Remote Keyless Entry Implementation Using Can Protocol

[{“box”:0,”content”:”[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : June 15, 2024 at 2:18 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

[foreach 286]n

n

n

J. Ravindra, P. V. Krishna Reddy, R. UPENDRA, N. Sunil Kumar

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Assistant Professor, Student, Student, Student Department of Electronics and Electrical Engineering , Bapatla Engineering College,GBCRD,Mahatmajipuram,Bapatla, Department of Electronics and Electrical Engineering , Bapatla Engineering College,GBCRD,Mahatmajipuram,Bapatla, Department of Electronics and Electrical Engineering , Bapatla Engineering College,GBCRD,Mahatmajipuram,Bapatla, Department of Electronics and Electrical Engineering , Bapatla Engineering College,GBCRD,Mahatmajipuram,Bapatla Andhra Pradesh, Andhra Pradesh, Andhra Pradesh, Andhra Pradesh India, India, India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nThe coming of the Controlling Area Network (CAN) protocol has totally transformed the car industry, enabling smooth communication between various electronical control units (ECUs) within modern vehicles. Using this strong communication framework, our project centers on the execution of a Remote Keyless Entry (RKE) system, providing improved security and ease to vehicle owners. This project aims at designing and developing a complex RKE system employing the CAN protocol, which allows wireless entry to vehicles through coded signals. By amalgamating CAN-powered ECUs like the body control unit (BCU) and the key dongle, our solution promises reliable and secure communication between the key fob and the vehicle, making user interaction simpler. The suggested RKE system consists of two prime components: the key dongle and the vehicle’s BCU. The key dongle dispatches coded signals to the BCU via the CAN bus, triggering keyless entry functions like locking, unlocking, and remote beginning. Through careful coding techniques and validation mechanisms, our system alleviates the danger of unauthorized access, securing the vehicle against theft or manipulation. Moreover, embedding the RKE system using the CAN protocol proposes scalability and intercommunication, enabling smooth integration with existing vehicle nets and future improvements. By complying with industry norms and best practices, our solution ensures compliance with a broad array of vehicle makes and manufacturers, thus enhancing its practicality and marketability. To sum up, the Remote Keyless Entry Implementation Using CAN Protocol project stands as a notable leap forward in automotive security and ease. By utilizing the power of the CAN protocol, our solution offers a strong, efficient, and user-friendly approach to remotely accessing vehicles, heralding a fresh age of clever and secure automotive systems.

n

n

n

Keywords: RKE, ECU, CAN communication, BCM, CAN cable, Arbitration, IVN Bed, CAN High and CAN Low.

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Telecommunication, Switching Systems and Networks(jotssn)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Telecommunication, Switching Systems and Networks(jotssn)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: J. Ravindra, P. V. Krishna Reddy, R. UPENDRA, N. Sunil Kumar. Remote Keyless Entry Implementation Using Can Protocol. Journal of Telecommunication, Switching Systems and Networks. June 4, 2024; 11(01):-.

n

How to cite this URL: J. Ravindra, P. V. Krishna Reddy, R. UPENDRA, N. Sunil Kumar. Remote Keyless Entry Implementation Using Can Protocol. Journal of Telecommunication, Switching Systems and Networks. June 4, 2024; 11(01):-. Available from: https://journals.stmjournals.com/jotssn/article=June 4, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n[if 992 not_equal=”Open Access”]

[/if 992]n[if 992 not_equal=”Open Access”] n


nn[/if 992]nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

[1] A. I. Alrabady and S. M. Mahmud, “Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs,” IEEE transactions on vehicular technology, vol. 54, no. 1, pp. 41–50, 2005.

[2] F. Bersani and H. Tschofenig, “The eap-psk protocol: A pre-shared key extensible authentication protocol (eap) method,” Tech. Rep., 2007.

[3] C. Böhm, M. Hofer, and W. Pribyl, “A microcontroller sram-puf,” in 2011 5th International Conference on Network and System Security. IEEE, 2011, pp. 269–273.

[4] N. T. Courtois, G. V. Bard, and D. Wagner, “Algebraic and slide attacks on keeloq,” in Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers 15. Springer, 2008, pp. 97–115.

[5] T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, and M. T. M. Shalmani, “On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme,” in Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings 28. Springer, 2008, pp. 203–220.

[6] F. D. Garcia, D. Oswald, T. Kasper, and P. Pavlidès, “Lock it and still lose it—on the ({In) Security} of automotive remote keyless entry systems,” in 25th USENIX security symposium (USENIX Security 16), 2016.

[7] J.-R. Lin, T. Talty, and O. K. Tonguz, “On the potential of bluetooth low energy technology for vehicular applications,” IEEE Communications Magazine, vol. 53, no. 1, pp. 267–275, 2015.

[8] S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, “Security in embedded systems: Design challenges,” ACM Transactions on Embedded Computing Systems (TECS), vol. 3, no. 3, pp. 461–491, 2004.

[9] N. Semiconductor, “Nrf52832 product specification,” Nordic Semiconductor, 2017.

[10] P. Smith, “Comparing low-power wireless technologies,” Tech Zone, Digikey Online Magazine, Digi-Key Corporation, vol. 701, 2011.

[11] P. Štembera and M. Novotny, “Breaking hitag2 with reconfigurable hardware,” in 2011 14th Euromicro Conference on Digital System Design. IEEE, 2011, pp. 558–563.

[12] R. Verdult, F. D. Garcia, and B. Ege, “Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer,” in Supplement to the Proceedings of 22nd USENIX Security Symposium (Supplement to USENIX Security 15), 2015, pp. 703–718.

[13] J. Patel, M. L. Das and S. Nandi, “On the Security of Remote Key Less Entry for Vehicles,” 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Indore, India, 2018, pp. 1-6, doi: 10.1109/ANTS.2018.8710105.

[14] Kinzig, Johannes. “Design and Implementation of a remote keyless entry system using state of the art bidirectional communication and authentication mechanisms.”

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Original Research

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received May 12, 2024
Accepted May 24, 2024
Published June 4, 2024

n

n

n

n

n

n function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]