SlideShare a Scribd company logo
1 of 28
NIREEKSHA KUMARI
ELECTRONICS AND COMMUNICATION
4SF10EC064
• Modern vehicles are increasingly being interconnected with
computer systems, which collect information both from vehicular
sources and Internet services. Unfortunately, this creates a no
negligible attack surface, which extends when vehicles are partly
operated via smart phones. In this letter, a hierarchically distributed
control system architecture which integrates a Smartphone with
classical embedded systems is presented, and an ad-hoc, end-to-end
security layer is designed to demonstrate how a Smartphone can
interact securely with a modern vehicle without requiring
modifications to the existing in-vehicle network. Experimental
results demonstrate the effectiveness of the approach.
2SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 The current trend in automotive products and services is to improve the
accessibility of the vehicles through novel services, which require a connection
to some Internet-based source.
 This is used both to collect information on the external environment (e.g.,
traffic conditions, weather forecasts, vehicle position and orientation, often
integrated within the on-board vehicle control systems), and to offer
infotainment services.
 In doing so, the new devices that interact with the vehicle (e.g. modern
infotainment systems, GSM, and Bluetooth connections) lead to an increased
attack surface, which may enable an adversary to break into the vehicle itself,
causing severe safety hazards.
 Recently, several researchers highlighted this aspect and successfully
demonstrated attacks against different vehicles.
3SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 Each of these works showed that it was possible to take control of
certain functionalities of the vehicle, and interfere with safety-critical or
sensitive components.
 These vulnerabilities hamper novel solutions (e.g., smart phones to
unlock the vehicle door or to start the engine), because of the risk of
successful attacks.
 Adding security mechanisms to vehicles is a challenging task, as the
related embedded architectures are commonly designed with safety
requirements rather than security ones in mind.
 In addition, the available computing resources are in general tailored
to fit tightly to the control systems needs, in order to limit the costs. This
obviously restricts the options available for adding a security layer in
subsequent redesign phases.
4SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 Recently, however, security requirements are gaining more and more
priority, especially in the communication between embedded computers
with ad-hoc wireless networks .
 In this letter, we consider a Smartphone-in-the-loop vehicle
architecture in the use case of a two-wheeled vehicle.
 “Smartphone” is a mobile phone with more advanced computing
capability and connectivity than basic feature phones
 We propose a security solution that protects against attacks by
addressing the challenges raised above, meeting both performance and
real-time constraints. Furthermore, we explicitly take the capabilities of
the target architecture into account (i.e., no input capabilities on the
vehicle side, limited output capabilities, and lack of a trusted execution
environment on the mobile device).
5SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 Our proposed solution allows a Smartphone to establish a secure
session layer over an insecure radio connection, which provides additional
security guarantees regardless of the security mechanisms already
implemented in the physical layer (if any).
 As a result, the entire application layer is transparently secured.
 The applicability and the effectiveness of the proposed solution is
corroborated by experimental results.
 The structure of this letter is as follows.
 Section I presents the vehicle embedded architecture
 Section II details the related security issues.
 Section III describes the designed security solution.
 Section IV, the experimental results are presented and discussed.
6SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 The system architecture under consideration directly relates to
the vehicle control logic.
 The control logic1 can be split into two main stages:
 HIGH -LEVEL : This stage takes care of the vehicle
motion and energy control
 LOW-LEVEL : This stage takes care of data
acquisition and actuation.
7SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
8SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 The high-level and the low-level control routines run on different
devices, thus leading to a hierarchically distributed control system.
in Fig. 2.1.a), the system architecture comprises two main elements.
 “Gateway electronic control unit (ECU)”:
 which is physically mounted on the vehicle, runs the low-level control
logic, and communicates with sensors and actuators via an in-vehicle
network.
 The Gateway ECU is equipped with a radio interface that allows wireless
communication between the in-vehicle network and external devices
 “external device”:
 This works closely with the vehicle ECUs via the radio interface.
 The external device is a mobile device that runs the high-level control
routines and acts as a driver-to-vehicle interface
9SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
The task of implementation for lightweight electrical vehicles is
accomplished with a two-layer structure. A high-level controller keeps
track of a “reference profile” (ᶓ ref,) for the battery “state of charge
(SoC) , ᶓ ”.
The profile is generated by taking into account the route length and its
elevation profile. The mobile device implements the SoC controller
within an ad-hoc app that we developed, which also includes navigation
features that leverage on Internet-based services (e.g., Google Maps
API)
the low-level control loops enforce speed and acceleration
constraints (vb and ab in, which allow to meet the desired energy
consumption profile. The low-level controllers act on the gas handle
opening ge to guarantee that the dynamical behaviour of the vehicle
(i.e., speed ve and ae acceleration) is kept within the prescribed limits.
10SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
The protocol has a two-phase session setup: after the pairing process, which allows
the peers to get to know each other and set up the network properties, the actual
communication is enabled.
 Depending on the protocol version, different security features are available.
However, the early Bluetooth standard and its successors, with the introduction of
the secure Simple pairing (SSP) protocol, suffer from various security vulnerabilities
due to weak cryptographic primitives.
 Given the application scenario and the aforementioned security issues, it is
necessary to devise an application-level security mechanism that mitigates the
vulnerabilities that lie in the wireless link.
 The objective of the attacker is to obtain access to the information exchanged
between the vehicle and the mobile device, and ultimately manipulate the ECU
execution flow. We concentrate on the application layer.
SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT 11
12SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 A party is considered a “trusted domain” if we trust its correct
processing and execution of the software implementation, and thus its
integrity. Otherwise, we consider the party as an “untrusted domain”.
Depending on the characteristics and the security Properties of the
communication between entities, we can define trusted relationships
between entities.
 Our security layer follows the two-stage protocol depicted in Fig.2
the “First stage” sets up an end-to-end trusted relationship between
both application layers
 Only the vehicle’s owner is able to initiate the first stage by enabling
the one-off authorization procedure on the vehicle’s side. For instance,
this procedure can be enabled by pushing a button only reachable using
the vehicle key. 13SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 Within a short time span the ECU accepts a mobile device’s identity and the user
receives the identity information of the ECU, respectively.
 The “second stage” ensures that the real-time communication requirements are
met.
 To this end, it implements a symmetric cryptographic scheme that establishes a
secure communication session. The symmetric session key is derived from the long-
term secret exchanged during the first stage, plus some random data generated on
the mobile device.
 Here we use ECDH key-establishment scheme (asymmetric cryptography) on a
standardized curve .For each authentication process, the mobile device computes a
new random key set and transmits the corresponding public key to the ECU. In
contrast to the key set of the mobile device, the ECU possesses a static long-term
key set for the key establishment scheme.
14SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 For the session encryption, we implemented AES in a chaining block cipher
(CBC) mode, with a 128-bit key. The key-derivation function is implemented
according to the standard and provides a fresh 128-bit symmetric key for each
session.
 The goal of our security layer is to prevent attacks through the radio interface. As
depicted in Fig.1,our solution implements cryptographic session layer, this removes
the dependency from proprietary implementations, dramatically reducing the risk
of exploitation.
 Even if the attacker obtains access to the ECU via the radio interface, the
application data is encrypted with the session key. In particular, a man-in-the-
middle attack is difficult to conduct: the attacker would need to be within the
communication range:
 1) During the legacy Bluetooth pairing process; and
 2) During the first stage of our security protocol
15SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 Only the vehicle owner can enable the authorization process for a mobile device
(e.g., in his own garage) and, more importantly, within a predefined and short time
span.
16SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
As explained in Section 2.1, the Gateway ECU implements intelligent, range-
extending algorithms. Our security protocol has the two main working modes:
 Pairing : Pairing is active when the mobile device is paired with the vehicle, after
the typical Bluetooth pairing mechanism has taken place.
 payload exchange : The payload exchange mode activates when the AES key are
actually exchanged and encrypted or decryption takes place.
In “pairing mode”, we measured the performance of the asymmetric cryptography
both on the mobile device (on the Gateway ECU), and the performance of the key-
generation routine (on the mobile device).
 In “payload exchange mode”, we analyzed the performance of the decryption (on
the mobile device) and the performance of the encryption (on the Gateway ECU).
The payload consists of 64 bytes of data, which includes a padding scheme for
supporting arbitrary payload size.
17SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 The pairing is a one-shot task, whereas the system normally works
in payload-exchange mode.
 At runtime, the payload exchange must satisfy real-time
constraints.
 Here, the bottleneck lies in the Bluetooth stack, because the AES
encryption-decryption of the 64-bytes payload is executed every time
one of the peers transmits or receives a message via Bluetooth (i.e.,
every 200 ms).
 To test its performance, we collected runtime data both on a
simulator and on a real implementation on the test vehicle, to ensure
an accurate characterization.
 Both at runtime and pairing time, the execution time is a significant
performance indicator.
18SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 Table I
AVERAGE EXECUTION TIMES (5000 tests). MD: Mobile device;
(G):Gateway ECU; (S): Simulation and (D):Driving mode
19SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 Table I summarizes the results that obtained (averaged on all
experiments)
 The execution time is approximately 130 ms, 20 times bigger than the
average time recorded on the mobile device.
 We measured the time interval ∆T between two, received frames on the
Smartphone, and computed the frequency as ,
fb =1/∆T=1/(∆Td+∆Tr+∆Te)
 Where fb is Bluetooth sending frequency, which provides a concise view
of the impact of the security layer on the real-time exchange of data.
 Td and Te are the time of the decryption and of the encryption,
respectively.
 Tr is a random time interval between two sent messages.
 Tb is the time needed by the Bluetooth stack to send and receive data.
20SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 In general, the increased size of the message decreases the Bluetooth
frequency due to the low-level mechanisms implemented in the Bluetooth
stack.
 Despite this slight decrease of sending frequency, the performance of
the closed-loop system is not affected by the security routines when the
high-level control strategies equipped with this additional layer.
 The impact of the security layer on battery life should be measured, although we
expect no remarkable results.
 Finally, future work includes the requirements for security engineering on
embedded automotive devices considering software attack surfaces (e.g., buffer
overflows).
21SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 It is analyzed and discussed the security issues related to modern,
Smartphone based automotive embedded architectures.
 To cope with such issues, we designed, implemented and evaluated a security
layer that protects from an attacker that has full control over the Bluetooth
wireless link between the mobile device and the vehicle.
22SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 [1] I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W.
Trappe, and I. Seskar, “Security and privacy vulnerabilities of in car Wireless
networks: A tire pressure monitoring system case study,” in Proc. 19th
USENIX Conf. Security, Berkeley, CA, USA, 2010, pp. 21–21.
 [2] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S.
Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, “Comprehensive
Experimental analyses of automotive attack surfaces,” in Proc. 20th USENIX
Conf. Security, Berkeley, CA, USA, 2011, pp. 6–6.
 [3] F. Stajano, Security for Ubiquitous Computing. Hoboken, NJ, USA Wile,
2002.
 [4] A. Dardanelli, M. Tanelli, B. Picasso, S. Savaresi, O. di Tanna, and M.
Santucci, “A smartphone-in-the-loop active state-of-charge manager for
electric vehicles,” IEEE ASME Trans. Mechatron., vol. 17, no. 3, pp. 454–
463, 2012.
23SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 [5] C. Spelta, V. Manzoni,A.Corti,A. Goggi, and S.M. Savaresi, “Smartphone- based
vehicle-to-driver/environment interaction system for motorcycles,” IEEE Embed.
Systems Lett., vol. 2, no. 2, pp. 39–42, Jun. 2010.
 [6] A. Dardanelli,M. Tanelli, and S.M. Savaresi, “Active energy management of
electric vehicles with cartographic data,” presented at the 2012 IEEE Int. Electr. Veh.
Conf., 2012.
 [7] Microchip Technology Inc., 16-bit dsPIC® Digital Signal Controllers.
 [8] NIST Special Publication 800-121 Revision 1, Guide to Bluetooth Security:
Recommendations of the National Institue of Standards and Technology 2012.
 [9] C. Hager and S. Midkiff, “Demonstrating vulnerabilities in Bluetooth security,” in
Proc. IEEE Global Telecommun. Conf. (GLOBECOM’03), 2003, vol. 3, pp. 1420–
1424.
24SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
 [10] K. Haataja and P. Toivanen, “Two practical man-in-the-middle attacks on
bluetooth secure simple pairing and countermeasures,” IEEE Trans. Wireless
Commun. vol. 9, no. 1, pp. 384–392, Jan. 2010 [Online]. Available:
http://dx.doi.org/10.1109/TWC.2010.01.090935
 [11] NIST Special Publication 800-56A, Recommendation for Pair-Wise Key
Establishment Schemes Using Discrete Logarithm Cryptography. [12] FIPS-186-3,
Digital Signature Standard (DSS). NIST 2009.
 [13] FIPS-197, Advanced Encryption Standard (AES). NIST 2001.
 [14] NIST Special Publication 800-38A, Recommendation for Block Cipher Modes
of Operation - Methods and Techniques 2001.
 15] A. Bogdanov et al., “PRESENT-An ultra-lightweight block cipher,” in Proc. Int.
Workshop Cryptographic Hardware Embed. Syst. (CHES), 2007, pp. 450–466,
ser. LNCS, no. 4727 Springer.
25SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
26SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT 27
 Pic microcontroller
 16-bit 28-pin PDIP PIC24 microcontroller
 Die of a PIC12C508 8-bit, fully static, EEPROM/EPROM/ROM-based CMOS microcontroller
manufactured by Microchip Technology using a 1200 nanometre process.
 The name PIC initially referred to "Peripheral Interface Controller
 PIC is a family of modified Harvard architecture microcontrollers made by Microchip
Technology,
 Elliptic curve Diffie–Hellman (ECDH)
 is an anonymous key agreement protocol that allows two parties, each having an elliptic
curve public–private key pair, to establish a shared secret over an insecure channel.[1][2][3]
This shared secret may be directly used as a key, or better yet, to derive another key which
can then be used to encrypt subsequent communications using a symmetric key cipher. It is a
variant of the Diffie–Hellman protocol using elliptic curve cryptography
 Advanced Encryption Standard(AES),
 a specification for the encryption of electronic data
 Advanced Encryption Standard process, the process used in choosing an algorithm for
standardization
 AES instruction set, an x86 microprocessor architecture addition to accelerate Advanced
Encryption Standard
SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT 28

More Related Content

What's hot

Architecture & data acquisition by embedded systems in automobiles seminar re...
Architecture & data acquisition by embedded systems in automobiles seminar re...Architecture & data acquisition by embedded systems in automobiles seminar re...
Architecture & data acquisition by embedded systems in automobiles seminar re...Ankit Kaul
 
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDSAutomotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDSIOSR Journals
 
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLERESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLERcscpconf
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDIJCI JOURNAL
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekThe Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekCODE BLUE
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesiaemedu
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesIAEME Publication
 
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...Sivaram P
 
DESIGN AND VALIDATION OF SAFETY CRUISE CONTROL SYSTEM FOR AUTOMOBILES
DESIGN AND VALIDATION OF SAFETY CRUISE CONTROL SYSTEM FOR AUTOMOBILESDESIGN AND VALIDATION OF SAFETY CRUISE CONTROL SYSTEM FOR AUTOMOBILES
DESIGN AND VALIDATION OF SAFETY CRUISE CONTROL SYSTEM FOR AUTOMOBILESIJCSEA Journal
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
1. 10077 12326-1-pb
1. 10077 12326-1-pb1. 10077 12326-1-pb
1. 10077 12326-1-pbIAESIJEECS
 
Anti theft security system for vehicle
Anti theft security system for vehicleAnti theft security system for vehicle
Anti theft security system for vehicleabhinandanyadavg
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system96452128
 
anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security systemAkshay Gaikwad
 
TRB 15_2166_Poster_SHZ
TRB 15_2166_Poster_SHZTRB 15_2166_Poster_SHZ
TRB 15_2166_Poster_SHZShaohu Zhang
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET Journal
 

What's hot (20)

Architecture & data acquisition by embedded systems in automobiles seminar re...
Architecture & data acquisition by embedded systems in automobiles seminar re...Architecture & data acquisition by embedded systems in automobiles seminar re...
Architecture & data acquisition by embedded systems in automobiles seminar re...
 
ASDF WSS 2014 Paper 003
ASDF WSS 2014 Paper 003ASDF WSS 2014 Paper 003
ASDF WSS 2014 Paper 003
 
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDSAutomotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
 
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLERESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
 
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUDRELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
RELIABLE SOFTWARE FRAMEWORK FOR VEHICULAR SAFETY APPLICATIONS ON CLOUD
 
UDS Protocol Stack | Manual Guide | Fact Sheet
UDS Protocol Stack | Manual Guide | Fact SheetUDS Protocol Stack | Manual Guide | Fact Sheet
UDS Protocol Stack | Manual Guide | Fact Sheet
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekThe Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris Valasek
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
01-AUTOSAR In-vehicle Standardization with Certainty of Operations towards Gl...
 
DESIGN AND VALIDATION OF SAFETY CRUISE CONTROL SYSTEM FOR AUTOMOBILES
DESIGN AND VALIDATION OF SAFETY CRUISE CONTROL SYSTEM FOR AUTOMOBILESDESIGN AND VALIDATION OF SAFETY CRUISE CONTROL SYSTEM FOR AUTOMOBILES
DESIGN AND VALIDATION OF SAFETY CRUISE CONTROL SYSTEM FOR AUTOMOBILES
 
Jb3515641568
Jb3515641568Jb3515641568
Jb3515641568
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
1. 10077 12326-1-pb
1. 10077 12326-1-pb1. 10077 12326-1-pb
1. 10077 12326-1-pb
 
Anti theft security system for vehicle
Anti theft security system for vehicleAnti theft security system for vehicle
Anti theft security system for vehicle
 
Ijetcas14 395
Ijetcas14 395Ijetcas14 395
Ijetcas14 395
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system
 
anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security system
 
TRB 15_2166_Poster_SHZ
TRB 15_2166_Poster_SHZTRB 15_2166_Poster_SHZ
TRB 15_2166_Poster_SHZ
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
 

Viewers also liked

5 covingtoncorner.org-how-to-choose-your-perfect-wedding-photographer
5 covingtoncorner.org-how-to-choose-your-perfect-wedding-photographer5 covingtoncorner.org-how-to-choose-your-perfect-wedding-photographer
5 covingtoncorner.org-how-to-choose-your-perfect-wedding-photographernekyvtam
 
7 covingtoncorner.org-short-stay-serviced-apartments-london-area-a-better-acc...
7 covingtoncorner.org-short-stay-serviced-apartments-london-area-a-better-acc...7 covingtoncorner.org-short-stay-serviced-apartments-london-area-a-better-acc...
7 covingtoncorner.org-short-stay-serviced-apartments-london-area-a-better-acc...nekyvtam
 
MST #MyStartupStory 20130906 ppt
MST #MyStartupStory 20130906 pptMST #MyStartupStory 20130906 ppt
MST #MyStartupStory 20130906 pptMST Consulting
 

Viewers also liked (8)

5 covingtoncorner.org-how-to-choose-your-perfect-wedding-photographer
5 covingtoncorner.org-how-to-choose-your-perfect-wedding-photographer5 covingtoncorner.org-how-to-choose-your-perfect-wedding-photographer
5 covingtoncorner.org-how-to-choose-your-perfect-wedding-photographer
 
Lecture on marketing research.
Lecture on marketing research.Lecture on marketing research.
Lecture on marketing research.
 
7 covingtoncorner.org-short-stay-serviced-apartments-london-area-a-better-acc...
7 covingtoncorner.org-short-stay-serviced-apartments-london-area-a-better-acc...7 covingtoncorner.org-short-stay-serviced-apartments-london-area-a-better-acc...
7 covingtoncorner.org-short-stay-serviced-apartments-london-area-a-better-acc...
 
New World of Property Sales
New World of Property SalesNew World of Property Sales
New World of Property Sales
 
The Thirteenth Tribe
The Thirteenth TribeThe Thirteenth Tribe
The Thirteenth Tribe
 
MST #MyStartupStory 20130906 ppt
MST #MyStartupStory 20130906 pptMST #MyStartupStory 20130906 ppt
MST #MyStartupStory 20130906 ppt
 
Skills of f.o
Skills of f.oSkills of f.o
Skills of f.o
 
SUPREME COUNCIL
SUPREME COUNCILSUPREME COUNCIL
SUPREME COUNCIL
 

Similar to Nireeksha

Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
Homogenous and interoperable signaling computer interlocking through IEC 6149...
Homogenous and interoperable signaling computer interlocking through IEC 6149...Homogenous and interoperable signaling computer interlocking through IEC 6149...
Homogenous and interoperable signaling computer interlocking through IEC 6149...IJECEIAES
 
CAN BASED AUTOMATED VEHICLE SECURITY SYSTEM
CAN BASED AUTOMATED VEHICLE SECURITY SYSTEMCAN BASED AUTOMATED VEHICLE SECURITY SYSTEM
CAN BASED AUTOMATED VEHICLE SECURITY SYSTEMIAEME Publication
 
Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies IJECEIAES
 
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEM
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEMSOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEM
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEMVLSICS Design
 
A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Ashok Mishra
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET Journal
 
Architecture & data acquisition by embedded systems in automobiles seminar ppt
Architecture & data acquisition by embedded systems in automobiles seminar pptArchitecture & data acquisition by embedded systems in automobiles seminar ppt
Architecture & data acquisition by embedded systems in automobiles seminar pptAnkit Kaul
 
Siemens Prescan360
Siemens Prescan360 Siemens Prescan360
Siemens Prescan360 Hari Vijay
 
Internet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsInternet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Journals
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationeSAT Publishing House
 
ACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERTACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERTSecurity Gen
 
Unleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenUnleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenSecurityGen1
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 

Similar to Nireeksha (20)

Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
W04404135146
W04404135146W04404135146
W04404135146
 
Homogenous and interoperable signaling computer interlocking through IEC 6149...
Homogenous and interoperable signaling computer interlocking through IEC 6149...Homogenous and interoperable signaling computer interlocking through IEC 6149...
Homogenous and interoperable signaling computer interlocking through IEC 6149...
 
CAN BASED AUTOMATED VEHICLE SECURITY SYSTEM
CAN BASED AUTOMATED VEHICLE SECURITY SYSTEMCAN BASED AUTOMATED VEHICLE SECURITY SYSTEM
CAN BASED AUTOMATED VEHICLE SECURITY SYSTEM
 
Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies Automotive Ethernet architecture and security: challenges and technologies
Automotive Ethernet architecture and security: challenges and technologies
 
thesis paper
thesis paperthesis paper
thesis paper
 
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEM
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEMSOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEM
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEM
 
A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles
 
EMBEDDED SYSTEMS
EMBEDDED SYSTEMSEMBEDDED SYSTEMS
EMBEDDED SYSTEMS
 
Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks Cloud Computing for Vehicle Networks
Cloud Computing for Vehicle Networks
 
A novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud securityA novel key management protocol for vehicular cloud security
A novel key management protocol for vehicular cloud security
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
Architecture & data acquisition by embedded systems in automobiles seminar ppt
Architecture & data acquisition by embedded systems in automobiles seminar pptArchitecture & data acquisition by embedded systems in automobiles seminar ppt
Architecture & data acquisition by embedded systems in automobiles seminar ppt
 
Siemens Prescan360
Siemens Prescan360 Siemens Prescan360
Siemens Prescan360
 
Internet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsInternet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from Patents
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
ACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERTACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERT
 
Unleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenUnleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGen
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 

Nireeksha

  • 1. NIREEKSHA KUMARI ELECTRONICS AND COMMUNICATION 4SF10EC064
  • 2. • Modern vehicles are increasingly being interconnected with computer systems, which collect information both from vehicular sources and Internet services. Unfortunately, this creates a no negligible attack surface, which extends when vehicles are partly operated via smart phones. In this letter, a hierarchically distributed control system architecture which integrates a Smartphone with classical embedded systems is presented, and an ad-hoc, end-to-end security layer is designed to demonstrate how a Smartphone can interact securely with a modern vehicle without requiring modifications to the existing in-vehicle network. Experimental results demonstrate the effectiveness of the approach. 2SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 3.  The current trend in automotive products and services is to improve the accessibility of the vehicles through novel services, which require a connection to some Internet-based source.  This is used both to collect information on the external environment (e.g., traffic conditions, weather forecasts, vehicle position and orientation, often integrated within the on-board vehicle control systems), and to offer infotainment services.  In doing so, the new devices that interact with the vehicle (e.g. modern infotainment systems, GSM, and Bluetooth connections) lead to an increased attack surface, which may enable an adversary to break into the vehicle itself, causing severe safety hazards.  Recently, several researchers highlighted this aspect and successfully demonstrated attacks against different vehicles. 3SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 4.  Each of these works showed that it was possible to take control of certain functionalities of the vehicle, and interfere with safety-critical or sensitive components.  These vulnerabilities hamper novel solutions (e.g., smart phones to unlock the vehicle door or to start the engine), because of the risk of successful attacks.  Adding security mechanisms to vehicles is a challenging task, as the related embedded architectures are commonly designed with safety requirements rather than security ones in mind.  In addition, the available computing resources are in general tailored to fit tightly to the control systems needs, in order to limit the costs. This obviously restricts the options available for adding a security layer in subsequent redesign phases. 4SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 5.  Recently, however, security requirements are gaining more and more priority, especially in the communication between embedded computers with ad-hoc wireless networks .  In this letter, we consider a Smartphone-in-the-loop vehicle architecture in the use case of a two-wheeled vehicle.  “Smartphone” is a mobile phone with more advanced computing capability and connectivity than basic feature phones  We propose a security solution that protects against attacks by addressing the challenges raised above, meeting both performance and real-time constraints. Furthermore, we explicitly take the capabilities of the target architecture into account (i.e., no input capabilities on the vehicle side, limited output capabilities, and lack of a trusted execution environment on the mobile device). 5SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 6.  Our proposed solution allows a Smartphone to establish a secure session layer over an insecure radio connection, which provides additional security guarantees regardless of the security mechanisms already implemented in the physical layer (if any).  As a result, the entire application layer is transparently secured.  The applicability and the effectiveness of the proposed solution is corroborated by experimental results.  The structure of this letter is as follows.  Section I presents the vehicle embedded architecture  Section II details the related security issues.  Section III describes the designed security solution.  Section IV, the experimental results are presented and discussed. 6SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 7.  The system architecture under consideration directly relates to the vehicle control logic.  The control logic1 can be split into two main stages:  HIGH -LEVEL : This stage takes care of the vehicle motion and energy control  LOW-LEVEL : This stage takes care of data acquisition and actuation. 7SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 8. 8SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 9.  The high-level and the low-level control routines run on different devices, thus leading to a hierarchically distributed control system. in Fig. 2.1.a), the system architecture comprises two main elements.  “Gateway electronic control unit (ECU)”:  which is physically mounted on the vehicle, runs the low-level control logic, and communicates with sensors and actuators via an in-vehicle network.  The Gateway ECU is equipped with a radio interface that allows wireless communication between the in-vehicle network and external devices  “external device”:  This works closely with the vehicle ECUs via the radio interface.  The external device is a mobile device that runs the high-level control routines and acts as a driver-to-vehicle interface 9SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 10. The task of implementation for lightweight electrical vehicles is accomplished with a two-layer structure. A high-level controller keeps track of a “reference profile” (ᶓ ref,) for the battery “state of charge (SoC) , ᶓ ”. The profile is generated by taking into account the route length and its elevation profile. The mobile device implements the SoC controller within an ad-hoc app that we developed, which also includes navigation features that leverage on Internet-based services (e.g., Google Maps API) the low-level control loops enforce speed and acceleration constraints (vb and ab in, which allow to meet the desired energy consumption profile. The low-level controllers act on the gas handle opening ge to guarantee that the dynamical behaviour of the vehicle (i.e., speed ve and ae acceleration) is kept within the prescribed limits. 10SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 11. The protocol has a two-phase session setup: after the pairing process, which allows the peers to get to know each other and set up the network properties, the actual communication is enabled.  Depending on the protocol version, different security features are available. However, the early Bluetooth standard and its successors, with the introduction of the secure Simple pairing (SSP) protocol, suffer from various security vulnerabilities due to weak cryptographic primitives.  Given the application scenario and the aforementioned security issues, it is necessary to devise an application-level security mechanism that mitigates the vulnerabilities that lie in the wireless link.  The objective of the attacker is to obtain access to the information exchanged between the vehicle and the mobile device, and ultimately manipulate the ECU execution flow. We concentrate on the application layer. SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT 11
  • 12. 12SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 13.  A party is considered a “trusted domain” if we trust its correct processing and execution of the software implementation, and thus its integrity. Otherwise, we consider the party as an “untrusted domain”. Depending on the characteristics and the security Properties of the communication between entities, we can define trusted relationships between entities.  Our security layer follows the two-stage protocol depicted in Fig.2 the “First stage” sets up an end-to-end trusted relationship between both application layers  Only the vehicle’s owner is able to initiate the first stage by enabling the one-off authorization procedure on the vehicle’s side. For instance, this procedure can be enabled by pushing a button only reachable using the vehicle key. 13SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 14.  Within a short time span the ECU accepts a mobile device’s identity and the user receives the identity information of the ECU, respectively.  The “second stage” ensures that the real-time communication requirements are met.  To this end, it implements a symmetric cryptographic scheme that establishes a secure communication session. The symmetric session key is derived from the long- term secret exchanged during the first stage, plus some random data generated on the mobile device.  Here we use ECDH key-establishment scheme (asymmetric cryptography) on a standardized curve .For each authentication process, the mobile device computes a new random key set and transmits the corresponding public key to the ECU. In contrast to the key set of the mobile device, the ECU possesses a static long-term key set for the key establishment scheme. 14SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 15.  For the session encryption, we implemented AES in a chaining block cipher (CBC) mode, with a 128-bit key. The key-derivation function is implemented according to the standard and provides a fresh 128-bit symmetric key for each session.  The goal of our security layer is to prevent attacks through the radio interface. As depicted in Fig.1,our solution implements cryptographic session layer, this removes the dependency from proprietary implementations, dramatically reducing the risk of exploitation.  Even if the attacker obtains access to the ECU via the radio interface, the application data is encrypted with the session key. In particular, a man-in-the- middle attack is difficult to conduct: the attacker would need to be within the communication range:  1) During the legacy Bluetooth pairing process; and  2) During the first stage of our security protocol 15SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 16.  Only the vehicle owner can enable the authorization process for a mobile device (e.g., in his own garage) and, more importantly, within a predefined and short time span. 16SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 17. As explained in Section 2.1, the Gateway ECU implements intelligent, range- extending algorithms. Our security protocol has the two main working modes:  Pairing : Pairing is active when the mobile device is paired with the vehicle, after the typical Bluetooth pairing mechanism has taken place.  payload exchange : The payload exchange mode activates when the AES key are actually exchanged and encrypted or decryption takes place. In “pairing mode”, we measured the performance of the asymmetric cryptography both on the mobile device (on the Gateway ECU), and the performance of the key- generation routine (on the mobile device).  In “payload exchange mode”, we analyzed the performance of the decryption (on the mobile device) and the performance of the encryption (on the Gateway ECU). The payload consists of 64 bytes of data, which includes a padding scheme for supporting arbitrary payload size. 17SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 18.  The pairing is a one-shot task, whereas the system normally works in payload-exchange mode.  At runtime, the payload exchange must satisfy real-time constraints.  Here, the bottleneck lies in the Bluetooth stack, because the AES encryption-decryption of the 64-bytes payload is executed every time one of the peers transmits or receives a message via Bluetooth (i.e., every 200 ms).  To test its performance, we collected runtime data both on a simulator and on a real implementation on the test vehicle, to ensure an accurate characterization.  Both at runtime and pairing time, the execution time is a significant performance indicator. 18SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 19.  Table I AVERAGE EXECUTION TIMES (5000 tests). MD: Mobile device; (G):Gateway ECU; (S): Simulation and (D):Driving mode 19SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 20.  Table I summarizes the results that obtained (averaged on all experiments)  The execution time is approximately 130 ms, 20 times bigger than the average time recorded on the mobile device.  We measured the time interval ∆T between two, received frames on the Smartphone, and computed the frequency as , fb =1/∆T=1/(∆Td+∆Tr+∆Te)  Where fb is Bluetooth sending frequency, which provides a concise view of the impact of the security layer on the real-time exchange of data.  Td and Te are the time of the decryption and of the encryption, respectively.  Tr is a random time interval between two sent messages.  Tb is the time needed by the Bluetooth stack to send and receive data. 20SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 21.  In general, the increased size of the message decreases the Bluetooth frequency due to the low-level mechanisms implemented in the Bluetooth stack.  Despite this slight decrease of sending frequency, the performance of the closed-loop system is not affected by the security routines when the high-level control strategies equipped with this additional layer.  The impact of the security layer on battery life should be measured, although we expect no remarkable results.  Finally, future work includes the requirements for security engineering on embedded automotive devices considering software attack surfaces (e.g., buffer overflows). 21SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 22.  It is analyzed and discussed the security issues related to modern, Smartphone based automotive embedded architectures.  To cope with such issues, we designed, implemented and evaluated a security layer that protects from an attacker that has full control over the Bluetooth wireless link between the mobile device and the vehicle. 22SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 23.  [1] I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar, “Security and privacy vulnerabilities of in car Wireless networks: A tire pressure monitoring system case study,” in Proc. 19th USENIX Conf. Security, Berkeley, CA, USA, 2010, pp. 21–21.  [2] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, “Comprehensive Experimental analyses of automotive attack surfaces,” in Proc. 20th USENIX Conf. Security, Berkeley, CA, USA, 2011, pp. 6–6.  [3] F. Stajano, Security for Ubiquitous Computing. Hoboken, NJ, USA Wile, 2002.  [4] A. Dardanelli, M. Tanelli, B. Picasso, S. Savaresi, O. di Tanna, and M. Santucci, “A smartphone-in-the-loop active state-of-charge manager for electric vehicles,” IEEE ASME Trans. Mechatron., vol. 17, no. 3, pp. 454– 463, 2012. 23SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 24.  [5] C. Spelta, V. Manzoni,A.Corti,A. Goggi, and S.M. Savaresi, “Smartphone- based vehicle-to-driver/environment interaction system for motorcycles,” IEEE Embed. Systems Lett., vol. 2, no. 2, pp. 39–42, Jun. 2010.  [6] A. Dardanelli,M. Tanelli, and S.M. Savaresi, “Active energy management of electric vehicles with cartographic data,” presented at the 2012 IEEE Int. Electr. Veh. Conf., 2012.  [7] Microchip Technology Inc., 16-bit dsPIC® Digital Signal Controllers.  [8] NIST Special Publication 800-121 Revision 1, Guide to Bluetooth Security: Recommendations of the National Institue of Standards and Technology 2012.  [9] C. Hager and S. Midkiff, “Demonstrating vulnerabilities in Bluetooth security,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM’03), 2003, vol. 3, pp. 1420– 1424. 24SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 25.  [10] K. Haataja and P. Toivanen, “Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures,” IEEE Trans. Wireless Commun. vol. 9, no. 1, pp. 384–392, Jan. 2010 [Online]. Available: http://dx.doi.org/10.1109/TWC.2010.01.090935  [11] NIST Special Publication 800-56A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. [12] FIPS-186-3, Digital Signature Standard (DSS). NIST 2009.  [13] FIPS-197, Advanced Encryption Standard (AES). NIST 2001.  [14] NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation - Methods and Techniques 2001.  15] A. Bogdanov et al., “PRESENT-An ultra-lightweight block cipher,” in Proc. Int. Workshop Cryptographic Hardware Embed. Syst. (CHES), 2007, pp. 450–466, ser. LNCS, no. 4727 Springer. 25SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 26. 26SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT
  • 27. SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT 27  Pic microcontroller  16-bit 28-pin PDIP PIC24 microcontroller  Die of a PIC12C508 8-bit, fully static, EEPROM/EPROM/ROM-based CMOS microcontroller manufactured by Microchip Technology using a 1200 nanometre process.  The name PIC initially referred to "Peripheral Interface Controller  PIC is a family of modified Harvard architecture microcontrollers made by Microchip Technology,  Elliptic curve Diffie–Hellman (ECDH)  is an anonymous key agreement protocol that allows two parties, each having an elliptic curve public–private key pair, to establish a shared secret over an insecure channel.[1][2][3] This shared secret may be directly used as a key, or better yet, to derive another key which can then be used to encrypt subsequent communications using a symmetric key cipher. It is a variant of the Diffie–Hellman protocol using elliptic curve cryptography  Advanced Encryption Standard(AES),  a specification for the encryption of electronic data  Advanced Encryption Standard process, the process used in choosing an algorithm for standardization  AES instruction set, an x86 microprocessor architecture addition to accelerate Advanced Encryption Standard
  • 28. SAHYADRI COLLEGE OG ENGINEERING AND MANAGEMENT 28