You are on page 1of 6

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013

Door Access Control in an Intelligent Car


1st Shiv Sutar1, 2nd Kalyan Kapratwar2, 3rd Rahul Rayate3, 4th Siddhesh Birari4, 5rd Swastik Zalke5
,2,3,4,5

Computer Engineering University of Pune, India

AbstractSecurity is a phenomenon that applies to any vulnerable and valuable asset to protect it from harm. We think that vehicle is an invaluable asset. Our project basically aims at providing security for the Vehicles. At present, the entire security of the vehicle depends only and only on mechanical key. If under any circumstances the key is lost, then there is a great possibility for theft of the vehicle. In this present scenario of increasing thefts, there is a dire need to address these issues. In this paper, we aim at developing a prototype that would provide a high level security at the door of the vehicle. This would help in protecting the vehicle as well as its accessories from theft. In order to achieve this, our prototype makes use of highly secure and digitally authorized USB drive. The USB drive has been intensively authenticated with the use of high standard encryption and decryption algorithm. We also present an interlinked two step authentication process which can be used to enhance the security and reduce forgery cases.

Face Recognition[7] etc. But these are all time-consuming and non-economical processes. Moreover, if the related body part gets damaged then the use of the system becomes a tedious job. In order to avoid these factors, we can make use of highly secure, cost effective and portable USB device. In this paper, we study proposed system to overcome above said drawbacks, address common issues and discuss solutions. II. Literature Survey

Keywords - MD5, OTP, Validation, Authentication, Cipher text, Encryption, decryption.

I.

Introduction

Security provides "a form of protection where a separation is created between the assets and the threat"[1]. Technically security is a broader term that encompasses various aspects such as Encryption ,Decryption, Digital Certificate etc. However ,at present, the most popular technologies employed for security make use of Biometric techniques. Biometrics [2] has been around since about 29,000 BC when cavemen would sign their drawings with handprints [3].Vehicle security have been a major cause of concern for many companies worldwide. However, the vehicle security through Biometrics has signicantly improved since the early days. Since the beginning, there is a big contest between security providers and security breachers and it is becoming more complicating every day, and will continue afterwards. This is a quite general that the major cause for this is that new tactics get developed by security breachers every time. As said earlier, various Biometric techniques are currently in practice such as Fingerprint Recognition[4], Voice Recognition[5], Retina Scan[6],

There are numerous methods for preventing unauthorized access to unlock the vehicle door. The most commonly used technology is the car alarm siren [8] which is an electronic annoyance device installed in a vehicle in an attempt to discourage theft of the vehicle itself, its contents, or both. Another popular technique is a keyless entry system is an electronic lock that controls access to a building or vehicle without using a traditional mechanical key. Another popular technique used for the purpose is the Biometric techniques. Every individual in this world has a unique finger impression and no two finger impressions are a like thus giving everyone a unique identity [9]. In an another approach, a retina scanning anti-theft device for motor vehicles includes a retinal scanner electrically connected to a vehicle's door for preventing an intruder from unlocking the vehicle unless a proper retinal pattern is detected. To overcome the hardships in providing security in all aspects, some other several techniques that were suggested included pattern learning, code matching, OTP etc. II.1. Implausible Techniques This section introduces the obscure techniques commonly used in the security of the vehicles. A. Power Door Lock [9] This is one of the most common and easily available techniques which were introduced in 1914. Power door locks allow the driver or front passenger to simultaneously lock or unlock all the doors of an automobile , by pressing a button or flipping a switch. Nearly every car model today offers this feature as at least optional equipment. However, if the unauthorized person gets access to the switch then the system renders useless for security.

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1220

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013

B. Remote Keyless System [10] The term remote keyless system (RKS) is more commonly used as keyless entry or remote central locking. Keyless remotes contain a short-range radio transmitter, and must be within a certain range, usually 520 meters (1560 ft.), of the car to work. This system becomes implausible due to its short range. C. Voice Recognition System As compared to the techniques discuss above this is somewhat more interesting and user friendly techniques. Here user simply needs to pronounce password and depending on signals generated, the user is granted the access. Even the best speech recognition systems sometimes make errors. If there is noise or some other sound in the environment, then the number of errors will increase. D. Vehicle Tracking System [11] This is one of the best curative techniques presently available. It includes installation of the electronic device in vehicle or fleet of vehicle. This makes vehicle track able in cases of theft, but the preventive techniques are more effective than curative once. III. Proposed Architecture Our proposed model is a hybrid model consisting of various phases which provides security at different levels by using portable and digitally certified USB followed by electronic code matching technique. Basically whenever the issue of car access then two perspectives comes to the focus, first one is car access by owner and second one is that the car access by third but authenticated person. In first perspective the owner simply insert the USB to the system after doing this the owner get password which he simply enter and getting the access of the vehicle. In the second perspective [Third person access], The Third person who want to access the vehicle must have the authenticated USB deice then he simply insert the USB device to the system same as first perspective. After that the password is automatically send to the owner of vehicle. Then the owner provides the password to third person. After getting the password from owner of vehicle, the third person simply enter it and getting access of vehicle. This perspective is simply show in fig.1 This authentication process accepts data from phase-3[Internal Digital Code Generation] and phase-5[User Digital Code Generation]. Once this process completes, its output is given to door unlocking device. III.1. Internal Digital Code Generation Technique

Figure - 1 To implement above perspectives there are various phases in our proposed model. In the phase-1[USB Unique ID Extraction], the drive name and its corresponding serial-id is obtained and the uniqueness of the USB is authenticated. Phase-2[Password Generator] includes Password Generation where a random code is generated. The password is sent to the authenticated user. Phase-3[Internal Digital Code Generation] is the Digital Code Generation for internal validation purpose. This phase receives the inputs from phase-1[USB Unique ID Extraction] and phase-2[Password Generator]. In this phase, the concatenation of password and drive_id takes place. This string is then cipher texted. Using the data available in phase-1, phase-2[Password Generator] the cipher text is generated in the phase-3. The output of this phase is sent to the phase-6[Authentication Process] where it is compared with output of phase-5[User Digital Code Generation]. Phase-4[User Mobile] receives the input from the phase-2.The output of this phase is sent as an input to the Phase-5[User Digital Code Generation]. Phase-5[User Digital Code Generation],The data required for processing in this phase are obtained from phase-1[USB Unique ID Extraction] and phase-4[User Mobile]. Here a cipher text is generated as like in phase-3[Internal Digital Code Generation]. Phase 6[Authentication Process] this is the last phase of the proposed model in which actual authentication takes place. This technique is implemented in phase-3[Internal Digital Code Generation], in which the Internal Digital Code Generation takes place. This generated Internal Digital Code is used for the USB authentication purpose at a later stage. The data required for this technique is obtained from phase-1[USB Unique ID Extraction] and phase-2 as shown in fig-2. III.1.1 Execution of auto.exe file

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1221

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013 The objective of phase-1 is to obtain the unique USB id with its corresponding drive letter. When the USB device is plugged in, the auto.exe file is executed. This phenomenon is in practice since last decade a well known and dynamic example is autorun.exe used for CD-ROM[12]. Once the auto.exe is executed, it creates volinfofile. Using this volinfo file, USB unique id i.e. manufacturer id is extracted which is used Digital Code Generation Process in phase-3 and phase-5 as shown in fig-2. III.1.2 OTP generation process In phase-2[Password Generator] the One Time Password[13] generation process occurs. This system provides authentication for system access and other applications requiring authentication that is secure against passive attacks based on replaying captured reusable passwords. This technique was first suggested by Leslie Lamport [15]. This process consists of an initial step in which all inputs are combined, a computation step where the secure hash function is applied a specified number of times, and an output function where the 64-bit onetime password is converted to a human readable form. This OTP is sent to the registered mobile number. III.1.3 Digital Code generation process Phase-3[Internal Digital Code Generation] is the phase in which the actual Internal Digital Code is generated. Here the unique USB id obtained in phase-1[USB Unique ID Extraction] as well as the OTP generated in phase-2[Password Generator] are taken as inputs as shown in fig-1 below. In the next step of phase-3[Internal Digital Code Generation], concatenation of unique USB id followed by OTP takes place. Now this string is encrypted using MD-5[14] algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. The MD-5 algorithm is intended for digital signature applications, where a large file must be "compressed" in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA. The 128-bit cipher text generated by the MD-5 algorithm is given as a input to the phase-6[Authentication Process] as shown in following fig-2. III.2. User Digital Code Generation Technique. This technique is implemented in phase-5[User Digital Code Generation], in which the User Digital Code Generation takes place. This generated User Digital Code is used for authentication purpose in phase-6[Authentication Process]. The data required for this technique is obtained from phase-1 and phase-4[User Mobile]. The phase-1[USB Unique ID Extraction] provides the unique USB id along with its corresponding drive-name. The Password generated in phase2[Password Generator] has been sent to the authenticated mobile number. This is used as an input in phase-4. In phase4[User Mobile], this password is simply inputted to the System. In phase-5[User Digital Code Generation], the unique USB id obtained from phase-1[USB Unique ID Extraction] and the password entered in phase-4 are concatenated and a new password key is formed. The same encryption algorithm explained in section III.1.3 is used to generate the User Digital Code. III.3. Authentication Technique This technique is implemented in phase-6 of the proposed model. The Internal Digital Code generated in phase-3 and the User Digital Code generated in phase-5[User Digital Code Generation] are accepted as input in phase-6[Authentication Process]. Here in phase-6, the validation process is performed and if the validation is successful then access to the door is granted, otherwise the control transfers to the phase-1[USB Unique ID Extraction] of the model as shown in fig-2. IV. Block Diagram USB Device - It is the device through which security to the vehicle is provided.USB device consist .BAT file which is useful for generation of .EXE file. .EXE File This file consist the USB information such as USB unique id which identified the uniqueness of USB device. Password Generator This module of system is basically use for generating the password randomly. GSM Module - Then this generated password is send to the registered mobile number through GSM module. Code Matching Device This device is basically used to entering the unique code to the system.

Following diagram show the various phases of our proposed model.

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1222

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1223

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013 V. Applications Following are the applications of Intelligent car access system. Security alert. Precise and safe car access control. This technique provides two way authentication for accessing the car. The system can message the car owner on their mobile phone to alert them. Control and integration of security systems and also the potential for central locking of all perimeter doors and windows. VI. Future Work Looking at the current situation we can build system that can be embedded on various vehicles like cars, trucks etc. Limitation to provide the security only to the several parts of vehicle can be removed by extending security mechanism of all other vehicle parts. We can also provide security cameras that allowing the user to observe activity around a car. Security systems can be includes motion sensors that will detect any kind of unauthorized movement and notify the owner. In the future, we also planning to introduce some automation features in the vehicle as well as enhance its security further. The automation can be improved by employing techniques for automatic car parking and man less driving and ultimately reducing the risk of accident and at the same time compact more cars in the same space. We can further enhance the security by employing vehicle tracking as a preventive measure. VII. Conclusion This is an ongoing project. we proposed a Modified hybrid model consisting of various phases to provide high level security to the vehicle using generation of Digital Code. This Digital Code generation is achieved by employing the reliable MD5 Encryption algorithm. The Internal Digital Code generation and the User Digital Code generation prove to be important parts of the approach followed. This model devises an efficient feasible solution to the current burning issues in security. Also the Model helps in elimination of most of the limitations. This project uses the USB devices and code matching device both of which are easily available. So the overall implementation cost is very cheap and it is affordable by a common person. We have discussed a simple prototype in this paper but in future it can be expanded to many other areas. ACKNOWLEDGMENT We acknowledge the efforts and hard work by the experts who have contributed towards development of the different car security systems. We also acknowledge the efforts of the reviewers of the journal for the suggestions and modifications to improve the quality of the paper and to help prepare the camera-ready copy of our paper. REFERENCES [1] Lee Garber, Security, Privacy, Policy, and Dependability Roundup.IEEE Security & Privacy Volume 10, Number 6, November / December, 2012 [2] Javier Ortega-Garcia, Quality Measures in Biometric Systems. IEEE Security & Privacy Volume 10, Number 6, November / December, 2012 [3] Deepu Saini1 and Dr.Vijay Singh Rathore, Biometrics Identity Authentication in Secure Electronic Transactions. IJCSMS International Journal of Computer Science & Management Studies, Special Issue of Vol. 12, June 2012 [4] Ito, Koichi Graduate Sch. of Inf. Sci., Tohoku Univ. A fingerprint recognition algorithm using phase-based image matching for low-quality Fingerprints. Image Processing, 2005. ICIP 2005. IEEE International Conference,11-14 Sept. 2005. [5] Stephenson, Todd A. Dalle Molle Inst. for Perceptual Artificial Intelligence, Martigny, Switzerland -Doss, Mathew Magimai, Speech recognition with auxiliary information Volume: 12,Issue: 3, May 2004. [6] Grisan, Enrico,Pesce, Alessandro,Giani, Alfredo. A new tracking system for the robust extraction of retinal vessel structure. Engineering in Medicine and Biology Society, 2004. IEMBS '04. 26th Annual International Conference of the IEEE, Vol.1, 1-5 Sept. 2004 [7] Fukui, Kazuhiro Univ. of Tsukuba, Tsukuba Li, X. Human sensing using the mutual subspace method with multi-view images .SICE, 2007 Annual Conference, 17-20 Sept. 2007. [8] Soltysik, Richard, Paging alarm systems for automotive security applications, Conference Publications , 8 Oct 1993 [9] Merino,J.L.Bota,SebastinA,Garcia, F. J.Samitier, Josep, Niessen, Bernhard , Cabruja E. ,Bausells, J. , A MCM module for modern power window control in automotive applications, IECON 02 [Industrial Electronics Society, IEEE 2002 28th Annual Conference of the] ,Vol: 4, 2002 [10] Sato, Kazuo, Nishikawa, Kunitoshi , Kojima, Yoshiko ,Suzuki, Noriyoshi, Analysis of electric field distribution near car in radioremote control system for electric equipment installed in car, Antennas and Propagation Society International Symposium, 1999. IEEE ,Digital Object Identifier: 10.1109/APS.1999.789250,vol:4,1999. [11] Almomani, Iman M., Alkhalil, Nour Y., Ahmad, Enas M.,Jodeh, Rania M, Ubiquitous

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1224

International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013 GPS vehicle tracking and managementsystem, Applied Electrical Engineering and Computing Technologies (AEECT), 2011 IEEE Jordan Conference on Digital Object identifier: 10.1109/AEECT.2011.6132526,2011. [12] Cook, Dale L, Technology and education, Computers in Education, 2002.Proceedings. International Conference on , Digital Object Identifier: 10.1109/CIE.2002.1186289,2002. Murugesh R., Advanced biometric ATM machine with AES 256 and steganography implementation,Advanced Computing (ICoAC), 2012 Fourth International Conference Digital Object Identifier: 10.1109/ICoAC.2012.6416799,2012 Zheng, Xiaoling ,Jin, Jidong, Research for the application and safety of MD5 algorithm in password authentication, Fuzzy Systems and Knowledge Discovery (FSKD), 2012 9th International Conference,DigitalObject dentifier: 10.1109/FSKD.2012.6234010,2012

[13]

[14]

[15] IEEE global history network.

ISSN: 2231-5381

http://www.ijettjournal.org

Page 1225

You might also like