21 |
Intrusion Detection using Bit Timing Characteristics for CAN BusPatel, Chitvan Kirit 19 July 2019 (has links)
In today's world, most automobiles use Controller Area Network (CAN) bus for communication between various Electronic Control Units (ECUs), also called nodes on the CAN bus. Each ECU on the CAN bus is a microcontroller that sends a unique identifier used for node identification. It is possible to spoof node A by sending the same identifier through node B and thereby control node A. Thus, a hacker can control the steering using the car's internal lights and render it ineffective or misuse them. In order to combat this, we try to fingerprint each node by identifying its identifier's unique bit timing characteristics. To that extent, bit timing characteristics used are the Time of Flight (TOF) intervals between successive rising edges of identifier bits, for an ECU. Similarly, other characteristics such as TOF between successive falling edges of the CAN bus node identifier can also be used for node classification.
In order to measure these TOFs, we use a device called Time-to-Digital Convertor, which essentially triggers a ring oscillator to measure time values between rising/falling edges of a signal, to the order of picosecond accuracy. These timing values are used as features into the K-nearest neighbors (KNN) classifier algorithm. Once the classifier is trained, it can be used to predict a new timing value into a particular node category, which if different from the expected category is a sign of compromise or intrusion. It is seen that we achieve 95% accuracy of correctly predicting the compromised node under simulation tests. Thereafter, the thesis deals with experimentally predicting an intrusion in the CAN bus system utilizing EPOS Studio CAN bus position controller for Maxon motors. The clock timings being extremely accurate leads to the conclusion that employment of better statistical techniques for node characterization is needed for intrusion detection, which is outside the scope of this work. / Master of Science / In today’s world, most automobiles use Controller Area Network (CAN) bus for communication between various Electronic Control Units (ECUs), also called nodes on the CAN bus. These nodes can range from car headlights, radio, doors, internal lights to brakes, steering, throttle and much more. Each node on the CAN bus is a microcontroller which controls its proper operation. This also means that if a node is compromised using external hardware or a piece of software, it could be quite risky. Thus, a hacker can control the steering using the car’s internal lights and render it ineffective or misuse them. In order to combat this, we try to fingerprint each node by identifying its unique time domain characteristics. These characteristics can be the Time of Flight (TOF) measurement values between successive rising or falling edges of a node’s unique identifier, using an instrument called a Time-to-Digital convertor. Furthermore, these TOF values are used as features for the K-nearest neighbor (KNN) classifier machine learning algorithm, which uniquely identifies signals coming from any of the fingerprinted nodes, thereby raising a flag if a message comes from an unidentified node. In addition, experimental data is obtained for node identifiers on the CAN bus, in digital form, and passed into a neural network (NN) for training the classifier. We achieve an 95% and 70% prediction accuracy for the KNN and NN classifiers respectively.
|
22 |
Intrusion Detection System for Electronic Communication Buses: A New ApproachSpicer, Matthew William 18 January 2018 (has links)
With technology and computers becoming more and more sophisticated and readily available, cars have followed suit by integrating more and more microcontrollers to handle tasks ranging from controlling the radio to the brakes and steering. Handling all of these separate processors is a communication system and protocol known as Controller Area Network (CAN) bus. While the CAN bus is a robust system for sending messages, allowing control of the car through the CAN bus presents an opportunity for an outside party to interfere with the operations of a car. Any number of different methods could be used to hack the bus and take control of a car, including hacking into the bus remotely, plugging a small device into the on-board diagnostics port to the CAN bus, or swapping an existing node on the CAN bus for one that has been tampered with. This presents obvious safety risks, so to guard against this possibility, this paper will present an algorithm designed to recognize nodes based on the noise content of their signal so that any messages coming from an improper source can be flagged as suspicious.
The algorithm makes use of MATLAB and Python to perform various transformations on the data and calculate features of the noise in a signal. These features are then passed through a statistical analysis which provides each one a score for how much useful information it contains. The best performing features are run through both a multilayer perceptron neural network and a support vector machine, and the results are compared. Each algorithm gives strong prediction performance, with prediction accuracies of 99.9% and 99.8% for the neural network and support vector machine, respectively. / Master of Science / With technology and computers becoming more and more sophisticated and readily available, cars have followed suit by integrating more and more microcontrollers to handle tasks ranging from controlling the radio to the brakes. Handling all of these separate processors is a communication system and protocol known as Controller Area Network (CAN) bus. However, this presents an opportunity for an outside party to interfere with the operations of a car. An existing node for the CAN bus could be swapped out for one that has been tampered with, causing potentially fatal accidents. To guard against this possibility, this paper will present an algorithm designed to recognize nodes based on the noise content of their signal so that any new hardware will trigger a flag that an unrecognized source is trying to interfere. The algorithm makes use of the MATLAB and Python programming languages to calculate certain characteristics of the noise in the signal and pass those through a machine learning algorithm. This algorithm is able to learn through mathematical means what each node ”sounds like”. With over 99% accuracy, we were able to predict which node sent a given signal.
|
23 |
Embedded Instrument Panel for Construction Equipment / Glass CockpitLinder, Rickard, Lagerholm, Lars January 2012 (has links)
Construction equipment such as wheel loaders and dumpers are constantly getting updated with new technology when it comes to performance and fuel consumption. But the interior in the cockpit has not been exposed to any dramatic changes for decades. A modernized cockpit gives the driver a more modern feel of driving a highly technological machine, while at the same time enables for personalization. This thesis work presents a new way of improving the look and feel for displaying relevant information and also relaying information to both the driver of the machine and spectators outside. It includes a way of rerouting CAN-bus signals from a construction machine and displaying it on a tablet. The core idea with the solution is to make it as modular as possible to further improve and be able to use it in any machine available at Volvo's disposal. With this in mind, any machine could use the same software, the same hardware and still be able to fully utilize all the features that have been implemented from the thesis work. The idea and implementational results are designed as partly embedded and partly towards user interface.
|
24 |
CAN-bus system for vehicle actuation and data logging with Arrowhead FrameworkMånsson, Andreas January 2019 (has links)
The use of micro controllers in automotive application have exploded during the last half century. What was initially a set of mechanical systems that formed a vehicle have now become a collection of computers on wheels. The reason is quite obvious: micro controllers use several inputs to optimize the performance of systems; for example an engine control or an active safety system.The different inputs and outputs to these electronic units (electronic control unit, ECU) are of interest to other such units thereby justifying the need of inter-ECU communications. The Controller Area Network (CAN) bus has been developed to facilitate this communication. It is a message based protocol and is very resilient. It is however relatively slow and limited in terms of security. Security is assured only by trying to keep the message identification tags confidential and the bus physically separated to other network. A couple of decades ago our society embraced the Information Technology (IT) revolution. It allowed people to have extensive access to information. From a technology point of view, IT is based on the use of the Internet, which has been initially designed by the US military for robust applications. It is fast and its security is sufficiently high that we use it to communicate with our banks where we keep all our life savings.The aim of this thesis has been to combine these technologies such that a vehicle with a CAN bus could offer services (just like a bank does) over the Internet. The goal then is to transform a CAN bus to become a service provider over the Internet. The services are the broadcasted CAN messages made available to authorized interested parties and can post information and actuations to the ECUs connected to the CAN bus. A vehicle in that case becomes a cyber physical system. To make this transformation possible, we use the open source Arrowhead Framework, which is based on a Service Oriented Architecture (SOA). The available services are made known via a Service Registry and Orchestration service prosumers. Concretely, the work in this thesis project has been to develop (i.e., to design and implement) a CAN service prosumer that is Arrowhead Framework compliant. It has been successfully tested with another service prosumer, which is an Arrowhead Framework compliant data logger. The driving motivation for the thesis project are construction equipment machines, such as wheel loaders and excavators, which are vehicles with booms or arms. The aspiration is that they not only drive autonomously but also dig autonomously. This ambition shall require large amount of data to be exchanged, something that a CAN bus cannot handle.
|
25 |
Wireless weight displayEriksson, Joar, Oresten, Filip January 2019 (has links)
No description available.
|
26 |
Βελτιστοποίηση λειτουργίας ηλεκτρονικού διαφορικού για μικρό ηλεκτροκίνητο όχημαΜήλας, Νικόλαος 05 February 2015 (has links)
Η παρούσα διπλωματική εργασία πραγματεύεται τη μελέτη και κατασκευή ηλεκτρονικού διαφορικού σε μικρό ηλεκτροκίνητο όχημα. Η εργασία αυτή εκπονήθηκε στο Εργαστήριο Ηλεκτρομηχανικής Μετατροπής Ενέργειας του Τμήματος Ηλεκτρολόγων Μηχανικών και Τεχνολογίας Υπολογιστών της Πολυτεχνικής Σχολής του Πανεπιστημίου Πατρών. Στα πλαίσια του θεσμού της πρακτικής άσκησης του τμήματος, ένα τμήμα της εργασίας αυτής εκπονήθηκε στην εταιρία Δ.Ε.Δ.Δ.Η.Ε. Α.Ε.
Σκοπός είναι η υλοποίηση ηλεκτρονικού διαφορικού σε διθέσιο ηλεκτροκίνητο όχημα το οποίο περιλαμβάνει δύο ηλεκτρικούς κινητήρες χωρίς μηχανική σύνδεση μεταξύ τους. Με τη σωστή λειτουργία του ηλεκτρονικού διαφορικού είναι δυνατή η επίτευξη στροφής του οχήματος με ασφαλή για τους επιβάτες τρόπο.
Αρχικά, σχεδιάστηκε το μικροϋπολογιστικό σύστημα του οχήματος το οποίο αναλαμβάνει να συλλέξει τα απαραίτητα σήματα για το σωστό έλεγχο. Επιλέχθηκε να χρησιμοποιηθεί δίαυλος επικοινωνίας CAN για τη μεταφορά των δεδομένων επειδή χαρακτηρίζεται από μεγάλη αξιοπιστία και ταχύτητα μετάδοσης. Το μικροϋπολογιστικό σύστημα απαρτίζεται από τέσσερις πλακέτες τυπωμένου κυκλώματος που επιτελούν τις λειτουργίες του ηλεκτρονικού διαφορικού, της απεικόνισης δεδομένων στο χρήστη και της διεπαφής των ελεγκτών των δύο κινητήρων στο δίαυλο.
Στη συνέχεια, δοκιμάστηκε πειραματικά η αποτελεσματικότητα του μικροϋπολογιστικού συστήματος δίνοντας βάση στην ορθή μετάδοση των δεδομένων και την επαρκή ταχύτητα μεταφοράς αυτών μέσα στο δίαυλο. Μετά την εξακρίβωση της ορθής λειτουργίας του συστήματος, τοποθετήθηκε στο όχημα μαζί με την απαραίτητη καλωδίωση. Κατά την υλοποίηση της καλωδίωσης δόθηκε βάση στον απλό σχεδιασμό και την εύκολη συντήρηση σε περίπτωση βλάβης.
Το επόμενο βήμα ήταν συγγραφή κώδικα σε γλώσσα προγραμματισμού που υλοποιεί τη λειτουργία του ηλεκτρονικού διαφορικού σύμφωνα με τη γεωμετρία Ackermann.
Το τελευταίο στάδιο της διπλωματικής εργασίας ήταν η συνολική αξιολόγηση του συστήματος μέσω μετρήσεων που πραγματοποιήθηκαν από το μικροϋπολογιστικό σύστημα του οχήματος. Κατά τις τελικές μετρήσεις εξακριβώθηκε η αποτελεσματικότητα της γεωμετρίας Ackermann κατά τη στροφή του οχήματος σε χαμηλές ταχύτητες που συναντώνται σε συνθήκες πόλης. / In this diploma thesis the design and the implementation of an electronic differential for a small electric vehicle is studied. The thesis was elaborated in the Laboratory of Electromechanical Energy Conversion of the Department of Electrical and Computer Engineering in the University of Patras. A part of this thesis was accomplished in the company H.E.D.N.O. S.A. within the Internship program of the Department.
The primary target of this thesis is the implementation of an electronic differential for a Buggy type electric vehicle which utilizes two electric motors without mechanical connection between them. The appropriate operation of an electronic differential results in a safe turning trajectory.
In the first step, a microcomputer system was designed for the purpose of collecting and transferring the data required to achieve reliable control of the vehicle. Robust data transfer within the system is achieved by the use of a CAN bus, which characterizes the proposed architecture. The microcomputer system consists of four Printed Circuit Boards (PCBs) performing the operations of the electronic differential, the data visualization to the driver and the interface of the two motor controllers respectively.
Subsequently, the microcomputer system was tested and installed on the vehicle, focusing on the correct and fast data transmission. Moreover the wiring of the system was implemented with the aim to simplify the design for easy debugging in the case of a failure.
Then, a program was written in C to implement the operation of the electronic differential based on the Ackermann geometry.
The final stage of this diploma thesis was the overall evaluation of the system by the examination of the results obtained by experiments. The results of the experiments verified the effectiveness of the Ackermann geometry during the turning of the vehicle in the low speeds of city driving.
|
27 |
Arquitetura aberta para controle de robôs manipuladoresSantini, Diego Caberlon January 2009 (has links)
Este documento trata da especificação de uma arquitetura aberta para controle de robôs manipuladores. A arquitetura é implementada utilizando o framework do projeto OROCOS, ambiente que já foi utilizado com sucesso em alguns sistemas de controle de robôs. Esta arquitetura é especificada para um robô manipulador genérico de N juntas, definindo componentes que abstraem o hardware dos robôs. A arquitetura é implementada com três tipos de controladores diferentes: PID independente por junta, controlador de torque calculado e controlador com feedforward. A sua validação é feita através da sua implementação em um robô real. Para isso é utilizada uma placa de acionamento, utilizando o barramento CAN devido ao seu determinismo e a sua taxa de comunicação. Também é necessário a utilização do modelo dinâmico do robô para as estratégias de controle de torque calculado e com feedforward. A obtenção de tal modelo é feita neste trabalho de forma analítica, e a seguir os parâmetros são identificados usando o sistema proposto. / This work deals with the specification of an open architecture for control of manipulator robots. The architecture is implemented by using the OROCOS framework. The architecture is specified for a generic manipulator robot with N joints, through definition of components which abstract the hardware of the robot. Three different controllers are implemented: an independent PID for each joint, a computed torque controller and a controller with feedforward. The validation is made through the implementation on the Janus robot. For this purpose, an actuator card is defined. This card uses the CAN bus due its determinism and bus rate. The dynamic model of Janus, used in computed torque and feedforward controllers, is obtained in an analytical way. After that, the parameters of this model are identified using the least squares method.
|
28 |
Arquitetura aberta para controle de robôs manipuladoresSantini, Diego Caberlon January 2009 (has links)
Este documento trata da especificação de uma arquitetura aberta para controle de robôs manipuladores. A arquitetura é implementada utilizando o framework do projeto OROCOS, ambiente que já foi utilizado com sucesso em alguns sistemas de controle de robôs. Esta arquitetura é especificada para um robô manipulador genérico de N juntas, definindo componentes que abstraem o hardware dos robôs. A arquitetura é implementada com três tipos de controladores diferentes: PID independente por junta, controlador de torque calculado e controlador com feedforward. A sua validação é feita através da sua implementação em um robô real. Para isso é utilizada uma placa de acionamento, utilizando o barramento CAN devido ao seu determinismo e a sua taxa de comunicação. Também é necessário a utilização do modelo dinâmico do robô para as estratégias de controle de torque calculado e com feedforward. A obtenção de tal modelo é feita neste trabalho de forma analítica, e a seguir os parâmetros são identificados usando o sistema proposto. / This work deals with the specification of an open architecture for control of manipulator robots. The architecture is implemented by using the OROCOS framework. The architecture is specified for a generic manipulator robot with N joints, through definition of components which abstract the hardware of the robot. Three different controllers are implemented: an independent PID for each joint, a computed torque controller and a controller with feedforward. The validation is made through the implementation on the Janus robot. For this purpose, an actuator card is defined. This card uses the CAN bus due its determinism and bus rate. The dynamic model of Janus, used in computed torque and feedforward controllers, is obtained in an analytical way. After that, the parameters of this model are identified using the least squares method.
|
29 |
Arquitetura aberta para controle de robôs manipuladoresSantini, Diego Caberlon January 2009 (has links)
Este documento trata da especificação de uma arquitetura aberta para controle de robôs manipuladores. A arquitetura é implementada utilizando o framework do projeto OROCOS, ambiente que já foi utilizado com sucesso em alguns sistemas de controle de robôs. Esta arquitetura é especificada para um robô manipulador genérico de N juntas, definindo componentes que abstraem o hardware dos robôs. A arquitetura é implementada com três tipos de controladores diferentes: PID independente por junta, controlador de torque calculado e controlador com feedforward. A sua validação é feita através da sua implementação em um robô real. Para isso é utilizada uma placa de acionamento, utilizando o barramento CAN devido ao seu determinismo e a sua taxa de comunicação. Também é necessário a utilização do modelo dinâmico do robô para as estratégias de controle de torque calculado e com feedforward. A obtenção de tal modelo é feita neste trabalho de forma analítica, e a seguir os parâmetros são identificados usando o sistema proposto. / This work deals with the specification of an open architecture for control of manipulator robots. The architecture is implemented by using the OROCOS framework. The architecture is specified for a generic manipulator robot with N joints, through definition of components which abstract the hardware of the robot. Three different controllers are implemented: an independent PID for each joint, a computed torque controller and a controller with feedforward. The validation is made through the implementation on the Janus robot. For this purpose, an actuator card is defined. This card uses the CAN bus due its determinism and bus rate. The dynamic model of Janus, used in computed torque and feedforward controllers, is obtained in an analytical way. After that, the parameters of this model are identified using the least squares method.
|
30 |
Säkerhet i CAN-bussen : Riskerna som medföljer Internet of VehiclesLindmark, Anton, Hall, Fredrik January 2017 (has links)
I denna rapport undersöks säkerheten i de inbyggda systemen i ett fordon. Är CAN-bussen och enheterna som kommunicerar med den verkligen säkra? Vilka svagheter finns det inom säkerheten när ny teknik implementeras i fordon och ansluts till CAN-bussen?Om ett fordon blir angripet så är riskerna att angriparen lyckas med attacken ganska stora. Speciellt så finns det flera risker och säkerhetshål med ny teknik t.ex. inbyggda mediasystem i fordon.Vi har forskat i hur lätt det är att hämta information ur fordonet, samt vad som kan göras med denna information, detta med hjälp av både andra vetenskapliga rapporter samt en fysisk undersökning med hjälp av en applikation som utvecklades.Genom avläsning med hjälp av Bluetooth från OBD2 kontakten så kan information såsom signaler för att låsa upp fordonet eller trycka på gasen läsas av från fordonet. Viss information är dold för den normala användaren, såsom ett tryck på gaspedalen. Denna information måste erhållas genom exempelvis avläsning av dolda paket. Detta kan göras genom att spåra paket med hjälp av diverse program, t.ex. Wireshark. Hade denna information varit enkel att tillgå så kan den användas på ett skadligt sätt. Skulle exempelvis kommandot för att trycka på gasen kunna styras trådlöst så skulle detta kunna skapa stora och farliga problem. Detta är något som undersöks i rapporten, hur man kan gå tillväga och vilka sätt ett fordon kan angripas på.En applikation utvecklades för att undersöka vilken information som kan relativt enkelt extraheras. Parametrar som t.ex. hastighet eller varvtal på motorn är exempel på denna information. Med hjälp av en OBD2 enhet så kommunicerar applikationen med fordonet. Applikationen hämtar ut informationen om en bilresa från start till stopp för att sedan kunna redovisa denna information. Information visas till användaren i applikationen både under tiden fordonet färdas och sedan en sammanfattning av hela resan. Applikationen kan användas för att spara sina resor om man till exempel vill redovisa tjänsteresor för sin arbetsgivare. Resorna sparas både i databas och lokalt på din telefon med möjlighet för uppladdning till en webbserver eller liknande.iiApplikationen sparar all information du valt om din resa och kan även skräddarsys med mer eller mindre parametrar beroende på behov.Den har även ett användningsområde för att övervaka sitt körande, om man till exempel någon gång under resans gång uppnår onormala värden, som t.ex. alldeles för höga varvtal eller liknande. / In this report, the security in integrated systems within vehicles is evaluated. Is the CAN bus and the devices that communicate with it secure? What are the weaknesses in security when modern technologies are implemented in vehicles and connected to the CAN bus?If a vehicle is attacked, the risk of the attacker's success with the attack is quite large. There are several risks and security holes with modern technology, for example. built-in media system in vehicles.We have researched how easy it is to retrieve information from the vehicle and what can be done with this information, using both other scientific reports and a physical examination using an application that were developed.By reading using Bluetooth from the OBD2 connector, information such as signals to unlock the vehicle or press the gas pedal can be read from the vehicle. Certain information is hidden for the normal user, such as a press of the gas pedal. This information must be obtained by for example, reading hidden packages. This can be done by tracing packages through various applications, such as Wireshark. Had this information been easy to access, it could be used in a malicious way. Should the command to press the gas be controlled wirelessly, this could create major and dangerous problems. This is something that is being investigated in the report, how to proceed and what ways a vehicle can be attacked.An application was developed to investigate what information that can be relatively easily extracted. Parameters such as speed or rounds per minute on the engine are examples of this information. Using an OBD2 device, the application communicates with the vehicle. The application retrieves information about a trip from start to stop and then it’s able to report this information. Information is displayed to the user in the application both while the vehicle is traveling and then a summary of the entire trip. The application can be used to save one’s journey, if for example, you want to report your trips to your employer. The trips are stored both in a database and locally on your phone with the possibility of uploading to a web server.ivThe application saves all information you selected about your trip and can also be customized with parameters depending on your needs. It also has a field of use for monitoring your driving, for example if you at some time during the trip reach abnormal values, such as far too high rounds per minute or something similar.
|
Page generated in 0.0479 seconds