Professional Documents
Culture Documents
S.K.Saravanan
Assistant professor (Sle.G)
Valliammai Engineering College.
Anna University
Abstract Vehicle security and keeping pace of advancement in car features with technology have been major
concern in automobile industries. Now-a-days vehicles are Controlled and Accessed through smartphones and
Electronic Control Unit in the vehicle is made over Bluetooth connection. Unfortunately, this creates a non-negligible
attack surface, which extends when vehicles are partly operated via smartphones. In this letter, we provide an
encryption technique which includes senders finger vein authentication in addition to the sender device
authentication on the receiving side.
Keywords Encryption, Finger vein Technique, Bluetooth, Electronic Control Unit, Man-In-The-Middle, Embedded
Systems, and Smart Phone.
I. INTRODUCTION
It is becoming widely popular to control and access vehicles through smart phones together with embedded systems.
There exist vulnerabilities like improper validation, exposure and randomness. Especially in case of vehicles controlled
by smart phones over Bluetooth there are possibilities for Man-In-The-Middle (MITM) attack and other attacks of
falsification of information. Recently, several researchers highlighted this aspect and successfully demonstrated attacks
against different vehicles. Each of these works showed that it was possible to take control of certain functionalities of the
vehicle, and interfere with safety-critical or sensitive components. These vulnerabilities hamper novel solutions (e.g.,
smart phones to unlock the vehicle door or to start the engine), because of the risk of successful attacks. Adding security
mechanisms to vehicles is a challenging task, as the related embedded architectures are commonly designed with safety
requirements rather than security ones in mind.
We explicitly take the capabilities of the target architecture into account (i.e., no input capabilities on the vehicle
side, limited output capabilities, and lack of a trusted execution environment on the mobile device).Researchers had
established a secure session layer over an insecure radio connection. This security layer use encryption algorithms like
AES and SHA-1. This method encrypts the message before it is transmitted from the smart phone and it is decrypted by
the Electronic Control Unit [ECU] that is available in the vehicle. But no authentication is made about the senders
mobile device on the receiving side. There is a possibility of some other mobile device to pair with ECU in the vehicle.
The encryption algorithms have a draw back in terms of processing burden and time constraints. Also these methods
provide no authentication for senders mobile device. In this article we present an enhanced security layer which is
efficient, less complexity when compared to other encryption and provides authentication for sender mobile device on
the receiving side.
II. SYSTEM ARCHITECTURE
The system architecture under consideration directly relates to the vehicle control logic. The control logic can be
split into two main stages: the high-level stage take cares of the vehicle motion and energy control, while the lowlevel stage takes care of data acquisition and actuation. This layout is quite common in complex automotive control
systems, as they are often characterized by cascade structures that exploit the frequency-separation paradigm in order to
decouple nested control loops. Fig. 1, the system architecture comprises two main elements. The first element is the
Gateway electronic control unit (ECU), which is physically mounted on the vehicle, runs the low-level control logic, and
communicates with sensors and actuators via an in-vehicle network (e.g., the CAN bus). The Gateway ECU is equipped
with a radio interface that allows wireless communication between the in-vehicle network and external devices. The
second element is an external device that works closely with the vehicle ECUs via the radio interface.
We successfully implemented the aforementioned system architecture. Specifically, we implemented an intelligent
range extender for lightweight electric vehicles, with the goal of optimizing the energy consumption by actively
modifying the vehicle dynamic behavior, as detailed in [4]. This task is accomplished with a two-layer structure.
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
2014- 16, IJIRAE- All Rights Reserved
Page -57
BIOGRAPHIES:
Ms. N. Mamtha is a Student Pursuing MCA course in Valliammai Engineering College.
She is a talented, dedicated and hardworking student.
________________________________________________________________________________________________
IJIRAE: Impact Factor Value SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
2014- 16, IJIRAE- All Rights Reserved
Page -61