100% found this document useful (3 votes)
2K views27 pages

Chapter-2 Keyless Motorcycle

The document reviews literature related to keyless motorcycle technology, motorcycle safety and security devices, and device development and design. It discusses existing Philippine and foreign studies on motorcycle theft prevention, safety systems, and how keyless ignition works. Local studies found motorcycle accidents and theft increasing in the Philippines. Foreign systems discussed include biometric security, GPS tracking, and cellular alarm systems.

Uploaded by

Patrick Jimenez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
2K views27 pages

Chapter-2 Keyless Motorcycle

The document reviews literature related to keyless motorcycle technology, motorcycle safety and security devices, and device development and design. It discusses existing Philippine and foreign studies on motorcycle theft prevention, safety systems, and how keyless ignition works. Local studies found motorcycle accidents and theft increasing in the Philippines. Foreign systems discussed include biometric security, GPS tracking, and cellular alarm systems.

Uploaded by

Patrick Jimenez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

5

Chapter II

Review of Related Literature

This chapter contains related literatures and studies regarding Keyless

Motorcycle, Motorcycle Safety and Motorcycle Security, Device Development

and Design. This chapter also includes: existing motorcycle safety device that

are related to the study, the conceptual framework of the study and the definition

of terms for a better understanding of the study.

2.1 Local Related Literature and Studies

Motorcycle Anti-Theft and Safety Device

Everyone wants to be as secure as possible. Security is the degree of

protection against danger, damage, loss, and crime. Security is a form of

protection that includes structures and processes that provide or improve security

as a condition. Many people do not think about safety and security in

motorcycles until it is too late and they have become victims of car napping and

accidents.

The number of motorcycle accidents in the Philippines is increasing but

studies have not been done to assess its causes. This study considered the

separate and interactive effects of environment and driver-dependent factors

namely gender, helmet usage, risk taking behavior, day, time and month of the

accident, junction type, movement, road character, surface condition, weather,

traffic sector, and lighting conditions in predicting motorcycle accidents in the

Philippines.
6

According to the Metro Manila Development Authority (MMDA, 2019)

"motorcycles are more prone to accidents as they expose the driver and

passenger/s to twice as much risk than in four-wheel vehicles".

Philippine Motorcycle Industry Sees Growing Need for Motorcycles

(MDPPA, 2018) The Motorcycle Development Program Participants


Association is confident motorcycle sales will remain strong despite the negative
issues affecting the industry, including the rising number of road crashes linked
to motorcycle use. The country’s premier group of motorcycle manufacturers, in
fact, project sales will hit 2 million units by 2022 on the back of strong demand.

According to Motorcycle Development Program Participants Association

(MDPPA, 2018) “More people are opting to spend more time at home. If they

shop or run an errand, they do so straight from the house. As a result of this

‘in-home-staying’ lifestyle, we see an increasing demand for online shopping and

grocery delivery, which then fuels demand for motorcycles as a delivery transport

option.”

Motorcycles for business use, which posted an 18 percent sales growth

last year at 202,098 units compared with 170,979 units in 2016, are expected to

continue on an upward trend because of the rising popularity of the ​cocooning

trend. This trend is described as the preference of consumers, in particular

millennials, to do activities such as working, entertaining and relaxing at home

rather than outside. Anytime, anywhere internet connection is feeding the trend
7

even further, with more people now finding it productive to complete tasks, even

shopping from the comfort of their own homes (MDPPA, 2018).

Motorcycle Engine Shut Off Device

The Philippines is most likely one of the countries in the South East Asia

with many motorcycle owners and riders. In fact, the Region IV-A has recorded a

total of 360,297 registered (new and renewal) motorcycles based on the

Semi-Annual Report 2018 of the Land Transportation Office (LTO, 2018).

The data of the Philippine National Police said that "Today motorcycles

have been the common target of thieves and intruders due to its abundance.

Incidents of car theft are undeniably a persistent dilemma in the country."

Records from the Philippine National Police Highway Patrol Group (PNP-HPG)

showed that 5,363 carjacking incidents were documented in 2017, compared to

7,680 car thefts that took place in 2016. Most that were stolen are motorcycles

at 4,939 while the rest are four-wheeled vehicles at 424. That is why, the PNP

has urged the car and motorcycle owners ​to be vigilant and to install security alarms

and similar devices on their vehicles (​Tupas, 2018).

Push Start Ignitions

According to Nico Ylanan (2018) “If you happen to have purchased a car

within the past few years, chances are you were given a way to start it without a

traditional key to insert into the ignition slot.” This keyless entry system, by

definition, allows the driver to keep the key fob pocketed when unlocking, locking,

and starting the vehicle. It means that the smart key is identified via one of
8

several antennas in the car's bodywork and a radio pulse generator in the key

housing. Depending on the system, the vehicle is automatically unlocked when a

button or sensor on the door handle or trunk release is pressed. Vehicles with a

smart-key system have a mechanical backup, usually in the form of a spare key

blade supplied with the vehicle.” This can also be implemented to motorcycles

using an android device key fob usually gets lots at some occasion, but we doubt

that you will forget your phone when leaving, people nowadays tend to do

everything using their smartphones and forgetting their phones is not that often

as losing a key fob.

According to The Philippine National Police "we have recorded a periodic

increase in cases of stolen motorcycles across the country. The PNP Highway

Patrol Group said that in 2013, they recorded 3,701 cases of stolen motorcycles.

In 2014, the number of stolen motorcycles was at 7,302." During the first quarter

of 2015, the HPG recorded the theft of 2,404 motorcycles compared to the 1,562

stolen motorcycles during the same period last year (Dalizon, 2015). In the year

2015, the PNP recorded 8,203 cases of stolen motorcycles last November 2015,

the PNP-HPG recorded an average of 6.2 motorcycles being stolen per day

(Dalizon, 2016).
9

2.2 Foreign Related Literature and Studies

Motorcycle Theft Prevention and Recovery Security System

Motorcycle is one of the least expensive and a convenient mode of

transportation but unfortunately, it is easy to steal, easy to disassemble, and

easy to ship as parts (McDono, C, 2011). As motorcycle industry went boom,

motorcycle theft in the country has ran rampant over the years and countless of

their modus operandi has been recorded.

Motorcycle theft indeed has become a big problem of the community.

Although, the authorities are said to be doing the best they can to stop these

thieves, it still ranks high up in the list of crimes committed in the streets every

day.

Security plays a vital role in today's society. Safety of vehicles is

extremely essential for every private and public vehicle owner. For this reason,

various security systems have been carried out, but most of these security

systems are expensive, complicated and best suits to cars. Numerous car

security systems have been carried out to improve security system by

incorporating Biometric techniques such as Face Detection and Finger Print

Detection (Pingat et. al., 2013).

Other security systems were equipped with a tracking system using Global

Positioning System (GPS) and have the capability to shut down the engine of the

vehicle remotely via a text message (Ramadan et. al., 2012). As for motorcycles,

basic and affordable security system only gives siren indication and will make a
10

lot of noise that disturb people. But if the person is far from the motorcycle

location he will not be able to hear the alarm.

Physical type counter measures are also used to prevent theft, such as

padlocks, disk break lock and other more which is a preventive action but it is not

safe enough. One of the existing solutions for motorcycle napping available in

the market today is the Scorpio Ride “Core” Cellular Motorcycle Alarm and GPS

Tracking System. It uses iOS or Android app and a module installed inside the

bike. It sends a Short Message Service (SMS) alerts to notify the user for any

tampering of the motorcycle. It has also the ability to track vehicle's location. This

system does not have enough preventive measures during theft attempt.

How Keyless Ignition Works

Keyless ignition systems come with a fob that you can keep tucked away

in your pocket, purse, briefcase, or anywhere in close proximity to the receiver

inside the vehicle. The fob transmits a unique low-frequency signal to the car's

computer system, which then validates that the correct signal has been sent and

allows you to push a button on the dashboard or console to start the engine.

Shutting off the motor is just as hassle-free: Simply press the start/stop button.

And, in addition to keyless ignition, most systems also include keyless entry,

allowing you to enter the car without inserting a key or hitting a button on the fob.

Even though keyless ignition has become widely available, even on

affordable vehicles, these systems haven't yet reached the status of automotive
11

necessity, as have power windows and door locks. Still, the convenience factor

is a selling point for many car shoppers. It can be particularly helpful for drivers

with arthritis or other disabilities that impede their ability to grip and turn a key (P.

Gareffa, 2018).

Security Measure

Keyless ignition systems contain safeguards to ensure that your car doesn't

spring to life at the wrong time. Pre-start safety checks by the car's

computer-ensure that the vehicle is in park and that your foot is on the brake before

allowing the engine to start. For added insurance, some designs require you to

flick or rotate a switch before pressing the start button. And in most cases, the key

fob must be inside the vehicle in order to get the motor running.

Among other advantages, these systems are designed to help deter

break-ins and vehicle theft. Since the car's computer will only recognize a signal

from its own fob, thieves will have a harder time getting in and starting the engine.

There's no metal key that can be copied and no mechanical steering-column lock

that can be forced or otherwise defeated.


12

Keyless ignition also makes it more difficult to lock your keys in the car or the

trunk. For one thing, the fob can remain safe and snug in your pocket at all times.

But some systems are smart enough not to allow the doors to lock if, for some

reason, you leave the fob inside the vehicle or in the cargo area. Others send an

audible alert if you attempt to shut a door or trunk with the fob still inside.

And if the fob's battery goes dead while you're away from home, most

systems have you covered, though the approach varies among carmakers. The

most common solution is remote unlocking via the manufacturer's over-the-air

emergency service. When you call or use the company's mobile app, a

representative can send a signal to unlock your car doors and activate the starting

system. Other automakers offer an emergency roadside assistance program that

will send a technician to bail you out. And some systems even have a hidden key

that pops out of the fob to unlock the door. The key can then be inserted into an

emergency port to start the car (P. Gareffa, 2018).

A Keyless Ignition System

A smart key is a method of electronic access and authorization of an entry


and ignition system that’s available as an option or standard in several cars. ​The
first smart key was developed by Siemens in 1995, and introduced by
Mercedes-Benz under the name “Keyless Go” in 1998 on the W220 S-Class
following its design patent filed by Daimler-Benz on May 17, 1997. Although
keyless ignition systems have been around for 20 years and are available on
autos of all makes and models, and at all price points, there are some concerns
about safety and security ​(R. L. Donlon, 2016)
13

Security

Rather than a smart key sending out the same frequency signal over and

over, which would affect all the makes and models utilizing the same key, not to

mention make it easier for tech-savvy thieves to steal cars, smart keys broadcast

a different encrypted signal every time you unlock a door or remotely pop the

trunk.

A computer chip located inside the car is responsible for receiving the

signal and prompting a new frequency to be generated. Of course, nothing is

foolproof, and manufacturers are constantly working at making their technology

more secure (B. Yong, 2015).

Anti Theft Strategies for Motorcyclist

One of the dangers of popularity, such as that currently being experienced


by cruisers, is that it also makes that type of motorcycle popular with thieves. As
the customer base expands, there are more people who need parts, and some
who don't feel like paying retail.

But even inexpensive motorcycles with little following are stolen more
often than their owners expect. Insuring against theft can help after the fact, but
most owners are disappointed with the blue-book value that the insurer pays
after the theft. And nothing compensates for that feeling of having been violated
when your bike is stolen.
14

The solution starts with the recognition that your bike might be a target for
thieves. A little paranoia is a good thing; it can even be fun. And a little may be
all you need; many thefts can be prevented just with elementary precautions (A.
Friedman, 2009).

Improving motorcycle anti-theft system with the use of Bluetooth Low


Energy 4.0

In our previous work, the couple RFID passive tags were installed on
motorcycles to detect the larceny conditions. The main problem was found in the
last experiments that the RFID tags attached with the ignition key cannot be hung
flexibly. Therefore, the BLE4.0, which is the low-power-consumption device, is
dangle on the motorcycle's key and the RFID tags is installed on the bike's
hidden body.

The anti lost devices have been applied for responsibility of BLE-tags
slave mode, installed on a key. The HM-11 BLE 4.0 module combination with an
Arduino board has a function as the master mode, reading the MAC address
(called ID) of BLE slave devices. The results show that the maximum distance,
in which the BLE master module can detect the BLE slave's ID, is approximately
18 meters.

The proposed method is reliable because the BLE devices can be hung
on the key together while the motorbike is running on the speed not over than
15

80km/hr. Finally, the experimental results guarantee that, when relatively


compared with the previous method, accuracy of the MATS is improved
efficiently; moreover, this proposed system can actually be used in the real
situation at the Prachinburi province, Thailand (W. Koodtalang, T. Sansuwan,
2016).

Architecture Behind the Keyless Entry System

To start with a smart key is an automatic right of entry and approval

system that is an alternative to traditional keys that were in use previously as the

standardized option in several cars and points of entry. The smart key was first

were created in 1995 by Siemens group of companies and pioneered into use by

Mercedes-Benz and named the keyless go on the W220 S-Class that was

designed and patented to Daimler-Benz on 1998. The smart key permits the

driver of the automobile to keep the key chain or key holder in the pocket while

starting or stopping the engine of the car.

When the driver or user of the car touches the door handle of the car, a

small frequency wake-up signal is sent to the car and from the car to the key.

Consequently, a recognition cryptogram is sent back to the car, and if it is

accurate, the vehicle automatically unlocks itself. When the user of the vehicle

gains entry into the vehicle, he or she can start the engine of the vehicle by

pushing the button start or stop button. The access of the car user to gain entry

into the car is very cost effective purpose section in the architecture of the
16

keyless entry system. The current design of the keyless entry architecture

consists of a detached transponder that is in a parallel micro-controller that is

joined with a radio frequency and a transmitter integrated circuit.

The technology that is in use is dependent upon the proprietary crypto

algorithms which restrict the Original Equipment Manufacturer’s supplier

collection and enhances the possible frequency of attacks. There are proposals

by the designers of the keyless entry systems to use immobilizer front-end in the

integrated circuits.

The effect of doing this will be increased circuit integration in a cost-

effective way due to the elimination of the detached transponder with a small

ferrite that has a coil. The use of the advanced encryption standard crypto

algorithm allows for transparent and expert standard algorithms and increased

market for Original Equipment Manufacturers and greater effectiveness in the

controlling system.

Modern cars are fitted with several security systems, for instance, the

electronic engine immobilizer anti-theft alarm, anti-carjacking systems, steering

lock, door lock and ignition locks. The above facilities are present in the modern

vehicles that are manufactured, and others are being installed in the vehicles that

don’t have such features as add-on. The keyless entry system gives a security

boost to the user of the car with multiple layers of security levels to protect the
17

vehicle from unauthorized users who may be harboring ulterior motives. Cars

have been in existence since the start of the 20th century, and they did not have

the keyless entry systems features.

It is at the start of the 21st century that the initial cars began to be fitted

with the keyless entry a system which was a remarkable invention and a plus for

the security systems not only in cars but also in other facilities such as buildings

and private homes. The former car locks consisted of doors that were operated

using a mechanical pin and a tumbler lock for the essence of security and

convenience to the car users. This is what later overtaken by the keyless entry

system and automatic locking system. Similarly, the technological innovations

that were in play at that time established various methods that would be used to

ignite the engine of an automobile.

The previously used keys for gaining entry into the car and starting the

engine of the car were slowly being faced off and replaced other inventions. The

keyless entry system can robotically unlock the doors of the car if it is located

within some set radius by the manufacturer of the automobile. The cars that are

outfitted with a keyless system of entry do not have the traditional ignition lock

this is to say that they can be started using the start button instead of the turning

of a key. There are not set standards for the automatic keyless entry and this

result into different kinds of such systems in the market.


18

Because cars are used on a frequent basis, any issue that relates to the

security systems in them can attract a lot of enormous societal concern. The

development, for instance, the radio frequency identification RFID was previously

claimed to be highly safe, but this was disapproved easily as it was broken easily

as it did not tamper proof and could be easily manipulated. As regards to the

automatic keyless entry system, the manufacturers of these systems do not

make it known the details relating to the security of their products hence there is

no way of manipulating these systems. Hence they cannot be easily tampered

with.

Remote keyless entry systems are made use of in many assortments of

applications with most it being in cars and buildings for the purpose of gaining

entry to these facilities. These systems use a small powered battery device that

transfers an original message to the car or building for it to open or close its

doors.

Current research in this field illustrates the loopholes that existed in the

other security systems that were in place before and that the customers of such

devices were being given a raw deal. The security flaws that existed before were

as a result of obsolete cryptographic algorithms and defective key administration

and agreement techniques. For instance, the large Keeloq system that used
19

microchip was easily manipulated and broken into by researchers from the

University of Bochum. This was the case in the NXP’s Hitag-2 system.

As regards to the algorithms, the modern automatic keyless systems of

entry adopt the use of symmetric, identical and thoroughly researched

cryptographic algorithms, for instance, advanced encryption standard.

Symmetric algorithms have distinct advantages relating to the execution cost

efficient use of energy. On the contrary, the symmetric algorithms are not a good

foundation for unit verification since they need to have a well-defined key

administration strategy and ensure the safety of the transfer of clandestine keys.

In comparison to the symmetric algorithms, the asymmetric algorithms make the

key management easy and more efficient. For the asymmetric algorithms, there

is permission of essential agreement with the absence of the transmission of the

secret key.

To attain dependable security, the industry operates in a manner that

there is unity between the designer and the security principles standards entity to

the device, authenticate and model an architecture for automotive networks

where security related components are secured with various tamper identification

and defense schemes and sensitive information are protected with different

cryptographic algorithms. For stepping up of the security, there is a suitable

separation between the security software and hardware and a safe zone inside
20

the system is characterized with a hardware co-processor, undisclosed

storeroom, and dispensation.

Currently, the present security solutions for the keyless entry systems are

made of trusted hardware security modules which are incorporated with other

equipment’s, for instance, the secure hardware extension, vehicle intrusion

protected applications that are in the trusted platform module where they

coordinate with each other. The secure hardware extension is characterized by

some functions and a programmer’s interface that permits the cooperation and

coordination within a safe zone inside the electronic control unit that is installed in

an automobile.

The primary characteristics are encryption and decryption algorithms that

request an identification code to gain access to the API storage and

administration of the security keys. E-safety Vehicle Intrusion protected

Applications is characterized by three kinds of levels of security undertakings that

are light, full and medium. The primary purpose of the E-safety Vehicle Intrusion

Protected Applications is looking for an appropriate separation of software and

hardware security based on the fact that software is not adequately safe for the

current electronic safety applications (Kitson et al.).

It characterizes a hardware co-processor with safe storage and

dispensation and high throughput attained with hardware enhancement. The


21

alternative design method to ensure device safety is the use of security

controllers. The security controllers are standard incorporated systems with

security improved memory administration and processor additions to provide

separate runtime surroundings as safe and non safe modes. The National

Institute of Standards and Technology has recommended the Federal

Information Processing Standards which developed encryption algorithms, for

instance, the advanced encryption standard and additional data safety standards.

The remote keyless system allows the car user to gain entry into his or her

car devoid of the use of physical lock of the car. This system signals whether the

car is unlocked or locked by the utilization of a combination of actions such as

flashing of the indicator lights and a distinctive sound similar to that of the horn.

Additional apart from the closing and opening of the car the other characteristic

of the remote keyless system is the trunk, rooftop or windows.

Some of the keyless remote systems have a panic button which triggers

the car alarm system. The remote keyless system is operated through the use of

radio frequencies for instance in Japan and North America they operate on 315

MHz and 433.92 MHz in Europe.

The operating range of the spectrum differs from one manufacturer to the

other. For instance, the Ford remote keyless system is within a range of 5 meters

for Japan and 20 meters for Europe and North America and other markets where
22

the transmission power is limited by the laws of the land. The distance between

the vehicle and the remote sensing device is not straight and is affected by

corners and pillars and small window apertures slow down the signal thus

reducing the distance it can cover.

Similar technology has been used to run garage doors since the early

1950s. The transmitters that were used then were much simpler, and they

transmitted a single non-encrypted message to the garage door opener which

would respond by locking or unlocking the garage door.

On the other hand, keyless entry system allows control of doors fitted with

Schüco door manager which provide a convenient platform for opening, closing,

and locking the door without the need of a key. The Door Control System is

integrated with a port management system with maximum modularity providing a

high-level design with the current high-level technological devices. The Schüco

door manager is a dependable system which controls access to secure areas.

The access right is provided through the identification of an individual’s

fingerprints by using Schüco fingerprints systems, keypads or card readers.

These systems ensure that only specific people are allowed entrance to secure

areas for a specified period to prevent possible use of illegal substances such as

fraud debit and credit cards. Online based Schüco fingerprints systems have a

terminal server which communicates with specified door managers through a


23

local area network connection. In this system, access rights around the world

are performed centrally and conveniently from a personal computer.

Viper Smart Key is another technology that uses the smartphone to lock

and unlock the vehicle. This technology works with the installation of the Viper

smart key system in the smart phone as a standalone unit to control locking and

unlocking vehicles and buildings door. On the other hand, Viper smart key can

be added virtually to any remote start systems allowing an individual to control

his/her vehicle using their smart phones.

However, the Viper Smart Key technology has a lot of advantages to the

users since it unlocks the door and disarms the Viper system as the person

approaches the door. Additionally, viper smart key technology locks the door

and arms the system as an individual walks away from the entrance. Moreover,

this system is compatible with many Viper security systems thus more

convenient and effective to users with this security systems.

The mechanical digital door locks provide keyless entry to a building

through changing of digital codes combination. The digital codes combinations

are provided to allow unlocking and to lock the door. However, incorrect entry of

the codes will prevent the door from opening whereby the user will have to

contact the providers to check on the locks. On the other hand, digital door locks

are effective and convenient since they provide a guarantee of high security
24

since no one can have access to the building without the correct combination

codes.

In addition, digital locks have various advantages in that they are battery

powered whereby they still work even during blackouts. For example, the Yale

digital locks use a set of 4 AA batteries whereby if the battery reaches a critical

level, light up warning sign is shown on the lock. In addition, digital door locks are

bought with a free hotline whereby in the case of encountering any problems, a

user can contact customer care using the free hotline.

Moreover, digital locks are safer than ordinary locks because they have an

alarm that switches off when an intruder tries to break into the building.

Additionally, digital locks have faked pin functions which identify the owner’s pin

after a trial of numerous numbers to prevent anybody else from accessing the

pin. On the other hand, digital locks have sensitive screen keypad without

buttons thus making it hard for an intruder to trace the pin. However, digital locks

allow frequent changing of the codes to ensure the lock remains effective by

restricting access.

Similar technology has been employed in fingerprint identification which

has been adopted widely in the day to day life. This adaptation is commonly in

laptop computers which have been widely used to replace the input of a

password on the keyboard. Another application is in the mobile devices such as


25

cell phones. However, many residence and buildings use fingerprint

identification as a security system. In most cases, individual’s fingerprints are

integrated into the keyless entry system to enhance security by preventing key

guessing attacks and thief stealing attacks.

For the use of fingerprints identification, fingerprint images are obtained

from capacitance-based silicon sensors which use electric current signals to

simulate the epidermis and store the changes in electric signals using packed

matrices of capacitors on the surface of the sensors. Once the changes are

stored, the fingerprint image is pre-processed to filter distortion from the noise

and other environmental conditions.

After filtering distortions, fingerprints are converted into feature values by

ensuring that different fingerprints do not produce the same value. After the

conversion, the fingerprints features are compared to those stored in the

database whereby the matching score will come out after comparison. Whereby

qualification is granted when comparison score is greater than the metal crossing

the entrance of a house or a room, while qualification is denied when the

comparison score is less than the metal crossing the entrance of a house or a

room.

On the other hand, fingerprint identification has been adopted in the

vehicles to identify driver’s fingerprints to re-establish the driver’s status.


26

Fingerprint identification in a vehicle involves a remote control, keyless entry, and

an immobilizer. When a driver put his hand on the car door and tries to open it,

the antenna electronics sends out a low-frequency signal to the driver’s portable

transponder which is activated.

All portable transponders within the transmission line will receive the

signal, but only one transponder will be used for security check. After the

portable transponder is identified, antenna electronics will send signals to open

the door and another signal to the control unit to initiate the automatic

re-establishment of the driver’s status. The control unit will then condition the

seat and the rear mirror in line with the driver’s preferences. (​Pei, Dingyi. 2007)

2.3 Summary

Based on the presented studies and articles. Motorcycle theft has been

abrupt in our country and the same time a booming population of the motorcycle

industry brought by heavy traffics happening in the metro. Riders seek a more

secured motorcycle for daily use to avoid their motorcycle being taken away

easily. This type of device is specifically designed to provide riders for the

security they needed.


27

Developing such a device is not easy as well as there are things to be

considered. There are thieves that do not have master keys to take the

motorcycle, rather they will carry the whole motorcycle and put it inside a van

where no one can see them when traveling, but such case is very rare, there are

also existing anti-theft devices for motorcycles but most of them are paired with a

key, which is a weakness for their device.

2.4 Conceptual Model of the Study


28
29

2.5 Definition of Terms

Android ​- Android is a mobile ​operating system developed by Google. It is used

by several ​smart phones and ​tablets​. Examples include the Sony Xperia, the

Samsung Galaxy, and the Google Nexus One.

The Android operating system (OS) is based on the Linux ​kernel​. Unlike

Apple's ​IOS​, Android is ​open source​, meaning developers can modify and

customize the OS for each phone. Therefore, different Android-based phones

often have different graphical user interfaces ​GUIs even though they use the

same OS.

Anti-Theft ​- An anti-theft system is any device or method used to prevent or

detect the unauthorized appropriation of items considered valuable. Theft is one

of the most common and oldest criminal behaviours. Used to ​describe

equipment​ that is ​intended​ to ​prevent​ something from being ​stolen

Keyless ​- A ​keyless entry system is an electronic lock that controls access to a

building or vehicle without using a traditional mechanical key. When within a few

yards of the car, pressing a button on the remote can lock or unlock the doors,

and may perform other functions. Keyless entry systems allow you to unlock and

lock the doors to your vehicle without using a key.


30

Security ​- Security ​refers to all the measures that are taken to ​protect a place, or

to ensure that only people with ​permission ​enter it or leave it. Security means

safety, as well as the measures taken to be safe or protected.

GPS ​- GPS (Global Positioning System) is a "constellation" of approximately 30

well-spaced satellites that orbit the Earth and make it possible for people with

ground receivers to pinpoint their geographic location. The location accuracy is

anywhere from 100 to 10 meters for most equipment.

GSM ​- GSM (Global System for Mobile Communications) is a standard

developed by the European Telecommunications Standards Institute to describe

the protocols for second-generation digital cellular networks used by mobile

devices such as mobile phones and tablets.

SMS ​- SMS (short message service) is a text messaging service component of

most telephone, Internet, and mobile device systems. It uses standardized

communication protocols to enable mobile devices to exchange short text

messages. An intermediary service can facilitate a text-to-voice conversion to be

sent to landlines.

Arduino ​- refers to an open-source electronics platform or board and the

software used to program it. Arduino is designed to make electronics more


31

accessible to artists, designers, hobbyists and anyone interested in creating

interactive objects or environments. Arduino is an open-source hardware and

software company, project and user community that designs and manufactures

single-board microcontrollers and microcontroller kits for building digital devices.

Motorcycle ​- A motorcycle, often called a bike, motorbike, or cycle, is a two- or

three-wheeled ​motor vehicle​. Motorcycle design varies greatly to suit a range of

different purposes: ​long distance travel, ​commuting​, ​cruising​, ​sport including

racing​, and ​off-road riding. ​Motorcycling is riding a motorcycle and related social

activity such as joining a ​motorcycle club​ and attending ​motorcycle rallies​.

You might also like