You are on page 1of 4

2016 International Conference on Computation of Power, Energy Information and Communication (ICCPEIC)

AES Algorithm for Smartphone to Vehicle


Communication
AbithaM.W

Shyni S.M

Department of Electrical and Electronics Engineering,

Department of Electrical and Electronics Engineering

Sathyabama University, Chennai

Sathyabama University, Chennai

abithamemala w@yahoo. co.in

shynima@gmail.com

Abstract- Vehicle theft has become a pervasive problem in

communication between embedded computers with wireless

metropolitan cities. The aim of our work is to reduce the vehicle

network [3]. The road grade influence of the battery discharge

and fuel theft with an alert given by commonly used smart

rate in a light electric vehicle and a State-of-Charge tracking

phones. The modern vehicles are interconnected with computer

policy needs to be modified are discussed [6].

systems so that the information can be obtained from vehicular

smart phone-in-the-loop vehicle architecture is used in case of

sources and Internet services. This provides space for tracking


the vehicle through smart phones. In our work, an Advanced
Encryption Standard (AES) algorithm is implemented which
integrates a smart phone with classical embedded systems to
avoid vehicle theft.

a two-wheeled vehicle. Also a security solution that protects


against attacks by addressing the challenges is proposed,
meeting both performance and real-time constraints.

Embedded architecture, Security, Smartphone, Vehicles.

I.

The

following are the capabilities of the target architecture i. e. ,


limited

Keywords- Advanced Encryption Standard (AES) algorithm,

In our work, a

input

and

output

capabilities,

lack

of

trusted

execution environment on the mobile device. In our work, the


external device is a mobile that runs the high-level control
routines and acts as a driver-to-vehicle interface, as drivers are
likely familiar with mobile apps. This deployment method

INTRODUCTION

facilitates both software updates and the integration with other

Theft break records gives statistics of a vehicle is stolen in

web-based services [5]. However, the early Bluetooth standard

every 13 minutes in our capital city Delhi. The thieves are

and its successors have introduced the secure simple pairing

being efficient to steal vehicles. The vehicles are in unsafe

(SSP)

zone as the vehicle thieves are cleverer in stealing. This causes

Smartphone which provides additional security guarantees

severe safety hazards to vehicles. So it is necessary to protect

regardless of the security mechanisms with AES algorithm. As

protocol

[8].

Our

proposed

solution

allows

our vehicles through modern technologies. Several researchers

a result, the entire application layer is transparently secured.

concentrated on this aspect and demonstrated attacks against

AES algorithm is fast in software and hardware, easy to

different vehicles. Our aim is to improve the accessibility and

implement; also it needs only little memory. The aim of our

protection of the vehicles through some algorithm, which does

work is to prevent the vehicle theft with an alert using a

not

Smartphone application via Bluetooth. The work is being

require

connection

with

Internet-based

communication can be created between the

source.
vehicle

A
and

Smartphone through Bluetooth. Any security issues will be

extended to avoid fuel theft during off condition of the


vehicle.

given as an alert to the owner through Smartphone service.


Wireless networks are integrated into the modern automobile.
Considering the risk factors in communication, a privacy and
security evaluation of wireless Tire Pressure Monitoring
Systems is introduced in car networks [ 1]. The structural

II.

SYSTEM ARCHITECTURE

In our proposed architecture, the vehicle is connected to


the smart phone via Bluetooth device to avoid vehicle theft. It

characteristics of the automotive ecosystem that reduces the

uses a vehicle Bluetooth receiver and a transmitter which is

theft problems and the practical challenges are discussed [2].

connected to mobile device. Fig. 1 shows the architecture of

The previous investigation shows that it was possible to take

the proposed system which uses blue tooth receiver, interface

control of only certain functionalities of the vehicle.

and mobile device for preventing the vehicle theft.

possible

to

interfere

with

safety-critical

and

It is

sensitive

The vehicle is to be fixed with the blue tooth adapter. Any

components. The Smartphone can be used as the source to

static acceleration and dynamic acceleration resulting from

unlock or lock the vehicle. But the security mechanisms for


vehicles are a challenging task, and also the related embedded
architectures

are

commonly

designed

considering

safety

requirements rather than security purpose. The computing


resources should be able to fit the control systems needs, to
limit the costs. Therefore the option available for adding a
security layer is restricted in subsequent phase.

Security

requirement

in

have

more

priority,

especially

the

movements in the vehicle hand bar will be the input signal for
the adapter. Advanced Encryption Standard (AES) algorithm
transfers the input signal to user interface via Bluetooth
through cipher text. With the help of user interface the signal
is passed to the mobile device. The mobile beeps an alarm
thereby instruction is directed to the vehicle driver to lock the
vehicle.

978-1-5090-0901-5/J6/$31.0020J6 IEEE

796

ABITHA et AL.,AES Algorithm for Smartphone to Vehicle Communication

A. AES Algorithm
AES

is

combination

based
of

III. FUEL THEFT PREVENTION SYSTEM


on

both

design

principle

substitution

and

which

is

permutation.

the

The work is extended to identify a petrol theft. A petrol

AES

theft detector is used to sense the petrol level in the tank. If

algorithm is a symmetric block cipher. It uses the same key for

any decrease in level of petrol during the off condition, it is

encryption and decryption. AES algorithm has advantages

indicated with an alarm in the vehicle. Fig. 2 shows the block

over Ad-hoc algorithms and Data Encryption Standard (DES)

diagram of petrol theft system.

algorithm. AES based software and hardware is fast, easy to


implement and also it requires only little memory.
Mobile Device

Vehicle Bluetooth Receiver

MECHANICAL

Petrol Tank

RELAY

Fig. 2.

Petrol theft prevention system

The petrol theft system uses a PROBE (petrol level


detection sensor) to prevent petrol theft. When the level of the
petrol reduces J-type probe sends a pulse to the triggering

Fig. 1. Architecture of the proposed system

circuit. This triggering circuit consists of a Bipolar Junction

AES has advantages over DES algorithms. AES is more


secure,

it is less

susceptible to cryptanalysis than DES

Transistor which makes the relay to actuate. The relay makes


and brakes according to the signal from the petrol sensor. This

algorithm. This algorithm is able to support larger key sizes

signal toggles ON and OFF the buzzer which is located in the

than DES's 1 12 or 168 bits. AES is demanded by the latest

vehicle itself. By this the theft of petrol can be prevented.

U.S. and international standards.

IV. SIMULATION ANALYSTS


The results of vehicle and fuel theft is analyzed with a

B. Security framework
The aim of our security layer is to prevent attacks through
the radio interface. In our paper we implement Cryptographic
session layer, which removes the dependency from proprietary
implementations and reducing the risk of exploitation. Even if
the

interface,

the

application data is encrypted with the session key.

attacker

obtains

access

via

the

radio

The

attacker has less chances of obtaining the cryptographic, long


term secret, than in a regular Bluetooth pairing. In particular, a
man-in-the-middle attack is difficult to conduct: the attacker
would need to be within the communication range.

During the legacy Bluetooth pairing process

During the first stage of our security protocol (i. e.,

simulation circuit and its output is indicated by glowing of a


lamp. The modes of operation are explained with on and off
condition of the lamps. Fig. 3. Shows the simulation model
during on condition. The sensor is able to sense the movement
in 3 directions namely X,Y and Z axis. For any movement
sensed, the lamp glows. Also if there is any fuel theft during
off condition of the vehicle, the sensor detects the decrement
in petrol level, giving an alarm which is indicated by glowing
another lamp. Fig. 4. Shows the simulation model during off
condition.

the exchange of the public keys).


Only

the

vehicle

owner

will

be

able

to

enable

the

authorization process for a mobile device within a predefmed


and short time span. Instead of compromising the ECU's
security layer, an attacker may perform a dedicated attack
against the mobile device.
address

this

type

of

The security framework

security

threat

by

providing

will
the

cryptographic mechanisms under the developer's authority


and is flexible with respect to future updates to the mobile
device or operating system. It has the advantage of changing
any cryptographic primitive or protocol in order to protect
from actual or future vulnerabilities [9-10]. The security of the
mobile application is based on the integrity of the operating

Fig. 3.

Simulation model during on condition

system and its services.

797

2016 International Conference on Computation of Power, Energy Information and Communication (ICCPEIC)

Fig. 6.

Blue tooth serial module

B. Motion Sensor
Fig. 7. shows the functional block diagram of motion
sensor. The ADXL345 is used for mobile device applications.
It is able to measure the static acceleration of gravity, which
includes tilt-sensing applications, and dynamic acceleration
including motion or shock. Its resolution is high (3. 9 mg/LSB)
which enables measurement of inclination changes less than
1.0. Features of the mobile device, ADXL345 are smaller size,
ultralow

power,

3-axis

accelerometer

with

high

resolution

measurement at up to 16 g. Output is formatted as 16-bit two's


complement and it is accessible through SPI.

Fig. 4.

Vs

Simuation model during off condition

VOOIIO

V. HARDWARE IMPLEMENTATION
Fig. 5. Shows the functional block diagram of the proposed
system. It uses motion sensor, blue tooth adapter, motor driver
and arduino to perform our objective.

J.AXIS
SENSOR

SENSE
ELECTRONICS

AOC

+5V
Inputs

GND

Fig. 7.

Functional Block Diagram of motion sensor

C. Arduino

Arduino includes both hardware and software, which is an

Fig. 5. Functional Block Diagram

open-source prototyping platform.

The input can be read by

Arduino boards and its output helps in activating a motor. The


instructions can be sent to the microcontroller for controlling

A. Blue Tooth Adapter


HC

serial

Bluetooth

products

have

Bluetooth

serial

interface module and Bluetooth adapter in it. The blue tooth


serial module converts serial port to Bluetooth.

We are

the entire board.

To perform this operation,

the Arduino

programming language (based on Wiring), can be used. Fig. 8.


shows the Arduino board.

particularly using HC-05 module in this device. Fig. 6. shows


the Bluetooth serial module used in our system

Fig. 8. Arduino board

D. Motor Driver
The L293D is assembled in a plastic package which has 16
leads. It has 4 centre pins connected together and is used for
heat sinking. Sample motor vehicle movement is shown with
the 2 motors connected to it. It is a motor driver which is

798

ABITHA et AL.,AES Algorithm for Smartphone to Vehicle Communication

connected to the battery. This device can be used for switching

alarm in the vehicle is ON and it conveys message to the

applications at frequencies up to 5 kHz. The entire hardware

owner of the vehicle through Bluetooth. Also, if any fuel theft

setup is shown in fig. 9.

is made during the OFF condition of the vehicle, the Petrol


level detector wil detect the decrement in the level of petrol. If
the level gets reduced, a beep wil be given as alarm in the
vehicle to alert the owner.

VII. CONCLUSION
The security issues related to modem, smart phone-based
automotive
discussed.

embedded
To

cope

architectures
with

such

are

issues,

analyzed
we

and

designed,

implemented and evaluated a security layer that protects from


vehicle and fuel theft over the Bluetooth wireless link between
the mobile device and the vehicle. AES algorithm is used to
interface Smartphone with vehicle to avoid theft.

References

Fig. 9. Hardware Setup


[I]

VI. RESULTS AND DISCUSSION


In

our

experimental

setting,

the

AES

algorithm

is

implemented for electric vehicles. This algorithm has two


working modes: pairing and payload exchange. Pairing is

[2]

active when the bluetooth in mobile device is paired with the


vehicle. The payload exchange mode is activated when the
AES key is exchanged, and hence encryption or decryption
takes place. To test its performance, we collected runtime data
and implemented on the test vehicle. Table I. shows the
working of motion sensor and petrol level detector.
TABLE I. WORKING OF MOTION SENSOR AND PETROL LEVEL
DETECTOR

Sensor

Activates

[3]
[4]

[5]

Output
[6]

Motion
sensor

Movement in

Alarm and message

X axis

through Bluetooth

Yaxis
Zaxis

Control

of

the

vehicle
Petrol level

Any decrement in

Detector

petrol level during off

Alarm ON

condition
of vehicle

The movements in 3-axis, namely, X,Y and Z axis are

[7]
[8]

[9]

[10]

T. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser,


W. Trappe, and I. Seskar, "Security and privacy vulnerabilities of in car
wireless networks: A tire pressure monitoring system case study," in
Proc. 19th USENiX Con! Security, Berkeley, CA, USA, 2010, pp.2121.
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham,
S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno,
"Comprehensive experimental analyses of automotive attack surfaces,"
in Proc. 20th USENiX Con! Security, Berkeley, CA, USA, 2011, pp.
6-6.
F. Stajano, "Security for Ubiquitous Computing. Hoboken," NJ, USA:
Wile, 2002
A. Dardanelli, M. Tanelli, B. Picasso, S. Savaresi, O. di Tanna, and M.
Santucci, "A smartphone-in-the-Ioop active state-of-charge manager for
electric vehicles," iEEE ASME Trans. Mechatron., vol. 17, no. 3, pp.
454-463, 2012.
C. Spelta, V. Manzoni,A. Corti,A. Goggi, and S. M. Savaresi,
"Smartphone- based vehicle-to-driver/environment interaction system
for motorcycles," iEEE Embed. Systems Lett, vol. 2, no. 2, pp. 39-42,
Jun. 2010.
A. Dardanelli,M. Tanelli, and S.M. Savaresi, "Active energy
management of electric vehicles with cartographic data," presented at
the 2012 IEEE Int. Electr. Veh. Conf., 2012.
Microchip Technology Inc. , 16-bit dsPIC Digital Signal Controllers.
NIST Special Publication 800-121 Revision 1, Guide to B1uetooth
Security: Recommendations of the National Institue of Standards and
Technology 2012.
C. Hager and S. Midkiff, "Demonstrating vulnerabilities in Bluetooth
security," in Proc. iEEE Global Telecomm., Con! (GLOBECOM'03),
2003, vol. 3, pp. 1420-1424.
K. Haataja and P. Toivanen, 'Two practical man-in-the-middle attacks
on bluetooth secure simple pairing and countermeasures," iEEE Trans.
Wireless Commun. vol. 9, no. I, pp. 384-392, Jan. 2010.

sensed using motion sensor. For any movement sensed, the

799

You might also like