SlideShare a Scribd company logo
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -57
AN UNIQUE SECURE AUTHENTICATION
MECHANISM FOR CONTROL OF VEHICLE USING
SMARTPHONE
N.Mamtha*
S.K.Saravanan N. Leo Bright Tennisson
Student of MCA, Assistant professor (Sle.G) Assistant professor (Sle.G)
Valliammai Engineering College Valliammai Engineering College. Valliammai Engineering College
Anna University Anna University Anna University
Abstract— Vehicle security and keeping pace of advancement in car features with technology have been major
concern in automobile industries. Now-a-days vehicles are Controlled and Accessed through smartphones and
Electronic Control Unit in the vehicle is made over Bluetooth connection. Unfortunately, this creates a non-negligible
attack surface, which extends when vehicles are partly operated via smartphones. In this letter, we provide an
encryption technique which includes sender’s finger vein authentication in addition to the sender device
authentication on the receiving side.
Keywords— Encryption, Finger vein Technique, Bluetooth, Electronic Control Unit, Man-In-The-Middle, Embedded
Systems, and Smart Phone.
I. INTRODUCTION
It is becoming widely popular to control and access vehicles through smart phones together with embedded systems.
There exist vulnerabilities like improper validation, exposure and randomness. Especially in case of vehicles controlled
by smart phones over Bluetooth there are possibilities for Man-In-The-Middle (MITM) attack and other attacks of
falsification of information. Recently, several researchers highlighted this aspect and successfully demonstrated attacks
against different vehicles. Each of these works showed that it was possible to take control of certain functionalities of the
vehicle, and interfere with safety-critical or sensitive components. These vulnerabilities hamper novel solutions (e.g.,
smart phones to unlock the vehicle door or to start the engine), because of the risk of successful attacks. Adding security
mechanisms to vehicles is a challenging task, as the related embedded architectures are commonly designed with safety
requirements rather than security ones in mind.
We explicitly take the capabilities of the target architecture into account (i.e., no input capabilities on the vehicle
side, limited output capabilities, and lack of a trusted execution environment on the mobile device).Researchers had
established a secure session layer over an insecure radio connection. This security layer use encryption algorithms like
AES and SHA-1. This method encrypts the message before it is transmitted from the smart phone and it is decrypted by
the Electronic Control Unit [ECU] that is available in the vehicle. But no authentication is made about the sender’s
mobile device on the receiving side. There is a possibility of some other mobile device to pair with ECU in the vehicle.
The encryption algorithms have a draw back in terms of processing burden and time constraints. Also these methods
provide no authentication for sender’s mobile device. In this article we present an enhanced security layer which is
efficient, less complexity when compared to other encryption and provides authentication for sender mobile device on
the receiving side.
II. SYSTEM ARCHITECTURE
The system architecture under consideration directly relates to the vehicle control logic. The control logic can be
split into two main stages: the “high-level” stage take cares of the vehicle motion and energy control, while the “low-
level” stage takes care of data acquisition and actuation. This layout is quite common in complex automotive control
systems, as they are often characterized by cascade structures that exploit the frequency-separation paradigm in order to
decouple nested control loops. Fig. 1, the system architecture comprises two main elements. The first element is the
Gateway electronic control unit (ECU), which is physically mounted on the vehicle, runs the low-level control logic, and
communicates with sensors and actuators via an in-vehicle network (e.g., the CAN bus). The Gateway ECU is equipped
with a radio interface that allows wireless communication between the in-vehicle network and external devices. The
second element is an external device that works closely with the vehicle ECUs via the radio interface.
We successfully implemented the aforementioned system architecture. Specifically, we implemented an intelligent
range extender for lightweight electric vehicles, with the goal of optimizing the energy consumption by actively
modifying the vehicle dynamic behavior, as detailed in [4]. This task is accomplished with a two-layer structure.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -58
A high-level controller keeps track of a reference profile, , for the battery state of charge (SoC), . The profile is
generated by taking into account the route length and its elevation profile, as detailed in [6]. The mo-bile device
implements the SoC controller within an ad-hoc app that we developed, which also includes navigation features that
leverage on Internet-based services (e.g., Google Maps API). Furthermore, the low-level control loops enforce speed and
acceleration constraints ( and in, which allow meeting the desired energy consumption profile. The low-level
controllers act on the gas handle opening to guarantee that the dynamical behavior of the vehicle (i.e., speed and
acceleration ) is kept within the prescribed limits.
Fig.1 System Architecture for Smartphone Controlling the Vehicle
The Gateway ECU implements and executes the low -level control loops on a 16-bits ds PIC micro-controller with a
CPU speed of 20 Mips [7], and communicates with sensors and actuators via CAN bus. The Gateway ECU and the
mobile device communicate via a Bluetooth layer. They exchange both initialization and real time control data.
Initialization data is packed into a 48 bytes frame and the communication is unidirectional from the mobile device to the
gateway ECU. On the contrary, the real time communication is bidirectional: The Gateway ECU sends a 64-bytes
payload every 0.2 s (5 Hz), whereas the mobile device communicates 6 bytes control-data packet every time the vehicle
travels 50 m. Simulation results and experimental data collected on a prototype light 4-wheeled Toy vehicle prove the
effectiveness and the robustness of the proposed approach. The vehicle equipped with the SoC controller saves
approximately 20% of the energy supplied by the battery, with respect to a nominal driving behavior.
III. SECURITY ISSUES
The Bluetooth layer protocol has a two -phase session setup: after the pairing process, which allows the peers to get to
know each other and set up the network properties, the actual communication is enabled. Depending on the protocol
version, different security features are available. However, the early Bluetooth standard and its successors, with the
introduction of the secure simple pairing (SSP) protocol, suffer from various security vulnerabilities due to weak
cryptographic primitives. The security of most Bluetooth applications (e.g., in embedded scenarios) relies on a static PIN
only, with no way to change it.
IV. A SECURITY LAYER FOR AUTOMOTIVE SERVICES
Given the application scenario and the aforementioned security issues, it is necessary to devise an application-level
security mechanism that mitigates the vulnerabilities that lie in the wireless link. Such security layer must be independent
from the underlying wireless layer and must allow secure communication between the mobile device and the vehicle. In
our attack model the adversary knows the radio protocol in use, and is able to transmit and receive arbitrary data packets
on the radio interface. The objective of the attacker is to obtain access to the information exchanged between the vehicle
and the mobile de-vice, and ultimately manipulate the ECU execution flow. We concentrate on the application layer.
Therefore, attacks against the physical layer (e.g., jamming) or attacks that require physical, even temporary, access to
the vehicle (e.g., forceful shut-down) fall outside the scope of our security layer.
B. SECURITY ANALYSIS
When a vehicle is being accessed and controlled by mobile there is a possibility of another mobile device to pair with
the ECU mounted on the vehicle either accidentally or intentionally. So apart from encrypting the communication
message alone there must be security mechanism that authenticates the sender’s device on the receiving side. This
prevents any intruder mobile device which is paired to the ECU from accessing the vehicle.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -59
C. IMEI NUMBER
The International Mobile Station Equipment Identity or IMEI is a number, usually unique, to identify 3GPP (i.e.,
GSM, UMTS and LTE) and iDEN mobile phones, as well as some satellite phones. It is usually found printed inside the
battery compartment of the phone, but can also be displayed on-screen on most phones by entering *#06# on the dial pad,
or alongside other system information in the settings menu on smart phone operating systems. The IMEI number is used
by a GSM network to identify valid devices and therefore can be used for stopping a stolen phone from accessing that
network. For example, if a mobile phone is stolen, the owner can call his or her network provider and instruct them to
"blacklist" the phone using its IMEI number. This renders the phone useless on that network and sometimes other
networks too, whether or not the phone's SIM is changed.
1) STRUCTURE OF THE IMEI AND IMEISV (IMEI SOFTWARE VERSION)
The IMEI (15 decimal digits: 14 digits plus a check digit) or IMEISV (16 digits) includes information on the origin,
model, and serial number of the device. The structure of the IMEI/SV is specified in 3GPP TS 23.003. The model and
origin comprise the initial 8-digit portion of the IMEI/SV, known as the Type Allocation Code (TAC). The remainder of
the IMEI is manufacturer-defined, with a Luhn check digit at the end. For the IMEI format prior to 2003, the GSMA
guideline was to have this Check Digit always transmitted to the network as zero. This guideline seems to have
disappeared for the format valid from 2003 and onwards. As of 2004, the format of the IMEI is AA-BBBBBB-CCCCCC-
D, although it may not always be displayed this way. The IMEISV drops the Luhn check digit in favour of an additional
two digits for the Software Version Number (SVN), making the format AA-BBBBBB-CCCCCC-EE.
2) FINGER VEIN
Recently, there has been much interest in biometric authentication for security purposes. Biometrics or biometric
authentication refers to automated methods of recognizing a person using behavioural or physiological features, such as,
faces, irises, gaits, fingerprints, veins, etc. Biometric features are unique characteristics to an individual which is
convenient and more secure than traditional authentication methods. For example, biometric recognition is more reliable
than token-based verification methods (keys or ID cards) and knowledge-based methods (passwords or PINs) while
attaining higher efficiency and offering a better user experience.Fig.2 shows the comparisons of various biometric
techniques.
Fig.2 Comparisons of Biometric Techniques
Finger vein authentication is often a biometric technology which specifies an individual when using the vein pattern
inside of the fingers. Veins are usually the blood vessels which carry blood towards the heart. Every single person's veins
are having unique physical and behavioral features. It provides a greater degree of security that protects information and
access control much better. As deoxyhemoglobin in the blood absorbs infrared lights, vein patterns appear as several dark
outlines. The infrared lights combine with special camera capturing an image of the finger vein pattern. This image is
then transformed into pattern data along with saved as a template of any person's biometric authentication data. While
authentication, the particular finger vein image is taken and is compared against the saved template of the person. Fig.3
shows the finger vein is captured by device.
Fig.3 Finger vein Template
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -60
V. ENCRYPTION AND DECRYPTION
Above breech in the security system is tackled by our proposed special encryption method. Our proposed encryption
algorithm uses hash function. This hash function computes hash value over the concatenation of message M and
IMEI/SV International Mobile Station Equipment Identity number and hash code value generated from the finger
vein [FV] which is commonly shared by the mobile device and the ECU mounted on the vehicle. Sender computes the
hash value over the concatenation of M and IMEI number and Finger vein hash code. The resulting hash value to M.
Because the ECU on the vehicle possesses IMEI number and FV it can recomputed the hash value to verify. As M, IMEI
number ,FV sent in encrypted form, an intruder cannot modify an intercepted message and cannot generate a false
message.
Fig.4 Encryption and Decryption with IMEI and FV
1) Algorithm for Encryption e=M||H(M||IMEI number + FV)
 e is the encrypted message
 -Only Mobile Device and ECU share IMEI number and FV
2) Algorithm for Decryption
H= H(M||IMEI number + FV)
Compute the hash code of received message plus IMEI number + FV.
VI. SECURITY EVALUATION
The proposed encryption using hash function is simple and fast when compared to other encryption techniques like
AES. Also they do not provide authentication for the sender’s mobile device on the receiving side. A hash value h is
generated by a function H of the form h = H (M || IMEI number + FV). M is a variable length message and IMEI number
is 14 or 16 bits. The hash value is appended to the message at the source at a time when the message is assumed or
known to be correct.
 H can be applied to a block of data of any size
 H produces a fixed length output
 H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical
 For any given value h, it is computationally infeasible to find x such that H(x) = h.
 For any given block x, it is computationally infeasible to find y ≠ x with H(y) = H(x).
 It is computationally infeasible to find any pair(x, y) such that H(x) = H(y).
Experiment results showed that the proposed encryption or decryption techniques require an execution of 2.25
microseconds which is faster than the other encryption techniques. Apart from this execution other time limit like pairing
of mobile devices, etc… are same as with the previous researches.
VII. CONCLUSION
The proposed system includes a device for capturing finger-vein images and a proposed algorithm to extract finger-
vein images by considering various parameters like vein width, position, length, pixels and intersection of veins and the
encryption technique proved to be efficient and lightweight in terms of processing time and speed.. Our system is suitable
for mobile device because of its low computational complexity and low power consumption. The advantage of this
proposed system is more secured and confidential and provides an holistic security which protects the message as well as
allows the receiving side to ensure that the message is from authenticated sender device.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 03, Volume 3 (March 2016) www.ijirae.com
________________________________________________________________________________________________
IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 |
Index Copernicus 2014 = 6.57
© 2014- 16, IJIRAE- All Rights Reserved Page -61
REFERENCES
[1]. I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar, “Security and
privacy vulnerabilities of incar wireless networks: A tire pressure monitoring system case study,” in Proc. 19th
USENIX Conf. Security, Berkeley, CA, USA, 2010, pp. 21–21.
[2]. Rupinder Saini , Narinder Rana COMPARISON OF VARIOUS BIOMETRIC METHODS” IJAST Vol 2 Issue I
(March 2014)
[3]. N Venkata Vara Prasad#1, K Venkata Murali Mohan “A Real Time Embedded Finger Vein Recognition System for
Authentication on Mobile Devices” IJETT – Volume 8 Number 2- Feb 2014
[4]. S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner,
and T. Kohno, “Compre-hensive experimental analyses of automotive attack surfaces,” in Proc. 20th USENIX Conf.
Security, Berkeley, CA, USA, 2011, pp. 6–6.
[5]. A. Dardanelli, F. Maggi, M. Tanelli, S. Zanero, S. M. Savaresi, R. Kochanek, and T. Holz, A Security Layer for
Smartphone-to-Vehicle Communication Over Bluetooth, IEEE EMBEDDED SYSTEMS LETTERS, VOL. 5, NO. 3,
SEPTEMBER 2013
[6]. A. Dardanelli, M. Tanelli, B. Picasso, S. Savaresi, O. di Tanna, and M. Santucci, “A smartphone-in-the-loop active
state-of-charge manager for electric vehicles,” IEEE ASME Trans. Mechatron., vol. 17, no. 3, pp. 454–463, 2012.
[7]. C. Spelta, V. Manzoni, A. Corti, A. Goggi, and S. M. Savaresi, “Smart-phone-based vehicle-to-driver/environment
interaction system for mo-torcycles,” IEEE Embed. Systems Lett., vol. 2, no. 2, pp. 39–42, Jun. 2010.
[8]. A. Dardanelli, M. Tanelli, and S. M. Savaresi, “Active energy manage-ment of electric vehicles with cartographic
data,” presented at the 2012 IEEE Int. Electr. Veh. Conf., 2012.
[9]. Microchip Technology Inc., 16-bit dsPIC® Digital Signal Controllers.
[10]. NIST Special Publication 800-121 Revision 1, Guide to Bluetooth Se-curity: Recommendations of the National
Institue of Standards and Technology 2012.
[11]. C. Hager and S. Midkiff, “Demonstrating vulnerabilities in bluetooth security,” in Proc. IEEE Global Telecommun.
Conf. (GLOBECOM’03), 2003, vol. 3, pp. 1420–1424.
[12]. K. Haataja and P. Toivanen, “Two practical man-in-the-middle attacks on bluetooth secure simple pairing and
countermeasures,” IEEE Trans. Wireless Commun. vol. 9, no. 1, pp. 384–392, Jan. 2010 [Online]. Available:
http://dx.doi.org/10.1109/TWC.2010.01.090935
BIOGRAPHIES:
Mr. S.K.Saravanan is an Assistant Professor, in Department of Computer Application,
Valliammai engineering college. He has 16 years of teaching experience in engineering college.
Ms. N. Mamtha is a Student Pursuing MCA course in Valliammai Engineering College.
She is a talented, dedicated and hardworking student.
Mr. N.Leo Bright Tennisson is an Assistant Professor, in Department of Computer Science,
Valliammai Engineering College. He has about 9 years of teaching experience in Engineering
College and published various research papers in Conferences and International Journal.
Ad

Recommended

Nireeksha
Nireeksha
Naveen Gouda
 
Smart automobile security system using labview
Smart automobile security system using labview
eSAT Publishing House
 
D1803052831
D1803052831
IOSR Journals
 
IRJET- Intelligent Braking System for Automobiles
IRJET- Intelligent Braking System for Automobiles
IRJET Journal
 
IRJET- IoT System for Monitoring and Diagnostics of Engine
IRJET- IoT System for Monitoring and Diagnostics of Engine
IRJET Journal
 
CAN BASED AUTOMATED VEHICLE SECURITY SYSTEM
CAN BASED AUTOMATED VEHICLE SECURITY SYSTEM
IAEME Publication
 
NetSim VANET User Manual
NetSim VANET User Manual
Vishal Sharma
 
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
cscpconf
 
VANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technology
IOSRJECE
 
anti theft vehicular security system
anti theft vehicular security system
Akshay Gaikwad
 
VANET-based traffic monitoring and incident detection system: A review
VANET-based traffic monitoring and incident detection system: A review
IJECEIAES
 
IRJET- Automotive Safety System using Controller Area Network(CAN) Protocol
IRJET- Automotive Safety System using Controller Area Network(CAN) Protocol
IRJET Journal
 
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
cscpconf
 
Smart Metro - Rail System
Smart Metro - Rail System
IJAEMSJORNAL
 
Smart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle Theft
Mithileysh Sathiyanarayanan
 
Embedded Technology for vehicle cabin safety Monitoring and Alerting System
Embedded Technology for vehicle cabin safety Monitoring and Alerting System
IJCSEA Journal
 
Interactive voice response (ivr) electronic control unit (ecu) for unmanned g...
Interactive voice response (ivr) electronic control unit (ecu) for unmanned g...
eSAT Journals
 
C03502014017
C03502014017
theijes
 
project report. final
project report. final
Kumar Prateek
 
IRJET - Intelligent Traffic Control System using Centralized System for Emerg...
IRJET - Intelligent Traffic Control System using Centralized System for Emerg...
IRJET Journal
 
Intelligent traffic regulation system for roads using car two way communication
Intelligent traffic regulation system for roads using car two way communication
eSAT Publishing House
 
Train control system using can protocol
Train control system using can protocol
IRJET Journal
 
Review Paper on VANET
Review Paper on VANET
Pallavi Agarwal
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
Association of Scientists, Developers and Faculties
 
Anti theft security system for vehicle
Anti theft security system for vehicle
abhinandanyadavg
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris Valasek
CODE BLUE
 
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
IOSR Journals
 
Advanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPS
rahulmonikasharma
 
Slide 7 WestCal Political Science 1 - US Government 2015-2016
Slide 7 WestCal Political Science 1 - US Government 2015-2016
WestCal Academy
 
A BRIEF EXPERIMENTAL STUDY ON METAKOLIN ADMIXED CONCRETE WITH AND WITHOUT RIC...
A BRIEF EXPERIMENTAL STUDY ON METAKOLIN ADMIXED CONCRETE WITH AND WITHOUT RIC...
AM Publications
 

More Related Content

What's hot (20)

VANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technology
IOSRJECE
 
anti theft vehicular security system
anti theft vehicular security system
Akshay Gaikwad
 
VANET-based traffic monitoring and incident detection system: A review
VANET-based traffic monitoring and incident detection system: A review
IJECEIAES
 
IRJET- Automotive Safety System using Controller Area Network(CAN) Protocol
IRJET- Automotive Safety System using Controller Area Network(CAN) Protocol
IRJET Journal
 
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
cscpconf
 
Smart Metro - Rail System
Smart Metro - Rail System
IJAEMSJORNAL
 
Smart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle Theft
Mithileysh Sathiyanarayanan
 
Embedded Technology for vehicle cabin safety Monitoring and Alerting System
Embedded Technology for vehicle cabin safety Monitoring and Alerting System
IJCSEA Journal
 
Interactive voice response (ivr) electronic control unit (ecu) for unmanned g...
Interactive voice response (ivr) electronic control unit (ecu) for unmanned g...
eSAT Journals
 
C03502014017
C03502014017
theijes
 
project report. final
project report. final
Kumar Prateek
 
IRJET - Intelligent Traffic Control System using Centralized System for Emerg...
IRJET - Intelligent Traffic Control System using Centralized System for Emerg...
IRJET Journal
 
Intelligent traffic regulation system for roads using car two way communication
Intelligent traffic regulation system for roads using car two way communication
eSAT Publishing House
 
Train control system using can protocol
Train control system using can protocol
IRJET Journal
 
Review Paper on VANET
Review Paper on VANET
Pallavi Agarwal
 
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
Association of Scientists, Developers and Faculties
 
Anti theft security system for vehicle
Anti theft security system for vehicle
abhinandanyadavg
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris Valasek
CODE BLUE
 
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
IOSR Journals
 
Advanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPS
rahulmonikasharma
 
VANET based Intelligent TransportationSystem using Li-Fi technology
VANET based Intelligent TransportationSystem using Li-Fi technology
IOSRJECE
 
anti theft vehicular security system
anti theft vehicular security system
Akshay Gaikwad
 
VANET-based traffic monitoring and incident detection system: A review
VANET-based traffic monitoring and incident detection system: A review
IJECEIAES
 
IRJET- Automotive Safety System using Controller Area Network(CAN) Protocol
IRJET- Automotive Safety System using Controller Area Network(CAN) Protocol
IRJET Journal
 
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
ESTEREL IMPLEMENTATION AND VALIDATION OF CRUISE CONTROLLER
cscpconf
 
Smart Metro - Rail System
Smart Metro - Rail System
IJAEMSJORNAL
 
Embedded Technology for vehicle cabin safety Monitoring and Alerting System
Embedded Technology for vehicle cabin safety Monitoring and Alerting System
IJCSEA Journal
 
Interactive voice response (ivr) electronic control unit (ecu) for unmanned g...
Interactive voice response (ivr) electronic control unit (ecu) for unmanned g...
eSAT Journals
 
C03502014017
C03502014017
theijes
 
project report. final
project report. final
Kumar Prateek
 
IRJET - Intelligent Traffic Control System using Centralized System for Emerg...
IRJET - Intelligent Traffic Control System using Centralized System for Emerg...
IRJET Journal
 
Intelligent traffic regulation system for roads using car two way communication
Intelligent traffic regulation system for roads using car two way communication
eSAT Publishing House
 
Train control system using can protocol
Train control system using can protocol
IRJET Journal
 
Anti theft security system for vehicle
Anti theft security system for vehicle
abhinandanyadavg
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris Valasek
CODE BLUE
 
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
IOSR Journals
 
Advanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPS
rahulmonikasharma
 

Viewers also liked (11)

Slide 7 WestCal Political Science 1 - US Government 2015-2016
Slide 7 WestCal Political Science 1 - US Government 2015-2016
WestCal Academy
 
A BRIEF EXPERIMENTAL STUDY ON METAKOLIN ADMIXED CONCRETE WITH AND WITHOUT RIC...
A BRIEF EXPERIMENTAL STUDY ON METAKOLIN ADMIXED CONCRETE WITH AND WITHOUT RIC...
AM Publications
 
PM [B08] The Gate-crasher
PM [B08] The Gate-crasher
Stephen Kwong
 
CM [010] Galileo's Acceleration & Newton's Laws
CM [010] Galileo's Acceleration & Newton's Laws
Stephen Kwong
 
British Culture
British Culture
niachniach
 
AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS
AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS
AM Publications
 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
AM Publications
 
Advanced Security Mechanism for Mobile Ad hoc Networks using Game Theoretic A...
Advanced Security Mechanism for Mobile Ad hoc Networks using Game Theoretic A...
AM Publications
 
Get started with dropbox
Get started with dropbox
ddaress
 
Soldagem finalizado
Soldagem finalizado
Priscila Grazielle
 
Marketing politico candidata circuito 3 del edo. aragua abog.karin salanova
Marketing politico candidata circuito 3 del edo. aragua abog.karin salanova
Justice First
 
Slide 7 WestCal Political Science 1 - US Government 2015-2016
Slide 7 WestCal Political Science 1 - US Government 2015-2016
WestCal Academy
 
A BRIEF EXPERIMENTAL STUDY ON METAKOLIN ADMIXED CONCRETE WITH AND WITHOUT RIC...
A BRIEF EXPERIMENTAL STUDY ON METAKOLIN ADMIXED CONCRETE WITH AND WITHOUT RIC...
AM Publications
 
PM [B08] The Gate-crasher
PM [B08] The Gate-crasher
Stephen Kwong
 
CM [010] Galileo's Acceleration & Newton's Laws
CM [010] Galileo's Acceleration & Newton's Laws
Stephen Kwong
 
British Culture
British Culture
niachniach
 
AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS
AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS
AM Publications
 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
AM Publications
 
Advanced Security Mechanism for Mobile Ad hoc Networks using Game Theoretic A...
Advanced Security Mechanism for Mobile Ad hoc Networks using Game Theoretic A...
AM Publications
 
Get started with dropbox
Get started with dropbox
ddaress
 
Marketing politico candidata circuito 3 del edo. aragua abog.karin salanova
Marketing politico candidata circuito 3 del edo. aragua abog.karin salanova
Justice First
 
Ad

Similar to AN UNIQUE SECURE AUTHENTICATION MECHANISM FOR CONTROL OF VEHICLE USING SMARTPHONE (20)

A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles
IJECEIAES
 
W04404135146
W04404135146
IJERA Editor
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architecture
ijtsrd
 
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET Journal
 
Jb3515641568
Jb3515641568
IJERA Editor
 
A Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart Substations
IJECEIAES
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET Journal
 
Homogenous and interoperable signaling computer interlocking through IEC 6149...
Homogenous and interoperable signaling computer interlocking through IEC 6149...
IJECEIAES
 
Congestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportation
IAEME Publication
 
Intelligent vehicle using embedded system
Intelligent vehicle using embedded system
ijiert bestjournal
 
pre-defense (2).pptx
pre-defense (2).pptx
HasibulHassanShuvo
 
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET Journal
 
EMBEDDED SYSTEMS
EMBEDDED SYSTEMS
Hemanth kumar
 
Object collision avoidance with train using android
Object collision avoidance with train using android
eSAT Publishing House
 
LIFI based vehicle to vehicle communication to prevent accidents
LIFI based vehicle to vehicle communication to prevent accidents
IRJET Journal
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
Iaetsd Iaetsd
 
CAN BASE VOLVO AUTOMATION
CAN BASE VOLVO AUTOMATION
IAEME Publication
 
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEM
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEM
VLSICS Design
 
Survey of Smartphone applications based on OBD-II for Intelligent Transportat...
Survey of Smartphone applications based on OBD-II for Intelligent Transportat...
IJERA Editor
 
Survey of Smartphone applications based on OBD-II for Intelligent Transportat...
Survey of Smartphone applications based on OBD-II for Intelligent Transportat...
IJERA Editor
 
A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles
IJECEIAES
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architecture
ijtsrd
 
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET- Smart Accident Detection and Emergency Notification System using IoT a...
IRJET Journal
 
A Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart Substations
IJECEIAES
 
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET- Design of a Vehicular Ad-Hoc Netwrork (VANET)
IRJET Journal
 
Homogenous and interoperable signaling computer interlocking through IEC 6149...
Homogenous and interoperable signaling computer interlocking through IEC 6149...
IJECEIAES
 
Congestion control & collision avoidance algorithm in intelligent transportation
Congestion control & collision avoidance algorithm in intelligent transportation
IAEME Publication
 
Intelligent vehicle using embedded system
Intelligent vehicle using embedded system
ijiert bestjournal
 
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET Journal
 
Object collision avoidance with train using android
Object collision avoidance with train using android
eSAT Publishing House
 
LIFI based vehicle to vehicle communication to prevent accidents
LIFI based vehicle to vehicle communication to prevent accidents
IRJET Journal
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
Iaetsd Iaetsd
 
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEM
SOFTWARE AND HARDWARE DESIGN CHALLENGES IN AUTOMOTIVE EMBEDDED SYSTEM
VLSICS Design
 
Survey of Smartphone applications based on OBD-II for Intelligent Transportat...
Survey of Smartphone applications based on OBD-II for Intelligent Transportat...
IJERA Editor
 
Survey of Smartphone applications based on OBD-II for Intelligent Transportat...
Survey of Smartphone applications based on OBD-II for Intelligent Transportat...
IJERA Editor
 
Ad

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
AM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
AM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 

Recently uploaded (20)

Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
NALCO Green Anode Plant,Compositions of CPC,Pitch
NALCO Green Anode Plant,Compositions of CPC,Pitch
arpitprachi123
 
Quiz on EV , made fun and progressive !!!
Quiz on EV , made fun and progressive !!!
JaishreeAsokanEEE
 
Fundamentals of Digital Design_Class_21st May - Copy.pptx
Fundamentals of Digital Design_Class_21st May - Copy.pptx
drdebarshi1993
 
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
samueljackson3773
 
Pavement and its types, Application of rigid and Flexible Pavements
Pavement and its types, Application of rigid and Flexible Pavements
Sakthivel M
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Cadastral Maps
Cadastral Maps
Google
 
How Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdf
Mina Anis
 
David Boutry - Mentors Junior Developers
David Boutry - Mentors Junior Developers
David Boutry
 
Fundamentals of Digital Design_Class_12th April.pptx
Fundamentals of Digital Design_Class_12th April.pptx
drdebarshi1993
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
ElysiumPro Company Profile 2025-2026.pdf
ElysiumPro Company Profile 2025-2026.pdf
info751436
 
Center Enamel can Provide Aluminum Dome Roofs for diesel tank.docx
Center Enamel can Provide Aluminum Dome Roofs for diesel tank.docx
CenterEnamel
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
Week 6- PC HARDWARE AND MAINTENANCE-THEORY.pptx
Week 6- PC HARDWARE AND MAINTENANCE-THEORY.pptx
dayananda54
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
Proposal for folders structure division in projects.pdf
Proposal for folders structure division in projects.pdf
Mohamed Ahmed
 
special_edition_using_visual_foxpro_6.pdf
special_edition_using_visual_foxpro_6.pdf
Shabista Imam
 
60 Years and Beyond eBook 1234567891.pdf
60 Years and Beyond eBook 1234567891.pdf
waseemalazzeh
 
Complete guidance book of Asp.Net Web API
Complete guidance book of Asp.Net Web API
Shabista Imam
 
NALCO Green Anode Plant,Compositions of CPC,Pitch
NALCO Green Anode Plant,Compositions of CPC,Pitch
arpitprachi123
 
Quiz on EV , made fun and progressive !!!
Quiz on EV , made fun and progressive !!!
JaishreeAsokanEEE
 
Fundamentals of Digital Design_Class_21st May - Copy.pptx
Fundamentals of Digital Design_Class_21st May - Copy.pptx
drdebarshi1993
 
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
samueljackson3773
 
Pavement and its types, Application of rigid and Flexible Pavements
Pavement and its types, Application of rigid and Flexible Pavements
Sakthivel M
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Cadastral Maps
Cadastral Maps
Google
 
How Binning Affects LED Performance & Consistency.pdf
How Binning Affects LED Performance & Consistency.pdf
Mina Anis
 
David Boutry - Mentors Junior Developers
David Boutry - Mentors Junior Developers
David Boutry
 
Fundamentals of Digital Design_Class_12th April.pptx
Fundamentals of Digital Design_Class_12th April.pptx
drdebarshi1993
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
ElysiumPro Company Profile 2025-2026.pdf
ElysiumPro Company Profile 2025-2026.pdf
info751436
 
Center Enamel can Provide Aluminum Dome Roofs for diesel tank.docx
Center Enamel can Provide Aluminum Dome Roofs for diesel tank.docx
CenterEnamel
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
Week 6- PC HARDWARE AND MAINTENANCE-THEORY.pptx
Week 6- PC HARDWARE AND MAINTENANCE-THEORY.pptx
dayananda54
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 

AN UNIQUE SECURE AUTHENTICATION MECHANISM FOR CONTROL OF VEHICLE USING SMARTPHONE

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -57 AN UNIQUE SECURE AUTHENTICATION MECHANISM FOR CONTROL OF VEHICLE USING SMARTPHONE N.Mamtha* S.K.Saravanan N. Leo Bright Tennisson Student of MCA, Assistant professor (Sle.G) Assistant professor (Sle.G) Valliammai Engineering College Valliammai Engineering College. Valliammai Engineering College Anna University Anna University Anna University Abstract— Vehicle security and keeping pace of advancement in car features with technology have been major concern in automobile industries. Now-a-days vehicles are Controlled and Accessed through smartphones and Electronic Control Unit in the vehicle is made over Bluetooth connection. Unfortunately, this creates a non-negligible attack surface, which extends when vehicles are partly operated via smartphones. In this letter, we provide an encryption technique which includes sender’s finger vein authentication in addition to the sender device authentication on the receiving side. Keywords— Encryption, Finger vein Technique, Bluetooth, Electronic Control Unit, Man-In-The-Middle, Embedded Systems, and Smart Phone. I. INTRODUCTION It is becoming widely popular to control and access vehicles through smart phones together with embedded systems. There exist vulnerabilities like improper validation, exposure and randomness. Especially in case of vehicles controlled by smart phones over Bluetooth there are possibilities for Man-In-The-Middle (MITM) attack and other attacks of falsification of information. Recently, several researchers highlighted this aspect and successfully demonstrated attacks against different vehicles. Each of these works showed that it was possible to take control of certain functionalities of the vehicle, and interfere with safety-critical or sensitive components. These vulnerabilities hamper novel solutions (e.g., smart phones to unlock the vehicle door or to start the engine), because of the risk of successful attacks. Adding security mechanisms to vehicles is a challenging task, as the related embedded architectures are commonly designed with safety requirements rather than security ones in mind. We explicitly take the capabilities of the target architecture into account (i.e., no input capabilities on the vehicle side, limited output capabilities, and lack of a trusted execution environment on the mobile device).Researchers had established a secure session layer over an insecure radio connection. This security layer use encryption algorithms like AES and SHA-1. This method encrypts the message before it is transmitted from the smart phone and it is decrypted by the Electronic Control Unit [ECU] that is available in the vehicle. But no authentication is made about the sender’s mobile device on the receiving side. There is a possibility of some other mobile device to pair with ECU in the vehicle. The encryption algorithms have a draw back in terms of processing burden and time constraints. Also these methods provide no authentication for sender’s mobile device. In this article we present an enhanced security layer which is efficient, less complexity when compared to other encryption and provides authentication for sender mobile device on the receiving side. II. SYSTEM ARCHITECTURE The system architecture under consideration directly relates to the vehicle control logic. The control logic can be split into two main stages: the “high-level” stage take cares of the vehicle motion and energy control, while the “low- level” stage takes care of data acquisition and actuation. This layout is quite common in complex automotive control systems, as they are often characterized by cascade structures that exploit the frequency-separation paradigm in order to decouple nested control loops. Fig. 1, the system architecture comprises two main elements. The first element is the Gateway electronic control unit (ECU), which is physically mounted on the vehicle, runs the low-level control logic, and communicates with sensors and actuators via an in-vehicle network (e.g., the CAN bus). The Gateway ECU is equipped with a radio interface that allows wireless communication between the in-vehicle network and external devices. The second element is an external device that works closely with the vehicle ECUs via the radio interface. We successfully implemented the aforementioned system architecture. Specifically, we implemented an intelligent range extender for lightweight electric vehicles, with the goal of optimizing the energy consumption by actively modifying the vehicle dynamic behavior, as detailed in [4]. This task is accomplished with a two-layer structure.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com ________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -58 A high-level controller keeps track of a reference profile, , for the battery state of charge (SoC), . The profile is generated by taking into account the route length and its elevation profile, as detailed in [6]. The mo-bile device implements the SoC controller within an ad-hoc app that we developed, which also includes navigation features that leverage on Internet-based services (e.g., Google Maps API). Furthermore, the low-level control loops enforce speed and acceleration constraints ( and in, which allow meeting the desired energy consumption profile. The low-level controllers act on the gas handle opening to guarantee that the dynamical behavior of the vehicle (i.e., speed and acceleration ) is kept within the prescribed limits. Fig.1 System Architecture for Smartphone Controlling the Vehicle The Gateway ECU implements and executes the low -level control loops on a 16-bits ds PIC micro-controller with a CPU speed of 20 Mips [7], and communicates with sensors and actuators via CAN bus. The Gateway ECU and the mobile device communicate via a Bluetooth layer. They exchange both initialization and real time control data. Initialization data is packed into a 48 bytes frame and the communication is unidirectional from the mobile device to the gateway ECU. On the contrary, the real time communication is bidirectional: The Gateway ECU sends a 64-bytes payload every 0.2 s (5 Hz), whereas the mobile device communicates 6 bytes control-data packet every time the vehicle travels 50 m. Simulation results and experimental data collected on a prototype light 4-wheeled Toy vehicle prove the effectiveness and the robustness of the proposed approach. The vehicle equipped with the SoC controller saves approximately 20% of the energy supplied by the battery, with respect to a nominal driving behavior. III. SECURITY ISSUES The Bluetooth layer protocol has a two -phase session setup: after the pairing process, which allows the peers to get to know each other and set up the network properties, the actual communication is enabled. Depending on the protocol version, different security features are available. However, the early Bluetooth standard and its successors, with the introduction of the secure simple pairing (SSP) protocol, suffer from various security vulnerabilities due to weak cryptographic primitives. The security of most Bluetooth applications (e.g., in embedded scenarios) relies on a static PIN only, with no way to change it. IV. A SECURITY LAYER FOR AUTOMOTIVE SERVICES Given the application scenario and the aforementioned security issues, it is necessary to devise an application-level security mechanism that mitigates the vulnerabilities that lie in the wireless link. Such security layer must be independent from the underlying wireless layer and must allow secure communication between the mobile device and the vehicle. In our attack model the adversary knows the radio protocol in use, and is able to transmit and receive arbitrary data packets on the radio interface. The objective of the attacker is to obtain access to the information exchanged between the vehicle and the mobile de-vice, and ultimately manipulate the ECU execution flow. We concentrate on the application layer. Therefore, attacks against the physical layer (e.g., jamming) or attacks that require physical, even temporary, access to the vehicle (e.g., forceful shut-down) fall outside the scope of our security layer. B. SECURITY ANALYSIS When a vehicle is being accessed and controlled by mobile there is a possibility of another mobile device to pair with the ECU mounted on the vehicle either accidentally or intentionally. So apart from encrypting the communication message alone there must be security mechanism that authenticates the sender’s device on the receiving side. This prevents any intruder mobile device which is paired to the ECU from accessing the vehicle.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com ________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -59 C. IMEI NUMBER The International Mobile Station Equipment Identity or IMEI is a number, usually unique, to identify 3GPP (i.e., GSM, UMTS and LTE) and iDEN mobile phones, as well as some satellite phones. It is usually found printed inside the battery compartment of the phone, but can also be displayed on-screen on most phones by entering *#06# on the dial pad, or alongside other system information in the settings menu on smart phone operating systems. The IMEI number is used by a GSM network to identify valid devices and therefore can be used for stopping a stolen phone from accessing that network. For example, if a mobile phone is stolen, the owner can call his or her network provider and instruct them to "blacklist" the phone using its IMEI number. This renders the phone useless on that network and sometimes other networks too, whether or not the phone's SIM is changed. 1) STRUCTURE OF THE IMEI AND IMEISV (IMEI SOFTWARE VERSION) The IMEI (15 decimal digits: 14 digits plus a check digit) or IMEISV (16 digits) includes information on the origin, model, and serial number of the device. The structure of the IMEI/SV is specified in 3GPP TS 23.003. The model and origin comprise the initial 8-digit portion of the IMEI/SV, known as the Type Allocation Code (TAC). The remainder of the IMEI is manufacturer-defined, with a Luhn check digit at the end. For the IMEI format prior to 2003, the GSMA guideline was to have this Check Digit always transmitted to the network as zero. This guideline seems to have disappeared for the format valid from 2003 and onwards. As of 2004, the format of the IMEI is AA-BBBBBB-CCCCCC- D, although it may not always be displayed this way. The IMEISV drops the Luhn check digit in favour of an additional two digits for the Software Version Number (SVN), making the format AA-BBBBBB-CCCCCC-EE. 2) FINGER VEIN Recently, there has been much interest in biometric authentication for security purposes. Biometrics or biometric authentication refers to automated methods of recognizing a person using behavioural or physiological features, such as, faces, irises, gaits, fingerprints, veins, etc. Biometric features are unique characteristics to an individual which is convenient and more secure than traditional authentication methods. For example, biometric recognition is more reliable than token-based verification methods (keys or ID cards) and knowledge-based methods (passwords or PINs) while attaining higher efficiency and offering a better user experience.Fig.2 shows the comparisons of various biometric techniques. Fig.2 Comparisons of Biometric Techniques Finger vein authentication is often a biometric technology which specifies an individual when using the vein pattern inside of the fingers. Veins are usually the blood vessels which carry blood towards the heart. Every single person's veins are having unique physical and behavioral features. It provides a greater degree of security that protects information and access control much better. As deoxyhemoglobin in the blood absorbs infrared lights, vein patterns appear as several dark outlines. The infrared lights combine with special camera capturing an image of the finger vein pattern. This image is then transformed into pattern data along with saved as a template of any person's biometric authentication data. While authentication, the particular finger vein image is taken and is compared against the saved template of the person. Fig.3 shows the finger vein is captured by device. Fig.3 Finger vein Template
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com ________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -60 V. ENCRYPTION AND DECRYPTION Above breech in the security system is tackled by our proposed special encryption method. Our proposed encryption algorithm uses hash function. This hash function computes hash value over the concatenation of message M and IMEI/SV International Mobile Station Equipment Identity number and hash code value generated from the finger vein [FV] which is commonly shared by the mobile device and the ECU mounted on the vehicle. Sender computes the hash value over the concatenation of M and IMEI number and Finger vein hash code. The resulting hash value to M. Because the ECU on the vehicle possesses IMEI number and FV it can recomputed the hash value to verify. As M, IMEI number ,FV sent in encrypted form, an intruder cannot modify an intercepted message and cannot generate a false message. Fig.4 Encryption and Decryption with IMEI and FV 1) Algorithm for Encryption e=M||H(M||IMEI number + FV)  e is the encrypted message  -Only Mobile Device and ECU share IMEI number and FV 2) Algorithm for Decryption H= H(M||IMEI number + FV) Compute the hash code of received message plus IMEI number + FV. VI. SECURITY EVALUATION The proposed encryption using hash function is simple and fast when compared to other encryption techniques like AES. Also they do not provide authentication for the sender’s mobile device on the receiving side. A hash value h is generated by a function H of the form h = H (M || IMEI number + FV). M is a variable length message and IMEI number is 14 or 16 bits. The hash value is appended to the message at the source at a time when the message is assumed or known to be correct.  H can be applied to a block of data of any size  H produces a fixed length output  H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical  For any given value h, it is computationally infeasible to find x such that H(x) = h.  For any given block x, it is computationally infeasible to find y ≠ x with H(y) = H(x).  It is computationally infeasible to find any pair(x, y) such that H(x) = H(y). Experiment results showed that the proposed encryption or decryption techniques require an execution of 2.25 microseconds which is faster than the other encryption techniques. Apart from this execution other time limit like pairing of mobile devices, etc… are same as with the previous researches. VII. CONCLUSION The proposed system includes a device for capturing finger-vein images and a proposed algorithm to extract finger- vein images by considering various parameters like vein width, position, length, pixels and intersection of veins and the encryption technique proved to be efficient and lightweight in terms of processing time and speed.. Our system is suitable for mobile device because of its low computational complexity and low power consumption. The advantage of this proposed system is more secured and confidential and provides an holistic security which protects the message as well as allows the receiving side to ensure that the message is from authenticated sender device.
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 03, Volume 3 (March 2016) www.ijirae.com ________________________________________________________________________________________________ IJIRAE: Impact Factor Value – SJIF: Innospace, Morocco (2015): 3.361 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 16, IJIRAE- All Rights Reserved Page -61 REFERENCES [1]. I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar, “Security and privacy vulnerabilities of incar wireless networks: A tire pressure monitoring system case study,” in Proc. 19th USENIX Conf. Security, Berkeley, CA, USA, 2010, pp. 21–21. [2]. Rupinder Saini , Narinder Rana COMPARISON OF VARIOUS BIOMETRIC METHODS” IJAST Vol 2 Issue I (March 2014) [3]. N Venkata Vara Prasad#1, K Venkata Murali Mohan “A Real Time Embedded Finger Vein Recognition System for Authentication on Mobile Devices” IJETT – Volume 8 Number 2- Feb 2014 [4]. S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, “Compre-hensive experimental analyses of automotive attack surfaces,” in Proc. 20th USENIX Conf. Security, Berkeley, CA, USA, 2011, pp. 6–6. [5]. A. Dardanelli, F. Maggi, M. Tanelli, S. Zanero, S. M. Savaresi, R. Kochanek, and T. Holz, A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth, IEEE EMBEDDED SYSTEMS LETTERS, VOL. 5, NO. 3, SEPTEMBER 2013 [6]. A. Dardanelli, M. Tanelli, B. Picasso, S. Savaresi, O. di Tanna, and M. Santucci, “A smartphone-in-the-loop active state-of-charge manager for electric vehicles,” IEEE ASME Trans. Mechatron., vol. 17, no. 3, pp. 454–463, 2012. [7]. C. Spelta, V. Manzoni, A. Corti, A. Goggi, and S. M. Savaresi, “Smart-phone-based vehicle-to-driver/environment interaction system for mo-torcycles,” IEEE Embed. Systems Lett., vol. 2, no. 2, pp. 39–42, Jun. 2010. [8]. A. Dardanelli, M. Tanelli, and S. M. Savaresi, “Active energy manage-ment of electric vehicles with cartographic data,” presented at the 2012 IEEE Int. Electr. Veh. Conf., 2012. [9]. Microchip Technology Inc., 16-bit dsPIC® Digital Signal Controllers. [10]. NIST Special Publication 800-121 Revision 1, Guide to Bluetooth Se-curity: Recommendations of the National Institue of Standards and Technology 2012. [11]. C. Hager and S. Midkiff, “Demonstrating vulnerabilities in bluetooth security,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM’03), 2003, vol. 3, pp. 1420–1424. [12]. K. Haataja and P. Toivanen, “Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures,” IEEE Trans. Wireless Commun. vol. 9, no. 1, pp. 384–392, Jan. 2010 [Online]. Available: http://dx.doi.org/10.1109/TWC.2010.01.090935 BIOGRAPHIES: Mr. S.K.Saravanan is an Assistant Professor, in Department of Computer Application, Valliammai engineering college. He has 16 years of teaching experience in engineering college. Ms. N. Mamtha is a Student Pursuing MCA course in Valliammai Engineering College. She is a talented, dedicated and hardworking student. Mr. N.Leo Bright Tennisson is an Assistant Professor, in Department of Computer Science, Valliammai Engineering College. He has about 9 years of teaching experience in Engineering College and published various research papers in Conferences and International Journal.