scholarly journals Intelligent user identity authentication in vehicle security system based on wireless signals

Author(s):  
Jie Zhang ◽  
Zhongmin Wang ◽  
QingLi Yan

AbstractIntelligent identity authentication in vehicle security systems, as a vital component in anti-theft system and safety driving assist system, has received wide attention. Current vehicle security systems, however, focus the car security on the car keys security, ignore the owner of car keys. Anyone who owns the car keys can operate the car. This paper introduces an intelligent identity authentication method for vehicle security system based on wireless signals. Unlike past work, our approach combines car security with car owners and car keys. The intuition underlying our design is that when a user walks towards the car, the user’s gait information can be leveraged to identify the user. We capture the user’s gait information using wireless devices which can be deployed in the car, and then extract features from the received wireless signals using convolution kernel and apply artificial neural network to identify the user. We built a prototype and experimental results show that our approach can achieve high accuracy and strong robustness.

2021 ◽  
Vol 23 (07) ◽  
pp. 420-425
Author(s):  
Tejashwini R ◽  
◽  
Dr. Subodh Kumar Panda ◽  

Vehicle security is one of the major concerns that the entire world is currently experiencing. People generally own automobiles, yet these automobiles are not always secure. Vehicle theft occurs in parking lots, public places, and other unsafe areas. The vehicle’s manufacturer does not consider the vehicle security system to be a factor in the overall cost of the vehicle. Nowadays, only a few vehicles come equipped with high-priced security systems. Door locking, alarm system, GSM, GPS, and other security features are built into high-end vehicles only. There is a necessity to build a low-cost security system for vehicles that common people can afford it and the manufacture can built-in the security system in a wide range of automobiles. This paper proposed a method for vehicle theft detection, tracking, and accident identification using the Internet of Things.


Author(s):  
إبراهيم محمد زين

الملخّص يهدف هذا البحث لبيان أن السبيل الناجح لمواجهة الإرهاب الدولي المعاصر الملتبس بدعاوي الجهاد الإسلامي وإحياء دولة الخلافة الإسلامية هو التركز على معاني الأمن الفكري والروحي في الإسلام وهذا الاتجاه في المباحثة يُعيد النظر في طرائق قضايا الجهاد ويميز بين ما هو عقائدي ومرتبط بنظام الإسلام الكلي وبين ما هو من مجال حروب الفتنة والصعلكة.  الكلمات المفتاحيّة: الجهاد، حروب الصعلكة، حروب الفتنة، الأمن الروحي والفكري.              Abstract This study focuses on the most effective way of combating global terrorism that utilizes the banner of Jihad and restoration of the Khilafa system of governance. It should be emphasized that there is a dire need for a new line of investigation concerning the issue of Jihad that pays more attention to both spiritual and intellectual security systems in Islam. This requires a distinction to be made between what is universalistic in the Islamic system and what is particular. In this regard one has to differentiate between acts of just war and those of economic or sedition wars. Keywords: Jihad, economic war, sedition war, spiritual-intellectual security system.


2021 ◽  
Vol 2 (2) ◽  
pp. 105-115
Author(s):  
Mahmod Al-Bkree

This work is to optimize perimeter surveillance and explore the distribution of ground bases for unmanned aerial vehicles along the Jordanian border and optimize the set of technologies for each aerial vehicle. This model is part of ongoing research on perimeter security systems based on unmanned aerial vehicles. The suggested models give an initial insight about selecting technologies carried by unmanned aerial vehicles based on their priority; it runs for a small scale system that can be expanded, the initial results show the need for at least four ground bases along the length of the border, and a selected set of various technologies for each vehicle.


2019 ◽  
Vol 1235 ◽  
pp. 012119
Author(s):  
R F Rahmat ◽  
M P Loi ◽  
S Faza ◽  
D Arisandi ◽  
R Budiarto

2019 ◽  
Vol 4 (2) ◽  
pp. 112-120
Author(s):  
Hadjira BELAIDI ◽  
Nour-El-Houda MEDDAH

This work deals with lock and home security systems. First, Motion sensors detect movement indoors and outdoors to guard against intruders, protect valuables and more. Thus, if any movement, RFID reader will be activated and database will be scanned to identify the persons who have the access to the home. This enhances the effectiveness of the security system and provides the user with the complete, whole-house protection he needs. An RFID badge can be used to unlock the door and access to the home. Alerts also are received on the smart phone if motion is sensed in a protected area inside or outside; giving the user the information it needs to act quickly. The door can also be remotely locked/unlocked. A microcontroller (ATmega2560) is used to control the entire system, and GSM is used to send alerts to the Smartphone. An Ethernet shield that connects the microcontroller to the database (DB) is also added.


Author(s):  
Vikram Kulkarni ◽  
Viswaprakash Babu

In this proposed embedded car security system, FDS(Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car’s owner is sleeping and someone theft the car then FDS obtains images by one tiny web camera which can be hidden easily in somewhere in the car. FDS compares the obtained image with the predefined images if the image doesn’t match, then the information is sent to the owner through MMS. So now owner can obtain the image of the thief in his mobile as well as he can trace the location through GPS. The location of the car as well as its speed can be displayed to the owner through SMS. So by using this system, owner can identify the thief image as well as the location of the car This system prototype is built on the base of one embedded platform in which one SoC named “SEP4020”(works at 100MHz) controls all the processes .Experimental results illuminate the validity of this car security system.


Sign in / Sign up

Export Citation Format

Share Document