Door Access Control in an Intelligent Car 1 Shiv Sutar , 2

advertisement
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
Door Access Control in an Intelligent Car
1st Shiv Sutar1, 2nd Kalyan Kapratwar2, 3rd Rahul Rayate3, 4th Siddhesh Birari4, 5rd Swastik Zalke5
¹,2,3,4,5
Computer Engineering University of Pune, India
Abstract—Security is a phenomenon that applies to any
vulnerable and valuable asset to protect it from harm. We
think that vehicle is an invaluable asset. Our project basically
aims at providing security for the Vehicles. At present, the
entire security of the vehicle depends only and only on
mechanical key. If under any circumstances the key is lost,
then there is a great possibility for theft of the vehicle. In this
present scenario of increasing thefts, there is a dire need to
address these issues. In this paper, we aim at developing a
prototype that would provide a high level security at the door
of the vehicle. This would help in protecting the vehicle as
well as its accessories from theft. In order to achieve this, our
prototype makes use of highly secure and digitally authorized
USB drive. The USB drive has been intensively authenticated
with the use of high standard encryption and decryption
algorithm. We also present an interlinked two step
authentication process which can be used to enhance the
security and reduce forgery cases.
Keywords - MD5, OTP, Validation, Authentication, Cipher
text, Encryption, decryption.
I.
Introduction
Security provides "a form of protection where a separation is
created between the assets and the threat"[1]. Technically
security is a broader term that encompasses various aspects
such as Encryption ,Decryption, Digital Certificate etc.
However ,at present, the most popular technologies employed
for security make use of Biometric techniques. Biometrics [2]
has been around since about 29,000 BC when cavemen would
sign their drawings with handprints [3].Vehicle security have
been a major cause of concern for many companies worldwide.
However, the vehicle security through Biometrics has
significantly improved since the early days. Since the
beginning, there is a big contest between security providers and
security breachers and it is becoming more complicating every
day, and will continue afterwards. This is a quite general that
the major cause for this is that new tactics get developed by
security breachers every time. As said earlier, various
Biometric techniques are currently in practice such as Fingerprint Recognition[4], Voice Recognition[5], Retina Scan[6],
ISSN: 2231-5381
Face Recognition[7] etc. But these are all time-consuming and
non-economical processes. Moreover, if the related body part
gets damaged then the use of the system becomes a tedious job.
In order to avoid these factors, we can make use of highly
secure, cost effective and portable USB device. In this paper,
we study proposed system to overcome above said drawbacks,
address common issues and discuss solutions.
II.
Literature Survey
There are numerous methods for preventing unauthorized
access to unlock the vehicle door. The most commonly used
technology is the car alarm siren [8] which is an electronic
annoyance device installed in a vehicle in an attempt to
discourage theft of the vehicle itself, its contents, or both.
Another popular technique is a keyless entry system is an
electronic lock that controls access to a building or vehicle
without using a traditional mechanical key. Another popular
technique used for the purpose is the Biometric techniques.
Every individual in this world has a unique finger impression
and no two finger impressions are a like thus giving everyone a
unique identity [9]. In an another approach, a retina scanning
anti-theft device for motor vehicles includes a retinal scanner
electrically connected to a vehicle's door for preventing an
intruder from unlocking the vehicle unless a proper retinal
pattern is detected. To overcome the hardships in providing
security in all aspects, some other several techniques that were
suggested included pattern learning, code matching, OTP etc.
II.1. Implausible Techniques
This section introduces the obscure techniques commonly used
in the security of the vehicles.
A. Power Door Lock [9]
This is one of the most common and easily available
techniques which were introduced in 1914. Power door
locks allow the driver or front passenger to simultaneously lock
or unlock all the doors of an automobile , by pressing a button
or flipping a switch. Nearly every car model today offers this
feature as at least optional equipment. However, if the
unauthorized person gets access to the switch then the system
renders useless for security.
http://www.ijettjournal.org
Page 1220
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
B. Remote Keyless System [10]
The term remote keyless system (RKS) is more commonly
used as keyless entry or remote central locking. Keyless
remotes contain a short-range radio transmitter, and must be
within a certain range, usually 5–20 meters (15–60 ft.), of the
car to work. This system becomes implausible due to its short
range.
C. Voice Recognition System
As compared to the techniques discuss above this is somewhat
more interesting and user friendly techniques. Here user simply
needs to pronounce password and depending on signals
generated, the user is granted the access. Even the best speech
recognition systems sometimes make errors. If there is noise or
some other sound in the environment, then the number of
errors will increase.
D. Vehicle Tracking System [11]
This is one of the best curative techniques presently available.
It includes installation of the electronic device in vehicle or
fleet of vehicle. This makes vehicle track able in cases of theft,
but the preventive techniques are more effective than curative
once.
III. Proposed Architecture
Our proposed model is a hybrid model consisting of various
phases which provides security at different levels by using
portable and digitally certified USB followed by electronic
code matching technique. Basically whenever the issue of car
access then two perspectives comes to the focus, first one is car
access by owner and second one is that the car access by third
but authenticated person. In first perspective the owner simply
insert the USB to the system after doing this the owner get
password which he simply enter and getting the access of the
vehicle.
In the second perspective [Third person access], The Third
person who want to access the vehicle must have the
authenticated USB deice then he simply insert the USB device
to the system same as first perspective. After that the password
is automatically send to the owner of vehicle. Then the owner
provides the password to third person. After getting the
password from owner of vehicle, the third person simply enter
it and getting access of vehicle. This perspective is simply
show in fig.1
This authentication process accepts data from phase-3[Internal
Digital Code Generation] and phase-5[User Digital Code
Generation]. Once this process completes, its output is given to
door unlocking device.
III.1.
Internal Digital Code Generation Technique
Figure - 1
To implement above perspectives there are various phases in
our proposed model.
In the phase-1[USB Unique ID Extraction], the drive name
and its corresponding serial-id is obtained and the uniqueness
of the USB is authenticated.
Phase-2[Password Generator] includes Password Generation
where a random code is generated. The password is sent to the
authenticated user.
Phase-3[Internal Digital Code Generation] is the Digital Code
Generation for internal validation purpose. This phase receives
the inputs from phase-1[USB Unique ID Extraction] and
phase-2[Password Generator]. In this phase, the concatenation
of password and drive_id takes place. This string is then cipher
texted. Using the data available in phase-1, phase-2[Password
Generator] the cipher text is generated in the phase-3. The
output of this phase is sent to the phase-6[Authentication
Process] where it is compared with output of phase-5[User
Digital Code Generation].
Phase-4[User Mobile] receives the input from the phase-2.The
output of this phase is sent as an input to the Phase-5[User
Digital Code Generation].
Phase-5[User Digital Code Generation],The data required for
processing in this phase are obtained from phase-1[USB
Unique ID Extraction] and phase-4[User Mobile]. Here a
cipher text is generated as like in phase-3[Internal Digital Code
Generation].
Phase 6[Authentication Process] this is the last phase of the
proposed model in which actual authentication takes place.
This technique is implemented in phase-3[Internal Digital
Code Generation], in which the Internal Digital Code
Generation takes place. This generated Internal Digital Code is
used for the USB authentication purpose at a later stage. The
data required for this technique is obtained from phase-1[USB
Unique ID Extraction] and phase-2 as shown in fig-2.
III.1.1
ISSN: 2231-5381
http://www.ijettjournal.org
Execution of auto.exe file
Page 1221
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
The objective of phase-1 is to obtain the unique USB id with
its corresponding drive letter. When the USB device is plugged
in, the auto.exe file is executed. This phenomenon is in practice
since last decade a well known and dynamic example is
autorun.exe used for CD-ROM[12]. Once the auto.exe is
executed, it creates volinfofile. Using this volinfo file, USB
unique id i.e. manufacturer id is extracted which is used Digital
Code Generation Process in phase-3 and phase-5 as shown in
fig-2.
III.1.2 OTP generation process
In phase-2[Password Generator] the One Time Password[13]
generation process occurs. This system provides authentication
for system access and other applications requiring
authentication that is secure against passive attacks based on
replaying captured reusable passwords. This technique was
first suggested by Leslie Lamport [15]. This process consists of
an initial step in which all inputs are combined, a computation
step where the secure hash function is applied a specified
number of times, and an output function where the 64-bit onetime password is converted to a human readable form. This
OTP is sent to the registered mobile number.
III.1.3 Digital Code generation process
Phase-3[Internal Digital Code Generation] is the phase in
which the actual Internal Digital Code is generated. Here the
unique USB id obtained in phase-1[USB Unique ID
Extraction] as well as the OTP generated in phase-2[Password
Generator] are taken as inputs as shown in fig-1 below. In the
next step of phase-3[Internal Digital Code Generation],
concatenation of unique USB id followed by OTP takes place.
Now this string is encrypted using MD-5[14] algorithm. The
algorithm takes as input a message of arbitrary length and
produces as output a 128-bit "fingerprint" or "message digest"
of the input. The MD-5 algorithm is intended for digital
signature applications, where a large file must be "compressed"
in a secure manner before being encrypted with a private
(secret) key under a public-key cryptosystem such as RSA. The
128-bit cipher text generated by the MD-5 algorithm is given
as a input to the phase-6[Authentication Process] as shown in
following fig-2.
III.2. User Digital Code Generation Technique.
This technique is implemented in phase-5[User Digital Code
Generation], in which the User Digital Code Generation takes
place. This generated User Digital Code is used for
authentication purpose in phase-6[Authentication Process]. The
data required for this technique is obtained from phase-1 and
phase-4[User Mobile]. The phase-1[USB Unique ID
Extraction] provides the unique USB id along with its
corresponding drive-name. The Password generated in phase2[Password Generator] has been sent to the authenticated
mobile number. This is used as an input in phase-4. In phase4[User Mobile], this password is simply inputted to the
System. In phase-5[User Digital Code Generation], the unique
USB id obtained from phase-1[USB Unique ID Extraction] and
the password entered in phase-4 are concatenated and a new
password key is formed. The same encryption algorithm
explained in section III.1.3 is used to generate the User Digital
Code.
III.3. Authentication Technique
This technique is implemented in phase-6 of the proposed
model. The Internal Digital Code generated in phase-3 and the
User Digital Code generated in phase-5[User Digital Code
Generation] are accepted as input in phase-6[Authentication
Process]. Here in phase-6, the validation process is performed
and if the validation is successful then access to the door is
granted, otherwise the control transfers to the phase-1[USB
Unique ID Extraction] of the model as shown in fig-2.
IV. Block Diagram
USB Device - It is the device through which security to the
vehicle is provided.USB device consist .BAT file which is
useful for generation of .EXE file.
.EXE File – This file consist the USB information such as USB
unique id which identified the uniqueness of USB device.
Password Generator – This module of system is basically use
for generating the password randomly.
GSM Module - Then this generated password is send to the
registered mobile number through GSM module.
Code Matching Device – This device is basically used to
entering the unique code to the system.
Following diagram show the various phases of our proposed model.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 1222
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
ISSN: 2231-5381
http://www.ijettjournal.org
Page 1223
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
V. Applications
Following are the applications of Intelligent car access
system.
 Security alert.
 Precise and safe car access control.
 This technique provides two way authentication for
accessing the car.
 The system can message the car owner on their mobile
phone to alert them.
 Control and integration of security systems and also the
potential for central locking of all perimeter doors and
windows.
VI. Future Work
Looking at the current situation we can build system that
can be embedded on various vehicles like cars, trucks etc.
Limitation to provide the security only to the several parts
of vehicle can be removed by extending security mechanism
of all other vehicle parts. We can also provide security
cameras that allowing the user to observe activity around a
car. Security systems can be includes motion sensors that
will detect any kind of unauthorized movement and notify
the owner. In the future, we also planning to introduce some
automation features in the vehicle as well as enhance its
security further. The automation can be improved by
employing techniques for automatic car parking and man
less driving and ultimately reducing the risk of accident and
at the same time compact more cars in the same space. We
can further enhance the security by employing vehicle
tracking as a preventive measure.
VII. Conclusion
This is an ongoing project. we proposed a Modified hybrid
model consisting of various phases to provide high level
security to the vehicle using generation of Digital Code.
This Digital Code generation is achieved by employing the
reliable MD5 Encryption algorithm. The Internal Digital
Code generation and the User Digital Code generation prove
to be important parts of the approach followed. This model
devises an efficient feasible solution to the current burning
issues in security. Also the Model helps in elimination of
most of the limitations. This project uses the USB devices
and code matching device both of which are easily
available. So the overall implementation cost is very cheap
and it is affordable by a common person. We have discussed
a simple prototype in this paper but in future it can be
expanded to many other areas.
ACKNOWLEDGMENT
We acknowledge the efforts and hard work by the experts
who have contributed towards development of the different
car security systems. We also acknowledge the efforts of the
reviewers of the journal for the suggestions and
modifications to improve the quality of the paper and to help
prepare the camera-ready copy of our paper.
ISSN: 2231-5381
REFERENCES
[1]
Lee Garber, ”Security, Privacy, Policy, and
Dependability Roundup”.IEEE Security & Privacy
Volume 10, Number 6, November / December, 2012
[2] Javier Ortega-Garcia, ”Quality Measures in Biometric
Systems”. IEEE Security & Privacy Volume 10,
Number 6, November / December, 2012
[3] Deepu Saini1 and Dr.Vijay Singh Rathore, ”Biometrics
Identity Authentication in Secure Electronic
Transactions”. IJCSMS International Journal of
Computer Science & Management Studies, Special
Issue of Vol. 12, June 2012
[4] Ito, Koichi Graduate Sch. of Inf. Sci., Tohoku Univ. “
A fingerprint recognition algorithm using phase-based
image matching for low-quality Fingerprints”. Image
Processing, 2005. ICIP 2005. IEEE International
Conference,11-14 Sept. 2005.
[5] Stephenson, Todd A. Dalle Molle Inst. for Perceptual
Artificial Intelligence, Martigny, Switzerland -Doss,
Mathew Magimai, “Speech recognition with auxiliary
information” Volume: 12,Issue: 3, May 2004.
[6] Grisan, Enrico,Pesce, Alessandro,Giani, Alfredo. “A
new tracking system for the robust extraction of retinal
vessel structure”. Engineering in Medicine and
Biology Society, 2004. IEMBS '04. 26th Annual
International Conference of the IEEE, Vol.1, 1-5 Sept.
2004
[7]
Fukui, Kazuhiro Univ. of Tsukuba, Tsukuba Li, X.
“Human sensing using the mutual subspace method
with multi-view images” .SICE, 2007 Annual
Conference, 17-20 Sept. 2007.
[8]
Soltysik, Richard, “Paging alarm systems for
automotive security applications”, Conference
Publications , 8 Oct 1993
[9] Merino,J.L.Bota,SebastiánA,Garcia, F. J.Samitier,
Josep, Niessen,
Bernhard , Cabruja
E. ,Bausells,
J. , “A MCM module for modern power window
control in automotive applications”, IECON 02
[Industrial Electronics Society, IEEE 2002 28th
Annual Conference of the] ,Vol: 4, 2002
[10] Sato, Kazuo, Nishikawa, Kunitoshi , Kojima,
Yoshiko ,Suzuki, Noriyoshi, “Analysis of electric field
distribution near car in radioremote control system for
electric equipment installed in car”, Antennas and
Propagation Society International Symposium, 1999.
IEEE ,Digital
Object
Identifier: 10.1109/APS.1999.789250,vol:4,1999.
[11] Almomani, Iman M., Alkhalil, Nour Y., Ahmad, Enas
M.,Jodeh,
Rania
M,
“Ubiquitous
http://www.ijettjournal.org
Page 1224
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
GPS vehicle tracking and
managementsystem”,
Applied Electrical Engineering and Computing
Technologies (AEECT), 2011 IEEE Jordan
Conference
on Digital
Object
identifier: 10.1109/AEECT.2011.6132526,2011.
[12]
Cook, Dale L,” Technology and education”,
Computers
in
Education,
2002.Proceedings.
International Conference on , Digital Object
Identifier: 10.1109/CIE.2002.1186289,2002.
[13]
Murugesh R., “Advanced biometric ATM machine
with
AES
256
and
steganography
implementation”,Advanced Computing (ICoAC),
2012
Fourth
International
Conference
Digital
Object
Identifier: 10.1109/ICoAC.2012.6416799,2012
[14]
Zheng, Xiaoling ,Jin, Jidong, “Research for the
application and safety of MD5 algorithm in password
authentication”, Fuzzy Systems and Knowledge
Discovery (FSKD),
2012
9th
International
Conference,DigitalObject
dentifier: 10.1109/FSKD.2012.6234010,2012
[15] IEEE global history network.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 1225
Download