2016 International Conference on Computation of Power, Energy Information and Communication (ICCPEIC)
AES Algorithm for Smartphone to Vehicle
Communication
AbithaM.W
Shyni S.M
Department of Electrical and Electronics Engineering,
Department of Electrical and Electronics Engineering
Sathyabama University, Chennai
Sathyabama University, Chennai
abithamemala w@yahoo. co.in
shynima@gmail.com
Abstract- Vehicle theft has become a pervasive problem in
communication between embedded computers with wireless
metropolitan cities. The aim of our work is to reduce the vehicle
network [3]. The road grade influence of the battery discharge
and fuel theft with an alert given by commonly used smart
rate in a light electric vehicle and a State-of-Charge tracking
phones. The modern vehicles are interconnected with computer
policy needs to be modified are discussed [6].
systems so that the information can be obtained from vehicular
smart phone-in-the-loop vehicle architecture is used in case of
sources and Internet services. This provides space for tracking
the vehicle through smart phones. In our work, an Advanced
Encryption Standard (AES) algorithm is implemented which
integrates a smart phone with classical embedded systems to
avoid vehicle theft.
a two-wheeled vehicle. Also a security solution that protects
against attacks by addressing the challenges is proposed,
meeting both performance and real-time constraints.
Embedded architecture, Security, Smartphone, Vehicles.
I.
The
following are the capabilities of the target architecture i. e. ,
limited
Keywords- Advanced Encryption Standard (AES) algorithm,
In our work, a
input
and
output
capabilities,
lack
of
trusted
execution environment on the mobile device. In our work, the
external device is a mobile that runs the high-level control
routines and acts as a driver-to-vehicle interface, as drivers are
likely familiar with mobile apps. This deployment method
INTRODUCTION
facilitates both software updates and the integration with other
Theft break records gives statistics of a vehicle is stolen in
web-based services [5]. However, the early Bluetooth standard
every 13 minutes in our capital city Delhi. The thieves are
and its successors have introduced the secure simple pairing
being efficient to steal vehicles. The vehicles are in unsafe
(SSP)
zone as the vehicle thieves are cleverer in stealing. This causes
Smartphone which provides additional security guarantees
severe safety hazards to vehicles. So it is necessary to protect
regardless of the security mechanisms with AES algorithm. As
protocol
[8].
Our
proposed
solution
allows
our vehicles through modern technologies. Several researchers
a result, the entire application layer is transparently secured.
concentrated on this aspect and demonstrated attacks against
AES algorithm is fast in software and hardware, easy to
different vehicles. Our aim is to improve the accessibility and
implement; also it needs only little memory. The aim of our
protection of the vehicles through some algorithm, which does
work is to prevent the vehicle theft with an alert using a
not
Smartphone application via Bluetooth. The work is being
require
connection
with
Internet-based
communication can be created between the
source.
vehicle
A
and
Smartphone through Bluetooth. Any security issues will be
extended to avoid fuel theft during off condition of the
vehicle.
given as an alert to the owner through Smartphone service.
Wireless networks are integrated into the modern automobile.
Considering the risk factors in communication, a privacy and
security evaluation of wireless Tire Pressure Monitoring
Systems is introduced in car networks [ 1]. The structural
II.
SYSTEM ARCHITECTURE
In our proposed architecture, the vehicle is connected to
the smart phone via Bluetooth device to avoid vehicle theft. It
characteristics of the automotive ecosystem that reduces the
uses a vehicle Bluetooth receiver and a transmitter which is
theft problems and the practical challenges are discussed [2].
connected to mobile device. Fig. 1 shows the architecture of
The previous investigation shows that it was possible to take
the proposed system which uses blue tooth receiver, interface
control of only certain functionalities of the vehicle.
and mobile device for preventing the vehicle theft.
possible
to
interfere
with
safety-critical
and
It is
sensitive
The vehicle is to be fixed with the blue tooth adapter. Any
components. The Smartphone can be used as the source to
static acceleration and dynamic acceleration resulting from
unlock or lock the vehicle. But the security mechanisms for
vehicles are a challenging task, and also the related embedded
architectures
are
commonly
designed
considering
safety
requirements rather than security purpose. The computing
resources should be able to fit the control systems needs, to
limit the costs. Therefore the option available for adding a
security layer is restricted in subsequent phase.
Security
requirement
in
have
more
priority,
especially
the
movements in the vehicle hand bar will be the input signal for
the adapter. Advanced Encryption Standard (AES) algorithm
transfers the input signal to user interface via Bluetooth
through cipher text. With the help of user interface the signal
is passed to the mobile device. The mobile beeps an alarm
thereby instruction is directed to the vehicle driver to lock the
vehicle.
978-1-5090-0901-5/J6/$31.0020J6 IEEE
796
ABITHA et AL.,AES Algorithm for Smartphone to Vehicle Communication
A. AES Algorithm
AES
is
combination
based
of
III. FUEL THEFT PREVENTION SYSTEM
on
both
design
principle
substitution
and
which
is
permutation.
the
The work is extended to identify a petrol theft. A petrol
AES
theft detector is used to sense the petrol level in the tank. If
algorithm is a symmetric block cipher. It uses the same key for
any decrease in level of petrol during the off condition, it is
encryption and decryption. AES algorithm has advantages
indicated with an alarm in the vehicle. Fig. 2 shows the block
over Ad-hoc algorithms and Data Encryption Standard (DES)
diagram of petrol theft system.
algorithm. AES based software and hardware is fast, easy to
implement and also it requires only little memory.
Mobile Device
Vehicle Bluetooth Receiver
MECHANICAL
Petrol Tank
RELAY
Fig. 2.
Petrol theft prevention system
The petrol theft system uses a PROBE (petrol level
detection sensor) to prevent petrol theft. When the level of the
petrol reduces J-type probe sends a pulse to the triggering
Fig. 1. Architecture of the proposed system
circuit. This triggering circuit consists of a Bipolar Junction
AES has advantages over DES algorithms. AES is more
secure,
it is less
susceptible to cryptanalysis than DES
Transistor which makes the relay to actuate. The relay makes
and brakes according to the signal from the petrol sensor. This
algorithm. This algorithm is able to support larger key sizes
signal toggles ON and OFF the buzzer which is located in the
than DES's 1 12 or 168 bits. AES is demanded by the latest
vehicle itself. By this the theft of petrol can be prevented.
U.S. and international standards.
IV. SIMULATION ANALYSTS
The results of vehicle and fuel theft is analyzed with a
B. Security framework
The aim of our security layer is to prevent attacks through
the radio interface. In our paper we implement Cryptographic
session layer, which removes the dependency from proprietary
implementations and reducing the risk of exploitation. Even if
the
interface,
the
application data is encrypted with the session key.
attacker
obtains
access
via
the
radio
The
attacker has less chances of obtaining the cryptographic, long
term secret, than in a regular Bluetooth pairing. In particular, a
man-in-the-middle attack is difficult to conduct: the attacker
would need to be within the communication range.
During the legacy Bluetooth pairing process
During the first stage of our security protocol (i. e.,
simulation circuit and its output is indicated by glowing of a
lamp. The modes of operation are explained with on and off
condition of the lamps. Fig. 3. Shows the simulation model
during on condition. The sensor is able to sense the movement
in 3 directions namely X,Y and Z axis. For any movement
sensed, the lamp glows. Also if there is any fuel theft during
off condition of the vehicle, the sensor detects the decrement
in petrol level, giving an alarm which is indicated by glowing
another lamp. Fig. 4. Shows the simulation model during off
condition.
the exchange of the public keys).
Only
the
vehicle
owner
will
be
able
to
enable
the
authorization process for a mobile device within a predefmed
and short time span. Instead of compromising the ECU's
security layer, an attacker may perform a dedicated attack
against the mobile device.
address
this
type
of
The security framework
security
threat
by
providing
will
the
cryptographic mechanisms under the developer's authority
and is flexible with respect to future updates to the mobile
device or operating system. It has the advantage of changing
any cryptographic primitive or protocol in order to protect
from actual or future vulnerabilities [9-10]. The security of the
mobile application is based on the integrity of the operating
Fig. 3.
Simulation model during on condition
system and its services.
797
2016 International Conference on Computation of Power, Energy Information and Communication (ICCPEIC)
Fig. 6.
Blue tooth serial module
B. Motion Sensor
Fig. 7. shows the functional block diagram of motion
sensor. The ADXL345 is used for mobile device applications.
It is able to measure the static acceleration of gravity, which
includes tilt-sensing applications, and dynamic acceleration
including motion or shock. Its resolution is high (3. 9 mg/LSB)
which enables measurement of inclination changes less than
1.0. Features of the mobile device, ADXL345 are smaller size,
ultralow
power,
3-axis
accelerometer
with
high
resolution
measurement at up to 16 g. Output is formatted as 16-bit two's
complement and it is accessible through SPI.
Fig. 4.
Vs
Simuation model during off condition
VOOIIO
V. HARDWARE IMPLEMENTATION
Fig. 5. Shows the functional block diagram of the proposed
system. It uses motion sensor, blue tooth adapter, motor driver
and arduino to perform our objective.
J.AXIS
SENSOR
SENSE
ELECTRONICS
AOC
+5V
Inputs
GND
Fig. 7.
Functional Block Diagram of motion sensor
C. Arduino
Arduino includes both hardware and software, which is an
Fig. 5. Functional Block Diagram
open-source prototyping platform.
The input can be read by
Arduino boards and its output helps in activating a motor. The
instructions can be sent to the microcontroller for controlling
A. Blue Tooth Adapter
HC
serial
Bluetooth
products
have
Bluetooth
serial
interface module and Bluetooth adapter in it. The blue tooth
serial module converts serial port to Bluetooth.
We are
the entire board.
To perform this operation,
the Arduino
programming language (based on Wiring), can be used. Fig. 8.
shows the Arduino board.
particularly using HC-05 module in this device. Fig. 6. shows
the Bluetooth serial module used in our system
Fig. 8. Arduino board
D. Motor Driver
The L293D is assembled in a plastic package which has 16
leads. It has 4 centre pins connected together and is used for
heat sinking. Sample motor vehicle movement is shown with
the 2 motors connected to it. It is a motor driver which is
798
ABITHA et AL.,AES Algorithm for Smartphone to Vehicle Communication
connected to the battery. This device can be used for switching
alarm in the vehicle is ON and it conveys message to the
applications at frequencies up to 5 kHz. The entire hardware
owner of the vehicle through Bluetooth. Also, if any fuel theft
setup is shown in fig. 9.
is made during the OFF condition of the vehicle, the Petrol
level detector wil detect the decrement in the level of petrol. If
the level gets reduced, a beep wil be given as alarm in the
vehicle to alert the owner.
VII. CONCLUSION
The security issues related to modem, smart phone-based
automotive
discussed.
embedded
To
cope
architectures
with
such
are
issues,
analyzed
we
and
designed,
implemented and evaluated a security layer that protects from
vehicle and fuel theft over the Bluetooth wireless link between
the mobile device and the vehicle. AES algorithm is used to
interface Smartphone with vehicle to avoid theft.
References
Fig. 9. Hardware Setup
[I]
VI. RESULTS AND DISCUSSION
In
our
experimental
setting,
the
AES
algorithm
is
implemented for electric vehicles. This algorithm has two
working modes: pairing and payload exchange. Pairing is
[2]
active when the bluetooth in mobile device is paired with the
vehicle. The payload exchange mode is activated when the
AES key is exchanged, and hence encryption or decryption
takes place. To test its performance, we collected runtime data
and implemented on the test vehicle. Table I. shows the
working of motion sensor and petrol level detector.
TABLE I. WORKING OF MOTION SENSOR AND PETROL LEVEL
DETECTOR
Sensor
Activates
[3]
[4]
[5]
Output
[6]
Motion
sensor
Movement in
Alarm and message
X axis
through Bluetooth
Yaxis
Zaxis
Control
of
the
vehicle
Petrol level
Any decrement in
Detector
petrol level during off
Alarm ON
condition
of vehicle
The movements in 3-axis, namely, X,Y and Z axis are
[7]
[8]
[9]
[10]
T. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser,
W. Trappe, and I. Seskar, "Security and privacy vulnerabilities of in car
wireless networks: A tire pressure monitoring system case study," in
Proc. 19th USENiX Con! Security, Berkeley, CA, USA, 2010, pp.2121.
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham,
S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno,
"Comprehensive experimental analyses of automotive attack surfaces,"
in Proc. 20th USENiX Con! Security, Berkeley, CA, USA, 2011, pp.
6-6.
F. Stajano, "Security for Ubiquitous Computing. Hoboken," NJ, USA:
Wile, 2002
A. Dardanelli, M. Tanelli, B. Picasso, S. Savaresi, O. di Tanna, and M.
Santucci, "A smartphone-in-the-Ioop active state-of-charge manager for
electric vehicles," iEEE ASME Trans. Mechatron., vol. 17, no. 3, pp.
454-463, 2012.
C. Spelta, V. Manzoni,A. Corti,A. Goggi, and S. M. Savaresi,
"Smartphone- based vehicle-to-driver/environment interaction system
for motorcycles," iEEE Embed. Systems Lett, vol. 2, no. 2, pp. 39-42,
Jun. 2010.
A. Dardanelli,M. Tanelli, and S.M. Savaresi, "Active energy
management of electric vehicles with cartographic data," presented at
the 2012 IEEE Int. Electr. Veh. Conf., 2012.
Microchip Technology Inc. , 16-bit dsPIC Digital Signal Controllers.
NIST Special Publication 800-121 Revision 1, Guide to B1uetooth
Security: Recommendations of the National Institue of Standards and
Technology 2012.
C. Hager and S. Midkiff, "Demonstrating vulnerabilities in Bluetooth
security," in Proc. iEEE Global Telecomm., Con! (GLOBECOM'03),
2003, vol. 3, pp. 1420-1424.
K. Haataja and P. Toivanen, 'Two practical man-in-the-middle attacks
on bluetooth secure simple pairing and countermeasures," iEEE Trans.
Wireless Commun. vol. 9, no. I, pp. 384-392, Jan. 2010.
sensed using motion sensor. For any movement sensed, the
799