1
Security Feature for Automobiles Implemented
using CAN protocol.
K.BHANUPRAKASH, KR. ARUN KUMAR
Communication Engineering, VIT University
Vellore, Tamil Nadu, India
kbhanu.prakash2014@vit.ac.in
Abstract- Today’s Automobiles, invariably
comply with digital control systems as a
consequence of constant growth in
technology. Recent Vehicles contains large
number of Electronic Control Systems and
already there are large numbers of Electronic
Control Units present. The growth of
automotive electronics is the result parties of
the customers wish for better safety and
greater comfort and also for other
requirements like improved emission control
and reduced fuel consumption. Automotive
industry uses Controller Area Network (CAN)
as the in-vehicle network for the Engine
Management, the body electronics like door
and roof control, air conditioning and lighting
as well as for the entertainment control.
Nowadays almost all car manufacturers have
also started implementing CAN based vehicle
automation.CAN networks used in engine
management to connect several ECUs.
I. INTRODUCTION
In Recent Innovations Automobiles, contains
many digital control systems as technology is
growing faster. Recently released Vehicles
have many Electronic Control Systems and
Electronic Control Units embedded in it. The
growth in automotive electronics resulted that
many parties of the buyers and customers wish
to have a better safety along with good
comfort and also many other luxurious and
saving features like improved emission control
and also reduced fuel consumption. There are
many other messaging protocols used in
vehicles but some automotive industries uses
Controller Area Network (CAN) as an in-
vehicle network for the purpose of Engine
Management, for the body electronics like
door as well as roof control, air conditioning,
lighting and for the entertainment control.
Now-a-days almost many car manufacturing
companies have started implementing the
CAN based vehicle automation system.CAN
networks are used for the engine management
to interconnect several Electronic Control
Units.
II. WORKING PRINCIPLE
a. In proposed system whenever the vehicle is
started by a person, a message with the GPS
coordinate along with the location of the
vehicle will be sent as an SMS to the vehicle
owner’s number.
b. On receiving the message the vehicle owner
will send a reply to lock or antilock that is stop
the vehicle or allow the vehicle to run.
c. The system at first checks and verifies the
owner number and if exact it checks the SMS
sent and performs the corresponding action.
d. All this process is achieved through in
vehicular network, CAN.
e. When the car engine is started it sends the
information to the Master node in CAN which
in turn fetches the location coordinates
attached with it and generates the SMS.
f. On receiving locking or anti-locking code it
sends the respective command to the slave
node which takes the intended action.
2
III. FLOWCHART OF WORKING
PRINCIPLE
IV.PROPOSED BLOCK DIAGRAM
V.SOFTWARE REQUIREMENTS
MPLAB IDE
It is called as Integrated Development
Environment, because it provides a single
integrated "environment" to develop code for
embedded microcontrollers. MPLAB X IDE is
software that runs on a PC to develop
applications for Microchip microcontrollers
and digital signal controllers. Unlike previous
versions of the MPLAB IDE which were
developed completely in-house, MPLAB X
IDE is based on the open source Net Beans
IDE from Oracle. MPLAB X Integrated
Development Environment has brought many
changes to PIC microcontroller development
tool chain. This path allowed us to add
frequently requested features quickly and
easily, also providing much more extensible
architecture to bring even more new features
in the future.
PROTEUS
Proteus is software for simulation of
microprocessor, schematic capture, and also
for PCB design which has developed by Lab
Center Electronics. It combines the ISIS
schematic capture and the ARES PCB layout
programs in order to provide powerful,
integrated tools for a professional PCB
Design. Here more advanced routing modes
are also included in Proteus PCB Design Level
2 and higher whilst simulation capabilities can
be enhanced by purchasing the Advanced
Simulation option and/or micro-controller
simulation capabilities. Using this Proteus
software a simulated connection can be given
between the components and tested before
fetching the code into the Controller.
IV. RESULTS
Figure3: Transmitter and Receiver Sections
3
V. CONCLUSION
There are many more features to be seen in the
car to attract consumers who wish for modern
Technical Features to be present in the Car.
Due to this the manufacturer can implement
much more features like
 Emergency information transfer.
 Automatic lock system when there is theft.
 Automatic off of Vehicle engine during
fire attacks.
 Automatic Engine off when a driver
consumes alcohol Etc.
VI. REFERENCES
[1] A. Saad and U. Weinmann, “Automotive
software engineering and concepts,” GI.
Jahrestagung., vol. 34, pp. 318–319, 2003.
[2] E. Nickel, “IBM automotive software
foundry,” in Proc. Conf. Comput. Sci. Autom.
Ind., Frankfurt, Germany, 2003.
[3] M. Wolf, A. Weimerskirch, and T.
Wollinger, “State of the art: Embedding
security in vehicles,” EURASIP J. Embedded
Syst., vol. 2007, no. 5, p. 1,2007.
[4] R. Charette, This Car Runs on Code.
[Online]. Available: http://www.
spectrum.ieee.org/feb09/7649
[5] T. Nolte, H. Hansson, and L. L. Bello,
“Automotive communications-past, current
and future,” in Proc. IEEE Int. Conf.
Emerging Technol. Factory Autom., 2005,
vol. 1, pp. 992–999.
[6] K. H. Johansson, M. Torngren, and L.
Nielsen, “Vehicle applications of controller
area network,” in Handbook of Networked and
Embedded Control Systems. New York, NY,
USA: Springer-Verlag, 2005, pp. 741–765.
[7] T. Hoppe and J. Dittman, “Sniffing/replay
attacks on CAN buses: A simulated attack on
the electric window lift classified using an
adapted CERT taxonomy,” in Proc. Conf.
Embedded Syst. Security, 2007, pp. 1–6.
[8] T. Hoppe, S. Kiltz, and J. Dittmann,
“Security threats to automotive CAN
networks—Practical examples and selected
short-term countermeasures,” Rel. Eng. Syst.
Safety, vol. 96, no. 1, pp. 11–25, Jan. 2011.
[9] K. Koscher et al., “Experimental security
analysis of a modern automobile,”
in Proc. IEEE Security Privacy. Symp.,
Oakland, CA, USA, 2010,pp. 447–462.
[10] The EVITA project, 2008, Webpage.
[Online]. Available: http://evita-project.org
[11] H. Schweppe, Y. Roudier, B. Weyl, L.
Apvrille, and D. Scheuermann, “Car2X
communication: Securing the last meter—A
cost-effective approach for ensuring trust in
Car2X applications using in-vehicle
symmetric cryptography,” in Proc. Conf. Veh.
Technol., San Francisco, CA, USA, 2011, pp.
1–5.
[12] H. Schweppe et al., “Securing Car2X
applications with effective hardware Software
co-design for vehicular on-board networks,” in
Proc. Conf. Autom. Security, Berlin,
Germany, 2011.
4

thesis paper

  • 1.
    1 Security Feature forAutomobiles Implemented using CAN protocol. K.BHANUPRAKASH, KR. ARUN KUMAR Communication Engineering, VIT University Vellore, Tamil Nadu, India kbhanu.prakash2014@vit.ac.in Abstract- Today’s Automobiles, invariably comply with digital control systems as a consequence of constant growth in technology. Recent Vehicles contains large number of Electronic Control Systems and already there are large numbers of Electronic Control Units present. The growth of automotive electronics is the result parties of the customers wish for better safety and greater comfort and also for other requirements like improved emission control and reduced fuel consumption. Automotive industry uses Controller Area Network (CAN) as the in-vehicle network for the Engine Management, the body electronics like door and roof control, air conditioning and lighting as well as for the entertainment control. Nowadays almost all car manufacturers have also started implementing CAN based vehicle automation.CAN networks used in engine management to connect several ECUs. I. INTRODUCTION In Recent Innovations Automobiles, contains many digital control systems as technology is growing faster. Recently released Vehicles have many Electronic Control Systems and Electronic Control Units embedded in it. The growth in automotive electronics resulted that many parties of the buyers and customers wish to have a better safety along with good comfort and also many other luxurious and saving features like improved emission control and also reduced fuel consumption. There are many other messaging protocols used in vehicles but some automotive industries uses Controller Area Network (CAN) as an in- vehicle network for the purpose of Engine Management, for the body electronics like door as well as roof control, air conditioning, lighting and for the entertainment control. Now-a-days almost many car manufacturing companies have started implementing the CAN based vehicle automation system.CAN networks are used for the engine management to interconnect several Electronic Control Units. II. WORKING PRINCIPLE a. In proposed system whenever the vehicle is started by a person, a message with the GPS coordinate along with the location of the vehicle will be sent as an SMS to the vehicle owner’s number. b. On receiving the message the vehicle owner will send a reply to lock or antilock that is stop the vehicle or allow the vehicle to run. c. The system at first checks and verifies the owner number and if exact it checks the SMS sent and performs the corresponding action. d. All this process is achieved through in vehicular network, CAN. e. When the car engine is started it sends the information to the Master node in CAN which in turn fetches the location coordinates attached with it and generates the SMS. f. On receiving locking or anti-locking code it sends the respective command to the slave node which takes the intended action.
  • 2.
    2 III. FLOWCHART OFWORKING PRINCIPLE IV.PROPOSED BLOCK DIAGRAM V.SOFTWARE REQUIREMENTS MPLAB IDE It is called as Integrated Development Environment, because it provides a single integrated "environment" to develop code for embedded microcontrollers. MPLAB X IDE is software that runs on a PC to develop applications for Microchip microcontrollers and digital signal controllers. Unlike previous versions of the MPLAB IDE which were developed completely in-house, MPLAB X IDE is based on the open source Net Beans IDE from Oracle. MPLAB X Integrated Development Environment has brought many changes to PIC microcontroller development tool chain. This path allowed us to add frequently requested features quickly and easily, also providing much more extensible architecture to bring even more new features in the future. PROTEUS Proteus is software for simulation of microprocessor, schematic capture, and also for PCB design which has developed by Lab Center Electronics. It combines the ISIS schematic capture and the ARES PCB layout programs in order to provide powerful, integrated tools for a professional PCB Design. Here more advanced routing modes are also included in Proteus PCB Design Level 2 and higher whilst simulation capabilities can be enhanced by purchasing the Advanced Simulation option and/or micro-controller simulation capabilities. Using this Proteus software a simulated connection can be given between the components and tested before fetching the code into the Controller. IV. RESULTS Figure3: Transmitter and Receiver Sections
  • 3.
    3 V. CONCLUSION There aremany more features to be seen in the car to attract consumers who wish for modern Technical Features to be present in the Car. Due to this the manufacturer can implement much more features like  Emergency information transfer.  Automatic lock system when there is theft.  Automatic off of Vehicle engine during fire attacks.  Automatic Engine off when a driver consumes alcohol Etc. VI. REFERENCES [1] A. Saad and U. Weinmann, “Automotive software engineering and concepts,” GI. Jahrestagung., vol. 34, pp. 318–319, 2003. [2] E. Nickel, “IBM automotive software foundry,” in Proc. Conf. Comput. Sci. Autom. Ind., Frankfurt, Germany, 2003. [3] M. Wolf, A. Weimerskirch, and T. Wollinger, “State of the art: Embedding security in vehicles,” EURASIP J. Embedded Syst., vol. 2007, no. 5, p. 1,2007. [4] R. Charette, This Car Runs on Code. [Online]. Available: http://www. spectrum.ieee.org/feb09/7649 [5] T. Nolte, H. Hansson, and L. L. Bello, “Automotive communications-past, current and future,” in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2005, vol. 1, pp. 992–999. [6] K. H. Johansson, M. Torngren, and L. Nielsen, “Vehicle applications of controller area network,” in Handbook of Networked and Embedded Control Systems. New York, NY, USA: Springer-Verlag, 2005, pp. 741–765. [7] T. Hoppe and J. Dittman, “Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy,” in Proc. Conf. Embedded Syst. Security, 2007, pp. 1–6. [8] T. Hoppe, S. Kiltz, and J. Dittmann, “Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures,” Rel. Eng. Syst. Safety, vol. 96, no. 1, pp. 11–25, Jan. 2011. [9] K. Koscher et al., “Experimental security analysis of a modern automobile,” in Proc. IEEE Security Privacy. Symp., Oakland, CA, USA, 2010,pp. 447–462. [10] The EVITA project, 2008, Webpage. [Online]. Available: http://evita-project.org [11] H. Schweppe, Y. Roudier, B. Weyl, L. Apvrille, and D. Scheuermann, “Car2X communication: Securing the last meter—A cost-effective approach for ensuring trust in Car2X applications using in-vehicle symmetric cryptography,” in Proc. Conf. Veh. Technol., San Francisco, CA, USA, 2011, pp. 1–5. [12] H. Schweppe et al., “Securing Car2X applications with effective hardware Software co-design for vehicular on-board networks,” in Proc. Conf. Autom. Security, Berlin, Germany, 2011.
  • 4.