information highway

474 views
363 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
474
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

information highway

  1. 1. Information Highway.. ALTANAI BISHT- VM 3178 BTECH INFORMATION TECHNOLOGY < FINAL YEAR > VEL TECH MULTITECH DR RR DR SR ENGG. COLLEGE
  2. 2. ABSTRACT To harness computer and communication technologies tosupport vehicular infrastructure control , driver – vehicleauthentication and significantly tracking the vehiclemovement. It connects the connect the driver’s cell, the vehicle basedGSM/Bluetooth system and the administrator in client servernetwork. 2
  3. 3. OBJECTIVETo replace the physical vehicular keys by mobile phone generated session keys.Also enabling the effective tracking of vehicle movement via GSM based BTS( base transceiver station monitoring) and transmitting critical data through net to vehicle via server administrator . 3
  4. 4. INTRODUCTIONThe system of interconnection between the vehicle ,driver andserver enables the most tedious process of conveyance ofinformation ,management of distances /fares/services as well assurveillance to become computerized.It is achieved with the help logic of random key generation,session key based authentication, vehicle to driver bluetoothconnection, driver to server smtp gmail connection and trackingwith the help of gps coordinates on google map service. 4
  5. 5. 3. EXISTING SYSTEMDriver uses a physical metallic key to initiate the mechanismof vehicleLimitation of existing system : 1.Driver might lose the key. 2.Key might fall into wrong hands. 3.Difficult to replace a key. 4.Number of duplicate keys can be produced. 55
  6. 6. 4. PROPOSED SYSTEMReplacing the physical key ,by session key mechanism betweenthe driver’s mobile and vehicle based device, connectedthrough the server.Security :•Personalized encryption program•Personalized random session key generator program 6
  7. 7. SYSTEM ANALYSIS1. FEASIBILITY STUDYcar theft in last Quarter of 2010 1200000#1 United States:1,246,096 1000000#2 United Kingdom:348,169 800000#3 France:301,539 600000 last quarter#4 India : 232,564 400000 middle quarter#5 Canada:161,506 200000 first quarter#6 Mexico:141,007 0 us uk france canada india mexico australia# 7 Australia:139,094 7
  8. 8. 5. REQUIRNMENTS<i> HARDWARE REQUIRNMENTS: <ii> SOFTWARE REQUIRNMENTS:1. Vehicle fitted with GSM and 1. Java ME for cell based program Bluetooth. 2. JSP/servlets for web program2. Mobile phone or PDA for each 3. Oracle database for backend driver. 4. JDBC connectivity to database3. Administrator system as server. 5. Simulation tools –NS2 88
  9. 9. 5. REQUIRNMENTS conti..<iii> FUNCTIONAL <iv> PERFORMANCEREQUIRNMENTS REQUIRNMENTS:1. Administrator system must be 1. Must request and deliver session key able to track the movement of sk2 and sk2 safely and securely. vehicle. 2. Help option must be kept handy.2. Driver must be able to request 3. Availability of session key 24x7. session key from server.3. Vehicle must be able to ask session key from driver. 99
  10. 10. Boehms SPIRAL SDLC( software developed life cycle model) 10
  11. 11. SpecificationsADVANTAGES: DISADVANTAGES1. Realism: the model 1. Needs technical expertise in accurately reflects the risk analysis to really work iterative nature of software 2. Model is poorly understood development on projects by non-technical with unclear requirements management, hence not so widely used2. Flexible: incoporates the 3. Complicated model, needs advantages of the waterfal competent professional and rapid prototyping management. High methods administrative overhead.3. Comprehensive model decreases risk4. Good project visibility. 11
  12. 12. ARCHITECTURE - earlierVechile –fitted with GSM andbluetooth system Pass session key INTERNET Response of session key compare server Request for session key (UID + VID) Driver’s mobile 12
  13. 13. ARCHITECTURE- revisedVechile –fitted with GSM andbluetooth system Grant access to the user with session keys2 INTERNET Pass the key to serverFrequent serverchecks with Passsession key session2 key Response of Request for session key (UID + VID) session key S1 Driver’s mobile 13
  14. 14. INTERNET Request session key( UID +VID+hours) Grant session key Copy session keyDriver authenticates himself Server can posts some content on net Store information Store information into into vehicle vehicle memoryPass on the memoryinformation to driverterminal 14
  15. 15. GPS + GSM + GIS GSM GPS network GIS 15
  16. 16. SYSTEM DESIGNDATA DICTIONARY VID - unique Vehicle Identification number UID - unique Driver identification number VIS - vehicle Information System sk1, sk2 - major , minor session key GPS - Global positioning system GSM - Global system for mobile communication GIS - Global Information system 16
  17. 17. 1. Class diagram 17
  18. 18. Module 1: Authentication algorithm1.Driver requests a session key from the server2.Server provides it with a session key, the same is stored into the vehicle account.3.As the driver tries to establish the communication with vehicle, both the session keys are matched , > if true then driver obtains access to start and operate the vehicle. > if false then driver is restricted the permission to operate the vehicle. 18
  19. 19. 1.1 Activitydiagram for driver 19
  20. 20. 1.2Activitydiagramfor admin 20
  21. 21. 2. Sequence diagram 21
  22. 22. 3. Usecase – 3.1 register 22
  23. 23. 3.2 Usecase - Major session key authentication 23
  24. 24. 3.3 Usecase – minor session key authentication 24
  25. 25. Module 2: communication between driverand server, via vehicle reception 25
  26. 26. Module 3: web based transportation service 26
  27. 27. 27
  28. 28. 28
  29. 29. 29
  30. 30. 30
  31. 31. 31
  32. 32. 32
  33. 33. 33
  34. 34. 34
  35. 35. 35
  36. 36. 36
  37. 37. 37
  38. 38. 38
  39. 39. SCREENSHOTS. 39
  40. 40. 40
  41. 41. 41
  42. 42. 42
  43. 43. 43
  44. 44. 44
  45. 45. 45
  46. 46. 46
  47. 47. 47
  48. 48. 48
  49. 49. APPLICATIONS MILITARY SERVICESAMBULANCES TRUCK SERVICES CAB SERVICES 49 TOURIST SERVICES
  50. 50. Future Scope..1. Webcam captured video/image from vehicle’s interior or exterior to monitoring server.2. On demand music playback / direction updates / cricket commentary !3. Ad-hoc based network using vehicles as mobile nodes .4. Extend the infrastructure to cloud domain.5. Routing the nearest hospital or police station in case of emergency 50
  51. 51. FEEDBACKS.1. Handicap friendly.2. Strong cryptography. 51
  52. 52. Conclusion:To develop an intelligent vehicle authentication, management and monitoring system it is indeed important to guage and determine the possibilities and loopholes in emerging automotive engineering technologies around the world so as to lead to an independent mobile node based ad-hoc network for vehicles. 52
  53. 53. REFERENCES1. Based on IEEE paper- Intelligent Vehicle Monitoring System Based on GPS, GSM and GIS- 2010 WASE International Conference on Information Engineering2. Next Generation Wireless Vehicle Detection- Sensay system3. MOST150: Concept of multimedia networking in vehicles-Wolfgang Bott4. Vehicular computing – Wikipedia, the free encyclopaedia5. The Grid, Our Cars and the Net: One Idea to Link Them All-Robin Chase 53
  54. 54. Thank You 54

×