SlideShare une entreprise Scribd logo
1  sur  54
Information Highway..




     ALTANAI BISHT- VM 3178
     BTECH INFORMATION TECHNOLOGY < FINAL YEAR >
     VEL TECH MULTITECH DR RR DR SR ENGG. COLLEGE
ABSTRACT



 To harness computer and communication technologies to
support vehicular infrastructure control , driver – vehicle
authentication and significantly tracking the vehicle
movement.

 It connects the connect the driver’s cell, the vehicle based
GSM/Bluetooth system and the administrator in client server
network.



                                                                2
OBJECTIVE



To replace the physical vehicular keys by mobile phone
  generated session keys.
Also enabling the effective tracking of vehicle movement via
  GSM based BTS( base transceiver station monitoring) and
  transmitting critical data through net to vehicle via server
  administrator .




                                                                 3
INTRODUCTION


The system of interconnection between the vehicle ,driver and
server enables the most tedious process of conveyance of
information ,management of distances /fares/services as well as
surveillance to become computerized.

It is achieved with the help logic of random key generation,
session key based authentication, vehicle to driver bluetooth
connection, driver to server smtp gmail connection and tracking
with the help of gps coordinates on google map service.




                                                                  4
3. EXISTING SYSTEM



Driver uses a physical metallic key to initiate the mechanism
of vehicle

Limitation of existing system :
      1.Driver might lose the key.
      2.Key might fall into wrong hands.
      3.Difficult to replace a key.
      4.Number of duplicate keys can be produced.

                                                                55
4. PROPOSED SYSTEM


Replacing the physical key ,by session key mechanism between
the driver’s mobile and vehicle based device, connected
through the server.

Security :
•Personalized encryption program
•Personalized random session key generator program




                                                           6
SYSTEM ANALYSIS

1. FEASIBILITY STUDY
car theft in last Quarter of 2010
                               1200000
#1   United States:1,246,096   1000000
#2   United Kingdom:348,169     800000
#3   France:301,539             600000
                                                                    last quarter
#4   India : 232,564            400000
                                                                    middle quarter
#5   Canada:161,506             200000
                                                                    first quarter
#6   Mexico:141,007                  0   us
                                         uk
                                              france


                                                         canada
                                                india


                                                         mexico
                                                        australia
# 7 Australia:139,094



                                                                                    7
5. REQUIRNMENTS


<i> HARDWARE REQUIRNMENTS:           <ii> SOFTWARE REQUIRNMENTS:

1. Vehicle fitted with GSM and       1.   Java ME for cell based program
   Bluetooth.                        2.   JSP/servlets for web program
2. Mobile phone or PDA for each      3.   Oracle database for backend
   driver.                           4.   JDBC connectivity to database
3. Administrator system as server.   5.   Simulation tools –NS2




                                                                           88
5. REQUIRNMENTS conti..


<iii> FUNCTIONAL                    <iv> PERFORMANCE
REQUIRNMENTS                        REQUIRNMENTS:

1. Administrator system must be     1. Must request and deliver session key
   able to track the movement of       sk2 and sk2 safely and securely.
   vehicle.                         2. Help option must be kept handy.
2. Driver must be able to request   3. Availability of session key 24x7.
   session key from server.
3. Vehicle must be able to ask
   session key from driver.




                                                                         99
Boehms SPIRAL SDLC
( software developed life cycle model)




                                         10
Specifications

ADVANTAGES:                       DISADVANTAGES
1. Realism: the model             1. Needs technical expertise in
   accurately reflects the           risk analysis to really work
   iterative nature of software   2. Model is poorly understood
   development on projects           by non-technical
   with unclear requirements         management, hence not so
                                     widely used
2. Flexible: incoporates the
                                  3. Complicated model, needs
   advantages of the waterfal        competent professional
   and rapid prototyping             management. High
   methods                           administrative overhead.
3. Comprehensive model
   decreases risk
4. Good project visibility.

                                                                    11
ARCHITECTURE - earlier

Vechile –fitted with GSM and
bluetooth system
                         Pass session key
                                                                       INTERNET
                     Response of session key


   compare                                      server




                                            Request for session key (UID + VID)


          Driver’s mobile

                                                                                  12
ARCHITECTURE- revised

Vechile –fitted with GSM and
bluetooth system       Grant access to the user with session
                    keys2
                                                   INTERNET

                      Pass the key to
                      server
Frequent                                                                     server
checks with      Pass
session key      session
2                key
                            Response of            Request for session key (UID + VID)
                            session key
                            S1

       Driver’s mobile
                                                                                         13
INTERNET




 Request session key( UID +VID+hours)

 Grant session key


                        Copy session key

Driver authenticates himself
                                            Server can posts some
                                            content on net

                        Store information   Store information into
                        into vehicle        vehicle memory
Pass on the             memory
information to driver
terminal
                                                                     14
GPS + GSM + GIS
                     GSM



     GPS




     network




               GIS
                           15
SYSTEM DESIGN

DATA DICTIONARY

      VID - unique Vehicle Identification number
      UID - unique Driver identification number
      VIS - vehicle Information System
 sk1, sk2 - major , minor session key
     GPS - Global positioning system
     GSM - Global system for mobile communication
      GIS - Global Information system



                                                    16
1. Class diagram




                   17
Module 1: Authentication
            algorithm

1.Driver requests a session key from the server
2.Server provides it with a session key, the same is stored into
   the vehicle account.
3.As the driver tries to establish the communication with
  vehicle, both the session keys are matched ,
       > if true then driver obtains access to start and operate
         the vehicle.
       > if false then driver is restricted the permission to
         operate the vehicle.



                                                                   18
1.1 Activity
diagram for driver




                     19
1.2Activity
diagram
for admin




              20
2. Sequence diagram
                      21
3. Usecase – 3.1 register




                            22
3.2 Usecase - Major session key authentication




                                            23
3.3 Usecase – minor session key authentication




                                                 24
Module 2: communication between driver
and server, via vehicle reception




                                         25
Module 3: web based transportation service




                                         26
27
28
29
30
31
32
33
34
35
36
37
38
SCREENSHOTS.




               39
40
41
42
43
44
45
46
47
48
APPLICATIONS




                                    MILITARY SERVICES
AMBULANCES




         TRUCK SERVICES            CAB SERVICES

                                                   49
                          TOURIST SERVICES
Future Scope..

1. Webcam captured video/image from vehicle’s interior or
   exterior to monitoring server.

2. On demand music playback / direction updates / cricket
   commentary !

3. Ad-hoc based network using vehicles as mobile nodes .

4. Extend the infrastructure to cloud domain.

5. Routing the nearest hospital or police station in case of
    emergency
                                                               50
FEEDBACKS.


1. Handicap friendly.




2. Strong cryptography.




                          51
Conclusion:


To develop an intelligent vehicle authentication, management
  and monitoring system it is indeed important to guage and
  determine the possibilities and loopholes in emerging
  automotive engineering technologies around the world so as
  to lead to an independent mobile node based ad-hoc network
  for vehicles.




                                                          52
REFERENCES


1. Based on IEEE paper- Intelligent Vehicle Monitoring System Based
   on GPS, GSM and GIS- 2010 WASE International Conference on
   Information Engineering

2. Next Generation Wireless Vehicle Detection- Sensay system
3. MOST150: Concept of multimedia networking in vehicles-Wolfgang
   Bott
4. Vehicular computing – Wikipedia, the free encyclopaedia
5. The Grid, Our Cars and the Net: One Idea to Link Them All-Robin
   Chase



                                                                 53
Thank You



            54

Contenu connexe

Tendances

Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
Zytronic projected capacitive_x-y_controller_touchscreen_user_manual_-_issue_1
Zytronic projected capacitive_x-y_controller_touchscreen_user_manual_-_issue_1Zytronic projected capacitive_x-y_controller_touchscreen_user_manual_-_issue_1
Zytronic projected capacitive_x-y_controller_touchscreen_user_manual_-_issue_1camax_adm
 
Service Manual Acer Aspire-4720-4720 g-4720z-4320
Service Manual Acer Aspire-4720-4720 g-4720z-4320Service Manual Acer Aspire-4720-4720 g-4720z-4320
Service Manual Acer Aspire-4720-4720 g-4720z-4320Dane Morais
 
Service manual-acer-aspire-5710-5710 g-5310-5310g
Service manual-acer-aspire-5710-5710 g-5310-5310gService manual-acer-aspire-5710-5710 g-5310-5310g
Service manual-acer-aspire-5710-5710 g-5310-5310gmumbutu
 

Tendances (11)

C18 c compiler user guide
C18 c compiler user guideC18 c compiler user guide
C18 c compiler user guide
 
C30 users guide_51284f
C30 users guide_51284fC30 users guide_51284f
C30 users guide_51284f
 
2n netstar user_manual_en_3_0_0
2n netstar user_manual_en_3_0_02n netstar user_manual_en_3_0_0
2n netstar user_manual_en_3_0_0
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
Zytronic projected capacitive_x-y_controller_touchscreen_user_manual_-_issue_1
Zytronic projected capacitive_x-y_controller_touchscreen_user_manual_-_issue_1Zytronic projected capacitive_x-y_controller_touchscreen_user_manual_-_issue_1
Zytronic projected capacitive_x-y_controller_touchscreen_user_manual_-_issue_1
 
Pt100
Pt100Pt100
Pt100
 
Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
 
Solution- BorderForce
Solution- BorderForceSolution- BorderForce
Solution- BorderForce
 
Service Manual Acer Aspire-4720-4720 g-4720z-4320
Service Manual Acer Aspire-4720-4720 g-4720z-4320Service Manual Acer Aspire-4720-4720 g-4720z-4320
Service Manual Acer Aspire-4720-4720 g-4720z-4320
 
Ct 1 Danielson
Ct 1 DanielsonCt 1 Danielson
Ct 1 Danielson
 
Service manual-acer-aspire-5710-5710 g-5310-5310g
Service manual-acer-aspire-5710-5710 g-5310-5310gService manual-acer-aspire-5710-5710 g-5310-5310g
Service manual-acer-aspire-5710-5710 g-5310-5310g
 

En vedette

Gas Detector Training
Gas Detector TrainingGas Detector Training
Gas Detector TrainingPiplu Das
 
Assigning IP Address
Assigning IP AddressAssigning IP Address
Assigning IP Addressshubifareek
 
DESIGN West 2013 Presentation: Accelerating Android Development and Delivery
DESIGN West 2013 Presentation: Accelerating Android Development and DeliveryDESIGN West 2013 Presentation: Accelerating Android Development and Delivery
DESIGN West 2013 Presentation: Accelerating Android Development and DeliveryDavid Rosen
 
Unified Communications and Collaborations (UC&C)
Unified Communications and Collaborations (UC&C)Unified Communications and Collaborations (UC&C)
Unified Communications and Collaborations (UC&C)ALTANAI BISHT
 
3 solusi memperkuat ide ide kreatif melalui bertanya dan mendengar
3 solusi memperkuat ide ide kreatif melalui bertanya dan mendengar3 solusi memperkuat ide ide kreatif melalui bertanya dan mendengar
3 solusi memperkuat ide ide kreatif melalui bertanya dan mendengarFandy Neutron
 
Apresentação Zmags em Português
Apresentação Zmags em PortuguêsApresentação Zmags em Português
Apresentação Zmags em PortuguêsZmags_Brasil
 
Hackaday ramudroid 6.5
Hackaday ramudroid 6.5Hackaday ramudroid 6.5
Hackaday ramudroid 6.5ALTANAI BISHT
 
Tadiran gateway
Tadiran gatewayTadiran gateway
Tadiran gatewayNTCOM Ltd
 
Beautiul Beijing Bird Nest (美麗北京鳥巢)
Beautiul Beijing Bird Nest (美麗北京鳥巢)Beautiul Beijing Bird Nest (美麗北京鳥巢)
Beautiul Beijing Bird Nest (美麗北京鳥巢)Chung Yen Chang
 
FYP Report-Xing Dan
FYP Report-Xing DanFYP Report-Xing Dan
FYP Report-Xing Dan#Xing Dan#
 
Power Point frases amb suport visual
Power Point frases amb suport visualPower Point frases amb suport visual
Power Point frases amb suport visualYolanda Roset Aligué
 
RFID in Assets and Library Management
RFID in Assets and Library Management RFID in Assets and Library Management
RFID in Assets and Library Management ALTANAI BISHT
 
3 c brasil-folleto-2014
3 c brasil-folleto-20143 c brasil-folleto-2014
3 c brasil-folleto-2014David Arias
 
Namrata electricals profile v1
Namrata electricals profile v1Namrata electricals profile v1
Namrata electricals profile v1NARESH MAHADIK
 

En vedette (20)

Alta edad media
Alta edad mediaAlta edad media
Alta edad media
 
Gas Detector Training
Gas Detector TrainingGas Detector Training
Gas Detector Training
 
Assigning IP Address
Assigning IP AddressAssigning IP Address
Assigning IP Address
 
DESIGN West 2013 Presentation: Accelerating Android Development and Delivery
DESIGN West 2013 Presentation: Accelerating Android Development and DeliveryDESIGN West 2013 Presentation: Accelerating Android Development and Delivery
DESIGN West 2013 Presentation: Accelerating Android Development and Delivery
 
Unified Communications and Collaborations (UC&C)
Unified Communications and Collaborations (UC&C)Unified Communications and Collaborations (UC&C)
Unified Communications and Collaborations (UC&C)
 
3 solusi memperkuat ide ide kreatif melalui bertanya dan mendengar
3 solusi memperkuat ide ide kreatif melalui bertanya dan mendengar3 solusi memperkuat ide ide kreatif melalui bertanya dan mendengar
3 solusi memperkuat ide ide kreatif melalui bertanya dan mendengar
 
My grandfather
My grandfatherMy grandfather
My grandfather
 
10 led-30 w-shop lamp
10 led-30 w-shop lamp10 led-30 w-shop lamp
10 led-30 w-shop lamp
 
Auma
AumaAuma
Auma
 
Apresentação Zmags em Português
Apresentação Zmags em PortuguêsApresentação Zmags em Português
Apresentação Zmags em Português
 
Hackaday ramudroid 6.5
Hackaday ramudroid 6.5Hackaday ramudroid 6.5
Hackaday ramudroid 6.5
 
Tadiran gateway
Tadiran gatewayTadiran gateway
Tadiran gateway
 
Beautiul Beijing Bird Nest (美麗北京鳥巢)
Beautiul Beijing Bird Nest (美麗北京鳥巢)Beautiul Beijing Bird Nest (美麗北京鳥巢)
Beautiul Beijing Bird Nest (美麗北京鳥巢)
 
Brewbot
BrewbotBrewbot
Brewbot
 
FYP Report-Xing Dan
FYP Report-Xing DanFYP Report-Xing Dan
FYP Report-Xing Dan
 
Sample essay
Sample essaySample essay
Sample essay
 
Power Point frases amb suport visual
Power Point frases amb suport visualPower Point frases amb suport visual
Power Point frases amb suport visual
 
RFID in Assets and Library Management
RFID in Assets and Library Management RFID in Assets and Library Management
RFID in Assets and Library Management
 
3 c brasil-folleto-2014
3 c brasil-folleto-20143 c brasil-folleto-2014
3 c brasil-folleto-2014
 
Namrata electricals profile v1
Namrata electricals profile v1Namrata electricals profile v1
Namrata electricals profile v1
 

Similaire à Information Highway Authentication and Tracking System

Sierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open ATSierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open ATThibault Cantegrel
 
IRJET- Smart Door Unit
IRJET- Smart Door UnitIRJET- Smart Door Unit
IRJET- Smart Door UnitIRJET Journal
 
Accelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudAccelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudRebekah Rodriguez
 
sasikumarj_resume
sasikumarj_resumesasikumarj_resume
sasikumarj_resumeSasi Kumar
 
Indicus Profile 2013
Indicus Profile 2013Indicus Profile 2013
Indicus Profile 2013samjoshi
 
IRJET- Design of SCADA based Wireless Monitoring and Control
IRJET- Design of SCADA based Wireless Monitoring and ControlIRJET- Design of SCADA based Wireless Monitoring and Control
IRJET- Design of SCADA based Wireless Monitoring and ControlIRJET Journal
 
Design and Implementation of a Web Based Access Control System
Design and Implementation of a Web Based Access Control SystemDesign and Implementation of a Web Based Access Control System
Design and Implementation of a Web Based Access Control SystemSerhan
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...IRJET Journal
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...IRJET Journal
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
New Police 3 G Mobile Dvr Solution
New Police 3 G Mobile Dvr SolutionNew Police 3 G Mobile Dvr Solution
New Police 3 G Mobile Dvr Solutionardentlover
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversVinny Chweety
 
IRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET Journal
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE
 

Similaire à Information Highway Authentication and Tracking System (20)

Alcohol report
Alcohol reportAlcohol report
Alcohol report
 
Sierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open ATSierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open AT
 
IRJET- Smart Door Unit
IRJET- Smart Door UnitIRJET- Smart Door Unit
IRJET- Smart Door Unit
 
Accelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudAccelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to Cloud
 
推動電子學習,建造雲端無線網絡校園
推動電子學習,建造雲端無線網絡校園推動電子學習,建造雲端無線網絡校園
推動電子學習,建造雲端無線網絡校園
 
sasikumarj_resume
sasikumarj_resumesasikumarj_resume
sasikumarj_resume
 
Indicus Profile 2013
Indicus Profile 2013Indicus Profile 2013
Indicus Profile 2013
 
IRJET- Design of SCADA based Wireless Monitoring and Control
IRJET- Design of SCADA based Wireless Monitoring and ControlIRJET- Design of SCADA based Wireless Monitoring and Control
IRJET- Design of SCADA based Wireless Monitoring and Control
 
Design and Implementation of a Web Based Access Control System
Design and Implementation of a Web Based Access Control SystemDesign and Implementation of a Web Based Access Control System
Design and Implementation of a Web Based Access Control System
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Wi Fi Mo For Road
Wi Fi Mo   For RoadWi Fi Mo   For Road
Wi Fi Mo For Road
 
New Police 3 G Mobile Dvr Solution
New Police 3 G Mobile Dvr SolutionNew Police 3 G Mobile Dvr Solution
New Police 3 G Mobile Dvr Solution
 
Microcontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken driversMicrocontroller based automatic engine locking system for drunken drivers
Microcontroller based automatic engine locking system for drunken drivers
 
Ak4103212215
Ak4103212215Ak4103212215
Ak4103212215
 
IRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe RequestIRJET- Tracking of Vehicle’s Location using Probe Request
IRJET- Tracking of Vehicle’s Location using Probe Request
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
 

Plus de ALTANAI BISHT

Practical byzantine fault tolerance by altanai
Practical byzantine fault tolerance by altanaiPractical byzantine fault tolerance by altanai
Practical byzantine fault tolerance by altanaiALTANAI BISHT
 
Ramudroid presented in woman in robotics 2021
Ramudroid  presented in woman in robotics 2021Ramudroid  presented in woman in robotics 2021
Ramudroid presented in woman in robotics 2021ALTANAI BISHT
 
Telecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learningTelecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learningALTANAI BISHT
 
Machine Learning applications in Voice over IP
Machine Learning applications in Voice over IPMachine Learning applications in Voice over IP
Machine Learning applications in Voice over IPALTANAI BISHT
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IPALTANAI BISHT
 
Plivo webrtc telephony in your browser
Plivo webrtc telephony in your browserPlivo webrtc telephony in your browser
Plivo webrtc telephony in your browserALTANAI BISHT
 
Hybrid Smart Grid System for Renewable energy
Hybrid Smart Grid System for Renewable energyHybrid Smart Grid System for Renewable energy
Hybrid Smart Grid System for Renewable energyALTANAI BISHT
 
Media Streams in IOT via WebRTC
Media Streams in IOT  via WebRTCMedia Streams in IOT  via WebRTC
Media Streams in IOT via WebRTCALTANAI BISHT
 
WbeRTC in IOT presented in KrankyGeek
WbeRTC in IOT presented in KrankyGeekWbeRTC in IOT presented in KrankyGeek
WbeRTC in IOT presented in KrankyGeekALTANAI BISHT
 
Ramu droid for swach bharat abhiyaan
Ramu droid for swach bharat abhiyaanRamu droid for swach bharat abhiyaan
Ramu droid for swach bharat abhiyaanALTANAI BISHT
 
Ramu droid @gracehopper
Ramu droid @gracehopperRamu droid @gracehopper
Ramu droid @gracehopperALTANAI BISHT
 
Single board computer options
Single board computer optionsSingle board computer options
Single board computer optionsALTANAI BISHT
 
Real time control and communication ( Robots , Machines , IOT )
Real time control and communication ( Robots , Machines , IOT )Real time control and communication ( Robots , Machines , IOT )
Real time control and communication ( Robots , Machines , IOT )ALTANAI BISHT
 
Augmented reality in web rtc browser
Augmented reality in web rtc browserAugmented reality in web rtc browser
Augmented reality in web rtc browserALTANAI BISHT
 
Service Broker for VOIP IMA WebRTC and old telecom networks
Service Broker for VOIP IMA WebRTC and old telecom networksService Broker for VOIP IMA WebRTC and old telecom networks
Service Broker for VOIP IMA WebRTC and old telecom networksALTANAI BISHT
 
Building a WebRTC Communication and collaboration platform - techleash barcamp
Building a WebRTC Communication and collaboration platform  -  techleash barcampBuilding a WebRTC Communication and collaboration platform  -  techleash barcamp
Building a WebRTC Communication and collaboration platform - techleash barcampALTANAI BISHT
 

Plus de ALTANAI BISHT (20)

Practical byzantine fault tolerance by altanai
Practical byzantine fault tolerance by altanaiPractical byzantine fault tolerance by altanai
Practical byzantine fault tolerance by altanai
 
Cinemarkup
CinemarkupCinemarkup
Cinemarkup
 
Ramudroid presented in woman in robotics 2021
Ramudroid  presented in woman in robotics 2021Ramudroid  presented in woman in robotics 2021
Ramudroid presented in woman in robotics 2021
 
Telecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learningTelecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learning
 
Machine Learning applications in Voice over IP
Machine Learning applications in Voice over IPMachine Learning applications in Voice over IP
Machine Learning applications in Voice over IP
 
Current trends and innovations in voice over IP
Current trends and innovations in voice over IPCurrent trends and innovations in voice over IP
Current trends and innovations in voice over IP
 
Ramudroid
RamudroidRamudroid
Ramudroid
 
Plivo webrtc telephony in your browser
Plivo webrtc telephony in your browserPlivo webrtc telephony in your browser
Plivo webrtc telephony in your browser
 
Hybrid Smart Grid System for Renewable energy
Hybrid Smart Grid System for Renewable energyHybrid Smart Grid System for Renewable energy
Hybrid Smart Grid System for Renewable energy
 
Media Streams in IOT via WebRTC
Media Streams in IOT  via WebRTCMedia Streams in IOT  via WebRTC
Media Streams in IOT via WebRTC
 
Ramudroid v7.0
Ramudroid v7.0Ramudroid v7.0
Ramudroid v7.0
 
WbeRTC in IOT presented in KrankyGeek
WbeRTC in IOT presented in KrankyGeekWbeRTC in IOT presented in KrankyGeek
WbeRTC in IOT presented in KrankyGeek
 
Ramu droid for swach bharat abhiyaan
Ramu droid for swach bharat abhiyaanRamu droid for swach bharat abhiyaan
Ramu droid for swach bharat abhiyaan
 
Ramu droid @gracehopper
Ramu droid @gracehopperRamu droid @gracehopper
Ramu droid @gracehopper
 
Single board computer options
Single board computer optionsSingle board computer options
Single board computer options
 
Ramu droid
Ramu droidRamu droid
Ramu droid
 
Real time control and communication ( Robots , Machines , IOT )
Real time control and communication ( Robots , Machines , IOT )Real time control and communication ( Robots , Machines , IOT )
Real time control and communication ( Robots , Machines , IOT )
 
Augmented reality in web rtc browser
Augmented reality in web rtc browserAugmented reality in web rtc browser
Augmented reality in web rtc browser
 
Service Broker for VOIP IMA WebRTC and old telecom networks
Service Broker for VOIP IMA WebRTC and old telecom networksService Broker for VOIP IMA WebRTC and old telecom networks
Service Broker for VOIP IMA WebRTC and old telecom networks
 
Building a WebRTC Communication and collaboration platform - techleash barcamp
Building a WebRTC Communication and collaboration platform  -  techleash barcampBuilding a WebRTC Communication and collaboration platform  -  techleash barcamp
Building a WebRTC Communication and collaboration platform - techleash barcamp
 

Dernier

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 

Dernier (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 

Information Highway Authentication and Tracking System

  • 1. Information Highway.. ALTANAI BISHT- VM 3178 BTECH INFORMATION TECHNOLOGY < FINAL YEAR > VEL TECH MULTITECH DR RR DR SR ENGG. COLLEGE
  • 2. ABSTRACT To harness computer and communication technologies to support vehicular infrastructure control , driver – vehicle authentication and significantly tracking the vehicle movement. It connects the connect the driver’s cell, the vehicle based GSM/Bluetooth system and the administrator in client server network. 2
  • 3. OBJECTIVE To replace the physical vehicular keys by mobile phone generated session keys. Also enabling the effective tracking of vehicle movement via GSM based BTS( base transceiver station monitoring) and transmitting critical data through net to vehicle via server administrator . 3
  • 4. INTRODUCTION The system of interconnection between the vehicle ,driver and server enables the most tedious process of conveyance of information ,management of distances /fares/services as well as surveillance to become computerized. It is achieved with the help logic of random key generation, session key based authentication, vehicle to driver bluetooth connection, driver to server smtp gmail connection and tracking with the help of gps coordinates on google map service. 4
  • 5. 3. EXISTING SYSTEM Driver uses a physical metallic key to initiate the mechanism of vehicle Limitation of existing system : 1.Driver might lose the key. 2.Key might fall into wrong hands. 3.Difficult to replace a key. 4.Number of duplicate keys can be produced. 55
  • 6. 4. PROPOSED SYSTEM Replacing the physical key ,by session key mechanism between the driver’s mobile and vehicle based device, connected through the server. Security : •Personalized encryption program •Personalized random session key generator program 6
  • 7. SYSTEM ANALYSIS 1. FEASIBILITY STUDY car theft in last Quarter of 2010 1200000 #1 United States:1,246,096 1000000 #2 United Kingdom:348,169 800000 #3 France:301,539 600000 last quarter #4 India : 232,564 400000 middle quarter #5 Canada:161,506 200000 first quarter #6 Mexico:141,007 0 us uk france canada india mexico australia # 7 Australia:139,094 7
  • 8. 5. REQUIRNMENTS <i> HARDWARE REQUIRNMENTS: <ii> SOFTWARE REQUIRNMENTS: 1. Vehicle fitted with GSM and 1. Java ME for cell based program Bluetooth. 2. JSP/servlets for web program 2. Mobile phone or PDA for each 3. Oracle database for backend driver. 4. JDBC connectivity to database 3. Administrator system as server. 5. Simulation tools –NS2 88
  • 9. 5. REQUIRNMENTS conti.. <iii> FUNCTIONAL <iv> PERFORMANCE REQUIRNMENTS REQUIRNMENTS: 1. Administrator system must be 1. Must request and deliver session key able to track the movement of sk2 and sk2 safely and securely. vehicle. 2. Help option must be kept handy. 2. Driver must be able to request 3. Availability of session key 24x7. session key from server. 3. Vehicle must be able to ask session key from driver. 99
  • 10. Boehms SPIRAL SDLC ( software developed life cycle model) 10
  • 11. Specifications ADVANTAGES: DISADVANTAGES 1. Realism: the model 1. Needs technical expertise in accurately reflects the risk analysis to really work iterative nature of software 2. Model is poorly understood development on projects by non-technical with unclear requirements management, hence not so widely used 2. Flexible: incoporates the 3. Complicated model, needs advantages of the waterfal competent professional and rapid prototyping management. High methods administrative overhead. 3. Comprehensive model decreases risk 4. Good project visibility. 11
  • 12. ARCHITECTURE - earlier Vechile –fitted with GSM and bluetooth system Pass session key INTERNET Response of session key compare server Request for session key (UID + VID) Driver’s mobile 12
  • 13. ARCHITECTURE- revised Vechile –fitted with GSM and bluetooth system Grant access to the user with session keys2 INTERNET Pass the key to server Frequent server checks with Pass session key session 2 key Response of Request for session key (UID + VID) session key S1 Driver’s mobile 13
  • 14. INTERNET Request session key( UID +VID+hours) Grant session key Copy session key Driver authenticates himself Server can posts some content on net Store information Store information into into vehicle vehicle memory Pass on the memory information to driver terminal 14
  • 15. GPS + GSM + GIS GSM GPS network GIS 15
  • 16. SYSTEM DESIGN DATA DICTIONARY VID - unique Vehicle Identification number UID - unique Driver identification number VIS - vehicle Information System sk1, sk2 - major , minor session key GPS - Global positioning system GSM - Global system for mobile communication GIS - Global Information system 16
  • 18. Module 1: Authentication algorithm 1.Driver requests a session key from the server 2.Server provides it with a session key, the same is stored into the vehicle account. 3.As the driver tries to establish the communication with vehicle, both the session keys are matched , > if true then driver obtains access to start and operate the vehicle. > if false then driver is restricted the permission to operate the vehicle. 18
  • 22. 3. Usecase – 3.1 register 22
  • 23. 3.2 Usecase - Major session key authentication 23
  • 24. 3.3 Usecase – minor session key authentication 24
  • 25. Module 2: communication between driver and server, via vehicle reception 25
  • 26. Module 3: web based transportation service 26
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36
  • 37. 37
  • 38. 38
  • 40. 40
  • 41. 41
  • 42. 42
  • 43. 43
  • 44. 44
  • 45. 45
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. APPLICATIONS MILITARY SERVICES AMBULANCES TRUCK SERVICES CAB SERVICES 49 TOURIST SERVICES
  • 50. Future Scope.. 1. Webcam captured video/image from vehicle’s interior or exterior to monitoring server. 2. On demand music playback / direction updates / cricket commentary ! 3. Ad-hoc based network using vehicles as mobile nodes . 4. Extend the infrastructure to cloud domain. 5. Routing the nearest hospital or police station in case of emergency 50
  • 51. FEEDBACKS. 1. Handicap friendly. 2. Strong cryptography. 51
  • 52. Conclusion: To develop an intelligent vehicle authentication, management and monitoring system it is indeed important to guage and determine the possibilities and loopholes in emerging automotive engineering technologies around the world so as to lead to an independent mobile node based ad-hoc network for vehicles. 52
  • 53. REFERENCES 1. Based on IEEE paper- Intelligent Vehicle Monitoring System Based on GPS, GSM and GIS- 2010 WASE International Conference on Information Engineering 2. Next Generation Wireless Vehicle Detection- Sensay system 3. MOST150: Concept of multimedia networking in vehicles-Wolfgang Bott 4. Vehicular computing – Wikipedia, the free encyclopaedia 5. The Grid, Our Cars and the Net: One Idea to Link Them All-Robin Chase 53
  • 54. Thank You 54