Embedded Based Conveyance Authentication and Notification System
نویسنده
چکیده
S. Dharanya , A. Umamakeswari M.Tech Embedded Systems, Associate Dean, School of Computing, SASTRA University, Thanjavur, Tamil Nadu, India [email protected] [email protected] Abstract:Amidst the rapid increase in population and urbanization, the use of automobiles is increasing rapidly. Though there are improved safety and security features with advancement in technology, there are no vehicle regulatory systems that provide automation in vehicle monitoring and act violations. The main objective of the work is to have a centralized server based monitoring of vehicles with an advanced security system realized in two levels of verification (password and RFID card i.e. driving license) for engine ignition. In addition to this, the centralized server maintains two separate data bases i.e. one for the vehicle and another for the person who rides it. A unique id is allotted for the vehicle and RFID card (smart card driving license) can be used to identify the object. The unique identifiers linked to the respective person’s bank account debits the penalty/toll fare when the vehicle passes by toll gates/check posts. This provides a way for reducing any possibility of corruption in motor vehicles section as the penalty will be deducted straightforwardly from the person's account by an automated system.
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملAwase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images
There is a trade-off between security and usability in user authentication for mobile phones. Since such devices have a poor input interfaces, 4-digit number passwords are widely used at present. Therefore, a more secure and user friendly authentication is needed. This paper proposes a novel authentication method called “Awase-E”. The system uses image passwords. It, moreover, integrates image ...
متن کاملEvaluation of TBM Utilization Using Rock Mass Rating System: A Case Study of Karaj-Tehran Water Conveyance Tunnel (Lots 1 and 2)
Successful application of a TBM in a project requires investigating both the ground conditions and the machine and backup system design features. Prediction of the machine performance is very important as it has a big effect on the duration of the project and the costs. In this respect, both penetration rate and advance rate must be estimated. Utilization factor, which depends on the type of op...
متن کاملAbusing Notification Services on Smartphones for Phishing and Spamming
Notification service is a popular functionality provided by almost all modern smartphone platforms. To facilitate customization for developers, many smartphone platforms support highly customizable notifications, which allow the third party applications to specify the trigger events, the notification views to be displayed, and the allowed user operations on the notification views. In this paper...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کامل