Car Theft Prevention System
Car theft cases in Malaysia have been a threat to the government and the community as a whole. Increasing cases of car thefts in public areas, paid parking service, mall parking, and also in the neighborhood are the reasons why this project is initiated. The proposed system is a security system d...
Saved in:
Main Author: | |
---|---|
Format: | Final Year Project |
Language: | English |
Published: |
Universiti Teknologi Petronas
2006
|
Subjects: | |
Online Access: | http://utpedia.utp.edu.my/6865/1/2006%20-%20Car%20Theft%20Prevention%20System.pdf http://utpedia.utp.edu.my/6865/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Petronas |
Language: | English |
Summary: | Car theft cases in Malaysia have been a threat to the government and the
community as a whole. Increasing cases of car thefts in public areas, paid parking
service, mall parking, and also in the neighborhood are the reasons why this project is
initiated. The proposed system is a security system designed to collaborate with the
existing security systems incar parks such as shopping mall car parks and hotel car parks.
It also poses as a verification system for the car and its owner. This project is also
initiated to create a low-cost but effective security system in car parks. Current systems
adopt single authorization method for security purpose which is prone to security
breakage and has a few flaws in its implementation. Therefore, this system is designed
with two-factor verification which consists of car registration number (what you know)
and MyKad (what you have). These two inputs or authentication elements are very
important as they act as a "binder" between the car owner and its car thus becoming the
verifier for this system. In developing this system, iterative development methodology is
used and it is being modified to cater the need of this project. Iterative development
methodology is suitable for this system based on its nature where analysis phase, design
phase and implementation are being executed iteratively until a satisfied product is
produced. It is also suitable to be used for projects with a small timeframe. Included in
this report as well, is the technical configuration required during the product development
which consists of system's configuration and database configuration. During the analysis
part of this project, there has been a few interesting findings that supports the creation of
this project. Among them is the adoption of two-factor authentication using password and
token or smart card is proven to be cheaper yet effective compared to a single biometric
authentication which is very expensive to be implemented. Besides that, privacy violation
and identity theft becomes easierand more damaging whenbiometric system is adopted.
Finally, smart card has been recognized as the future of better security due to its
flexibility to collaborate with password authentication and biometric authentication
which is currently |
---|