Menu

Executive Programs

Workshops

Projects

Blogs

Careers

Placements

Student Reviews


For Business


More

Academic Training

Informative Articles

Find Jobs

We are Hiring!


All Courses

Choose a category

Mechanical

Electrical

Civil

Computer Science

Electronics

Offline Program

All Courses

All Courses

logo

CHOOSE A CATEGORY

Mechanical

Electrical

Civil

Computer Science

Electronics

Offline Program

Top Job Leading Courses

Automotive

CFD

FEA

Design

MBD

Med Tech

Courses by Software

Design

Solver

Automation

Vehicle Dynamics

CFD Solver

Preprocessor

Courses by Semester

First Year

Second Year

Third Year

Fourth Year

Courses by Domain

Automotive

CFD

Design

FEA

Tool-focused Courses

Design

Solver

Automation

Preprocessor

CFD Solver

Vehicle Dynamics

Machine learning

Machine Learning and AI

POPULAR COURSES

coursePost Graduate Program in Hybrid Electric Vehicle Design and Analysis
coursePost Graduate Program in Computational Fluid Dynamics
coursePost Graduate Program in CAD
coursePost Graduate Program in CAE
coursePost Graduate Program in Manufacturing Design
coursePost Graduate Program in Computational Design and Pre-processing
coursePost Graduate Program in Complete Passenger Car Design & Product Development
Executive Programs
Workshops
For Business

Success Stories

Placements

Student Reviews

More

Projects

Blogs

Academic Training

Find Jobs

Informative Articles

We're Hiring!

phone+91 9342691281Log in
  1. Home/
  2. NAVENBABU Y/
  3. Project 2

Project 2

1. Program that Performs a Binary Signals in ICSIM: ICSIM [Instrument Cluster Stimulator]:  ICSim by Craig Smith this virtual instrument cluster represents a dashboard from a vehicle and includes a speedometer, door lock indicators, turn signal indicators and a control panel that allows you to interact with a simulated…

    • NAVENBABU Y

      updated on 17 May 2022

    1. Program that Performs a Binary Signals in ICSIM:

    ICSIM [Instrument Cluster Stimulator]:

     ICSim by Craig Smith this virtual instrument cluster represents a dashboard from a vehicle and includes a speedometer, door lock indicators, turn signal indicators and a control panel that allows you to interact with a simulated CAN network similar to the CAN networks seen on real cars and vehicles.

    In ICSim the instrument Cluster is starts

    Command: ./icsim vcan0

    In ICsim the joystick controller is starts which is used to control the virtual instrument cluster.

    Command: ./controls vcan0

    Sample Picture:

     

     

    (a). Program to set the speedometer

    In ICSim the virtual CAN message for acceleration using command in while loop format to rise the acceleration upto 120kph in virtual instrument cluster. The acceleration ARB ID is 244 with byte value is 5.

    The program of speedometer is proceed in BASH SCRIPT using the while loop process to break the speed linit and rise upto 120kph.

    Screenshot Bash Program for Speedometer:

    Command: ./Can_bash1.sh {Execute by using the file name}

     

    Replay Attack Instrument Cluster Program:

    Speedometer:

    The Replay Attack is process on the linux termal using the tools are CANPLAYER for play the replay attack on the ICSim.

    Steps to Replay Attack process:

    Step 1: At first in the linux terminal use to open the ICSim instrumental cluster and controller for pass the CAN message. Using the CANDUMP tool to store the CAN message from ICSim process.

    Syntax: candump -L vcan0 > “Replay_Attack1.log”

    Screenshot for Replay_Attack1.log file:

    Step 2: Using the CANPLAYER tool to process the replay attack in instrument of ICSim to watch the attack process

    Syntax: canplayer -l Replay_Attack1.log {Execute with log file name}

    Screenshot for Canplayer for Speedometer:

     

    (b). Program and Replay Attack for Indicator Signals:

    In ICSim the virtual CAN message for signals using left and right arrow key is using joystick in virtual instrument cluster. The signal ARB ID is 188 with byte value is 4.

    Command: cangen vcan0 -g 10 -I 188 -L 6 -D 02 00 00 00 { -g <ms> (gap in milli seconds - default: 200 ms)} & { -I <mode>(CAN ID generation mode - see below)} & { L <mode>(CAN data length code (dlc) generation mode - see below)}&{ -D <mode> (CAN data (payload) generation mode - see below)}

    Payload Byte Value: Right Signal 02

    Sample Screenshot for Indicator Signal:

     

    Replay Attack Indicator Signals Program:

    Indicator Signals:

    The Replay Attack is process on the linux termal using the tools are CANPLAYER for play the replay attack on the ICSim.

    Steps to Replay Attack process:

    Step 1: At first in the linux terminal use to open the ICSim instrumental cluster and controller for pass the CAN message. Using the CANDUMP tool to store the CAN message from ICSim process.

    Syntax: candump -L vcan0 > “Replay_Attack2.log”

    Screenshot for Replay_Attack1.log file:

    Step 2: Using the CANPLAYER tool to process the replay attack in instrument of ICSim to watch the attack process

    Syntax: canplayer -l Replay_Attack2.log {Execute with log file name}

    Screenshot for Canplayer for Indicator Signal:

     

    2. Iteration Message Display and kept in Log Files:

    The CAN Message is pass through on the ICSim (Instrument Cluster Stimulation ) the method iteration is form in message flow again and again in the same path of ARB ID’s while occurs in under CAN tool on CANSNIFFER. It’s keep the message in the continue flow of loop on same ARB ID’s.

    Command of CANSNIFFER: cansniffer -t 0 -c  vcan0 {-t <time>(timeout for  ID  display  [x10ms]  default: 500, 0 = OFF) &  -c  (color changes)}

     Screenshot of CANSNIFFER:

     

     

    Repay Attack in ICSim CAN Message:

    The Replay Attack is process on the linux termal using the tools are CANPLAYER for play the replay attack on the ICSim.

    Steps to Replay Attack process:

    Step 1:In Repay Attack first program some CAN message pass, In ICSim the virtual CAN message for signals using command value 03 in payload to access virtual instrument cluster. The first signal ARB ID is 19B with byte value is 6 and Second Signal is ARB ID is 188 with byte value is 4

    • Command for DOOR OPEN: cansend vcan0 19B#00000E000000 {Left front Door open: Byte 02 = 0E}
    • Command for Indicator Signal: cangen vcan0 -g 10 -I 188 -L 6 -D 02 00 00 00 { -g <ms> (gap in milli seconds - default: 200 ms)} & { -I <mode>(CAN ID generation mode - see below)} & { L <mode>(CAN data length code (dlc) generation mode - see below)}&{ -D <mode> (CAN data (payload) generation mode - see below)}

    Step 2: At first in the linux terminal use to open the ICSim instrumental cluster and controller for pass the CAN message. Using the CANDUMP tool to store the CAN message from ICSim process.

    Syntax: candump -L vcan0 > “Replay_Attack3.log” {Execute with file name}

    Sample Screenshot Log file:

    Step 3: Using the controller to process the operation as soon as possible because in the candump tool the log store continue flow of message.

    Step 4: Using the CANPLAYER tool to process the replay attack in instrument of ICSim to watch the attack process.

    Syntax: canplayer -l Replay_Attack3.log {Execute with file name}

    Sample Screenshot:

     

    Split the Log File into half :

    Step 1: In the log file of replay attack there is n number message are pass including the replay attack message. But in this task we need to generate replay attack after 200 message pass through in the ICSim for replay attack.

    Step 2: Using the WC for Work Count message in log file. In this Repay Attack the log file contains 12386 message are pass while during process of iteration program. The SPLIT the log file into half of the section then proceed the CANPLAYER operation for Replay Attack on the CAN message in the ICSim.

    Syntax for Word Count: wc -l Replay_Attack3.log [12386] {Execute with file name}

    Syntax for Split log file: split -l Replay_Attack3.log [6193] {Execute with file name}

    Sample Screenshot of both WC and SPLIT log file:

    Step 3: Again Using the CANPLAYER tool to process the replay attack in instrument of ICSim to watch the attack process of split log file.

    Syntax: canplayer -l Replay_Attack3.log {Execute with file name}

    Screenshot for SPLIT log file Replay Attack:

     

    Note: Log files and program file attached:

    (i). Iteration Program file name is can_send1.sh

    (ii). All Replay Attacks are attach as per file names are

    • Repay_Attack1.log
    • Repay_Attack2.log
    • Repay_Attack3.log

     

    Leave a comment

    Thanks for choosing to leave a comment. Please keep in mind that all the comments are moderated as per our comment policy, and your email will not be published for privacy reasons. Please leave a personal & meaningful conversation.

    Please  login to add a comment

    Other comments...

    No comments yet!
    Be the first to add a comment

    Read more Projects by NAVENBABU Y (9)

    Project

    Objective:

    TARA (Technical Assessment and Risk Analysis) Report Product: Headlamp System: Introduction: This TARA report is aimed at analyzing the potential risks associated with damage to the headlamp system. The report presents a comprehensive analysis of the product's technical features, functionality, and potential risks associated…

    calendar

    03 May 2023 06:07 AM IST

      Read more

      Project 2 - Comprehensive Risk Rating System &#40;CRRS&#41;

      Objective:

      Project-2: Comprehensive Risk Rating System (CRRS): Agenda of the Project: Explanation about Risk and detail about Risk formula. Find the vulnerability and Impact of each component were place in Online Bank Security Boundary. Calculate the Risk of Security components using Risk formula. Average total Risk find in security…

      calendar

      06 Jan 2023 04:29 PM IST

        Read more

        Project 1 - Design Enterprise Security Model

        Objective:

        Project 1- Design Enterprise Security Model: Agenda of Project: Introduction detail about the task and include the bank security infrastructure. Express the details of security model were using for bank infrastructure. Express the real-time scenario online banking and background working security boundary. List the checklist…

        calendar

        06 Jan 2023 08:53 AM IST

          Read more

          Project 2 - Installing BWAPP – web app on your local machine

          Objective:

          1. Install BWAPP – web app on your local machine. Successfully exploit the below Vulnerabilities: BWAPP intro: bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. It helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities.…

          calendar

          06 Dec 2022 05:38 PM IST

          • HTML
          Read more

          Schedule a counselling session

          Please enter your name
          Please enter a valid email
          Please enter a valid number

          Related Courses

          coursecard

          Design loads considered on bridges

          Recently launched

          10 Hours of Content

          coursecard

          Design of Steel Superstructure in Bridges

          Recently launched

          16 Hours of Content

          coursecard

          Design for Manufacturability (DFM)

          Recently launched

          11 Hours of Content

          coursecard

          CATIA for Medical Product Design

          Recently launched

          5 Hours of Content

          coursecardcoursetype

          Accelerated Career Program in Embedded Systems (On-Campus) Courseware Partner: IT-ITes SSC nasscom

          Recently launched

          0 Hours of Content

          Schedule a counselling session

          Please enter your name
          Please enter a valid email
          Please enter a valid number

          logo

          Skill-Lync offers industry relevant advanced engineering courses for engineering students by partnering with industry experts.

          https://d27yxarlh48w6q.cloudfront.net/web/v1/images/facebook.svghttps://d27yxarlh48w6q.cloudfront.net/web/v1/images/insta.svghttps://d27yxarlh48w6q.cloudfront.net/web/v1/images/twitter.svghttps://d27yxarlh48w6q.cloudfront.net/web/v1/images/youtube.svghttps://d27yxarlh48w6q.cloudfront.net/web/v1/images/linkedin.svg

          Our Company

          News & EventsBlogCareersGrievance RedressalSkill-Lync ReviewsTermsPrivacy PolicyBecome an Affiliate
          map
          EpowerX Learning Technologies Pvt Ltd.
          4th Floor, BLOCK-B, Velachery - Tambaram Main Rd, Ram Nagar South, Madipakkam, Chennai, Tamil Nadu 600042.
          mail
          info@skill-lync.com
          mail
          ITgrievance@skill-lync.com

          Top Individual Courses

          Computational Combustion Using Python and CanteraIntroduction to Physical Modeling using SimscapeIntroduction to Structural Analysis using ANSYS WorkbenchIntroduction to Structural Analysis using ANSYS Workbench

          Top PG Programs

          Post Graduate Program in Hybrid Electric Vehicle Design and AnalysisPost Graduate Program in Computational Fluid DynamicsPost Graduate Program in CADPost Graduate Program in Electric Vehicle Design & Development

          Skill-Lync Plus

          Executive Program in Electric Vehicle Embedded SoftwareExecutive Program in Electric Vehicle DesignExecutive Program in Cybersecurity

          Trending Blogs

          Heat Transfer Principles in Energy-Efficient Refrigerators and Air Conditioners Advanced Modeling and Result Visualization in Simscape Exploring Simulink and Library Browser in Simscape Advanced Simulink Tools and Libraries in SimscapeExploring Simulink Basics in Simscape

          © 2025 Skill-Lync Inc. All Rights Reserved.

                      Do You Want To Showcase Your Technical Skills?
                      Sign-Up for our projects.