Multi-Level Security for Automotive ? RFID Based Technology with Lab VIEW Implementation
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 9)Publication Date: 2013-04-16
Authors : Priya Darshini .V; Prakash.R; Prasannabalaje.S.M; Sangeetha Monica.T;
Page : 36-40
Keywords : Educational Laboratory Virtual Instrumentation Suite II (ELVIS); Global System for Mobile communication(GSM); Multimedia Messaging Service (MMS); and Radio Frequency Identification (RFID).;
Abstract
S ecurity has become a prominent parameter for all the electronic gadgets. This proposed paper aims at securing the automotive and also preventing the unauthorized persons from accessing it. The technologies such as Radio Frequency Identification (RFID), thumb registration system and face recognition will be applied for the security measures. This proposed system wil l also be implemented in LabVIEW using Educational Laboratory Virtual Instrumentation Suite II (ELVIS). Initially, the RFID system will be authenticated .The importance of this system is that, it gets verification from the Road Transportation Office (RTO).The user will require an authen tication to get proceed to the thumb registration module by which the efficiency of the thumb is enhanced using Pattern Matching Algorithm (PMA). Face recognition system is a technique which will be used after the thumb registration system. At last, this s ystem allows the user to drive the car. For emergency, a key insertion slot will be placed in the system through which the user can insert the key. During this emergency mode of operation the camera captures the driver’s image and sends it to the owner’s m obile as Multimedia Messaging Service (MMS). The owner will provide the authentication password; this in turn allows the user to drive the vehicle. Global System for Mobile communication (GSM) module is also kept inbuilt for tracking purpose. Among the dif ferent technologies proposed, RFID technique is briefly discussed in this paper.
Other Latest Articles
- A Novel Approach of Energy Optimization in WSN?
- A Secure Mechanism to Supervise Automotive Sensor Network by Client on Smart Phone
- Extracting Person Name, Date and Place from Text Documents Using LEX Tool
- Result Analysis of Proposed Image Enhancement Algorithm Based on a Self Organizing Map Network and Wavelet Transform
- Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network
Last modified: 2014-11-28 21:34:20