Sunteți pe pagina 1din 5

2016 3rd MEC International Conference on Big Data and Smart City

SMART VEHICLE SECURITY SYSTEM FOR


DEFENDING AGAINST COLLABRATIVE
ATTACKS BY MALWARE
Chandra Shekar Ramaiah1 Dr.S.Asif Hussain2
Head of the Department of E & C Assistant Professor
Middle East College Middle East College
Knowledge oasis Muscat, Knowledge oasis Muscat,
Sultanate of Oman Sultanate of Oman
E-mail: chandrashekar@mec.edu.om E-mail: shussain@mec.edu.om

Yahya Al Balushi
S. Zahid Hussain Lecturer
Dept. of E.C.E
Software Engineer
Middle East College, Muscat
TCS, Hyderabad
Sultanate of Oman
zahidhussains@gmail.com
yalbelushi@mec.edu.om

Abstract— Modern world vehicles are not just mechanical The block representation of proposed Person Authentication
devices but are smart enough to make decisions and act based on System illustrates the function of the proposed system.
real time inputs. This features also results in various technical The design mainly consists of ARM processor, GSM unit and
vulnerabilities. So, Security systems are inevitably part of today’s camera as main hardware unit, an effective face recognition
life. Here in the proposed work a real time vehicle security system using Matlab platform and malware identification
system and malware detection system developed and
implemented. The proposed system will ensure that the
using JAVA platform as software component. In this work
authorized person will be able to activate and use the car and initially the owner or the driver’s image is stored in the
thus ensuring that unauthorized access is prevented. When the database. Whenever a person is starting the car, the face
car ignition is to be activated, the security system will initially detection & recognition unit will take the image and compare
check the person’s valid authentication and allow the valid user with the database image. If the image is matched then the car
to access it. If it detects any unauthorized access, the proposed ignition will turn on else an alert will be transmitted to the
Person Authentication System (PAS) will prevent the person to stored Security Mobile Number (SMN) [1].
operate the car and it will send the alert information image to the
system controller. Also the malware system detects any spyware
in the image to determine the authenticity of the image. The
system is implemented integrating the hardware built on ARM
core and user interface on java platform.
Keywords—GSM module; Person Authentication System (PAS);
ARM LPC 2148
I. INTRODUCTION
In Present scenario security is a critical issue,
whether it’s home, office or a vehicle. As cars are becoming
integral part of today’s life and improvement in living
standards people wish to have cars which are need of the hour
for ease of movement. Like any other expensive asset, a car
brings with it a secondary cost. The probability of theft also
increases with increased number of cars on road. In current
situation vehicle theft has relatively increased with more focus
on high end cars which are significantly expensive. In this Fig 1: Block representation of Proposed PAS
paper a security system is proposed to overcome this issue.

978-1-4673-9584-7/16/$31.00 ©2016 IEEE


2016 3rd MEC International Conference on Big Data and Smart City

II. DESIGN AND IMPLEMENTATION on the comparison results the identity or authorization can be
The two major platforms used in the proposed design are: determined [7].
1. Software Platform; and If the acquired image and database image matches
2. Hardware Platform. then there will not be any response to the SMN. But if the
image is of unauthorized person then, an alert will be sent to
A. SOFTWARE PLATFORM the SMN through GSM modem.
The face recognition system plays a key role in the if (cnt1>2 || cnt2>2)
entire operation. The simulation tool MATLAB is used for the if cnt1>cnt2
face recognition part and java platform is used for malware warndlg('Authorised Person is A');
detection. The image processing and recognition process in else
indicated in figure 2. errordlg('Person not Autherized');
To capture an image a camera that support
YUY2_640x480 format need to be used. Initially the image
that needs to be stored in database is captured and stored. The
supportable camera configuration in the MATLAB is given in
the form of the following data function video input
('winvideo'1,'YUY2_640x480'); Initially ten database sample
images are stored in the database for effective feature
extraction[3]. Once an image is captured by the camera it will
be sent to MATLAB for processing. Whenever MATLAB
reads images it is converted to grey scale format since
processing time in single plane would be minimal.

Captured image Data base


image Fig. 3. GUI Dialog representing Personal Authentication System (PAS)
Screen

B. MALWARE DETECTION

Captured image Database image In malware detection system we have a tendency to


process Process area unit victimization, Naive Bayes formula for classification
with accuracy [2]. The Naive Bayes algorithm only needs a
little extent of training information to determine the
parameters required for classification [4]. Hence each category
Matching test variable’s variance has to be determined and not the complete
variance matrix.
In malware detection system we have a tendency to
area unit victimization, Naive Bayes formula for classification
with accuracy [2]. The Naive Bayes algorithm only needs a
Authentication result little extent of training information to determine the
parameters required for classification [4]. Hence each category
variable’s variance has to be determined and not the complete
Fig. 2. PAS Software architecture variance matrix.
Once image is captured the pre-processing will be
carried out with the captured image and the database image III. SYSTEM ARCHITECTURE
which involves similarity checks and probability finding. The
similarity check is carried out by calculating the distance The proposed architecture shown in figure 4
between the input and data base image. describes the modules:
Effective edge analysis and pixel analysis is adopted 1. Data Collection
for similarity check in the work [5]. Using the function
Euclidean Distance(X, Y), similarities and the differences 2. Dataset Creation
between the input image and data base image and also the 3. Feature Extraction
changes in the same input after a particular time period can be
determined [6]. Finally, pixel value result is compared with 4. Classification
the mean and median value to find the authentication. Based
2016 3rd MEC International Conference on Big Data and Smart City

Data Opcode
Fig.6. Reduced Feature Sets
Parser

C. Classification
Feature Train Naive Bayes classifier is built on Bayes theorem
Extractio Classifier
where different features are independent of each other. This
assumption does not hold well in real-time applications. This
algorithm has provided good results in complex applications.
Classify
J48 a decision tree algorithm adopts a top-down approach and
navigates a tree for classification.

Data set Classifier


hexadecim Classificatio
Maliciou Benign Algorithm n Results
s al dumps
of the hexadecimal hexadecimal
dumps of the
binary files
dumps of the binary file
binary files

Fig.7. Top-down approach for classification

Fig.4. System Architecture

Effective edge analysis and pixel analysis is adopted


for similarity check in the work [5]. Using the function
Euclidean Distance(X, Y), similarities and the differences
between the input image and data base image and also the
changes in the same input after a particular time period can be
determined [6]. Finally, pixel value result is compared with
the mean and median value to find the authentication.
A. Dataset Creation
The hexadecimal dumps of the binary files are created
using UNIX based utility. In this design the engine unit is
controlled by a driver circuit. If the car is started, ARM
processor will give the bias voltage to the transistor to switch
on the relay which in turn switches the car engine. Meanwhile
the processor will check the interrupt service routine. If an Fig.8. Results for Naive Bayes
interrupt is detected which indicates unauthorized access via
UART then the control unit will put the transistor to cutoff D. Hardware Platform
which ensures that the engine of the vehicle is turned off then The hardware system consists of ARM
extracted from these hexadecimal binary files of different size. processor as control unit, GSM unit, Ignition system, PC and a
The Attribute Relation File Format dataset are generated based camera. ARM processor is used for controlling the overall
on frequency and common features. system. Here LPC2148 series is used, which has two UART.
PC is interfaced in UART 0 for image analysis. The ignition
Collection of Dataset Data set driver circuit is interfaced with GPIO of ARM and interrupt
Malware Data Creation
service routine (ISR) is used to check whether there is any
interrupt from the software subsystem. UART 1 is connected
to GSM modem.
Fig.5. Creation of data with attributes
B. Feature Extraction
The parsing outputs are subjected to feature
extraction. The Common Feature-based Extraction (CFBE)
and Frequency-based Feature Extraction are used to extract
the feature. The ARFF files are generated using Reduced
Feature Sets (RFSs).
Input Feature Extrac ARFF
hexadecima tion hexadecimal hexadecima
l dumps of dumps of the l dumps of
the binary binary files the binary Fig. 9. Prototype Developed for real time testing
files files File
2016 3rd MEC International Conference on Big Data and Smart City

In this design the engine unit is controlled by a driver


circuit. If the car is started, ARM processor will give the bias
voltage to the transistor to switch on the relay which in turn
switches the car engine. Meanwhile the processor will check
the interrupt service routine. If an interrupt is detected which
indicates unauthorized access via UART then the control unit
will put the transistor to cutoff which ensures that the engine
of the vehicle is turned off.

IV. EXPERMENTAL RESULTS

Fig.12. TP and FP rates of naïve bias algorithm.

Fig 10: Face Detection Module

The database capacity depends on user convenience,


and the images in database are authorized. Whenever a person
enters the car the camera automatically captures the image
which is located in front of driver’s seat. The captured image
is verified with database as shown in figure 11 and if it
matches the car will start. If an unauthorized person access the
car the GSM modem will be activated and a message will be
transmitted to the owner as shown in figure 12.
Fig. 13. Malware detection of J48 algorithm

Fig. 11. Message displayed on owner’s Mobile.

V. MALWARE RESULTS
This malware result is purely software dependent. In
Fig 14. Malware detection of random forest algorithm.
this development WEKA a collection of machine learning
algorithm is used to detect the malware. In this tool the results The ignition driver circuit is interfaced with GPIO of ARM
are totally probability based. Using data mining the infected and interrupt service routine (ISR) is used to check whether
files are extracted from thousands of files in database. The there is any interrupt from the software subsystem. UART 1 is
project mainly focused on three algorithms i.e. Navey bias, j48 connected to GSM modem. These methods are effective to
and Random Forest. These methods are effective to detect detect malware with in a fraction of second. The malware
malware with in a fraction of second. The figures13, 14 and 15 infection is checked in two ways i.e. file name (FN) and file
shows true positive rate and false positive rate of three feature (FF). The values are indicated in table 1.
different algorithms.
2016 3rd MEC International Conference on Big Data and Smart City

Table 1: T.P, F.P, execution time, correctly and incorrectly classified [5] S Hussain, et.al. - “A Prototype Model For Realistic Driving
instances of different algorithm Environment System”International Conference on Emerging Technology
Trends in Advanced Engineering Research(ICETT- 2012), Published by
NAÏVE J48 RANDOM th st
IEEE Press and in IEEE Explorer, pp 52 - 57. Feb’ 20 -21 2012.
BIAS FOREST
[6] N. Bird, S. Atev, N. Caramelli, R. Martin, O. Masoud, and N.
F.N F.F F.N F.F F.N F.F Papanikolopoulos,“Real time, online detection of abandoned objects in public
areas,” in Proc. IEEE Conf. Robot. Automat. 2006, pp.3775–3780.
[7] D. Li, Y. Jiang, and G. Chen, “A low cost embedded color vision system
T.P(true 0.35 0 0.47 0 0.35 0 based on SX52,” in Proc. IEEE Int. Conf. Inf. Acquisit., Aug. 2006, pp. 883–
887.
positive)
[8] S Hussain, R. Subhan Tilak Basha- “ Accurate Face Recognition system
Rate based on ARM 9 processor using HAAR wavelets” International Journal of
Engineering Research(IJER),March 2014,pp:157 -161.
F.P(false 0.41 0.41 0.41 0.41 0.28 0.25
positive)
Rate
Execution 0 0 0.03 0 0 0
time(in sec)
Correctly 6 0 8 0 6 0
classified
instances
Incorrectly 11 17 9 17 11 17
classified
instances

VI. CONCLUSION
As technology is growing and it is significantly
becoming part of daily life, its effective use becomes very
much necessity. As the world is moving towards usage of
smart applications and more autonomous systems are
replacing the existing ones the proposed system could bring a
solution in system malware identification and image based
authentication. Person authentication system is an effective
mechanism that provides inputs for intelligent Car Security,
thus preventing unauthorized access and use of vehicle.
Malware detection will helps to avoid the system crash. This
development will certainly help to utilize the data collected in
various networks or applications in a smart system and
provide safer environment to live.
REFERENCES
[1] I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, “A survey on wireless
multimedia sensor networks,” Computer Networks, vol. 51, no. 4, pp.921–
960, 2007.
[2] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham,
S.Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno,
“Comprehensive experimental analyses of automotive attack surfaces,” in
Proc.20th USENIX Conf. Security, Berkeley, CA, USA, 2011, pp. 6–6.
[3] J. H. Lee and I. B. Jung, “Reliable asynchronous image transfer protocol in
wireless multimedia sensor networks,” Sensors, vol. 10, pp. 1486–1510, 2010.
[4] R. Pon, M. Batalin, M. Rahimi, Y. Yu, D. Estrin, G. Pottie,M.
Srivastava,G. Sukhatme, and W. Kaiser, “Self-aware distributed embedded
systems,” in Proc. IEEE Int.Workshop Future Trends Distrib. Comput.Syst.,
2004, pp. 102–107.

S-ar putea să vă placă și