The Insights into Car Hacking
|
|
|
- Garry Wilkinson
- 10 years ago
- Views:
Transcription
1 The Insights into Car Hacking EEL 6931 Advanced Ethical Hacking Group Project Spring 2014 Mark Bacchus FIU - Computer Engineering Department Florida, United States [email protected] Maria A. Gutierrez FIU - Computer Engineering Department Florida, United States [email protected] Alexander Coronado FIU - Electrical Engineering Department Florida, United States [email protected] Abstract Cars have come a long way. The most important aspect that has been constantly changing in cars is the technology that they are built with. Today, computers are essential and play a big role in cars. Almost everything is controlled by computers, which are as vulnerable as any other computer out in the world. Index Items Car, hacking, wireless, ECU, PCM, research I. INTRODUCTION CAR TECHNOLOGY Technology is constantly changing. It affects everything in a person s life, including their vehicle of transportation. It does not matter what type of car you may drive, the basic structure of computers in car is the same. Some computers will control almost the entire car; others may just control the main features of the car. In this paper, it will be discussed the different computers a car has, the research that has been done on car hacking, and finally the future expectations. A. Different Computers A car is composed by many computers; all these computers are the ECU (Electronics Control Unit). Here is a small list of computers that compose an ECU is: ECU (Engine Control Unit), PCM (Powertrain Control Module), CTM (Central Timing Module), SCM (Suspension Control Module), GEM (General Electronic Module), TCM (Transmission Control Module), BCM (Body Control Module), EBCM (Brake Control Module), CCM (Central Control Module) and others. The two main computers that will be discussed in this paper are the Engine Control Unit and Powertrain Control Module. The Engine Control Units are the most dominant computers the car has. There are also other microprocessors, which are essential for the car engine to run; this is due to the global specifications a car has to meet in order to be able to be sold. The elements of an ECU are as follows: 1. Core of the computer: a. Clocks b. Microcontrollers 2. Inputs of the computer: a. Supply Voltage b. Analog Inputs c. Digital Inputs 3. Memory a. SRAM b. Flash c. EEPROM 4. Connector 5. Housing 6. Communication Links: a. USB b. Serial c. Flex ray d. CAN Bus 7. Outputs a. Logic Outputs b. H Bridge Drivers c. Relay Drivers d. Injectors Drivers In this section, it will be discussed in detail ECUs, and PCMs. 1) ECU As previously mentioned, the Engine Control Unit is one of the computers in the car that is most dominant and powerful. This computer works with closed-loop control. This scheme, the closed-loop control, is in charge of monitoring the system s inputs, some parameters such as the fuel economy, and the emissions management. These
2 computers gather lots of information that has to do with the sensors located around the vehicle. It works by reviewing tables that exist in the system and making a lot of calculations per second. It is like a small computer containing 32-bit and a 40 MHz processor, which is enough since the code that it handles is no more than 1 MB of memory in total. The components that are supported by this processor are: 1. High-level digital outputs: these are the on and off digital outputs that the systems transmits; for example, the cooling fan being on or off. 2. Analog-to-Digital converters: the car s sensors give an output in analog, which the car cannot read because it only reads digital outputs. This way, the ECU converts the output from analog to digital and performs the task that is needed. 3. Digital-to-Analog converters: the same applies here. Whenever the ECU needs to send an output to the sensors or any other computer in the car, it needs to be in analog. The ECU only comes up with digital outputs that need to be converter to analog. 4. Signal converters: these components adjust the inputs and outputs whenever it is needed. 5. Communication Chips: these components are the CAN (Controller-area networking). They are mainly used for the implementation of the communication standards. These standards let the communication have a speed of up to 500 Kbps. The communication is through two wires. 2) PCM As stated earlier, PCM or Powertrain Control Module is the computer that takes care of the engine managements and driveline components. These are a multi-layered circuit that adjusts and monitors all the mixtures such as fuel and air. It also uses catalytic converters to reduce the pollution that is created by the engine. Working in two modes, the PCM either is in an open loop or a closed loop. An open loop is when the engine is cold and the computer makes the engine operate on a preset program. The closed loop is when the engine is at right temperature and working. For a closed loop, the computer uses various sensors around the car to operate the engine. Other of the tasks that the PCM takes care of is adjusting the system s sensors as it is necessary for the car. The sensors that are taken care of by the Powertrain Control Module is mass air flow, crankshaft angle, oxygen, air intake temperature, throttle position, engine hook, coolant temperature, camshaft angle. After adjusting the sensors, the PCM starts sending the necessary feedback to other controls around the car, such as the emission system controls, or the traction controls, etc. This is how the two main computers in the car work. Their jobs are essential for the car to work. These are the computers that are as vulnerable as any other computer in the world. This is the way hackers get into the car the easiest. In the sections to follow, we will be explaining some of the security aspects that the cars have, the research that has been done by universities, the malware that exists, the different attacks and the governmental restrictions when it comes to cars. A. Security on Vehicle Wireless II. RESEARCH DONE When it comes to the future of vehicle technology, Bluetooth Is often mentioned and integrated in more and facets of everyday vehicles. By using Bluetooth manufactures are able to cut down on the number of cables and simplify the bus system in a vehicle. Wireless systems give the manufacture a sense of flexibility that will allow them to do things that otherwise cannot be done in a traditional wired bus system that is found in most cars today. To summarize what Bluetooth technology basically is, it is a short ranged wireless system that uses around the 2.4 GHz frequency to transmit data. The reason why most manufactures find that it is the ideal wireless technology to be used in vehicles is because you can operate a Bluetooth signal in noisy environments. Bluetooth has the ability to hop faster and also use smaller packets then most other wireless technologies. This is so efficient that it even limits the impact of microwaves on the signal. The reliability of this does not stop there, as it also supports multi-channel transition so that data can be transmitted even faster. Bluetooth technology is also seen as ideal for vehicle systems because the distances that you need to cover are in most cases very short. There are 3 classes of power when it comes to Bluetooth signals, 1mW, 2.5mW, and 100mW. These power frequencies allow for distances of between 10 to 100 meters. Figure 1. Bluetooth Technical Details Bluetooth systems biggest advantage that will allow it to work well in vehicle is its ability to support both point to point, and point to multipoint connections. You can have in one piconet; up to 7 devices all connected together, sharing information. Today, you mainly see the use of Bluetooth networks used in vehicle media systems to connect devices such as laptops and phones to your car. We are seeing a change in technology however due to low price and wider availability, that is introducing the use of its Bluetooth technology in providing car status information to the users
3 mobile device (if there is a CAN bus link between the media system and the car). Even though Bluetooth is an easy system for a vehicle to use, it is also an easy system for an attacker to gain access to through blue jacking. An attacker can perform a variety of attacks such as accessing the phone book of a car or sending audio, or retrieving audio (phone calls) through the cars Bluetooth network. There is even software out there such as Car Whisperer which allow you to tap into a phone or vehicle to access the sound being transmitted with no extra software besides a computer and a Bluetooth driver. Someone gaining access to your media and personal info might not sound that bad, but with the integration to the CAN bus system, where people can actually start their car remotely, unlock doors, etc. It becomes very dangerous for someone to have access to your vehicle. B. Bluetooth based Attacks Most modern cars now a days have very complex systems, most have some sorry of keyless entry and key less start that come standard, and this is called a PKES system. While this is a great invention and makes life easier on drivers, it also opens up a new security vulnerability in which attackers can take advantage. A typical attack of a PKES system involves an attacker placing a device near the key and another device near the car. What that does is it carries over the signal from the key to the car without either having to be close to each other. Relay devices such as this one are available online for purchase, many times under 1000 dollars. Before I describe any attacks, I will briefly explain how a PKES system works exactly. First you have the car that occasionally sends out a beacon (or when the handle is pulled) that is recognized by the key, when you key sees the signal; it will demodulate it and interpret it. Then the key replies to the car with the response message and then the car unlocks it. The car starts itself in a similar way, only this time keeping in mind the region that the key is in. Figure 2: PKES Key FOB Coverage There are several types of relay attacks. A normal relay attack just involves placing a device near the key and another near a car to make it seem as though they are in close proximity to each other. This attack is commonly done in two ways, the first of which is a Relay Over-Cable Attack. This is where the signal from the car to the key and vice versa is transferred via a coaxial cable. There is also a Relay over The- Air Attack, which is used for long distance. It catches the signal from the emitter and boosts it up to around 2.5 GHz and transmits it to another antenna that is near the key that grabs the signal and then down converts it to match the frequency required by the key. Now there are a number of preventive measures one can take to ensure the safety of their vehicle. One could be to shield the key in a metal casing to prevent the RFID chip within from transmitting. One could also remove the battery from the device when not in use. The most viable one in my mind would be a software modification that would allow you to activate and deactivate the key whenever you need it. Figure 3: Up and Down Conversion and Modulation of Signal C. Vehicle Malware 1) Vehicle Malware Nowadays most of the new cars are integrated with electrical devices that can communicate external devices through the electronic network composed of several Electronic Control Units (ECUs) that are connected to a bus where any information can be broadcast to any connected node. This has lead the vehicles in a security risk and attackers take advantage to access with low cost available tools access to vehicles for exploiting its security vulnerabilities and as successfully access to the automobile [4]. 2) Automotive Networks Among the multiple networks that an unauthorized user can access can be listed as follows: CAN (Controller Area Network): Is a serial bus designed for Ethernet networks based on CSMA/CD (Carrier Sense Multiple Access / Collision Detection). LIN (Local Interconnect Network): Based on Master Slave model, where a slave can only send a message if previously asked by the master. This network is common used for controlling elements such as electric windows lifts and windshield wipers. MOST (Media Oriented System Transport): is used to manage multimedia data via optical fiber. The MOST is in charge of streaming data such as audio or video signals. OBD (On-Board Diagnostic): Is a standard that monitor statistics of a vehicle such as, speed, low tire pressure, RPM among others. The OBD is connected to multiple sensors in different parts of vehicles to locate abnormal changes in the system.
4 With this potential networks vulnerabilities in an automobile, attackers has set eyes on these targets make unauthorized modification on the code to lower the miles on a car [4], unlock and deactivate alarms and targeted cars, counterfeit, stole personal information from users or just for the challenge of talking control of somebody else vehicle. With this malicious actions security in the vehicle network has become a serious concern nowadays. a) Remote Attacks ODB Port: This diagnostic port has the option of plug a device to remotely control it via Wi-Fi, such as the device ELM327 OBD2 Auto Scanner Adapter Scan Tool Wi-Fi enable [1] which make this port vulnerable to any attack made from a regular computer. This pass-thru device not also can transmit malicious packets onto the network but use this tool as a virus distributor to other automobiles that share the same device, for example a car dealer or an automotive repair center. USB Port: Since it is an input connected to the network of the car, the insertion of a file with unauthorized malicious software or the possibility of connect a compromised device (smartphone, USB drive) which would perform an attack against the ECU of the vehicle. Bluetooth: Wireless pairing of mobile devices with the vehicle and use features like sound system or the hands-free devices is very common nowadays. However exploiting a possible vulnerability can lead to access to personal information, eavesdrop into conversations and according to some document, the exploitation of the ECU [2]. Vehicle-to Vehicle communications: this feature will be one of the evolutions of the networking vehicles. The ability of communicate with near cars with the purpose of send alerts to the driver in case of some emergency braking, incoming stop light, accident ahead, e.g. This are very useful tool but at the same time can lend for eavesdropping, emission of corrupt data that could lead the driver to commit an inappropriate reaction. Wireless Unlocking: Most of the vehicles came with the remote unlocking system to unlock alarms, doors and even to power on the engine. This service is encrypted and can be hacked as demonstrated by [4] where the encryption KeeLoq was compromised vehicles from different manufacturers with an antenna placed close to the key holder to unlock and start a car that use Passive Keyless Entry and Start system [5]. D. Keyless Technology and Relay Attacks As discussed earlier, most cars today use keyless entry systems. This is either a numerical keypad that contains certain combinations of numbers, or a RKE, which is a remote keyless entry system, through Bluetooth, radio frequencies, or infrared. The keypad is easily hacked into since it contains algorithms and anyone with time on their hands can decipher the code. In this section, we are going to focus in RKE. Remote keyless entry contains two main parts: the CID (customer identification device) and receiver located on the inside of the vehicle. The CID is the key that the user holds. The most important aspect of this is that their communication between the parts is unidirectional through either Infrared (IR) or through Radio frequencies (RF); this means that the CID is the only device who sends information. Since the transmission carries important information about the car, this makes it very vulnerable. From the moment a person holding the CID touches the car, the communication between the devices start. Now, we are going to describe in more detail some of the common attacks for passive entry systems. 1) Message Playback Attack a) Attack This attack is the easiest and most common attack for RKE. It consists on having a thief going up the car and recording the transmission that the car sends as soon as you grab the door handle. After having that recorded, the thief would go near the person holding the CID and play the recording. The CID will then identify the transmission and respond to it creating the communication cycle. Finally, once the CID is responding to the recording, the thief records it. He/she is now in control of the communication of your car. This way, the thief goes up to the car, touches the handle and starts the transmission. Then, the thief plays the recording from the CID and gets access to the car. b) Available Solution A solution that is available for this attack is creating a random challenge response. This consists on the car creating a random challenge once it is triggered. Then the CID will respond to the certain challenge presented to it. Since the challenges change, the thief recording a certain challenge will not get it right whenever he/she tries to open the car. The challenges can be created from various messages that are either new or have been transmitted already and/or a combination of those as well. The idea here is to make it difficult for the thief to figure out what the challenge is and it can t be a decipherable algorithm. 2) Dictionary Attack a) Attack This attack consists on an electronics dictionary created by the thief. This goes hand-in-hand with the message playback attack. The thief develops a dictionary that contains the challenges and their responses that are valid for the vehicle. To do this, the thief plays a challenge next to the person containing the CID, and then records the response and starts developing the dictionary. Then the thief does the message playback attack. b) Available Solution For this attack, there is no solution defined yet, other than making even more complicated challenges. 3) Two-Thief Attack a) Attack
5 This attack consists of two thieves working together. They need to position themselves in the gap between the person with the CID and the vehicle, then bridge the communication. With receivers, the thieves send one another the communication of both sides. Then, they use a device that amplifies the signal. This is just like the message playback attack without actually recording the signals because they are being streamed live as if the person holding the CID was next to the vehicle. b) Available Solution For this attack, there are a couple of ways you can avoid being harmed. The best one is to detect the repeater. The vehicle itself can detect if a repeater is near the vehicle s range. This is done through measuring the loop time delay that it takes the signal to reach the CID. If the delay is larger than a certain value, the car will notice the repeaters. This is done through electronic devices that have high-speed. These are the different attacks that can be done to a vehicle through the remote keyless entry systems. Since it is common in cars to have this technology, this is a big window for attackers to hack the car. E. Governmental Restrictions With the advancement of technology in automobiles and the increased research in these areas according to the United States Department of Transportation [1], several organizations have been established in order to regulate, standardize and innovate in the automotive arena. Participating organizations in this research can be named as follows: AASHTO (American Association of State Highway and Transportation Officials) USDOT (United States Department of Transportation) ANSI (American National Standards Institute) APTA (American Public Transportation Association) ASTM (American Society for Testing and Materials) IEEE (Institute of Electrical and Electronics Engineers) ITE (Institute of Transportation Engineers) NEMA (National Electrical Manufacturers Association) SAE (Society of Automotive Engineers) IETF (Internet Engineering Task Force) W3C (World Wide Web Consortium) ISO (International Organization for Standardization) Of the organizations previously mentioned have been selected three documents that are of interest for this research. a) IEEE Standard for Wireless Access in Vehicular Environments (WAVE): Security Services for Applications and Management Messages. The purpose of this IEEE standard is to protect the messages or data from attacks such as alteration, spoofing, eavesdropping among others in wireless technology. The document describes the security services that should be aware in order to certify the Confidentiality, Authentication, Authorization and Integrity in the communication between devices in the automotive network, preventing unauthorized users have access to it. WAVE proposes a communication protocol stack for vehicular environment, using the architecture illustrated in Figure 1. Figure 4. Wave Protocol Stack The WAVE security block is in charge of accepts secure input requests from calling entities. The WAVE security block will respond to each request with a corresponding output confirmation containing the request as long as the private keys, public keys or certificates are valid. An implementation of WAVE security services block should include at least one of the following security processing services: Generate signed data Generate encrypted data Verify signed data Decrypt encrypted data The WAVE Management block allows the WAVE security block to determine the trustworthiness of the certificates and received data defined on IEEE standard [2] required to provide WAVE networking services. Among the services provided by the management block is maintain the information of the certificates that correspond to the private keys. In this block is located the Certificate Revocation List. For the WAVE security management block it will need some of the following operations: Generate certificate request Verify response to certificate request Verify certificate revocation list One of the certificates that may be use according to this standard is an explicit certificate to verify that is a trusted user illustrated in the figure 2. In Figure 3 is illustrated implicit certificate which must contain one of the following rules: At least one public key for a cryptosystem belonging to the certificate holder A list of the permissions associated with that public key An identifier for the issuer A cryptographic demonstration that the issuer authorized the linkage between the public key and the permissions
6 Figure 5. Explicit Certificate Applications for the Environment: Real-Time Information Synthesis (AERIS) Road Weather Applications for Connected Vehicles 3. Connected Vehicle Technology Policy and Institutional Issues Connected Vehicle Policy and Institutional Issues Progress of these projects are demonstrated with Vehicleto-Vehicle communication has been approved by the U.S. Department of Transportation's (DOT) National Highway Traffic Safety Administration (NHTSA) in Washington the last third of February of 2014 and announced that it will begin taking steps to enable vehicle-to-vehicle (V2V) communication technology for light vehicles. This technology would improve safety by allowing vehicles to communicate to each other and ultimately avoid many crashes altogether by exchanging basic safety data, such as speed and position, ten times per second. Figure 6. Implicit Certificate Taking into consideration these parameters previously explained, it will warrantee more security in the wireless automotive transportation. Being this not the only security standard for vehicles, the U.S. Department of Transportation (USDOT) sponsors a group dedicated to the innovation in vehicles technology. b) USDOT Research and Innovative Technology Administration This organization focuses on intelligent vehicles, intelligent infrastructure and the creation of intelligent transportation system through integration that has been divided in: connected vehicle technology, connected vehicle applications, connected technology policy and institutional issues of which can be named the following projects: 1. Connected Vehicle Technology Harmonization of International Standards and Architecture around the Vehicle Platform Human Factors Research Systems Engineering Connected Vehicle Certification Connected Vehicle Test Bed 2. Connected Vehicle Applications Vehicle to Vehicle Communications for Safety Vehicle to Infrastructure Communications for Safety Real-Time Data Capture and Management Dynamic Mobility Application III. CONCLUSION Conclusion In conclusion we have discussed the different systems within a car, also the types of know attacks and some ways you can defend yourself from such attacks. We have also gone into a potential in-car network that is possible with Bluetooth technology that links the car CAN bus system and the media system for a reliable all in one system. Although Bluetooth technology has made large strides over the years, there is still a of room to progressive until we have a system that is full proof and safe enough to make universal in all vehicles. In order to make significant progress and deter vehicle hacking we must analyze critical flaws in out vehicles and propose countermeasures to minimize the risks of many of the known attacks. You can never make any system full proof but the plan is to stay one step ahead of the attackers. REFERENCES [1] Nice, Karim, How Car Computers Work, April HTTP: [2] Lavacot, Ken, Computer PCM, August HTTP: [3] I. Studnia, V. Nicomette, Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks. Dependable Systems and Networks Workshop (DSN-W), rd Annual IEEE/IFIP Conference. Budapest, Hungary, 2013 [4] Z. Fellow, Defending Connected Vehicles against Malware: Challenges and a Solution Framework, Internet of Things Journal IEEE. Issue 99, Fort Lee NJ USA, 2014
7 [5] M. Lee, User-Level Network Protocol Stacks for Automotive Infotainment Systems". International Conference on Embedded and Ubiquitous Computing, Hong Kong, 2010 [6] J.A. Cottle, Exploiting the Synergetic Relationship between Automobiles and Wireless Communications. Automotive Electronics, rd Institution of Engineering and Technology Conference, U.K, 2007 [7] R. Nusser and R Pelz, Bluetooth-based Wireless Connectivity in an Automotive Environment, Vehicular Technology Conference, IEEE-VTS Fall VTC nd, Boston, USA, 2000 [8] S. Masud and S. Shanker, In-Vehicle Secure Wireless Personal Area Network (SWPAN), IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, Detroit, USA 2006 [9] T. Yang, Resisting Relay Attacks on Vehicular Passive Keyless Entry and Start Systems, Fuzzy Systems and Knowledge Discovery (FSKD), th International Conference, Sichuan, China 2012 [10] I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar, Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study, the 19th USENIX Security Symposium, 2010 [11] U.S. DEPARTMENT OF TRANSPORTATION, 1200 New Jersey Avenue, Washington, DC. [12] IEEE standard
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Presenter: Wenyuan Xu Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh Wenyuan
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
USER MANUAL V5.0 ST100
GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2
SECURITY OF PASSIVE ACCESS VEHICLE ANSAF IBRAHEM ALRABADY DISSERTATION. Submitted to the Graduate School. of Wayne State University, Detroit, Michigan
SECURITY OF PASSIVE ACCESS VEHICLE by ANSAF IBRAHEM ALRABADY DISSERTATION Submitted to the Graduate School of Wayne State University, Detroit, Michigan in partial fulfillment of the requirements for the
The relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
Vehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
A MASSIVE VEHICLE THEFT CONTROL SYSTEM USING EMBEDDED AND MOBILE TECHNOLOGIES
Journal homepage:http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE A MASSIVE VEHICLE THEFT CONTROL SYSTEM USING EMBEDDED AND MOBILE TECHNOLOGIES Pranesh.S 1, Mr. P.
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
The data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN
INTRODUCTION: REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN Remote keyless entry (RKE) has captivated automobile buyers, as evidenced by the popularity of RKE on new automobiles and as an aftermarket item.
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB
Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB ABSTRACT There is a potential for 50-400 million per year Bluetooth nodes within the car market if Bluetooth can be integrated into
1. What is the main difference between the X3 micro and other Bluetooth headsets? 3. How does the X3 micro use the Bluetooth technology?
X3 Micro FAQ X3 Micro General 1. What is the main difference between the X3 micro and other Bluetooth headsets? 2. What is included in the X3 micro package? 3. How does the X3 micro use the Bluetooth technology?
In-Vehicle Networking
In-Vehicle Networking SAE Network classification Class A networks Low Speed (
LOCAL INTERCONNECT NETWORK (LIN)
54B-1 GROUP 54B LOCAL INTERCONNECT NETWORK (LIN) CONTENTS GENERAL INFORMATION........ 54B-2............ 54B-3 STRUCTURE................... 54B-2 54B-2 LIN refers to "Local Interconnect Network," which
Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS
SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,
FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS
FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
DC-8706K Auto Dial Alarm System
DC-8706K Auto Dial Alarm System User Guide Basic Contents: 1x the host unit; 1x wireless door (window) magnet; 1x wireless infrared detector; 2x remote control; 1x siren; 1x phone core; 1x AC to DC power
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
Maximizing Range and Battery Life in Low-Cost Wireless Networks
Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications
Module 6 Engine Control Module (ECM)
Module 6 Engine Control Module (ECM) Author: Grant Swaim E-mail: [email protected] URL: www.tech2tech.net Phone: (336) 632-9882 Fax: (336) 632-9688 Postal Address: Tech-2-Tech Website PO Box 18443 Greensboro,
Introduction CHAPTER 1
CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by
Car Authentication and Accident Intimation System Using GPS and GSM
Car Authentication and Accident Intimation System Using GPS and GSM R.Monisha 1, Jessen Joseph Leo 2, B.T.Tharani Sri Sakthi 3 Master of Engineering (Embedded Systems), Department of ECE, Bannari Amman
WIFI OBD GPS Tracker T356 User Manual
WIFI OBD GPS Tracker T356 User Manual Version:1.000 http://www.ulbotech.com [email protected] Document Title T356 User Manual Version 1.000 Date 2015-04-02 Status Release General Notes Ulbotech offers this
Security for 802 Access Networks: A Problem Statement
Security for 802 Access Networks: A Problem Statement Norman Finn, Cisco Systems Session Number 1 Why bother with Link Layer security? Why not just use IPSEC? There are many protocols that are not securable
IN A CONVENTIONAL remote keyless-entry (RKE)
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 54, NO. 1, JANUARY 2005 41 Analysis of Attacks Against the Security of Keyless-Entry Systems for Vehicles and Suggestions for Improved Designs Ansaf Ibrahem
Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute
Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute 1 Executive Summary The Ponemon Institute recently conducted a cybersecurity
ENGINE CONTROLS AND FUEL SYSTEMS
ENGINE CONTROLS AND FUEL SYSTEMS SPRING 2005 FORD VEHICLE COMPUTER RELEARN PROCEDURES Performing repairs or service on any of the following may require you to initiate a computer relearn procedure in order
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
1. SAFETY PRECAUTIONS AND WARNINGS
Table of Contents 1. SAFETY PRECAUTIONS AND WARNINGS...1 2. INTRODUCTION...3 2.1 On Board Diagnostics (OBD)...3 2.2 Vehicles Covered...4 2.3 Diagnostic Trouble Codes (DTCs)...6 2.4 Location of the Data
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
Energy Harvesting Powered Wireless Sensor Node and Asset Tracking Solutions in Random Vibration Environments
White Paper Energy Harvesting Powered Wireless Sensor Node and Asset Tracking Solutions in Random Vibration Environments by Anurag Kasyap, Ph.D. April 2009 Copyright 2009 AdaptivEnergy LLC. All rights
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Car Connections. Johan Lukkien. System Architecture and Networking
Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:
PEMS Conference. Acquiring Data from In-Vehicle Networks. Rick Walter, P.E. HEM Data Corporation
PEMS Conference Acquiring Data from In-Vehicle Networks Rick Walter, P.E. HEM Data Corporation Acquiring Data from In-Vehicle Networks Topics Overview/Benefits Heavy Duty J1939 protocol Available J1939
Typical ECM/PCM Inputs
Typical ECM/PCM Inputs The computer system components fall into two categories: sensors (inputs) and controlled components (outputs). Each system has sensors. Not every system has all the ones listed,
IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited
(Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device
Intervid Fleet Management Fleet Telematics. Intervid, Inc. 5111 Pegasus Court, Suite C Frederick, MD 21704
Intervid Fleet Management Fleet Telematics Intervid Fleet Management Intervid Fleet Management brings to market a leading Global Fleet Telematics Technology. Intervid Fleet Management solutions have assisted
Industrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network
u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
Vehicle IOT Gateway Family Datasheet
Vehicle IOT Gateway Family Datasheet VG-Series Overview The Samsara Vehicle IoT Gateway is a powerful telematics platform that provides continuous, real-time location visibility, streamlining dispatch
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Sensor network infrastructure for intelligent building monitoring and management system
Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
A Review of Security System for Smart Home Applications
Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department
Sensors and actuators are ubiquitous. They are used
Understanding IEEE 1451 Networked Smart Transducer Interface Standard Eugene Y. Song and Kang Lee istockphoto.com What Is a Smart Transducer? Sensors and actuators are ubiquitous. They are used in a variety
BMW Multi Tool User Manual
X-Horse Electronics Co., Ltd. Table of Contents 1. Safety Precautions and Warnings... 3 2. General Information... 4 3. Hardware Overview... 5 3.1. Tool Description... 5 3.2. Specifications... 6 3.3. System
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant
International Journal of Computational Engineering Research Vol, 03 Issue, 4 Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant 1, Mr.S.Vimalraj, 2, Gausalya.R.B, 3, Samyuktha.V,
Introduction to Electronic Signals
Introduction to Electronic Signals Oscilloscope An oscilloscope displays voltage changes over time. Use an oscilloscope to view analog and digital signals when required during circuit diagnosis. Fig. 6-01
M2M and the PICtail Plus Daughter Board
M2M and the PICtail Plus Daughter Board By Adam Folts Hello, my name is Adam Folts. I am an Applications Engineer at Microchip. This webinar discusses the machine to machine board, M2M, its features, and
Computers Are Your Future. 2006 Prentice-Hall, Inc.
Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth
Study on Differential Protection of Transmission Line Using Wireless Communication
Study on Differential Protection of Transmission Line Using Wireless Communication George John.P 1, Agna Prince 2, Akhila.K.K 3, Guy Marcel 4, Harikrishnan.P 5 Professor, Dept. of EEE, MA Engineering College,
INSTRUMENT PANEL. 1995 Volvo 850 DESCRIPTION & OPERATION. 1995-96 ACCESSORIES & EQUIPMENT Volvo Instrument Panels
INSTRUMENT PANEL 1995 Volvo 850 1995-96 ACCESSORIES & EQUIPMENT Volvo Instrument Panels 850 WARNING: When working around steering column and before performing repairs, disconnect and shield battery ground
WIRELESS INSTRUMENTATION TECHNOLOGY
BS&B WIRELESS, L.L.C. BS&B WIRELESS, L.L.C. WIRELESS INSTRUMENTATION TECHNOLOGY Printed February 2004 BS&B WIRELESS, L.L.C. 7422-B East 46th Place, Tulsa, OK74145 Phone: 918-622-5950 Fax: 918-665-3904
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
Application of IEEE 802.15 to Distribute Cell Phone Calls through a Home Phone Network
Application of IEEE 802.15 to Distribute Cell Phone Calls through a Home Phone Network Student Members: Danny Szczotka Chris Switzer Project Advisor: Dr. Liuqing Yang Graduate Student Advisor: Bo Yu Department
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
Wireless ATA: A New Data Transport Protocol for Wireless Storage
Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr
Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera
Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Assignment due today Project part 1 due on next Tuesday Assignment 2 will be online today evening 2nd Discussion session
Automotive and Industrial Data Security
André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication
The SAE J1939 Communications Network
The SAE J939 Communications Network An overview of the J939 family of standards and how they are used An SAE White Paper Since its publication more than a decade ago, SAE J939 has become widely accepted
Case Study Competition 2013. Be an engineer of the future! Innovating cars using the latest instrumentation!
Case Study Competition 2013 Be an engineer of the future! Innovating cars using the latest instrumentation! The scenario You are engineers working on a project team that is tasked with the development
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
UTMB INFORMATION RESOURCES PRACTICE STANDARD
IR Security Glossary Introduction Purpose Applicability Sensitive Digital Data Management Privacy Implications This abbreviated list provides explanations for typically used Information Resources (IR)
Keywords: GPS, GSM, AVR Microcontroller, SMS.
Volume 5, Issue 4, 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A System for Car Accident
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Automotive Software Development Challenges Virtualisation and Embedded Security
Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive
GSM Home Alarm System User Manual. http://www.usmartbuy.com
GSM Home Alarm System User Manual http://www.usmartbuy.com 1 1. Factory default Normally, all sensors in the big box have been coded (learnt) to the control host Operation Password: 0000 Long-Distance
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
Wynn s Extended Care
Wynn s Extended Care Every car deserves to receive the very best care... especially yours. How Do You Keep Your Reliable Transportation Reliable? Count on Wynn s Because Wynn s has been caring for cars
Final Design Report 19 April 2011. Project Name: utouch
EEL 4924 Electrical Engineering Design (Senior Design) Final Design Report 19 April 2011 Project Name: utouch Team Members: Name: Issam Bouter Name: Constantine Metropulos Email: [email protected] Email:
INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM
INSTRUCTION MANUAL All-In-One GSM Home Alarm System SB-SP7200-GSM Revised: August 28, 2014 PRODUCT REFERENCE MOUNTING ACCESSORIES PIR / MOTION DETECTION UNIT MAIN UNIT POWER ADAPTER MOUNTING ACCESSORIES
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
Automotive Sensor Simulator. Automotive sensor simulator. Operating manual. AutoSim
Automotive sensor simulator Operating manual AutoSim Contents Introduction.. page 3 Technical specifications.... page 4 Typical application of AutoSim simulator..... page 4 Device appearance... page 5
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
MANUAL PC1000R [email protected]
MANUAL PC1000R [email protected] Features The APart PC1000R is a professional multisource CD/USB/SD card music player, equipped with balanced and unbalanced analog outputs, coaxial and optical digital
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
Implementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
The Bus (PCI and PCI-Express)
4 Jan, 2008 The Bus (PCI and PCI-Express) The CPU, memory, disks, and all the other devices in a computer have to be able to communicate and exchange data. The technology that connects them is called the
ACR880 GPRS Portable Smart Card Terminal
ACR880 GPRS Portable Smart Card Terminal Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Supported Card Types... 5 3.1.
FMT600BT Transmitter
Technaxx FMT600BT Transmitter User Manual Transfer of music and calls directly from your Bluetooth device to your car radio This device complies with the requirements of the standards referred to the Directive
