAL
 
Forensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceForensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceIRJET Journal
 
IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET Journal
 
GPS GSM Based Vehicle Tracking & Locking System
GPS GSM Based Vehicle Tracking  &  Locking SystemGPS GSM Based Vehicle Tracking  &  Locking System
GPS GSM Based Vehicle Tracking & Locking SystemIRJET Journal
 
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...IRJET Journal
 
IRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET Journal
 
IRJET- On Board Diagnostics (OBD)3 for Vehicular Management
IRJET- On Board Diagnostics (OBD)3 for Vehicular ManagementIRJET- On Board Diagnostics (OBD)3 for Vehicular Management
IRJET- On Board Diagnostics (OBD)3 for Vehicular ManagementIRJET Journal
 
Smart Car Parking System
Smart Car Parking SystemSmart Car Parking System
Smart Car Parking SystemIRJET Journal
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET Journal
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET Journal
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET Journal
 
IRJET- IoT based Smart BLACK BOX System
IRJET- IoT based Smart BLACK BOX SystemIRJET- IoT based Smart BLACK BOX System
IRJET- IoT based Smart BLACK BOX SystemIRJET Journal
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
 
IRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET Journal
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET Journal
 
IRJET - A Design Thinking based Smart Parking System for Vehicle Parking ...
IRJET -  	  A Design Thinking based Smart Parking System for Vehicle Parking ...IRJET -  	  A Design Thinking based Smart Parking System for Vehicle Parking ...
IRJET - A Design Thinking based Smart Parking System for Vehicle Parking ...IRJET Journal
 
Traffic Sign Board Detection and Recognition using Convolutional Neural Netwo...
Traffic Sign Board Detection and Recognition using Convolutional Neural Netwo...Traffic Sign Board Detection and Recognition using Convolutional Neural Netwo...
Traffic Sign Board Detection and Recognition using Convolutional Neural Netwo...IRJET Journal
 

Similar to Data Acquisition and Security Risks in Connected Cars (20)

Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
 
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationAnti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
 
Forensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceForensic Tool for Android Mobile Device
Forensic Tool for Android Mobile Device
 
IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking System
 
GPS GSM Based Vehicle Tracking & Locking System
GPS GSM Based Vehicle Tracking  &  Locking SystemGPS GSM Based Vehicle Tracking  &  Locking System
GPS GSM Based Vehicle Tracking & Locking System
 
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
 
IRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring System
 
IRJET- On Board Diagnostics (OBD)3 for Vehicular Management
IRJET- On Board Diagnostics (OBD)3 for Vehicular ManagementIRJET- On Board Diagnostics (OBD)3 for Vehicular Management
IRJET- On Board Diagnostics (OBD)3 for Vehicular Management
 
Smart Car Parking System
Smart Car Parking SystemSmart Car Parking System
Smart Car Parking System
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
IRJET- IoT based Smart BLACK BOX System
IRJET- IoT based Smart BLACK BOX SystemIRJET- IoT based Smart BLACK BOX System
IRJET- IoT based Smart BLACK BOX System
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
 
IRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle SafetyIRJET- Smart Technology for Vehicle Safety
IRJET- Smart Technology for Vehicle Safety
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
 
IRJET - A Design Thinking based Smart Parking System for Vehicle Parking ...
IRJET -  	  A Design Thinking based Smart Parking System for Vehicle Parking ...IRJET -  	  A Design Thinking based Smart Parking System for Vehicle Parking ...
IRJET - A Design Thinking based Smart Parking System for Vehicle Parking ...
 
Traffic Sign Board Detection and Recognition using Convolutional Neural Netwo...
Traffic Sign Board Detection and Recognition using Convolutional Neural Netwo...Traffic Sign Board Detection and Recognition using Convolutional Neural Netwo...
Traffic Sign Board Detection and Recognition using Convolutional Neural Netwo...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 

Data Acquisition and Security Risks in Connected Cars

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 181 Data Acquistion through Connectivities in Cars Kaushik Chhappaniya1, Manjiri Kshirsagar2, Mugdha Doke3 Guided by Aishwarya Gore4 1,2,3Student, Second Year EXTC, Pune Vidyarthi Griha’s College of Engineering and Technology, Pune-09 4Penetration Tester, Newton’s Apple, Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - This is the era of the integrating different fields. Internet cars or connected cars are controlling the market. Not only the smartphone but also the car holds a lot of user’s data. Hacking of the car is now a days bit easier for threatening the society. Key Words: Internet cars, Hacking 1. INTRODUCTION The Automotive cyber security is an emerging branch integrated of automotive and Cyber security .Having a great combination of cyber physical systems and connectivity in modern vehicles and mechanical equipment. But here’s the mess the digital modernization in connected cars is not only opening a new branch but also creating a new field for the threat vectors .These are capable of critically affecting the functionality and safety of vehicles and also manipulating the other parameters. Cyber security needed in a sense to protect vehicle components and vehicle-related data from illegal access, data acquisition, interference and modification. The report collects the threats to the system and has a brief discussion on it right from the data of nodes, sensors, Electronic Control Unit, software application protection and secure network connectivity (V2X, Bluetooth protocols, Wi-Fi protocols). 1.1 Need to Study It Now a days a research done taken to identify possible cyber security vulnerabilities are pointing towards, that not only machines, smartphones, desktops but also cars can also be ‘hacked’. This is a new threat to automotive industries. As complexities in the vehicles is increasing day by day the available surface to attack on the car security increases. A single vulnerable device can leave an entire automobile industry open to attack, and the potential exposure ranges from inconvenience to massive safety breakdowns. This creates the threat to the society in a way that:- Fig-1: Hacked System This can be seen in upcoming days if no primitive care is taken .So hacked car is not only a hacked infotainment system but also a very ‘harmful weapon’ .In the sense hackers can change the route and change the controls and they can also control the whole car (including brakes and accelerators 2. THE DATA OF USERS STORED IN THEIR VEHICLES: Event data records On-board Diagnostic information Location information In cabin Information Apps User Recognition External information 2.1 Event data records:- These EDRs came into picture since 1990s.Till today EDR’s are in 90% of the cars. They store information w. This information includes speed, accelerator, break position, seat belt usage and deployment of the airbags. EDRs are intended to provide the crucial information to investigate the crash. 2.2 In-Cabin information:- Many of today’s vehicles contain sensors inside the vehicle cabin. Microphone cameras and other devices can collect the data of the occupant. These sensors may be required for the emergency services and hands free use.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 182 The hard drive storage of the car is storing all the above information. 2.3 User Recognition:- 1] Some of the today’s cars with advanced systems recognize their user by physical characteristics. 2] The combination of the different devices like the smart phone and key. (In Evoque –Range Rover) 3] This may include physical or biometrics like face, fingerprint or voice.(face recognition in jaguar, land over, biometric sets in Bently , Driver state warning in Hyundai, biometric vehicle access in Porsche, voice recognition in Bentley ,Morris Garages, Aston Martin)[1] 4] These sensors can also track the movement of the user’s eyes so as to check whether the user is asleep or not. Driver monitoring system recognizes driver and signs of distraction. [2] 5] The car may automatically adjust the seats and infotainment according to your everyday use. 2.4 Apps:- Many of today’s vehicles give you the freedom to install third party apps in your car infotainment like Apple CarPlay, Android Auto, Spot angels. Vehicles also allow an interface in apps in your smartphone .This apps have their special app privacy policies. 2.5 On-Board diagnostic information All vehicles after 1996 are legally required the on-Board information diagnostic port (OBD-ll). Located generally underneath the driver’s dashboard. It stores information like where you travel how aggressively you apply brakes .The information stored in it can be retrieved by inserting physically a device into it. 2.6 Location information: - The location of your vehicle based on the GPS and your destination can be collected. Also the route the user takes can be collected. Your home, work and favorite places are also saved in your car system. 1) Set destination on schedule, live car tracking, location sharing[3] 2.7 External information:- Modern vehicles may contain cameras and sensors that collect the information about the surrounding of the driver like assisted braking Rear-Parking detection, detect road or weather conditions ,lane markings and obstacles ,traffic condition and much more. Surrounding view cameras on under the mirror in number of cars. [4][5] 3. WIRELESS HACKING WiFi plays a huge role in the hacking system. It works as a medium through which intruder can attack .Wireless networks are those networks which are connected to each other but not via the wires.eg in laptops, printers. The standard 802.11 specifies an over-the-air interface between a mobile device wireless client and a base station or between two mobile device wireless clients. The tools used are generally used are wireshark, aircrack, wifimap, wifitap, wifiite, wpacleansmali, dex2jar [6] 3.1 Wireless Standards: 1] SSID(Service Set Identifier): It is the name of a wireless local area network (WLAN).All wireless devices on a WLAN must employ the same SSID in order to communicate with each other. SSID is also known as ESSID (Extended Service Set Identifier). 2]BSSID (Basic Service Set Identifier): A BSSID is nothing but just a MAC address (Media Access Control) or Physical Address of the Wireless Access Point or the Wireless router. This is a unique 48 bit key provided by the manufacturer of the device. It can be in the form of Hexadecimal. I.e. 0-9, A-F 3] BEACONS: These are the wireless packets which are broadcasted to maintain the connectivity with the Wireless Access Point and Client Systems. 4] CHANNEL: It is the frequency at which the Wireless Signal travels through air. It can vary as per the changes in the surrounding air. 5] DATA PACKETS: These are the packets which are sent and received for the transfer of data between Wireless Access Point and Client Systems. All the data communicated between two computers travels in the forms of data packets. 3.2 Use in Infotainment and Having Hands Free Interaction in Cars 1) Automotive Voice Assistant Now a days voice assistant are come up along with the vehicles as we have in Android Devices and iPhone .It detects by just calling by any specific phrase or message (like hey MG). The voice assistant can recognize many of languages and work on your voice too. Using voice assistant we can open close the windows, doors, sunroofs, change AC temperature and also many more operations. Important features of Voice Assistant: 1.1 Drivers use Bluetooth to connect their smartphones to their car systems to make hands-free calls.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 183 1.2 Getting directions and navigation is also the important feature of voice assistant. In A Class Mercedes cars we could just use three words to navigate a location. 1.3 Sending text messages 1.4 Playing Music. 1.5 Asking for local recommendations.[7] 2) Embedded support for LTE Vehicles now days come up with a support of embedded SIM card The M2M or Machine to Machine SIM card is paired with the Internet Protocol (IPv6/IPv4). This keeps the vehicle connected to the internet and the world. LTE has so many advantages but the issue is LTE depends on Multiple Input Multiple Output (MIMO) antennas, which are too complex. The novelty of LTE system is itself a great challenge new network developments launching every day but still LTE is popular technology. The developers are look for programmable and more secured LTE modules that will allow them embedded application and to communicate with others.[8] 3) Emergency call:- Cars like MG Hector have an E-Call emergency response system that alerts a SOS in case of an accident. Also when the airbags are deployed, e-call is activated and a text message is sent along with the location of the car. Also, a text message is sent to the registered emergency contact numbers to notify the respective people about the mishap. The main advantage of E-Call is the GPS positioning of the vehicle which needs the help. The road accidents could reduce by 10% and therefore saves 2,500 lives per year. [9][10] 3.3 Types of Connectivity:- Fig-2 Types of connectivity There are 5 ways a vehicle can be connected to its surroundings and communicate with them: 1. V2I (Vehicle to Infrastructure): The technology captures data generated by the vehicle and provides information about the infrastructure to the driver. The V2I technology communicates information about safety, mobility or environment-related conditions. 2. V2V (Vehicle to Vehicle): The technology communicates information about speed and position of surrounding vehicles through a wireless exchange of information. The goal is to avoid accidents, ease traffic congestions and have a positive impact on the environment. 3. V2C (Vehicle to Cloud): The technology exchanges information about and for applications of the vehicle with a cloud system. This allows the vehicle to use information from other, though the cloud connected industries like energy, transportation and smart homes and make use of IoT. 4. V2P (Vehicle to Pedestrian): The technology senses information about its environment and communicates it to other vehicles, infrastructure and personal mobile devices. This enables the vehicle to communicate with pedestrians and is intended to improve safety and mobility on the road. 5. V2X (Vehicle to Everything): The technology interconnects all types of vehicles and infrastructure systems with another. This connectivity includes cars, highways, ships, trains and airplanes. 4. ATTACK PROSPECTS: 1] Cars can be hacked and all the controls right from the steering, brakes, accelerator, transmission ,sunroof, windshield, and all the other controls. [11] 2] Information can be hacked and modified to increase sales by the companies and also by the user to change the statistics, this includes the distance travelled and other data through which they can fool the insurance companies. 3]Key fob hacking is a new method by using which attacker can enter a car without actually having its original key and steal the car.(uses jammer and intercepting the signal ). 4]Sometimes attacker don’t hack the car intentionally .They do it just to get fame or for fun. 5]An attacker can hack the infotainment system of the car and change all the user data. Like the home and work and other locations in the map. 6]Also an attacker can change the route by hacking the infotainment system and can create a fatal threat to the user.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 184 7]The ECU’s in the cars are increasingly day by day and they can be hacked and the audio, video played can be changed. 8]By using the surrounding sensors in the car personal data could be hacked and then the victim can be blackmailed. 4.1 Prevention: Intrusion detection system(IDS)— IDS is the simplest way to prevent vulnerability and have the ability in detecting the attacks efficiently. Generally, IDS monitors the activities in the network or directly on the host, detects, and raises the alarm if there are any unexpected events occurred in the system. These unusual events, known as intrusions are they resist their way so that unauthorized access can be obtained. The intrusions may come from internal, which resides inside the targeted system components having legal access privilege to the network, whereas external intruders may come from the outside of the targeted network, attempting to gain illegal access to the system components. It has categories as follows-, 1. Signature-, 2. Specification- and hybrid-based. There are 2 categories in IDS 1.Passive 2.Active Passive IDS only detects the attack on the other hand active IDS takes preventive action on the attack. A typical IDS’s architecture is made of sensors, a detection engine, and finally a reporting module. The sensors are implemented either in the network (network-based IDS) or directly at end node (host-based IDS). Hardware Security modules (AUTOSAR System)— It is a physical firewall made up of microcontrollers. Normally it has its own ram and has area for program code and data. It has timers, hardware accelerators for cryptographic algorithms. It can access the complete hardware of the host. It connects the host system as a firewall. This makes the system secure, authenticated startup of host monitors. The main use of HSM is it is freely programmable. With the help of cryptography(code writing or solving) we perform data transformation which cannot be accessed by unauthenticated users.[12][13] Machine learning:- Today’s most trending point machine learning (ML) can be opted in this industry also ,to prevent the user from being the victim. We can implement a system which can test the user’s car against attacks. The developed system will attack and find out the vulnerabilities and then solve it .likewise the designed system can collect lots of test samples which the system will learn and implement a immune system which will protect against the threat of upcoming vulnerabilities . 5. CONCLUSION Hence we conclude this research creating awareness in individuals about their data stored in their cars and also the ways in which the data can be hampered. The connections they make through the features given in their cars are used to hack their cars. This is witnessing dangerous mishaps in the society. ACKNOWLEDGEMENT We wish to record our deep sense of gratitude and profound thanks to Dr. Mrs. M. P. Atre, Electronics and Telecommunication Department, PVG’s COET, Pune, Maharashtra, India for showing keen interest, inspiring guidance, constant encouragement with our work during this completion of paper. REFERENCES [1]https://www.biometricupdate.com/201907/biom etric-technology-in-development-for-several-auto- applications [2] https://www.valeo.com/en/driver-monitoring/ [3]https://www.kia.com/in/uvo.html#uvo- introduction [4]https://www.autobytel.com/car-buying- guides/features/10-cars-with-a-surround-view- camera-132305/ [5] https://www.buycarparts.co.uk/sensors-pr [6] https://tools.kali.org/too`ls [7] https://blog.soundhound.com/how-drivers-are- actually-using-voice-assistants-in-cars-bb1e3972301b [8] http://embedded-computing.com/articles/lte-the- drivers-seat/ [9] https://www.mgmotor.co.in/ismart [10] https://veillecarto2-0.fr/2018/04/01/ecall-the- geolocated-emergency-call-becomes-mandatory- inside-cars/ [11]https://www.youtube.com/watch?v=MK0SrxBC1 xs&feature=youtu.be [12]https://en.wikipedia.org/wiki/Hardware_securit y_module [13]https://www.edn.com/hardware-security- modules-unleash-autosar/ [14] Information Security principles and practices ByMark Merkow,Jim Breithupt [15] Wireless Hacking Exposed By Johnny Cache, Vincent Liu [16] Hacking a Terror Network. [17] Wi-Fi Protocols.