Welcome To UTPedia

We would like to introduce you, the new knowledge repository product called UTPedia. The UTP Electronic and Digital Intellectual Asset. It stores digitized version of thesis, final year project reports and past year examination questions.

Browse content of UTPedia using Year, Subject, Department and Author and Search for required document using Searching facilities included in UTPedia. UTPedia with full text are accessible for all registered users, whereas only the physical information and metadata can be retrieved by public users. UTPedia collaborating and connecting peoples with university’s intellectual works from anywhere.

Disclaimer - Universiti Teknologi PETRONAS shall not be liable for any loss or damage caused by the usage of any information obtained from this web site.Best viewed using Mozilla Firefox 3 or IE 7 with resolution 1024 x 768.

Car Theft Prevention System

Sharil, Syahrul Aniza (2006) Car Theft Prevention System. Universiti Teknologi Petronas. (Unpublished)

[img] PDF
Download (3128Kb)


Car theft cases in Malaysia have been a threat to the government and the community as a whole. Increasing cases of car thefts in public areas, paid parking service, mall parking, and also in the neighborhood are the reasons why this project is initiated. The proposed system is a security system designed to collaborate with the existing security systems incar parks such as shopping mall car parks and hotel car parks. It also poses as a verification system for the car and its owner. This project is also initiated to create a low-cost but effective security system in car parks. Current systems adopt single authorization method for security purpose which is prone to security breakage and has a few flaws in its implementation. Therefore, this system is designed with two-factor verification which consists of car registration number (what you know) and MyKad (what you have). These two inputs or authentication elements are very important as they act as a "binder" between the car owner and its car thus becoming the verifier for this system. In developing this system, iterative development methodology is used and it is being modified to cater the need of this project. Iterative development methodology is suitable for this system based on its nature where analysis phase, design phase and implementation are being executed iteratively until a satisfied product is produced. It is also suitable to be used for projects with a small timeframe. Included in this report as well, is the technical configuration required during the product development which consists of system's configuration and database configuration. During the analysis part of this project, there has been a few interesting findings that supports the creation of this project. Among them is the adoption of two-factor authentication using password and token or smart card is proven to be cheaper yet effective compared to a single biometric authentication which is very expensive to be implemented. Besides that, privacy violation and identity theft becomes easierand more damaging whenbiometric system is adopted. Finally, smart card has been recognized as the future of better security due to its flexibility to collaborate with password authentication and biometric authentication which is currently

Item Type: Final Year Project
Academic Subject : Academic Department - Information Communication Technology
Subject: Z Bibliography. Library Science. Information Resources > ZA Information resources
Divisions: Sciences and Information Technology > Computer and Information Sciences
Depositing User: Users 2053 not found.
Date Deposited: 27 Sep 2013 10:55
Last Modified: 25 Jan 2017 09:46
URI: http://utpedia.utp.edu.my/id/eprint/6865

Actions (login required)

View Item View Item

Document Downloads

More statistics for this item...