Open Access Open Access  Restricted Access Subscription Access

Vehicle Intruder Alert System using Multi-Layered Authentication Technique


Affiliations
1 School of Computing, Sastra University, Thanjavur - 613401, Tamil Nadu, India
 

Objectives: In the recent past, vehicle theft is increasingly prevalent. The objective of the study is to propose a method to overcome the problem. Methods: In this paper, a technique is proposed that resolves the above mentioned problem. The primary purpose of the proposed scheme is to protect the vehicle from any unauthorized access using a cryptographic algorithm. Findings: The surety of the algorithm is achieved by combining cryptographic algorithm with a secret key. A randomly chosen binary template is used as a secret key which is then integrated with the input in order to generate the hash value using an MD5 hashing algorithm. This hash value is then compared with the stored hash value in order to operate the vehicle. In hashing algorithm, the hidden key is a data in which it is applied as an additional input to a one-way function that hashes a password. The principal use of the private key is to defend against dictionary attack and a rainbow table attack. Improvements/Applications: Thus, this technique achieves data confidentiality, data integrity, data privacy, authentication, and also is efficient in terms of processing time.

Keywords

Authentication, Cryptography, Hashing Algorithm, Intrusion Prevention.
User

Abstract Views: 150

PDF Views: 0




  • Vehicle Intruder Alert System using Multi-Layered Authentication Technique

Abstract Views: 150  |  PDF Views: 0

Authors

R. Padmanaban
School of Computing, Sastra University, Thanjavur - 613401, Tamil Nadu, India
J. Jennifer Ranjani
School of Computing, Sastra University, Thanjavur - 613401, Tamil Nadu, India

Abstract


Objectives: In the recent past, vehicle theft is increasingly prevalent. The objective of the study is to propose a method to overcome the problem. Methods: In this paper, a technique is proposed that resolves the above mentioned problem. The primary purpose of the proposed scheme is to protect the vehicle from any unauthorized access using a cryptographic algorithm. Findings: The surety of the algorithm is achieved by combining cryptographic algorithm with a secret key. A randomly chosen binary template is used as a secret key which is then integrated with the input in order to generate the hash value using an MD5 hashing algorithm. This hash value is then compared with the stored hash value in order to operate the vehicle. In hashing algorithm, the hidden key is a data in which it is applied as an additional input to a one-way function that hashes a password. The principal use of the private key is to defend against dictionary attack and a rainbow table attack. Improvements/Applications: Thus, this technique achieves data confidentiality, data integrity, data privacy, authentication, and also is efficient in terms of processing time.

Keywords


Authentication, Cryptography, Hashing Algorithm, Intrusion Prevention.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i48%2F139085