SlideShare a Scribd company logo
International Conference on Computer Applications 83
Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”.
International Conference on Computer Applications 2016: 83-88. Print.
International Conference on Computer Applications 2016 [ICCA 2016]
ISBN 978-81-929866-5-4 VOL 05
Website icca.co.in eMail icca@asdf.res.in
Received 14 – March– 2016 Accepted 02 - April – 2016
Article ID ICCA017 eAID ICCA.2016.017
Algorithm for Security in Autonomous Cars
J C Kavitha1
, Akash Venugopal2
, S Pushparani3
1,3
Associate Professor, CSE, 2
Meenakshi College of Engineering, Chennai
Abstract: An autonomous vehicle is capable of sensing its environment and navigating without human input. Imbibing intelligence to these devices is
through a system called embedded systems. Embedded Systems are combinations of hardware and software that are mounted on compact electronic circuit
boards integrated into devices. Autonomous vehicles sense their surroundings with such techniques as radar, GPS, and computer vision. These systems are
more intelligent and autonomous.
The challenge faced by this system is that; there are many possible ways for hacking the GPS. This system also contains alternate way for moving the car
even if still the GPS is blocked. But the alternative ways are still focused on connection with the satellite. Now there needs to be a total security for
preventing hackers from hacking the satellite. This is going to be done by encrypting the signal sent from car to the satellite. There are many ways of
encrypting, among which we are going to use the concept of Secret key Encryption method. We use One-Time-Pad concept where the data is converted to
cipher text and then it is going to be decrypted by the satellite. By this way, we could create a high level security where only that particular car and the
satellite will have a common code and each time the car moves to a location, there is going to be a random key generated.
The current topic which we had chosen is one of a major problem in autonomous cars, which needs to be focused on. Our objective is to bring a complete
security for the car and its owner.
General-Terms: Autonomous cars, embedded systems, Security, Total security, resolutions for problems faced by autonomous cars.
1. INTRODUCTION
Embedded system is a combination of hardware and software that forms the component of a larger system; this in turn is programmed
to perform a range of dedicated functions usually with a minimal operator intervention. In embedded systems the hardware is normally
unique to a given application; computer chips are embedded into the control electronics to manage the products functionality.
Autonomous Cars: These cars have the ability to control it. The car, which is embedded, can simulate the human driver completely
and direct the vehicle on the road. Autonomous vehicle is the drastic change in technical brilliance and developments in different fields
with EMBEDDED SYSTEM as pioneer. A fully computerized car capable of doing almost everything a car lover would want to.
Almost all automobiles will interact with computer on dashboards. From ordering food materials to booking tickets at the nearest
theatre, things would be as easy as giving orders to your servant. As a matter of fact, vehicles all over the world is now fitted with
intelligent devices that makes the vehicles to respond to various factors like - climate control, sudden accelerations or braking or even
self-repair of modules.
The finger print technologies have been introduced to enter and start your car with the touch of a finger. The fingerprint, which is
acting as a key, would trigger a check of the mirrors, steering wheel, radio and temperature to ensure that they're the way you like
This paper is prepared exclusively for International Conference on Computer Applications 2016 [ICCA 2016] which is published by ASDF International,
Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr Gunasekaran Gunasamy and Editors Dr. Daniel James, Dr. Kokula Krishna
Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted
without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first
page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the owner/author(s). Copyright Holder can be reached at
copy@asdf.international for distribution.
2016 © Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]
International Conference on Computer Applications 84
Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”.
International Conference on Computer Applications 2016: 83-88. Print.
them. The convenience of fingerprint recognition technology comes with heightened security. Unlike personal identification numbers,
passwords and keys, each person's unique fingerprints can't be duplicated, lost or forgotten.
2. Illustration
As mentioned above, this car system runs on it won through the embedded system concept. For this purpose Global Positioning
System (G.P.S) using satellites can provide positioning information. For still higher accuracy wide area differential GPS is used, which
offers a robust system that readily deals with selective availability errors and satellite clock errors.
The models for GPS also include aiding sensors, e.g. dead reckoning, radar and camera. A computer is simply required to feed
destination into a dashboard computer. Highly sensitive actuators simulate a human driver completely and direct the vehicle on the
road. The vehicle transmitter broadcasts its position and velocity to other immediate participants for collision-avoidance and lane
changing man oeuvres. Forward and reverse motions and U-turns are precisely achieved as per route guidance requirements.
Furthermore, an accurate steering control is obtained using Pulse Code Modulation technique and acceleration/braking control is
successfully implemented using learning adaptive system The reliability, efficiency and cost effectiveness of an autonomous vehicle
depend mainly on how judiciously its navigation sensors, perception unit and computer control is incorporated. The driver’s activity
is influenced by several factors that depend on driver itself and is environment such as traffic density, traffic status, time of travel and
weather. Thus the driving activity deals with a combined driver vehicle-environment system shown in figure. The vehicle is required
to blend its environmental perception capabilities with its intelligent controls in order to affect optimal path-planning strategies that
not only avoid obstacles but also minimize criteria such as time of travel, fuel consumption, exposure to pollution/danger, etc.
however basic driving functions consists of lane-keeping, safe distance maintenance, timely lane changing and overtaking. The key to
all these driving tasks is collision avoidance.
The Master Control Station (MCS) receives the positioning information from the satellite by employing WADGPS concept. The MCS
is linked to GPS instrumented position location systems (PLS) installed on the autonomous vehicles through a data link sub system
(DLS). The DLS can either use VHF or UHF or L-band, incorporating time division multiple access protocol to handle on the roads. A
International Conference on Computer Applications 85
Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”.
International Conference on Computer Applications 2016: 83-88. Print.
block forward error correction code is employed to protect and maintain the message integrity. The desired destination and starting
position of the vehicle together with the time of travel, manifest an optimal route on the road network. Once the vehicle commences
the journey the sensors continuously keep track of the direction and displacement of the vehicle initial calibration is a little crucial for
dead reckoning performance; however a feedback calibration indicated in fig suggested obtaining distance accuracy better than 99.9
percent.
GPS navigation guides you through the traffic. The GPS interface in the car pinpoints your exact location on a map. In case the GPS
signal can’t be received due to high density of tall buildings or other magnetic interface, the ‘dead reckoning ‘ technique, which works
for short durations guides you effectively. The system is also loaded with GSM/CDMA protocol standards further modified on the
CANBUS standard to give uninterrupted information.
3. Challenge Faced
Now-a-days computers are more and more prone to hacking and vulnerabilities. In our concept of embedded system in car
automation, we utilize the GPS technology for effective guidance of the vehicles. Hackers today are able to crack the security features
present in the satellites. Few software’s in net helps these hackers. If such software’s goes to the hands of evil doers and anti-social
elements, car automation could become a nightmare.
Let us consider that a VIP is using the autonomous car to visit a place. A person who could perform a MITM (man in the middle)
attack can drive away or change the destination of the car. This is the major weak spot or vulnerability that a hacker could use to
kidnap the individual.
The only solution to prevent a MITM or any hack attack would be implementing strong security feature such as encryption.
International Conference on Computer Applications 86
Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”.
International Conference on Computer Applications 2016: 83-88. Print.
What is Encryption?
Encryption is a technique for transforming information on a computer in such a way that it becomes unreadable. So, even if someone is
able to gain access to a computer with personal data on it, they likely won’t be able to do anything with the data unless they have
complicated, expensive software or the original data key.
The basic function of encryption is essentially to translate normal text into cipher text. Encryption can help ensure that data doesn’t
get read by the wrong people, but can also ensure that data isn’t altered in transit, and verify the identity of the sender.
There are three different basic encryption methods, each with their own advantages. We are choosing Secret key encryption method.
The encryption key is same as the decryption key.
Implementation of One-Time-Pad Method: The One time pad method has a common key between the sender and receiver.
The message which is sent from the sender is going to be converted as cypher text by using the common key and this encrypted code is
sent to the receiver. The receiver further with the same code, decrypts the data.
The secret key which is going to be given for each car are unique. We are going to implement this like a normal bank system (where
we get an ATM pin which only we know and we access). The key given is going to be 15 digits key. The key is going to be alphabets.
The first four places are going to be the starting four alphabets found in number plate. The remaining 11 places in the key are going to
be assigned by the central database. Each time an autonomous car is registered, the unique 15 digit key is going to be given to the
owner. Example: (TNAH***********).
Each time the car moves to different locations, the data is sent to satellite in a randomize manner. The randomly produced code is
going to be cypher texted using the 15 digit unique key. This text is going to be sent to the satellite along with the signals from the
GPS. The satellite will further decrypt this cypher text and send back the information of location and timing to the GPS. The hacker
International Conference on Computer Applications 87
Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”.
International Conference on Computer Applications 2016: 83-88. Print.
will have a probability of choosing one out of a quadrillion or one thousand billion. This will give a high security to the autonomous
car. Also the satellite coding is done in such a way that, if the hacker accidently finds the correct key, and tries to access our car, the
secret key will be blocked. The blocking is done if two signals from same key number are received. Now the person’s car will stop,
and he will be alerted by the incoming problem and he can inform the police or alert his security guards. He then has to reset his pin by
going to the control database.
Added Feature (using TOR Project)
Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer
who is going where over a public network. Knowing the source and destination of your Internet traffic allows others to track your
behavior and interests. It can even threaten your job and physical safety by revealing who and where you are.
Staying Anonymous
Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support
software if you don't want others to see your identifying information. This is where encryption kicks in.
Working of TOR Project
Result
As we encrypt our data it is not easy for hackers to penetrate into the data exchange between the car and the satellite. The probability
of a computer and the human, to guess the randomize code is going to be one quadrillion which is seriously unimaginable. Also, if the
evil doer tries to crack the encryption, it would take at least a couple weeks for him. Even though if it’s a long journey, the passenger
will each time go to a different zone of the satellite control which would make the hacker get delayed each time, and by the time he
finds the next address of the location, the passenger would have reached his destination.
International Conference on Computer Applications 88
Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”.
International Conference on Computer Applications 2016: 83-88. Print.
4. Conclusion
Autonomous car had been implemented in reality and being tested in various countries. In this fast advancing world, security acts as
most important feature.
We would like to present that there must be further developments in this technology to make autonomous car more common all over
the world with a high security level system. This can be happened by making the autonomous easy to operate for the user and the
designers should concentrate more in producing autonomous cars, which should not cost a lot.. With this type of vehicles there will be
great advantages in the coming future. Speed control technique and tracking system based cars would reduce amount of accidents. In
the near future, autonomous car become more common all over the world. Indian efforts in the embedded technology can assure that
these autonomous cars will become cheaper and may evolve with many more advantages. By this way we could find ourselves using
these autonomous cars in the near feature in a totally secured way.
Thus the complexity to track a person will multiply exponentially depending upon the number of people using this service.
5. References
1. James M. Anderson, et al. (2014), Autonomous Vehicle Technology A Guide for Policymakers, RAND Corporation
(www.rand.org); at www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR443- 1/RAND_RR443-1.pdf.
2. Allison Arieff (2013), “Driving Sideways,” New York Times, 23 July 2013; at
http://opinionator.blogs.nytimes.com/2013/07/23/driving-sideways.
3. Brad Berman (2011), History of Hybrid Vehicles, Hybrid Cars (www.hybridcars.com); at
4. Thomas Fray (2013), Driverless Cars: A Driving Force Coming to a Future Near You, Futurist Speak
(www.futuristspeaker.com);
5. Andrew Keen (2013), “The Future of Travel: How Driverless Cars Could Change Everything,” CNN Business Traveler, 15
May;
6. NHTSA (2013), Preliminary Statement of Policy Concerning Automated Vehicles, National Highway Traffic Safety
Administration (www.nhtsa.gov).
7. Ben Schonberger and Steve Gutmann (2013), A Self-Driving Future: At The Intersection Of Driverless Cars And Car
Sharing, Sightline Institute (www.sightline.org).
8. Michael Sivak and Brandon Schoettle (2015b), Potential Impact of Self-Driving Vehicles on Household Vehicle Demand and
Usage, Sustainable Worldwide Transportation Program.
9. Jim Motavalli (2012), “Self-Driving Cars Will Take Over By 2040,” Forbes Magazine, 25 Sept. 2012;
10. Scott Le Vine, Alireza Zolfaghari and John Polak (2015), “Autonomous Cars: The Tension between Occupant-Experience
and Intersection Capacity,” Transportation Research Part C: Emerging Technologies;

More Related Content

PPTX
ACCIDENT PREVENTION AND DETECTION SYSTEM
PDF
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
PDF
1. 10077 12326-1-pb
DOCX
Accident detection
PDF
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
DOCX
Accident detection and notification system
PPTX
Smart IoT Device for Vehicle Theft
PDF
Ijetcas14 395
ACCIDENT PREVENTION AND DETECTION SYSTEM
AUTOMATIC ACCIDENT DETECTION AND ALERT SYSTEM
1. 10077 12326-1-pb
Accident detection
IRJET- Smart Vehicle with Crash Detection and Emergency Vehicle Dispatch with...
Accident detection and notification system
Smart IoT Device for Vehicle Theft
Ijetcas14 395

What's hot (20)

PDF
Vehicle anti theft system based on an embedded platform
PDF
Light Dimmer with Implementation of Data Abstraction While Crashing
PDF
IRJET- Car Accident Detection and Notification: An Analytical Survey
PPTX
Auto pilot Mode ppt
PDF
IRJET- Automative Impregnable Driving System
PDF
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
PDF
IRJET- Vehicular Data Acquisition & Driver Behaviours Surveillance System
PDF
IRJET - Accident Prevention Control System and Detection of Lost Key
PDF
Final report
PDF
Car Safety System Enhancements using Internet of Things (IoT)
PDF
Inginious Trafalgar Contrivition System
PDF
IRJET- Vehicle Cyber Security
DOC
Fingerprint based physical access control vehicle immobilizer
PDF
SMART MOTORCYCLE HELMET: REAL-TIME CRASH DETECTION WITH EMERGENCY NOTIFICATIO...
PDF
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
PDF
IRJET- To Develop a Distance Algorithm using Sensor Networks for Adaptive Cru...
DOCX
Development of anti theft security system
DOCX
Vehicle Security System
PDF
IRJET- Driver State Monitoring System and Vehicle Control
PDF
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
Vehicle anti theft system based on an embedded platform
Light Dimmer with Implementation of Data Abstraction While Crashing
IRJET- Car Accident Detection and Notification: An Analytical Survey
Auto pilot Mode ppt
IRJET- Automative Impregnable Driving System
Ieeepro techno solutions ieee 2013 embedded project gravity lock next gen...
IRJET- Vehicular Data Acquisition & Driver Behaviours Surveillance System
IRJET - Accident Prevention Control System and Detection of Lost Key
Final report
Car Safety System Enhancements using Internet of Things (IoT)
Inginious Trafalgar Contrivition System
IRJET- Vehicle Cyber Security
Fingerprint based physical access control vehicle immobilizer
SMART MOTORCYCLE HELMET: REAL-TIME CRASH DETECTION WITH EMERGENCY NOTIFICATIO...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
IRJET- To Develop a Distance Algorithm using Sensor Networks for Adaptive Cru...
Development of anti theft security system
Vehicle Security System
IRJET- Driver State Monitoring System and Vehicle Control
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
Ad

Viewers also liked (13)

PDF
Inquiry Planning
PDF
Process_Solutions_iRIS_Brochure
PPTX
ApresentaçãO1
PPTX
Jo boyden panel presentation young lives conference 07 09 16
PDF
InfoNet Day 2015: Sharepoint und Office 365 - ein starkes Gespann
DOC
семинар
DOCX
Garcinia torch review
PPTX
Fulbright Economics Teaching Program Seminar: Phân Tích cải cách luật tài chí...
PPTX
Conference social mobility cueto - mexico-2016-final 2
PDF
VIETNAM ANALYSIS
PPTX
English study practice in Vietnam
RTF
Kadıköy 2.el eşya satmak istiyorum
PDF
internsship @ itrans
Inquiry Planning
Process_Solutions_iRIS_Brochure
ApresentaçãO1
Jo boyden panel presentation young lives conference 07 09 16
InfoNet Day 2015: Sharepoint und Office 365 - ein starkes Gespann
семинар
Garcinia torch review
Fulbright Economics Teaching Program Seminar: Phân Tích cải cách luật tài chí...
Conference social mobility cueto - mexico-2016-final 2
VIETNAM ANALYSIS
English study practice in Vietnam
Kadıköy 2.el eşya satmak istiyorum
internsship @ itrans
Ad

Similar to Algorithm for Security in Autonomous Cars (20)

DOC
10 embedded systems1
PDF
iaetsd Vehicle monitoring and security system
PDF
Connected cars by Smart Driving Labs
PDF
Autonomous Vehicle Hardware word (1).pdf
PDF
An Overview of Traffic Accident Detection System using IoT
PDF
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
PDF
Smart Driving Labs connected cars
PDF
IRJET- GPS Based Vehicle Tracking and Monitoring System - A Solution for Tran...
PPTX
auto theft Project1
PPT
External ppt
PPTX
SWAROOP_technical ghdfbbfhhhfhkknnhhh.pptx
PDF
Mobile safety systems for automobiles
PDF
Mobile safety systems for automobiles
PDF
GPS GSM Based Vehicle Tracking & Locking System
PDF
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
PDF
Automatic Park and retrieve assissted systems for automobiles using smartphone
PDF
Automatic Park and retrieve assissted systems for automobiles using smartphone
PDF
Advanced Driver Assistance System using Vehicle to Vehicle Communication
PDF
Advanced Driver Assistance System using Vehicle to Vehicle Communication
PDF
ACCIDENT DETECTION USING BiLSTM
10 embedded systems1
iaetsd Vehicle monitoring and security system
Connected cars by Smart Driving Labs
Autonomous Vehicle Hardware word (1).pdf
An Overview of Traffic Accident Detection System using IoT
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Smart Driving Labs connected cars
IRJET- GPS Based Vehicle Tracking and Monitoring System - A Solution for Tran...
auto theft Project1
External ppt
SWAROOP_technical ghdfbbfhhhfhkknnhhh.pptx
Mobile safety systems for automobiles
Mobile safety systems for automobiles
GPS GSM Based Vehicle Tracking & Locking System
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Automatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphone
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
ACCIDENT DETECTION USING BiLSTM

More from Association of Scientists, Developers and Faculties (20)

PDF
Core conferences bta 19 paper 12
PDF
Core conferences bta 19 paper 10
PDF
PDF
PDF
PDF
PDF
PDF
PDF
PDF
International Conference on Cloud of Things and Wearable Technologies 2018
PDF
A Typical Sleep Scheduling Algorithm in Cluster Head Selection for Energy Eff...
PDF
Application of Agricultural Waste in Preparation of Sustainable Construction ...
PDF
Survey and Research Challenges in Big Data
PDF
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...
Core conferences bta 19 paper 12
Core conferences bta 19 paper 10
International Conference on Cloud of Things and Wearable Technologies 2018
A Typical Sleep Scheduling Algorithm in Cluster Head Selection for Energy Eff...
Application of Agricultural Waste in Preparation of Sustainable Construction ...
Survey and Research Challenges in Big Data
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...

Recently uploaded (20)

PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Lesson notes of climatology university.
PPTX
Presentation on HIE in infants and its manifestations
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Institutional Correction lecture only . . .
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Lesson notes of climatology university.
Presentation on HIE in infants and its manifestations
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
RMMM.pdf make it easy to upload and study
Chinmaya Tiranga quiz Grand Finale.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Institutional Correction lecture only . . .
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Complications of Minimal Access Surgery at WLH
Microbial diseases, their pathogenesis and prophylaxis
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
human mycosis Human fungal infections are called human mycosis..pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
3rd Neelam Sanjeevareddy Memorial Lecture.pdf

Algorithm for Security in Autonomous Cars

  • 1. International Conference on Computer Applications 83 Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”. International Conference on Computer Applications 2016: 83-88. Print. International Conference on Computer Applications 2016 [ICCA 2016] ISBN 978-81-929866-5-4 VOL 05 Website icca.co.in eMail icca@asdf.res.in Received 14 – March– 2016 Accepted 02 - April – 2016 Article ID ICCA017 eAID ICCA.2016.017 Algorithm for Security in Autonomous Cars J C Kavitha1 , Akash Venugopal2 , S Pushparani3 1,3 Associate Professor, CSE, 2 Meenakshi College of Engineering, Chennai Abstract: An autonomous vehicle is capable of sensing its environment and navigating without human input. Imbibing intelligence to these devices is through a system called embedded systems. Embedded Systems are combinations of hardware and software that are mounted on compact electronic circuit boards integrated into devices. Autonomous vehicles sense their surroundings with such techniques as radar, GPS, and computer vision. These systems are more intelligent and autonomous. The challenge faced by this system is that; there are many possible ways for hacking the GPS. This system also contains alternate way for moving the car even if still the GPS is blocked. But the alternative ways are still focused on connection with the satellite. Now there needs to be a total security for preventing hackers from hacking the satellite. This is going to be done by encrypting the signal sent from car to the satellite. There are many ways of encrypting, among which we are going to use the concept of Secret key Encryption method. We use One-Time-Pad concept where the data is converted to cipher text and then it is going to be decrypted by the satellite. By this way, we could create a high level security where only that particular car and the satellite will have a common code and each time the car moves to a location, there is going to be a random key generated. The current topic which we had chosen is one of a major problem in autonomous cars, which needs to be focused on. Our objective is to bring a complete security for the car and its owner. General-Terms: Autonomous cars, embedded systems, Security, Total security, resolutions for problems faced by autonomous cars. 1. INTRODUCTION Embedded system is a combination of hardware and software that forms the component of a larger system; this in turn is programmed to perform a range of dedicated functions usually with a minimal operator intervention. In embedded systems the hardware is normally unique to a given application; computer chips are embedded into the control electronics to manage the products functionality. Autonomous Cars: These cars have the ability to control it. The car, which is embedded, can simulate the human driver completely and direct the vehicle on the road. Autonomous vehicle is the drastic change in technical brilliance and developments in different fields with EMBEDDED SYSTEM as pioneer. A fully computerized car capable of doing almost everything a car lover would want to. Almost all automobiles will interact with computer on dashboards. From ordering food materials to booking tickets at the nearest theatre, things would be as easy as giving orders to your servant. As a matter of fact, vehicles all over the world is now fitted with intelligent devices that makes the vehicles to respond to various factors like - climate control, sudden accelerations or braking or even self-repair of modules. The finger print technologies have been introduced to enter and start your car with the touch of a finger. The fingerprint, which is acting as a key, would trigger a check of the mirrors, steering wheel, radio and temperature to ensure that they're the way you like This paper is prepared exclusively for International Conference on Computer Applications 2016 [ICCA 2016] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr Gunasekaran Gunasamy and Editors Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution. 2016 © Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]
  • 2. International Conference on Computer Applications 84 Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”. International Conference on Computer Applications 2016: 83-88. Print. them. The convenience of fingerprint recognition technology comes with heightened security. Unlike personal identification numbers, passwords and keys, each person's unique fingerprints can't be duplicated, lost or forgotten. 2. Illustration As mentioned above, this car system runs on it won through the embedded system concept. For this purpose Global Positioning System (G.P.S) using satellites can provide positioning information. For still higher accuracy wide area differential GPS is used, which offers a robust system that readily deals with selective availability errors and satellite clock errors. The models for GPS also include aiding sensors, e.g. dead reckoning, radar and camera. A computer is simply required to feed destination into a dashboard computer. Highly sensitive actuators simulate a human driver completely and direct the vehicle on the road. The vehicle transmitter broadcasts its position and velocity to other immediate participants for collision-avoidance and lane changing man oeuvres. Forward and reverse motions and U-turns are precisely achieved as per route guidance requirements. Furthermore, an accurate steering control is obtained using Pulse Code Modulation technique and acceleration/braking control is successfully implemented using learning adaptive system The reliability, efficiency and cost effectiveness of an autonomous vehicle depend mainly on how judiciously its navigation sensors, perception unit and computer control is incorporated. The driver’s activity is influenced by several factors that depend on driver itself and is environment such as traffic density, traffic status, time of travel and weather. Thus the driving activity deals with a combined driver vehicle-environment system shown in figure. The vehicle is required to blend its environmental perception capabilities with its intelligent controls in order to affect optimal path-planning strategies that not only avoid obstacles but also minimize criteria such as time of travel, fuel consumption, exposure to pollution/danger, etc. however basic driving functions consists of lane-keeping, safe distance maintenance, timely lane changing and overtaking. The key to all these driving tasks is collision avoidance. The Master Control Station (MCS) receives the positioning information from the satellite by employing WADGPS concept. The MCS is linked to GPS instrumented position location systems (PLS) installed on the autonomous vehicles through a data link sub system (DLS). The DLS can either use VHF or UHF or L-band, incorporating time division multiple access protocol to handle on the roads. A
  • 3. International Conference on Computer Applications 85 Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”. International Conference on Computer Applications 2016: 83-88. Print. block forward error correction code is employed to protect and maintain the message integrity. The desired destination and starting position of the vehicle together with the time of travel, manifest an optimal route on the road network. Once the vehicle commences the journey the sensors continuously keep track of the direction and displacement of the vehicle initial calibration is a little crucial for dead reckoning performance; however a feedback calibration indicated in fig suggested obtaining distance accuracy better than 99.9 percent. GPS navigation guides you through the traffic. The GPS interface in the car pinpoints your exact location on a map. In case the GPS signal can’t be received due to high density of tall buildings or other magnetic interface, the ‘dead reckoning ‘ technique, which works for short durations guides you effectively. The system is also loaded with GSM/CDMA protocol standards further modified on the CANBUS standard to give uninterrupted information. 3. Challenge Faced Now-a-days computers are more and more prone to hacking and vulnerabilities. In our concept of embedded system in car automation, we utilize the GPS technology for effective guidance of the vehicles. Hackers today are able to crack the security features present in the satellites. Few software’s in net helps these hackers. If such software’s goes to the hands of evil doers and anti-social elements, car automation could become a nightmare. Let us consider that a VIP is using the autonomous car to visit a place. A person who could perform a MITM (man in the middle) attack can drive away or change the destination of the car. This is the major weak spot or vulnerability that a hacker could use to kidnap the individual. The only solution to prevent a MITM or any hack attack would be implementing strong security feature such as encryption.
  • 4. International Conference on Computer Applications 86 Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”. International Conference on Computer Applications 2016: 83-88. Print. What is Encryption? Encryption is a technique for transforming information on a computer in such a way that it becomes unreadable. So, even if someone is able to gain access to a computer with personal data on it, they likely won’t be able to do anything with the data unless they have complicated, expensive software or the original data key. The basic function of encryption is essentially to translate normal text into cipher text. Encryption can help ensure that data doesn’t get read by the wrong people, but can also ensure that data isn’t altered in transit, and verify the identity of the sender. There are three different basic encryption methods, each with their own advantages. We are choosing Secret key encryption method. The encryption key is same as the decryption key. Implementation of One-Time-Pad Method: The One time pad method has a common key between the sender and receiver. The message which is sent from the sender is going to be converted as cypher text by using the common key and this encrypted code is sent to the receiver. The receiver further with the same code, decrypts the data. The secret key which is going to be given for each car are unique. We are going to implement this like a normal bank system (where we get an ATM pin which only we know and we access). The key given is going to be 15 digits key. The key is going to be alphabets. The first four places are going to be the starting four alphabets found in number plate. The remaining 11 places in the key are going to be assigned by the central database. Each time an autonomous car is registered, the unique 15 digit key is going to be given to the owner. Example: (TNAH***********). Each time the car moves to different locations, the data is sent to satellite in a randomize manner. The randomly produced code is going to be cypher texted using the 15 digit unique key. This text is going to be sent to the satellite along with the signals from the GPS. The satellite will further decrypt this cypher text and send back the information of location and timing to the GPS. The hacker
  • 5. International Conference on Computer Applications 87 Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”. International Conference on Computer Applications 2016: 83-88. Print. will have a probability of choosing one out of a quadrillion or one thousand billion. This will give a high security to the autonomous car. Also the satellite coding is done in such a way that, if the hacker accidently finds the correct key, and tries to access our car, the secret key will be blocked. The blocking is done if two signals from same key number are received. Now the person’s car will stop, and he will be alerted by the incoming problem and he can inform the police or alert his security guards. He then has to reset his pin by going to the control database. Added Feature (using TOR Project) Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is going where over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. It can even threaten your job and physical safety by revealing who and where you are. Staying Anonymous Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want others to see your identifying information. This is where encryption kicks in. Working of TOR Project Result As we encrypt our data it is not easy for hackers to penetrate into the data exchange between the car and the satellite. The probability of a computer and the human, to guess the randomize code is going to be one quadrillion which is seriously unimaginable. Also, if the evil doer tries to crack the encryption, it would take at least a couple weeks for him. Even though if it’s a long journey, the passenger will each time go to a different zone of the satellite control which would make the hacker get delayed each time, and by the time he finds the next address of the location, the passenger would have reached his destination.
  • 6. International Conference on Computer Applications 88 Cite this article as: J C Kavitha, Akash Venugopal, S Pushparani. “Algorithm for Security in Autonomous Cars”. International Conference on Computer Applications 2016: 83-88. Print. 4. Conclusion Autonomous car had been implemented in reality and being tested in various countries. In this fast advancing world, security acts as most important feature. We would like to present that there must be further developments in this technology to make autonomous car more common all over the world with a high security level system. This can be happened by making the autonomous easy to operate for the user and the designers should concentrate more in producing autonomous cars, which should not cost a lot.. With this type of vehicles there will be great advantages in the coming future. Speed control technique and tracking system based cars would reduce amount of accidents. In the near future, autonomous car become more common all over the world. Indian efforts in the embedded technology can assure that these autonomous cars will become cheaper and may evolve with many more advantages. By this way we could find ourselves using these autonomous cars in the near feature in a totally secured way. Thus the complexity to track a person will multiply exponentially depending upon the number of people using this service. 5. References 1. James M. Anderson, et al. (2014), Autonomous Vehicle Technology A Guide for Policymakers, RAND Corporation (www.rand.org); at www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR443- 1/RAND_RR443-1.pdf. 2. Allison Arieff (2013), “Driving Sideways,” New York Times, 23 July 2013; at http://opinionator.blogs.nytimes.com/2013/07/23/driving-sideways. 3. Brad Berman (2011), History of Hybrid Vehicles, Hybrid Cars (www.hybridcars.com); at 4. Thomas Fray (2013), Driverless Cars: A Driving Force Coming to a Future Near You, Futurist Speak (www.futuristspeaker.com); 5. Andrew Keen (2013), “The Future of Travel: How Driverless Cars Could Change Everything,” CNN Business Traveler, 15 May; 6. NHTSA (2013), Preliminary Statement of Policy Concerning Automated Vehicles, National Highway Traffic Safety Administration (www.nhtsa.gov). 7. Ben Schonberger and Steve Gutmann (2013), A Self-Driving Future: At The Intersection Of Driverless Cars And Car Sharing, Sightline Institute (www.sightline.org). 8. Michael Sivak and Brandon Schoettle (2015b), Potential Impact of Self-Driving Vehicles on Household Vehicle Demand and Usage, Sustainable Worldwide Transportation Program. 9. Jim Motavalli (2012), “Self-Driving Cars Will Take Over By 2040,” Forbes Magazine, 25 Sept. 2012; 10. Scott Le Vine, Alireza Zolfaghari and John Polak (2015), “Autonomous Cars: The Tension between Occupant-Experience and Intersection Capacity,” Transportation Research Part C: Emerging Technologies;