OBD-II Vehicle Simulator

4th Year Cyber Security Project - SETU

📊Project Overview

This project focuses on creating an application which can listen in to a car's internal network via the OBD-II port. By doing so, this project will allow a user to understand the inner workings of a car's network.

The project explores the structure of diagnostic codes, the protocols that govern their transmission, and develops a framework for interpreting these codes to gain insights into vehicle health and performance.

📚Project Documents

Access all project documentation below:

📋
Project Specification
Download
🔍
Research Document
Download
📑
Final Report
Download

🔧Technical Details

This project leverages several technologies and tools to facilitate the reverse engineering of vehicle diagnostic codes:

PCAN Basic API PCAN USB CAN Bus Protocol OBD-II Standards Diagnostic Trouble Codes (DTCs) Signal Processing Python

The project specifically focuses on the Controller Area Network (CAN) protocol, which is the standard for in-vehicle network communication. Using the PCAN Basic API, the project captures, analyzes, and interprets diagnostic messages exchanged between a vehicle's Electronic Control Units (ECUs), and it's sensors.

â„šī¸About the Project

This project was developed as part of the 4th year undergraduate program at South East Technological University (SETU). The work represents the culmination of academic study in cyber security, focusing on practical applications in the automotive diagnostic domain.

Vehicle diagnostics has become increasingly complex with modern automobiles containing dozens of networked computers. Understanding the communication between these systems is crucial for vehicle maintenance, repair, and security research.

↑