poster presentation

1
Security Feature For Automobiles Implemented Using CAN Protocol K.Bhanuprakash | K.R. Arunkumar | SENSE COPE of the Project Results Methodology The main objective is to implement a added feature for a modern car that is implemented using a vehicle messaging protocol called CAN. There is scope for real time applications such as It is Very efficient way to avoid vehicle theft. We can Manually can stop the Vehicle Engine. Theft location can be Identified at Instant. The growth of automotive electronics is the result parties of the customers wish for best and modern features to be present in the car they wish to have. Automotive industry uses Controller Area Network (CAN)as the in-vehicle network for the Engine Management, Body electronics like door and roof control, air conditioning, lighting, Entertainment(DVD, TV, FM radio) control. Nowadays almost all car manufacturers have also started implementing CAN based vehicle automation.CAN networks used in engine management to connect several ECUs. otivation/ Introduction There are many more features to be seen in the car to attract consumers who wish for modern Technical Features to be present in the Car. Due to this the manufacturer can implement much more features like Emergency information transfer. Auto lock system when there is theft. Automatic off of Vehicle engine during fire attacks. Automatic Engine off when a driver consumes alcohol Etc. References [1] A. Saad and U. Weinmann, “Automotive software engineering and concepts,” GI. Jahrestagung., vol. 34, pp. 318–319, 2003. [2] E. Nickel, “IBM automotive software foundry,” in Proc. Conf. Comput. Sci. Autom. Ind., Frankfurt, Germany, 2003. [3] M.Wolf, A.Weimerskirch, and T.Wollinger, “State of the art: Embedding security in vehicles,” EURASIP J. Embedded Syst., vol. 2007, no. 5, p. 1,2007. [4] R. Charette, This Car Runs on Code. [Online]. Available: http://www. spectrum.ieee.org/feb09/7649 [5] T. Nolte, H. Hansson, and L. L. Bello, “Automotive communications-past, Conclusion/ Summary Contact Details [email protected] If vehicle is started, a message with the GPS coordinate of the location of the vehicle is sent as an SMS to the owner’s number. owner can send a reply to lock or unlock that is stop the vehicle or allow the vehicle to run. The system at first checks and verifies the owner number and if exact it checks the SMS sent and performs the corresponding action. All this process is achieved through vehicular network, CAN. When the engine is started it sends the information to the Master node in CAN which in turn fetches the location coordinates attached with it and generates the SMS. On receiving locking or unlocking code it sends the respective command to the slave node which takes the intended action.

Transcript of poster presentation

Page 1: poster presentation

Security Feature For Automobiles Implemented Using CAN ProtocolK.Bhanuprakash | K.R. Arunkumar | SENSE

SCOPE of the Project

Results

Methodology

The main objective is to implement a added feature for a modern car that is implemented using a vehicle messaging protocol called CAN. There is scope for real time applications such as

It is Very efficient way to avoid vehicle theft.

We can Manually can stop the Vehicle Engine.

Theft location can be Identified at Instant.

The growth of automotive electronics is the result parties of the customers wish for best and modern features to be present in the car they wish to have. Automotive industry uses Controller Area Network (CAN)as the in-vehicle network for the Engine Management, Body electronics like door and roof control, air conditioning, lighting, Entertainment(DVD, TV, FM radio) control. Nowadays almost all car manufacturers have also started implementing CAN based vehicle automation.CAN networks used in engine management to connect several ECUs.

Motivation/ Introduction

There are many more features to be seen in the car to attract consumers who wish for modern Technical Features to be present in the Car. Due to this the manufacturer can implement much more features like

Emergency information transfer.

Auto lock system when there is theft.

Automatic off of Vehicle engine during fire attacks.

Automatic Engine off when a driver consumes alcohol Etc.

References

[1] A. Saad and U. Weinmann, “Automotive software engineering andconcepts,” GI. Jahrestagung., vol. 34, pp. 318–319, 2003.

[2] E. Nickel, “IBM automotive software foundry,” in Proc. Conf. Comput.Sci. Autom. Ind., Frankfurt, Germany, 2003.

[3] M.Wolf, A.Weimerskirch, and T.Wollinger, “State of the art: Embeddingsecurity in vehicles,” EURASIP J. Embedded Syst., vol. 2007, no. 5, p. 1,2007.

[4] R. Charette, This Car Runs on Code. [Online]. Available: http://www.spectrum.ieee.org/feb09/7649

[5] T. Nolte, H. Hansson, and L. L. Bello, “Automotive communications-past,current and future,” in Proc. IEEE Int. Conf. Emerging Technol. FactoryAutom., 2005, vol. 1, pp. 992–999.

Conclusion/ Summary

Contact [email protected]

If vehicle is started, a message with the GPS coordinate of the location of the vehicle is sent as an SMS to the owner’s number.

owner can send a reply to lock or unlock that is stop the vehicle or allow the vehicle to run.

The system at first checks and verifies the owner number and if exact it checks the SMS sent and performs the corresponding action.

All this process is achieved through vehicular network, CAN.

When the engine is started it sends the information to the Master node in CAN which in turn fetches the location coordinates attached with it and generates the SMS.

On receiving locking or unlocking code it sends the respective command to the slave node which takes the intended action.