4th Year Cyber Security Project - SETU
This project focuses on creating an application which can listen in to a car's internal network via the OBD-II port. By doing so, this project will allow a user to understand the inner workings of a car's network.
The project explores the structure of diagnostic codes, the protocols that govern their transmission, and develops a framework for interpreting these codes to gain insights into vehicle health and performance.
Access all project documentation below:
This project leverages several technologies and tools to facilitate the reverse engineering of vehicle diagnostic codes:
The project specifically focuses on the Controller Area Network (CAN) protocol, which is the standard for in-vehicle network communication. Using the PCAN Basic API, the project captures, analyzes, and interprets diagnostic messages exchanged between a vehicle's Electronic Control Units (ECUs), and it's sensors.
This project was developed as part of the 4th year undergraduate program at South East Technological University (SETU). The work represents the culmination of academic study in cyber security, focusing on practical applications in the automotive diagnostic domain.
Vehicle diagnostics has become increasingly complex with modern automobiles containing dozens of networked computers. Understanding the communication between these systems is crucial for vehicle maintenance, repair, and security research.