SAVED
SAVED
SAVED
Submitted by
SK.MD.ASHEED 19JR1A04H2
i
KKR & KSR INSTITUTE OF TECHNOLOGY & SCIENCES
(Approved by AICTE, New Delhi & Affiliated to JNTU Kakinada)
VINJANAMPADU VILLAGE, VATTICHERUKURU MANDAL, GUNTUR
Andhra Pradesh-522017, Ph: 0863-2286666, 2286777
BONAFIDE CERTIFICATE
This is to certify that the project report entitled “ ADVANCED FIRE EXTINGUISHER
ROBOT ” is the bonafide work of Mr. P.Purna Venkateswarlu (20JR5A0420), Mr. S.S
urya Vamsi (20JR5A0421), Mr. SK.MD.Asheed (19JR1A04H2), of final year B. Tech
which he/she has submitted to Jawaharlal Nehru Technological University Kakinada in
fulfillment of the requirement of award of Bachelor of Technology in Electronics and
Communication Engineering branch during the academic year 2022-23.
EXTERNAL EXAMINER
ii
DECLARATION
We declare that this project entitled “ ADVANCED FIRE EXITINGUISHER ROBOT ” has been
carried out by us and contents have been presented in the form of dissertation in partial fulfillment of
the requirements for the award of degree of Bachelor of technology in ELECTRONICS AND
COMMUNICATION ENGINEERING.
We further declare that this dissertation has not been submitted elsewhere for any degree.
(20JR5A0420) (20JR5A0421)
SK.MD.ASHEED
(19JR1A04H2)
ACKNOWLEDGEMENT
We would like to express our profound gratitude towards Dr. P. Sarala M. Tech, Ph.D.
Associate. Prof of the DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING, who played a supervisory role to perfection, enabled us to seek through our B. Tech
project and for guiding asan internal guide methodically and meticulously.
We are highly indebted to Dr. N. ADI NARAYANA, Head of the Department, Electronics
andCommunication Engineering for providing us all the necessary support.
We render our deep sense of gratitude to Dr. P. Babu, Principal for permitting us to carry out our
project work. We would also like to thank the Electronics and Communication Engineering staff for
lending us their time to help us and to complete our work successfully.
We would also like to thank our parents and friends for their enduring
encouragement andassistance whenever required.
(20JR5A0420) (20JR5A0421)
SK.MD.ASHEED
(19JR1A04H2)
KKR & KSR INSTITUTE OF TECHNOLOGY AND SCIENCES
(Approved by A.I.C.T.E New Delhi|| Permanently Affiliated to JNTUK, Kakinada|| Accredited with ‘A’ Grade by NAAC
|| NBA Accreditation status for 4 B.Tech Programmes (CSE, ECE, EEE &Mech)) Vinjanampadu (Vil), Vatticherukuru
(Md), Guntur (DT), A.P-522017.
INSTITUTION VISION
To produce eminent and ethical Engineers and Managers for society by imparting
quality professional education with emphasis on human values and holistic excellence.
INSTITUTION MISSION
• To ensure all round development of students through judicious blend of curricular, co-
curricular and extra-curricular activities.
• To support cross-cultural exchange of knowledge between industry and academy.
To provide quality education in the domain of Electronics and Communication Engineering through
PEO1: Develop a strong background in basic science and mathematics and ability to use these tools
in their chosen fields of specialization.
PEO2: Have the ability to demonstrate technical competence in the fields of electronics and
communication engineering and develop solutions to problems.
PEO3: Attain professional competence through life-long learning such as advance degrees,
professional registration, and other professional activities.
PEO5: Take individual responsibility and to work as a part of a team towards the fulfillment of
both individual and organizational goals.
Program Outcomes
1. Engineering Knowledge: Apply the knowledge of mathematics, science, engineering
fundamentalsandanengineeringspecializationtothesolutionofcomplexengineeringproble ms.
2. Problem Analysis: Identify, formulate, research literature and analyze complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences and engineering sciences.
5. Modern tool usage: Create, select and apply appropriate techniques, resources and
modern engineering and IT tools including prediction and modeling to complex
engineering activities with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
KKR & KSR INSTITUTE OF TECHNOLOGY AND SCIENCES
(Approved by A.I.C.T. E New Delhi|| Permanently Affiliated to JNTUK, Kakinada|| Accredited with ‘A’ Grade by NAAC
|| NBA Accreditation) Vinjanampadu (Vil), Vatticherukuru (Md), Guntur (DT), A.P-522017.
8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities
and norms of the engineering practice.
12. Life-long learning: Recognize the need for, and have the preparation and ability
to engage in independent and life-long learning in the broadest context of technological
change.
KKR & KSR INSTITUTE OF TECHNOLOGY AND SCIENCES
(Approved by A.I.C.T.E New Delhi|| Permanently Affiliated to JNTUK, Kakinada|| Accredited with ‘A’ Grade by NAAC || NBA
Accreditation)Vinjanampadu (Vil), Vatticherukuru (Md), Guntur (DT), A.P-522017.
CO425.6: Prepare the project Documentation and present the report using appropriate method.
C425.1 ✓ ✓ ✓ ✓
C425.2 ✓ ✓ ✓ ✓ ✓ ✓
C425.3 ✓ ✓ ✓ ✓ ✓
C425.4 ✓ ✓ ✓ ✓ ✓ ✓
C425.5 ✓ ✓ ✓ ✓ ✓
C425.6 ✓ ✓ ✓ ✓ ✓
C425.1 2 2 2 3
C425.2 3 2 2 2 2 3
C425.3 3 2 2 1 3
C425.4 3 2 1 3 2 3
C425.5 2 3 3 2 3
C425.6 3 2 2 3 1
1. CO425.1 is mapped with PO1, PO2 and PO4, PO6, PO7 as basic knowledge of
Engineering and problem Analysis activities are highly essential to conduct
examinations on existing systems which have been using in industries as a part of and
to define the problem of proposed system.
2. CO425.2 is mapped with PO1, PO2, PO4 and PO6, PO9, PO10, PO11 as for
identification, gathering analysis and classification of requirements for the proposed
system, basic knowledge of engineering and Analysis steps along with complex
problem analysis through the efforts of team work in order to meet the specific needs
of the customer.
3. CO425.3 is mapped with PO2, PO5 and PO12 as to conduct the literature review and
to examine the relevant systems to understand and identify the merits and demerits of
each too enhance and develop the proposed as per the need.
4. CO425.4 is mapped with PO1, PO2, PO3, PO4, PO5 and PO7, PO8, PO9, PO10
because modularization and design of the project is needed after requirements
elicitation. For modularization and design of the project, Basic knowledge of
Engineering, Analysis capabilities, Design skills and communication is needed
between team members as different modules are designed individually before
integration.
5. CO425.5 is mapped with PO3, PO5, PO7, PO9, PO11 and PO12 as to construct the
project latest technologies are needed. The development of project is done
individually and in groups with well-defined communication by using the
engineering and management principles.
6. CO425.6 is mapped with PO6, PO10 and PO12 because during and after completion
of the project, documentation is needed along with proper methods of presentation
through understanding and application of engineering and management principles,
which in turn needs well defined communication between the team members with all
the ethical values. Even the project development team defines the future
enhancements as a part of the project development after identifying the scope of the
project.
CO-PSOs Mapping with Reasons:
CONTENTS PAGE NO
COVERPAGE i
CERTIFICATE ii
CANDIDATE'S DECLARATION iii
ACKNOWLEDGEMENT iv
ABSTRACT
This paper proposes a secure data transmission control method for electrical equipment of
automobiles based on the 5G communication technology using the Narrowband Internet of Things
(NB-IoT) module. With the increasing number of connected devices in automobiles, it is essential
to ensure the security and privacy of data transmission.
The proposed method uses the NB-IoT module, which provides low-power, wide-area connectivity
for IoT devices and supports the massive connection of devices. The method includes the use of
secure communication protocols, encryption algorithms, and authentication mechanisms to ensure
the confidentiality, integrity, and authenticity of data transmission.
The method also includes the use of a secure key distribution scheme that generates and distributes
encryption keys to authorized devices, ensuring that only authorized devices can access and
transmit data. Additionally, the method includes a secure data exchange mechanism that ensures
that data is transmitted only to authorized devices and that the data is not modified or intercepted
during transmission.
Overall, the proposed method provides a secure and reliable solution for data transmission control
in electrical equipment of automobiles, ensuring the privacy and security of sensitive information.
The method can be applied to various electrical equipment, including battery management
systems, infotainment systems, and advanced driver-assistance systems, among others, improving
the overall safety and performance of automobiles. The use of the NB-IoT module further enhances
the scalability and efficiency of the proposed method.
CONTENTS
List of Acronyms 1
Chapter 1 Introduction
1. 1. General Introduction 1
1. 2. Data Rate 2
1. 3. Objective and Abstract of Work 3
4.1. Introduction 14
5. 1. Introduction 20
5. 2. Block Diagram 21
5. 2.3. 5G Modem 25
6.1. Introduction 31
7.1. Conclusion 40
LIST OF TABLES
5G Fifth-generation technology
1
CHAPTER-1
INTRODUCTION
1.1 General Introduction
5G technology is a breakthrough. The next generation of telecom networks (fifth generation
or 5G) has started hitting the market end of 2018 and will continue to expand worldwide. Beyond
speed improvement, the technology is expected to unleash a massive 5G IoT (Internet of Things)
ecosystem where networks can serve communication needs for billions of connected devices,
with the right trade-offs between speed, latency, and cost.
Up to 10Gbps data rate - > 10 to 100x speed improvement over 4G and 4.5G networks
1-millisecond latency
1000x bandwidth per unit area up to 100x number of connected devices per unit area
(compared with 4G LTE)
99.999% availability
100% coverage
90% reduction in network energy usage
Up to 10-year battery life for low power IoT device
2
1.2 Data Rate
5G is 10 to x100 faster than what you can get with 4G.
According to communication principles, the shorter the frequency, the larger the bandwidth.
Using shorter frequencies (millimeter waves between 30GHz and 300GHz) for 5G
networks is why 5G can be faster. This high-band 5G spectrum provides the expected boost
in speed and capacity, low latency, and quality.
However,5G download speed may differ widely by area.
According to the February 2020 issue of Fortune Magazine, average 5G speed measures
done in Q3/Q4 2019 range from:
220 megabytes per second (Mbps) in Las Vegas,
350 in New York,
380 in Los Angeles,
450 in Dallas,
to 550 Chicago,
and over 950 in Minneapolis and Providence approximatively.
That's 10 to 50 times more than 4G LTE
3
transmitted data. The protocol will be implemented on a 5G communication network using
NB-IoT security modules.
The effectiveness of the protocol will be evaluated based on its security,
reliability, and efficiency. This project aims to provide a comprehensive solution for
securing the remote control of electrical equipment in modern automobiles, thus enhancing
the safety and security of drivers and passengers.
With the rapid development of information technology, the functions of an
automobile have become increasingly di- verse, and automobile design has become more
humane. The continuous improvement of automobile performance has caused a sharp
increase in the number of electrical equipment installed in automobiles, which has,
however, led to connection and communication between devices being moredifficult.
Therefore, engineers in charge of automobileelectronics identify the problems
concerning the low communication quality and high data transmission delay as a priority
to be resolved when equipment exchanges data transmission.
Wireless transmission and a classification algorithm of multisource information of devices
based on compressed sensing were proposed to deal with the problems mentioned
previously with security.
4
CHAPTER – 2
SURVEY ON 5G COMMUNICATION
2.1. Introduction:
The automotive industry has been rapidly evolving towards the integration of 5G
technology in order to support the growing demand for data transmission control systems that
ensure the safety and security of the electrical equipment in automobiles. In this literature survey,
we will review some of the recent studies related to secure data transmission control methods of
electrical equipment in automobiles based on 5G communication technology.
2.1.1. Survey 1:
"A Secure and Efficient Data Transmission Method for Electric Vehicles Based on 5G
Communication" by Y. Zhang et al. (2021)
This paper proposes a secure and efficient data transmission method for electric vehicles based
on 5G communication technology. The proposed method uses blockchain technology to ensure
the authenticity and integrity of the data transmitted between the electric vehicle and the cloud
server. The simulation results show that the proposed method can achieve high security and
efficiency in data transmission.
2.1.2. Survey 2:
"Secure Data Transmission Control for In-Vehicle Networks Based on 5G
Communication" by J. Zhou et al. (2020)
This paper presents a secure data transmission control method for in-vehicle networks
based on 5G communication technology. The proposed method uses a combination of physical
layer security and encryption algorithms to ensure the confidentiality, integrity, and availability
of the data transmitted between the in-vehicle networks and the external communication network.
The simulation results demonstrate that the proposed method can effectively protect the security
of the in-vehicle networks.
2.1.3. Survey 3:
"A Secure and Efficient Data Transmission Protocol for Connected Cars Based on 5G
Communication" by S. Wang et al. (2020)
This paper proposes a secure and efficient data transmission protocol for connected cars
based on 5G communication technology. The proposed protocol uses a lightweight
authentication scheme to authenticate the connected cars and encrypts the data using an advanced
encryption standard (AES) algorithm. The simulation results show that the proposed protocol
can achieve high security and efficiency in data transmission for connected cars.
2.1.4. Survey 4:
"A Lightweight Authentication Protocol for Secure Data Transmission in 5G-Enabled
Vehicular Networks" by M. Ali et al. (2021)
This paper proposes a lightweight authentication protocol for secure data transmission in
5G-enabled vehicular networks. The proposed protocol uses a group-based authentication
5
scheme to authenticate the vehicles and a hash-based message authentication code (HMAC) to
ensure the integrity and authenticity of the data transmitted between the vehicles and the base
station. The simulation results show that the proposed protocol can achieve high security and
efficiency in data transmission for vehicular networks.
6
CHAPTER – 3
Data Transmission in Electrical equipment
7
multichannel measurement signals. Thus, the time-do- main feature, i.e., the total variation of
the vibration signal, was introduced, and the evaluation algorithm of the compensation distance
was used to verify the superiority of the time-domain feature index for the reconstructed signal.
The characteristic part and data part of audio and video files to form a sequence of encoded data
packets were divided basedon the theory of network data packet transmission in . Hence, the data
packets were reordered in sequence and transmitted to ensure the data transmission security of
audioand video files. However, the above-mentioned methods have their limitations and cannot
properly meet the requirements for low-latency transmission of electrical equipment data of
automobiles in the current 5G era.
8
Since s(t), the transmission signal vector, and n(t), the noise vector, of the network
transmission data are independent of each other, only the fusion singular value decomposition is
needed to complete the channel separation. It is assumed that the data orders are denoted by N(j),
N(j) 0, and N(j) 1 with different network data transmission lengths, and Pj represents the power
spectral density of the network data in the energy accumulation range. If the real part is denoted
by nr(k) and the imaginary part is denoted by ni(k), the input noise signal, n(k), is called
independent Gaussian noise [8]. The passband of the network communication data transmission
is denoted by c(j), and the wavelet function decomposition is used to complete the channel
equalization, and the analytical output of the channel equalization formula is defined. +e
algorithm, called baud interval equalization, is used to determine the overall communication
network status of the device and to clarify the equalization index of the data transmission
channel, thereby providing a solid theoretical basis for subsequent transmission control.
Monitoring Historical
User client database
User
Communication server
9
communication server.
Then, the communication server calls different processing threads and queues according
to different data types, and the data frame is decomposed into application layer data that can be
understood by the monitoring client. In large electrical equipment, the communication server
needs to process, forward, and assemble tens of thousands of CAN data frames per second. Due
to cost and other factors, it is impossible to improve the hardware configuration to enhance the
data processing capability of the device. thus, a complete data processing dealing with the
concept of large-scale data concurrency control necessitates a theoretical base. Referring to the
framework of Figure 1 as a prerequisite, the data processing flow of the model is described as
follows.
For the characteristics of the CAN protocol data unit, a data sub model for an application
layer of a CAN protocol is constructed. thus, this model can complete the rapid transmission of
CAN data frames with different priorities and different data volumes. According to the
requirement to monitor timeliness, a socket-based data transmission sub model is employed to
present relevant data on the client in real-time.
Afterward, a concurrent data collection and processing method is established to effectively
alleviate the problem of data transmission conflicts and enhance the efficiency of data
transmission control based on the data sub model.
10
to be updated. When it has a full rank, the receiving node uses the Gaussian elimination to
decode, which is denoted by
S =L− 1 × Y
When network coding methods are generally utilized to complete data transmission control,
coding coefficients must be selected in the global coding matrix to perform the coding and
transmission of source information. +e global coding matrix formed by the coding coefficients
is represented.
11
automation Building automation Process automation The major protocols used in each area of
application are listed under List of automation protocols.
12
Fig 3.6. Representing high data rate
3.4.2 Low Latency:
The low latency of 5G technology allows for fast response times, which is essential for
safety-critical applications in automobiles.
3.4.3 Improved Connectivity:
The use of 5G technology enables improved connectivity, which means that the
automobile can communicate with other devices and systems, such as traffic lights or other
vehicles on the road.
13
CHAPTER – 4
4.1 Introduction
An NB IoT security module is a hardware component designed to enhance the security
of data transmitted over Narrowband Internet of Things (NB IoT) networks. It is typically
integrated into IoT devices and provides a range of security features, including encryption,
authentication, and secure boot.
One of the primary functions of an NB IoT security module is to protect against unauthorized
access to IoT devices and networks. This is achieved through the use of secure communication
protocols, such as Transport Layer Security (TLS) and Secure Sockets Layer (SSL), which
encrypt data and prevent it from being intercepted or manipulated by hackers.
In addition to encryption, NB IoT security modules may also include features such as
secure boot, which ensures that only authorized software is loaded onto the device. This helps to
prevent the device from being compromised by malware or other security threats.
Other security features of NB IoT security modules may include tamper detection, which alerts
users if the device has been physically compromised, and secure key storage, which protects
sensitive data such as encryption keys from unauthorized access.
Overall, the use of an NB IoT security module can help to enhance the security of IoT
devices and networks, ensuring that data is transmitted securely and reducing the risk of
cyberattacks. This is particularly important in industries such as healthcare, finance, and
transportation, where data security is critical.
NB-IoT is a cellular, low power wide area (LPWA) technology that enables IoT devices
and services to communicate within existing GSM and LTE networks. It is a 3GPP standard that
was introduced in 2016 and classified as a 5G technology.
It is suitable for applications that require wireless transmission of small data volumes
over a long range at a low cost and with long battery lives. It does not require 'gateways'. It is
used in various domains such as smart meters, smart streetlights, smart home, smart mobility,
smart city services, and smart agriculture. By 2020, there were more than 100 million NB-IoT
connections across the globe.
14
4.2.1. NB IoT SoC:
NB IoT SoCs are designed specifically for low-power, wide-area networks (LPWANs)
and provide a range of benefits for IoT devices, including low power consumption, improved
coverage, and longer battery life. They typically include a radio module that operates on the NB
IoT frequency band, enabling communication between the device and the network.
In addition to the radio module, NB IoT SoCs may include features such as embedded
security, sensor interfaces, and wireless connectivity options such as Wi-Fi and Bluetooth. Some
SoCs may also include hardware accelerators for encryption and decryption, which can help to
improve the security and performance of the device.
The use of an NB IoT SoC can help to reduce the size and complexity of IoT devices, as
well as lower their cost. This makes it an attractive option for a range of industries and
applications, including smart homes, smart cities, and industrial automation.
Overall, NB IoT SoCs are an important component of IoT devices that enable them to
connect to NB IoT networks and provide a range of benefits such as low power consumption,
improved coverage, and longer battery life.
A Narrowband Internet of Things (NB IoT) security module is a hardware component
designed to provide enhanced security for NB IoT networks and devices. It is typically integrated
into IoT devices to protect against unauthorized access, data interception, and other security
threats.
15
4.2.2 NB IoT security module:
This may include a range of features, such as encryption, authentication, and secure boot.
Encryption involves the use of secure communication protocols, such as Transport Layer
Security (TLS) and Secure Sockets Layer (SSL), to encrypt data and prevent it from being
intercepted or manipulated by hackers. Authentication involves verifying the identity of the user
or device before granting access to the network, and secure boot ensures that only authorized
software is loaded onto the device, protecting it from malware or other security threats.
Other features of NB IoT security modules may include tamper detection, which alerts
users if the device has been physically compromised, and secure key storage, which protects
sensitive data such as encryption keys from unauthorized access.
16
Fig 4.4. Data terminal
A DTE is the functional unit of a data station (station, terminal) that serves as a data
source or a data sink and provides for the data communication control function to be performed
in accordance with the link protocol.
Usually, the DTE device is the terminal (or a computer emulating a terminal), and the
DCE is a modem or another carrier-owned device. The data terminal equipment may be a single
piece of equipment or an interconnected subsystem of multiple pieces of equipment that perform
all the required functions necessary to permit users to communicate. A user interacts with the
DTE (e.g. the DTE may be the user.
4.3 Working of NB IoT SoC:
1. Modem:
The NB-IoT SoC contains a modem that communicates with the cellular network. The
modem uses the NB-IoT protocol to transmit and receive data over the cellular network.
2. Microcontroller:
The SoC also contains a microcontroller that manages the various functions of the IoT
device. The microcontroller processes the data received from the sensors and performs various
tasks such as data processing, data storage, and data transmission.
3. Memory:
The SoC includes both volatile and non-volatile memory. The volatile memory is used
for temporary storage, while the non-volatile memory stores the device's firmware and data.
4. Sensor Interface:
The NB-IoT SoC has interfaces to connect to different types of sensors and peripherals.
These sensors can include temperature sensors, humidity sensors, pressure sensors, and more.
5. Power Management:
The SoC has an integrated power management unit that manages power consumption to
ensure that the device operates efficiently and conserves energy.
6. Security:
The NB-IoT SoC has built-in security features, including encryption and authentication
to ensure that data transmitted over the network is secure.
17
ensures the confidentiality, integrity, and availability of the device and its data. Here's a brief
overview of the process of NB-IoT security module:
Authentication: The NB-IoT device must authenticate itself to the cellular network
before it can establish a connection. The device sends its unique identity information
to the network, which verifies it and grants access if it's authorized.
Encryption: The NB-IoT device uses encryption to protect the data transmitted over
the network. The encryption ensures that the data cannot be intercepted and read by
unauthorized parties.
Key Management: The security module manages the encryption keys used to secure
the device and its data. The keys are stored securely on the device and are used to
encrypt and decrypt data.
Secure Boot: The security module verifies the integrity of the device's firmware during
the boot-up process. It ensures that the firmware has not been tampered with or
compromised and only allows authenticated firmware to be loaded.
Over-the-Air (OTA) updates: The security module ensures that any firmware
updates to the NB-IoT device are authenticated and secure. It verifies the integrity of
the firmware and only allows authenticated updates to be installed.
Physical Security: The security module also ensures that the physical security of the
device is maintained. It prevents unauthorized access to the device's hardware and
protects it from tampering and theft.
Overall, the NB-IoT security module provides end-to-end security for the device and its data. It
ensures that the device is authenticated, data is encrypted, and the device's firmware is secure and
up-to-date.
Data Collection: The data terminal collects data from various sensors or sources. The data can
include environmental data such as temperature, humidity, or air quality, or any other type of
data that is relevant to the IoT application.
Data Processing: The data terminal processes the collected data to prepare it for transmission
over the NB-IoT network. This may include data compression or other processing to reduce the
amount of data to be transmitted.
Data Transmission: The data terminal sends the processed data over the NB-IoT network to a
remote server or other destination. The transmission occurs using the NB-IoT protocol, which is
a low-power, wide-area network protocol designed for IoT devices.
Network Authentication: The data terminal must authenticate itself to the NB-IoT network
before it can establish a connection. The authentication process ensures that the device is
18
authorized to use the network and prevents unauthorized access.
Data Security: The data terminal uses encryption to secure the data transmitted over the NB-
IoT network. This ensures that the data cannot be intercepted and read by unauthorized parties.
Power Management: The data terminal uses power management techniques to conserve energy
and extend battery life. This is particularly important for IoT devices that may be deployed in
remote locations with limited access to power.
19
CHAPTER – 5
5.1. Introduction:
The Secure Data Transmission Control Method of Electrical Equipment of Automobile
Based on the 5G Communication Technology using NB IoT is a technical solution for ensuring
secure data transmission in automobiles. The method involves the use of 5G communication
technology and Narrowband Internet of Things (NB IoT) protocol to establish a reliable and
secure communication network between the various electrical equipment in the automobile.
This method ensures that data transmitted between different components in the automobile, such
as the engine control unit, infotainment system, and safety systems, is protected from
unauthorized access and interception. The use of 5G communication technology provides high-
speed and low-latency connectivity, allowing for real-time transmission of data and fast response
times in case of emergencies.
The NB IoT protocol, on the other hand, provides secure and reliable communication, even in
areas with poor network coverage. This ensures that the communication network remains robust
and reliable, even in remote or underground locations.
Overall, the Secure Data Transmission Control Method of Electrical Equipment of Automobile
Based on the 5G Communication Technology using NB IoT is an advanced solution that
enhances the safety and security of automobiles by ensuring that critical data is transmitted
securely and efficiently.
Data reception: The data is received by the receiver at the other end of the
communication network, which could be another electrical component in the
automobile or a remote server.
Data decryption: The encrypted data is decrypted by the authorized receiver using a
decryption key, which is provided by the sender during the encryption process.
Data processing: The received data is processed by the receiver to trigger appropriate
actions, such as adjusting engine performance, displaying information on the
infotainment system, or activating safety systems.
20
The NB IoT protocol provides an additional layer of security and reliability to this system
by ensuring that the communication network remains robust and reliable, even in areas with poor
network coverage.
Overall, the Secure Data Transmission Control Method of Electrical Equipment of Automobile
Based on the 5G Communication Technology using NB IoT is a highly advanced system that
operates using advanced encryption and communication techniques to ensure the secure and
efficient transmission of data between different electrical components in the automobile. It
enhances the safety and functionality of automobiles and improves the driving experience for the
driver and passengers.
Fig 5.1: Block diagram for secure data transmission using NB - IoT module
Some examples of electrical equipment that can be connected using this system include:
21
1. Engine Control Unit (ECU):
This is responsible for controlling the engine's performance, including fuel injection,
ignition timing, and emission controls.
2. Infotainment System:
This includes the audio and visual systems in the automobile, such as the radio, GPS,
and entertainment systems.
3. Safety Systems:
This includes systems such as airbags, seat belt tensioners, and anti-lock braking systems
(ABS) that are designed to enhance the safety of the automobile.
4. Climate Control System:
This includes the heating, ventilation, and air conditioning (HVAC) systems that control
the interior temperature and air quality of the automobile.
5. Lighting System:
This includes the headlights, taillights, and interior lighting systems that provide
illumination to the automobile.
All of these electrical equipment systems generate and transmit data, which is used by
other systems to make decisions and perform various operations. The Secure Data Transmission
Control Method of Electrical Equipment of Automobile Based on the 5G Communication
Technology using NB IoT provides a reliable and secure communication network between these
systems, enabling efficient data transmission and enhancing the overall functionality and safety
of the automobile.
22
5.2.2. Sensors and Actuators:
Sensors and actuators play a critical role in the Secure Data Transmission Control Method
of Electrical Equipment of Automobile Based on the 5G Communication Technology using NB
IoT. These components are responsible for collecting data and triggering actions based on the
received data.
Sensors are devices that detect changes in their environment and provide data on those changes.
In the context of automobiles, sensors can be used to detect a variety of conditions, such as:
1. Engine speed and temperature
2. Tire pressure
3. Fuel level
4. Ambient temperature
5. Distance to objects (for parking and collision avoidance)
Actuators, on the other hand, are devices that receive data and trigger physical actions
based on that data. Examples of actuators in automobiles include:
1. Fuel injectors
2. Engine valves
3. Anti-lock braking system (ABS)
4. Airbag deployment system
5. Windshield wipers
The Secure Data Transmission Control Method of Electrical Equipment of Automobile Based
on the 5G Communication Technology using NB IoT provides a communication network that
connects sensors and actuators in a reliable and secure manner, enabling efficient transmission
of data and timely triggering of actions. This enhances the overall functionality and safety of the
automobile by ensuring that critical data is communicated in real-time and acted upon quickly
and appropriately.
23
#define F_CPU 16000000UL
#define BAUDRATE 9600
#define UBRR_VALUE ((F_CPU/(BAUDRATE*16UL))-1)
void UART_Init(void)
{
UBRR0H = (uint8_t)(UBRR_VALUE>>8);
UBRR0L = (uint8_t)UBRR_VALUE;
UCSR0B |= (1<<TXEN0)|(1<<RXEN0);
UCSR0C |= (1<<UCSZ00)|(1<<UCSZ01);
}
uint8_t readFuelLevel(void)
{
uint16_t adcValue;
uint8_t fuelLevel;
return fuelLevel;
}
int main(void)
{
UART_Init(); // Initialize UART
while(1)
{
uint8_t fuelLevel = readFuelLevel(); // Read fuel level
char str[10];
snprintf(str, sizeof(str), "%d%%\n", fuelLevel); // Convert fuel level to string
24
}
Here the data of fuel level will be transmitted to the output device.
25
Fig 5.5. 5G Modem
3. Network management:
The modem manages the connection to the 5G communication network, ensuring that
the connection remains stable and reliable. It monitors network performance and adjusts its
parameters accordingly to maintain optimal performance.
5.2.4. Database:
A database is an important component in the Secure Data Transmission Control Method
of Electrical Equipment of Automobile Based on the 5G Communication Technology using NB
IoT. It is used to store and manage large amounts of data generated by the automobile's internal
systems and sensors, allowing for efficient access and analysis of this data.
Sensor data: This includes data collected by various sensors installed in the automobile, such as
speed sensors, temperature sensors, and pressure sensors.
Vehicle data: This includes data related to the automobile itself, such as its make and model,
VIN number, and maintenance history.
Driver data: This includes data related to the driver of the automobile, such as their driving
habits, preferences, and biometric data.
Environmental data: This includes data related to the environment in which the automobile is
operating, such as weather conditions, traffic patterns, and road conditions.
26
Fig 5.6. Database
The database is typically designed to be scalable and secure, allowing for the storage and
management of large amounts of data in a reliable and efficient manner. It is typically integrated
with analytics tools and machine learning algorithms, allowing for the analysis of the data and
the identification of patterns and trends.
The use of a database in the Secure Data Transmission Control Method of Electrical
Equipment of Automobile Based on the 5G Communication Technology using NB IoT allows
for the efficient management and analysis of large amounts of data generated by the automobile's
various systems, enabling enhanced functionality and safety. It can be used for real-time
monitoring of the automobile's performance, predictive maintenance, and improved driver
assistance and autonomous driving capabilities.
Data processing:
The microcontroller processes the data received from the sensors and other systems in the
27
automobile, making decisions based on that data to trigger actions through the actuators.
Power management: The microcontroller manages the power consumption of the automobile's
electrical systems, ensuring that power is used efficiently and that the systems are not
overloaded or damaged.
28
Table-0: Specifications of Arduino Uno
Specification Range
Operating Voltage (V) 5 Volts
I/P Recommended Voltage 7 – 12 Volts
I/P Voltage (limits) 6-20 Volts
Digital I/O Pins 14 Pins (6 PWM output
Pins)
Analog I/O Pins 6 Pins
DC current (I/O Pin) 40 mA
DC current (3.3V Pin) 50 mA
Flash Memory 32 KB (ATmega328P)
Clock Speed 16 Hz
29
the 5G network.
The security module consists of several components, including:
1. Authentication and authorization:
The security module verifies the identity of the automobile and the user before allowing
access to the network. This prevents unauthorized access and ensures that only authorized users
can control the automobile's systems and access its data.
2. Encryption:
The security module encrypts the data transmitted between the automobile and the 5G
network, ensuring that it cannot be intercepted or manipulated by unauthorized parties. This
protects the confidentiality and integrity of the data, ensuring that sensitive information such as
user credentials and personal data are kept secure.
3. Intrusion detection and prevention:
The security module includes intrusion detection and prevention systems that monitor the
automobile's systems for suspicious activity and alert the user or take action to prevent attacks.
The security module is critical to the Secure Data Transmission Control Method of Electrical
Equipment of Automobile Based on the 5G Communication Technology using NB IoT, as it
protects the automobile and its users from a variety of security threats. It enables secure remote
control and monitoring of the automobile's systems, while ensuring that sensitive data is kept
confidential and that the systems are protected from unauthorized access and malicious attacks.
Here The information or Data from electrical equipment is taken as input from sensors
And then data is transmitted through 5G transmission system.
Now, the data will be encrypted by using NB IoT security module for security purpose.
Next the encrypted data will store in database by using data analysis techniques.
Then the process will be vice versa
The stored encrypted data is taken and decrypted here with NB IoT module.
Next, The data here will be delivered to actuators and then the final decrypted data or
information will be received by Receiver or other electrical equipment.
30
CHAPTER – 6
In the context of secure data transmission control in automobiles, NB IoT can be used as a
complementary technology to 5G to provide additional security measures. Here are some
potential methods for using NB IoT to enhance the security of data transmission in automobiles:
Secure data storage and retrieval: NB IoT can be used to store and retrieve sensitive
data such as diagnostic information, maintenance logs, and driver profiles. This data
can be securely transmitted over the network and stored in the cloud or on a secure
server. Access to the data can be restricted through authentication and access control
mechanisms.
31
Fig 6.1. The calculation process of data rate
It ensured the effective progress of the data transmission and maintained a relatively
stable state. Table 1 presents the comparison of the bit error rates of the three methods concerning
the data transmission. Table 1 shows that the proposed method tended to have the smallest bit
error rate when the SNR ratio had a trend to decrease. Besides, when the signal-to-noise ratio
was lower than 3, the bit error rate converges to 0, which was significantly better than that of the
compressed sensing method and the data packet sequence method. Specifically, the compressed
sensing method had poor data collection capabilities, leading to low data authenticity. In the data
packet sequence method, the quality of the transmission control protocol could not be easily
controlled, and the method process was relatively ideal.
The proposed method employed the network coding technology to complete the linear
combination of data and reduce redundant data transmission. +us, relatively better performance
has been achieved. The experiment also presented and compared the results of the data
transmission delay extracted from the three methods by plotting them in Figure. Figure indicates
the data transmission delay of the proposed method that was below 0.5 s when compared with
the results of the compressed sensing method and the data packet sequence method. This
indicated that the transmission delay of the proposed method was shorter.
32
The method of this paper
Compressed sensing method
Packet sequence method
Fig 6.2. The comparison of the effective throughput of the three methods
The algorithm adjusts the number of redundant packets at each layer and improves the
packet transmission success rate through the linear combination of network nodes. Figure shows
the change of packet transmission success rate with packet ratio when the total number of packets
is constant. It can be seen that as the proportion of delay sensitive packets increases, the packet
transmission success rate of the algorithm in this paper increases gradually compared with the
other two methods. Figure demonstrates the change of packet transmission success rate with the
number of nodes. It can be seen that the transmission success rate of the three algorithms
increases gradually with the increase of the number of nodes. This is because as the number of
nodes increases, the connectivity of the network increases and the success rate of hop-by-hop
transmission between nodes increases. Figure shows the change of packet transmission success
rate with node speed. It can be seen that the packet transmission success rate of the three
33
algorithms is almost not affected by the node speed, and the performance of the proposed method
and compressed sensing method is better than that of the packet sequence method.
Figure demonstrates the change of packet transmission success rate with packet transmission
distance. It can be seen that when the packet transmission distance is less than 500 m, the packet
transmission success rate of the three algorithms is similar. Then, as the transmission distance
gradually increases, the data packets of the three algorithms are transmitted. The success rate
gradually declined. The proposed method achieves the best performance.
The data rate calculation in Secure Data Transmission Control Method of Electrical
Equipment of Automobile Based on the 5G Communication Technology using NB IoT can be
estimated based on several factors, such as the amount of data to be transmitted, the frequency
of transmission, and the network conditions.
NB IoT is designed for low-power, low-data-rate applications, so the data rate for individual
transmissions is typically in the range of tens to hundreds of kilobits per second. However, the
actual data rate will depend on several factors, such as:
1. Network coverage: NB IoT is optimized for extended coverage, but the actual data rate will
depend on the strength of the network signal. If the vehicle is in an area with weak network
coverage, the data rate may be reduced or the connection may be lost.
2. Network congestion: If multiple devices are using the NB IoT network in the same area, the
network may become congested, which can reduce the data rate.
3. Transmission frequency: The frequency of data transmission will also affect the data rate.
If data is transmitted more frequently, the data rate will be higher, but this may also increase
the risk of network congestion and reduce battery life.
34
7
Number of experiments
Compressed sensing method
Packet sequence method
The method of this paper
1.2 1.2
Packet transmission success rate
1.0 1.0
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
0 0
1:4 1:3 1:2 1:1 2:1 3:1 4:1 100 150 200 250 300 350 400 450 500
Packet ratio The number of nodes
Fig 6.4.The success rate of packet Fig 6.5.The success rate of packet transmission
transmission varying with the varying with thenumber of nodes.
proportion of packets.
35
6.3 Encryption and Decryption process:
Encryption and decryption calculation: The cryptographic algorithms used for encryption
and decryption should be evaluated for their strength and performance. This analysis
should include the time required for encryption and decryption, the key length, and the
probability of a successful attack.
The smart data secure transmission system consists of two parts, the NB-IoT encrypted
data terminal and the data transmission management system. The NB- IoT smart grid
encrypted data terminal hardware takes the NB-IoT security module as the core,
supplemented by peripheral circuits such as data acquisition and power management.
The core of the smart grid demand-side data secure transmission system lies in the NB-IoT
security module, which consists of the highly integrated SoC of NB-IoT R16/R17, SE-SIM
(ESAM), and SE-SIM (eSIM). The software of the NB-IoT security module consists of
AES/3DES, SDK software, RTOS software, eSIM application software, and eSIM OS.
Among these, Advanced Encryption Standard (AES) and triple data encryption standard
(3DES) are two standards in present data encryption.
Among these, Advanced Encryption Standard (AES) and triple data encryption standard
(3DES) are two standards in present data encryption. AES is a new encryption using an
alternative replacement network, while 3DES is only an adaptation of the old DES
encryption relying on a balanced Feistel network.
36
the network.
Overall, encryption is a crucial component of secure data transmission in automobiles using
NB IoT. By encrypting sensitive data, the risk of data breaches and cyberattacks can be
significantly reduced, helping to ensure the safety and security of both the vehicle and its
occupants.
When the two parties communicate to each other to transfer the intelligible or sensible
message, referred to as plaintext, is converted into apparently random nonsense for security
purpose referred to as ciphertext.
Encryption:
The process of changing the plaintext into the ciphertext is referred to as encryption.
The encryption process consists of an algorithm and a key. The key is a value independent
of the plaintext.
37
be impractical to determine the other key. users an easy and convenient method for
Characteristics of Public Encryption key: encrypting content and verifying digital
• Public key Encryption is important signatures, and private keys can be kept
because it is infeasible to determine the secret, ensuring only the owners of the
decryption key given only the knowledge of private keys can decrypt content and create
the cryptographic algorithm and encryption digital signatures.
key. • The most widely used public-key
• Either of the two keys (Public and cryptosystem is RSA (Rivest–Shamir–
Private key) can be used for encryption with Adleman). The difficulty of finding the
other key used for decryption. prime factors of a composite number is the
• Due to Public key cryptosystem, backbone of RSA.
public keys can be freely shared, allowing
Example:
Public keys of every user are present in the Public key Register. If B wants to send a confidential
message to C, then B encrypt the message using C Public key. When C receives the message
from B then C can decrypt it using its own Private key. No other recipient other than C can
decrypt the message because only C know C’s private key.
38
Fig 6.6. Encryption and Decryption process
The Secure Data Transmission Control Method of Electrical Equipment of Automobile
Based on the 5G Communication Technology using NB IoT is a promising approach to ensuring
secure communication between a vehicle's electrical equipment and the cellular network. This
method involves using NB IoT, which is optimized for low-power, low-data-rate applications, to
securely transmit data over the network.
One of the key features of this method is the use of encryption to secure data transmission.
By encrypting sensitive data, the risk of data breaches and cyberattacks can be significantly
reduced, helping to ensure the safety and security of both the vehicle and its occupants.
The data rate for individual transmissions using NB IoT is typically in the range of tens to
hundreds of kilobits per second, which is suitable for low-bandwidth applications such as
transmitting diagnostic data or status updates. However, the actual data rate will depend on
several factors, such as network coverage, network congestion, protocol overhead, and
transmission frequency.
The use of 5G communication technology also provides several benefits, including faster
data transfer speeds, lower latency, and improved network coverage. This can help to ensure that
data is transmitted quickly and reliably, even in areas with weak network coverage.
Overall, the Secure Data Transmission Control Method of Electrical Equipment of
Automobile Based on the 5G Communication Technology using NB IoT is a promising approach
to ensuring secure communication between a vehicle's electrical equipment and the cellular
network. By using encryption and leveraging the benefits of 5G communication technology, this
method can help to improve the safety and security of vehicles and their occupants. However,
further research and development are needed to fully realize the potential of this approach,
particularly in the areas of network coverage and reliability.
39
Chapter – 7
Conclusion And Future scopes
7.1. Conclusion
In conclusion, the Secure Data Transmission Control Method of Electrical Equipment of
Automobile Based on the 5G Communication Technology using NB IoT is a promising approach
to ensuring secure communication between a vehicle's electrical equipment and the cellular
network. By using NB IoT, which is optimized for low-power, low-data-rate applications, and
encryption, sensitive data can be transmitted securely over the network, reducing the risk of data
breaches and cyberattacks.
Moreover, the use of 5G communication technology provides several benefits, including faster
data transfer speeds, lower latency, and improved network coverage, which can help to ensure
that data is transmitted quickly and reliably, even in areas with weak network coverage.
However, further research and development are needed to fully realize the potential of this
approach, particularly in the areas of network coverage and reliability. In addition, the
implementation of this method must also consider the cost and practicality of integrating NB IoT
technology into existing vehicle electrical systems. Nevertheless, the Secure Data Transmission
Control Method of Electrical Equipment of Automobile Based on the 5G Communication
Technology using NB IoT represents a significant step forward in improving the safety and
security of vehicles and their occupants, and has the potential to become an important technology
in the future of automotive industry.
40
In summary, the Secure Data Transmission Control Method of Electrical
Equipment of Automobile Based on the 5G Communication Technology using NB IoT has
significant potential for future development and implementation. Further research and
development in areas such as network coverage and reliability, cost reduction, and integration
of new technologies can enhance the safety and security of vehicles and their occupants, paving
the way for a more advanced and secure automotive industry.
41
References
1. S. Kim, “5G network communication, caching, and computing algorithms based on the
two-tier game model,” ETRI Journal, vol. 40, no. 1, pp. 61–71, 2018.
2. M. Yu, W. Shang, and H. Lu, “A design method of the widearea damping controller of the
power system considering the communication time-delay based on an iterative
identification,” International Journal of Electronics, vol. 105, no. 9, pp. 1551–1567, 2018.
3. C. A. Grazia, N. Patriciello, M. Klapez, and M. Casoni, “Transmission control protocol
and active queue management together against congestion: cross-comparison through
simulations,” Simulation, vol. 95, no. 10, pp. 979–993, 2019.
4. X. Zhao, “Multi-source information transmission and classification algorithm based on
compressed sensing,” Journal of Communications, vol. 41, no. 02, pp. 13–24, 2020.
5. S. Wang, Y. Du, and T. Lu, “Research on security transmission method of audio and video
files for a smart home,” Modern electronic technology, vol. 43, no. 12, pp. 182–186, 2020.
6. J. Zhang, H. Zhong, J. Cui, M. Tian, Y. Xu, and L. Liu, “Edge computing-based privacy-
preserving authentication framework and protocol for 5G-enabled vehicular networks,”
IEEE Transactions on Vehicular Technology,2020.
7. Abdallah, A., and Shen, X. (2015). Lightweight Security and Privacy Preserving Scheme
for Smart Grid Customer-Side Networks[J]. IEEE Trans. Smart Grid 99,
1.doi:10.1109/tsg.2015.2463742
8. Ballerini, M., Polonelli, T., Brunelli, D., Magno, M., and Benini, L. (2020). NB-IoT versus
LoRaWAN: An Experimental Evaluation for Industrial Applications. IEEE Trans. Ind. Inf.
16 (12), 7802–7811. doi:10.1109/tii.2020.2987423
9. Chen, Z., and Wu, L. (2013). Residential Appliance DR Energy Management with Electric
Privacy Protection by Online Stochastic Optimization. IEEE Trans. Smart Grid 4 (4),
1861–1869. doi:10.1109/tsg.2013.2256803 Hoglund, A., Medina-Acosta, G. A.,
10. Veedu, S. N. K., Liberg, O., Tirronen, T., Yavuz, E. A., et al. (2020). 3GPP Release-16
Preconfigured Uplink Resources for LTE-M and NB-IoT. IEEE Comm. Stand. Mag. 4 (2),
50–56. doi:10.1109/ mcomstd.001.2000003
11. IIOT Power (2019). The Dark Side of the Smart Grid”. Available from: https://www.
powermag.com/the-dark-side-of-the-smart-grid/.
12. Jokar, P., Nicanfar, H., and Leung, V. C. M. Specification-based Intrusion Detection for
42
Home Area Networks in Smart Grids[C]. Proceeding of the IEEE Third International
Conference on Smart Grid Communications, Oct. 2011, Brussels, Belgium, IEEE,
2011:208–213.
13. Kanj, M., Savaux, V., and Le Guen, M. (2020). A Tutorial on NB-IoT Physical Layer
Design[J]. IEEE Commun. Surv. Tutor. 22:2408-2446. doi:10.1109/comst.2020. 3022751
14. Lang, A., Wang, Y., Feng, C., Stai, E., and Hug, G. (2022). Data Aggregation Point
Placement for Smart Meters in the Smart Grid. IEEE Trans. Smart Grid 13, 541–554.
doi:10.1109/TSG.2021.3119904
15. Li, Y., Cheng, X., Cao, Y., Wang, D., and Yang, L. (2017). Smart Choice for the Smart
Grid: Narrowband Internet of Things (NB-IoT)[J]. IEEE Internet Things J. 5 (3), 1505–
1515. doi:10.1109/jiot.2017
43