Car Theft Prevention System

Car theft cases in Malaysia have been a threat to the government and the community as a whole. Increasing cases of car thefts in public areas, paid parking service, mall parking, and also in the neighborhood are the reasons why this project is initiated. The proposed system is a security system d...

Full description

Saved in:
Bibliographic Details
Main Author: Sharil, Syahrul Aniza
Format: Final Year Project
Language:English
Published: Universiti Teknologi Petronas 2006
Subjects:
Online Access:http://utpedia.utp.edu.my/6865/1/2006%20-%20Car%20Theft%20Prevention%20System.pdf
http://utpedia.utp.edu.my/6865/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Petronas
Language: English
Description
Summary:Car theft cases in Malaysia have been a threat to the government and the community as a whole. Increasing cases of car thefts in public areas, paid parking service, mall parking, and also in the neighborhood are the reasons why this project is initiated. The proposed system is a security system designed to collaborate with the existing security systems incar parks such as shopping mall car parks and hotel car parks. It also poses as a verification system for the car and its owner. This project is also initiated to create a low-cost but effective security system in car parks. Current systems adopt single authorization method for security purpose which is prone to security breakage and has a few flaws in its implementation. Therefore, this system is designed with two-factor verification which consists of car registration number (what you know) and MyKad (what you have). These two inputs or authentication elements are very important as they act as a "binder" between the car owner and its car thus becoming the verifier for this system. In developing this system, iterative development methodology is used and it is being modified to cater the need of this project. Iterative development methodology is suitable for this system based on its nature where analysis phase, design phase and implementation are being executed iteratively until a satisfied product is produced. It is also suitable to be used for projects with a small timeframe. Included in this report as well, is the technical configuration required during the product development which consists of system's configuration and database configuration. During the analysis part of this project, there has been a few interesting findings that supports the creation of this project. Among them is the adoption of two-factor authentication using password and token or smart card is proven to be cheaper yet effective compared to a single biometric authentication which is very expensive to be implemented. Besides that, privacy violation and identity theft becomes easierand more damaging whenbiometric system is adopted. Finally, smart card has been recognized as the future of better security due to its flexibility to collaborate with password authentication and biometric authentication which is currently