IRJET- Automotive Safety System using Controller Area Network(CAN) Protocol
thesis paper
1. 1
Security Feature for Automobiles Implemented
using CAN protocol.
K.BHANUPRAKASH, KR. ARUN KUMAR
Communication Engineering, VIT University
Vellore, Tamil Nadu, India
kbhanu.prakash2014@vit.ac.in
Abstract- Today’s Automobiles, invariably
comply with digital control systems as a
consequence of constant growth in
technology. Recent Vehicles contains large
number of Electronic Control Systems and
already there are large numbers of Electronic
Control Units present. The growth of
automotive electronics is the result parties of
the customers wish for better safety and
greater comfort and also for other
requirements like improved emission control
and reduced fuel consumption. Automotive
industry uses Controller Area Network (CAN)
as the in-vehicle network for the Engine
Management, the body electronics like door
and roof control, air conditioning and lighting
as well as for the entertainment control.
Nowadays almost all car manufacturers have
also started implementing CAN based vehicle
automation.CAN networks used in engine
management to connect several ECUs.
I. INTRODUCTION
In Recent Innovations Automobiles, contains
many digital control systems as technology is
growing faster. Recently released Vehicles
have many Electronic Control Systems and
Electronic Control Units embedded in it. The
growth in automotive electronics resulted that
many parties of the buyers and customers wish
to have a better safety along with good
comfort and also many other luxurious and
saving features like improved emission control
and also reduced fuel consumption. There are
many other messaging protocols used in
vehicles but some automotive industries uses
Controller Area Network (CAN) as an in-
vehicle network for the purpose of Engine
Management, for the body electronics like
door as well as roof control, air conditioning,
lighting and for the entertainment control.
Now-a-days almost many car manufacturing
companies have started implementing the
CAN based vehicle automation system.CAN
networks are used for the engine management
to interconnect several Electronic Control
Units.
II. WORKING PRINCIPLE
a. In proposed system whenever the vehicle is
started by a person, a message with the GPS
coordinate along with the location of the
vehicle will be sent as an SMS to the vehicle
owner’s number.
b. On receiving the message the vehicle owner
will send a reply to lock or antilock that is stop
the vehicle or allow the vehicle to run.
c. The system at first checks and verifies the
owner number and if exact it checks the SMS
sent and performs the corresponding action.
d. All this process is achieved through in
vehicular network, CAN.
e. When the car engine is started it sends the
information to the Master node in CAN which
in turn fetches the location coordinates
attached with it and generates the SMS.
f. On receiving locking or anti-locking code it
sends the respective command to the slave
node which takes the intended action.
2. 2
III. FLOWCHART OF WORKING
PRINCIPLE
IV.PROPOSED BLOCK DIAGRAM
V.SOFTWARE REQUIREMENTS
MPLAB IDE
It is called as Integrated Development
Environment, because it provides a single
integrated "environment" to develop code for
embedded microcontrollers. MPLAB X IDE is
software that runs on a PC to develop
applications for Microchip microcontrollers
and digital signal controllers. Unlike previous
versions of the MPLAB IDE which were
developed completely in-house, MPLAB X
IDE is based on the open source Net Beans
IDE from Oracle. MPLAB X Integrated
Development Environment has brought many
changes to PIC microcontroller development
tool chain. This path allowed us to add
frequently requested features quickly and
easily, also providing much more extensible
architecture to bring even more new features
in the future.
PROTEUS
Proteus is software for simulation of
microprocessor, schematic capture, and also
for PCB design which has developed by Lab
Center Electronics. It combines the ISIS
schematic capture and the ARES PCB layout
programs in order to provide powerful,
integrated tools for a professional PCB
Design. Here more advanced routing modes
are also included in Proteus PCB Design Level
2 and higher whilst simulation capabilities can
be enhanced by purchasing the Advanced
Simulation option and/or micro-controller
simulation capabilities. Using this Proteus
software a simulated connection can be given
between the components and tested before
fetching the code into the Controller.
IV. RESULTS
Figure3: Transmitter and Receiver Sections
3. 3
V. CONCLUSION
There are many more features to be seen in the
car to attract consumers who wish for modern
Technical Features to be present in the Car.
Due to this the manufacturer can implement
much more features like
Emergency information transfer.
Automatic lock system when there is theft.
Automatic off of Vehicle engine during
fire attacks.
Automatic Engine off when a driver
consumes alcohol Etc.
VI. REFERENCES
[1] A. Saad and U. Weinmann, “Automotive
software engineering and concepts,” GI.
Jahrestagung., vol. 34, pp. 318–319, 2003.
[2] E. Nickel, “IBM automotive software
foundry,” in Proc. Conf. Comput. Sci. Autom.
Ind., Frankfurt, Germany, 2003.
[3] M. Wolf, A. Weimerskirch, and T.
Wollinger, “State of the art: Embedding
security in vehicles,” EURASIP J. Embedded
Syst., vol. 2007, no. 5, p. 1,2007.
[4] R. Charette, This Car Runs on Code.
[Online]. Available: http://www.
spectrum.ieee.org/feb09/7649
[5] T. Nolte, H. Hansson, and L. L. Bello,
“Automotive communications-past, current
and future,” in Proc. IEEE Int. Conf.
Emerging Technol. Factory Autom., 2005,
vol. 1, pp. 992–999.
[6] K. H. Johansson, M. Torngren, and L.
Nielsen, “Vehicle applications of controller
area network,” in Handbook of Networked and
Embedded Control Systems. New York, NY,
USA: Springer-Verlag, 2005, pp. 741–765.
[7] T. Hoppe and J. Dittman, “Sniffing/replay
attacks on CAN buses: A simulated attack on
the electric window lift classified using an
adapted CERT taxonomy,” in Proc. Conf.
Embedded Syst. Security, 2007, pp. 1–6.
[8] T. Hoppe, S. Kiltz, and J. Dittmann,
“Security threats to automotive CAN
networks—Practical examples and selected
short-term countermeasures,” Rel. Eng. Syst.
Safety, vol. 96, no. 1, pp. 11–25, Jan. 2011.
[9] K. Koscher et al., “Experimental security
analysis of a modern automobile,”
in Proc. IEEE Security Privacy. Symp.,
Oakland, CA, USA, 2010,pp. 447–462.
[10] The EVITA project, 2008, Webpage.
[Online]. Available: http://evita-project.org
[11] H. Schweppe, Y. Roudier, B. Weyl, L.
Apvrille, and D. Scheuermann, “Car2X
communication: Securing the last meter—A
cost-effective approach for ensuring trust in
Car2X applications using in-vehicle
symmetric cryptography,” in Proc. Conf. Veh.
Technol., San Francisco, CA, USA, 2011, pp.
1–5.
[12] H. Schweppe et al., “Securing Car2X
applications with effective hardware Software
co-design for vehicular on-board networks,” in
Proc. Conf. Autom. Security, Berlin,
Germany, 2011.