Chapter-2 Keyless Motorcycle
Chapter-2 Keyless Motorcycle
Chapter II
and Design. This chapter also includes: existing motorcycle safety device that
are related to the study, the conceptual framework of the study and the definition
protection that includes structures and processes that provide or improve security
motorcycles until it is too late and they have become victims of car napping and
accidents.
studies have not been done to assess its causes. This study considered the
namely gender, helmet usage, risk taking behavior, day, time and month of the
Philippines.
6
"motorcycles are more prone to accidents as they expose the driver and
(MDPPA, 2018) “More people are opting to spend more time at home. If they
shop or run an errand, they do so straight from the house. As a result of this
grocery delivery, which then fuels demand for motorcycles as a delivery transport
option.”
last year at 202,098 units compared with 170,979 units in 2016, are expected to
rather than outside. Anytime, anywhere internet connection is feeding the trend
7
even further, with more people now finding it productive to complete tasks, even
The Philippines is most likely one of the countries in the South East Asia
with many motorcycle owners and riders. In fact, the Region IV-A has recorded a
The data of the Philippine National Police said that "Today motorcycles
have been the common target of thieves and intruders due to its abundance.
Records from the Philippine National Police Highway Patrol Group (PNP-HPG)
7,680 car thefts that took place in 2016. Most that were stolen are motorcycles
at 4,939 while the rest are four-wheeled vehicles at 424. That is why, the PNP
has urged the car and motorcycle owners to be vigilant and to install security alarms
According to Nico Ylanan (2018) “If you happen to have purchased a car
within the past few years, chances are you were given a way to start it without a
traditional key to insert into the ignition slot.” This keyless entry system, by
definition, allows the driver to keep the key fob pocketed when unlocking, locking,
and starting the vehicle. It means that the smart key is identified via one of
8
several antennas in the car's bodywork and a radio pulse generator in the key
button or sensor on the door handle or trunk release is pressed. Vehicles with a
smart-key system have a mechanical backup, usually in the form of a spare key
blade supplied with the vehicle.” This can also be implemented to motorcycles
using an android device key fob usually gets lots at some occasion, but we doubt
that you will forget your phone when leaving, people nowadays tend to do
everything using their smartphones and forgetting their phones is not that often
increase in cases of stolen motorcycles across the country. The PNP Highway
Patrol Group said that in 2013, they recorded 3,701 cases of stolen motorcycles.
In 2014, the number of stolen motorcycles was at 7,302." During the first quarter
of 2015, the HPG recorded the theft of 2,404 motorcycles compared to the 1,562
stolen motorcycles during the same period last year (Dalizon, 2015). In the year
2015, the PNP recorded 8,203 cases of stolen motorcycles last November 2015,
the PNP-HPG recorded an average of 6.2 motorcycles being stolen per day
(Dalizon, 2016).
9
motorcycle theft in the country has ran rampant over the years and countless of
Although, the authorities are said to be doing the best they can to stop these
thieves, it still ranks high up in the list of crimes committed in the streets every
day.
extremely essential for every private and public vehicle owner. For this reason,
various security systems have been carried out, but most of these security
systems are expensive, complicated and best suits to cars. Numerous car
Other security systems were equipped with a tracking system using Global
Positioning System (GPS) and have the capability to shut down the engine of the
vehicle remotely via a text message (Ramadan et. al., 2012). As for motorcycles,
basic and affordable security system only gives siren indication and will make a
10
lot of noise that disturb people. But if the person is far from the motorcycle
Physical type counter measures are also used to prevent theft, such as
padlocks, disk break lock and other more which is a preventive action but it is not
safe enough. One of the existing solutions for motorcycle napping available in
the market today is the Scorpio Ride “Core” Cellular Motorcycle Alarm and GPS
Tracking System. It uses iOS or Android app and a module installed inside the
bike. It sends a Short Message Service (SMS) alerts to notify the user for any
tampering of the motorcycle. It has also the ability to track vehicle's location. This
system does not have enough preventive measures during theft attempt.
Keyless ignition systems come with a fob that you can keep tucked away
inside the vehicle. The fob transmits a unique low-frequency signal to the car's
computer system, which then validates that the correct signal has been sent and
allows you to push a button on the dashboard or console to start the engine.
Shutting off the motor is just as hassle-free: Simply press the start/stop button.
And, in addition to keyless ignition, most systems also include keyless entry,
allowing you to enter the car without inserting a key or hitting a button on the fob.
affordable vehicles, these systems haven't yet reached the status of automotive
11
necessity, as have power windows and door locks. Still, the convenience factor
is a selling point for many car shoppers. It can be particularly helpful for drivers
with arthritis or other disabilities that impede their ability to grip and turn a key (P.
Gareffa, 2018).
Security Measure
Keyless ignition systems contain safeguards to ensure that your car doesn't
spring to life at the wrong time. Pre-start safety checks by the car's
computer-ensure that the vehicle is in park and that your foot is on the brake before
allowing the engine to start. For added insurance, some designs require you to
flick or rotate a switch before pressing the start button. And in most cases, the key
fob must be inside the vehicle in order to get the motor running.
break-ins and vehicle theft. Since the car's computer will only recognize a signal
from its own fob, thieves will have a harder time getting in and starting the engine.
There's no metal key that can be copied and no mechanical steering-column lock
Keyless ignition also makes it more difficult to lock your keys in the car or the
trunk. For one thing, the fob can remain safe and snug in your pocket at all times.
But some systems are smart enough not to allow the doors to lock if, for some
reason, you leave the fob inside the vehicle or in the cargo area. Others send an
audible alert if you attempt to shut a door or trunk with the fob still inside.
And if the fob's battery goes dead while you're away from home, most
systems have you covered, though the approach varies among carmakers. The
emergency service. When you call or use the company's mobile app, a
representative can send a signal to unlock your car doors and activate the starting
will send a technician to bail you out. And some systems even have a hidden key
that pops out of the fob to unlock the door. The key can then be inserted into an
Security
Rather than a smart key sending out the same frequency signal over and
over, which would affect all the makes and models utilizing the same key, not to
mention make it easier for tech-savvy thieves to steal cars, smart keys broadcast
a different encrypted signal every time you unlock a door or remotely pop the
trunk.
A computer chip located inside the car is responsible for receiving the
But even inexpensive motorcycles with little following are stolen more
often than their owners expect. Insuring against theft can help after the fact, but
most owners are disappointed with the blue-book value that the insurer pays
after the theft. And nothing compensates for that feeling of having been violated
when your bike is stolen.
14
The solution starts with the recognition that your bike might be a target for
thieves. A little paranoia is a good thing; it can even be fun. And a little may be
all you need; many thefts can be prevented just with elementary precautions (A.
Friedman, 2009).
In our previous work, the couple RFID passive tags were installed on
motorcycles to detect the larceny conditions. The main problem was found in the
last experiments that the RFID tags attached with the ignition key cannot be hung
flexibly. Therefore, the BLE4.0, which is the low-power-consumption device, is
dangle on the motorcycle's key and the RFID tags is installed on the bike's
hidden body.
The anti lost devices have been applied for responsibility of BLE-tags
slave mode, installed on a key. The HM-11 BLE 4.0 module combination with an
Arduino board has a function as the master mode, reading the MAC address
(called ID) of BLE slave devices. The results show that the maximum distance,
in which the BLE master module can detect the BLE slave's ID, is approximately
18 meters.
The proposed method is reliable because the BLE devices can be hung
on the key together while the motorbike is running on the speed not over than
15
system that is an alternative to traditional keys that were in use previously as the
standardized option in several cars and points of entry. The smart key was first
were created in 1995 by Siemens group of companies and pioneered into use by
Mercedes-Benz and named the keyless go on the W220 S-Class that was
designed and patented to Daimler-Benz on 1998. The smart key permits the
driver of the automobile to keep the key chain or key holder in the pocket while
When the driver or user of the car touches the door handle of the car, a
small frequency wake-up signal is sent to the car and from the car to the key.
accurate, the vehicle automatically unlocks itself. When the user of the vehicle
gains entry into the vehicle, he or she can start the engine of the vehicle by
pushing the button start or stop button. The access of the car user to gain entry
into the car is very cost effective purpose section in the architecture of the
16
keyless entry system. The current design of the keyless entry architecture
collection and enhances the possible frequency of attacks. There are proposals
by the designers of the keyless entry systems to use immobilizer front-end in the
integrated circuits.
effective way due to the elimination of the detached transponder with a small
ferrite that has a coil. The use of the advanced encryption standard crypto
algorithm allows for transparent and expert standard algorithms and increased
controlling system.
Modern cars are fitted with several security systems, for instance, the
lock, door lock and ignition locks. The above facilities are present in the modern
vehicles that are manufactured, and others are being installed in the vehicles that
don’t have such features as add-on. The keyless entry system gives a security
boost to the user of the car with multiple layers of security levels to protect the
17
vehicle from unauthorized users who may be harboring ulterior motives. Cars
have been in existence since the start of the 20th century, and they did not have
It is at the start of the 21st century that the initial cars began to be fitted
with the keyless entry a system which was a remarkable invention and a plus for
the security systems not only in cars but also in other facilities such as buildings
and private homes. The former car locks consisted of doors that were operated
using a mechanical pin and a tumbler lock for the essence of security and
convenience to the car users. This is what later overtaken by the keyless entry
that were in play at that time established various methods that would be used to
The previously used keys for gaining entry into the car and starting the
engine of the car were slowly being faced off and replaced other inventions. The
keyless entry system can robotically unlock the doors of the car if it is located
within some set radius by the manufacturer of the automobile. The cars that are
outfitted with a keyless system of entry do not have the traditional ignition lock
this is to say that they can be started using the start button instead of the turning
of a key. There are not set standards for the automatic keyless entry and this
Because cars are used on a frequent basis, any issue that relates to the
security systems in them can attract a lot of enormous societal concern. The
development, for instance, the radio frequency identification RFID was previously
claimed to be highly safe, but this was disapproved easily as it was broken easily
as it did not tamper proof and could be easily manipulated. As regards to the
make it known the details relating to the security of their products hence there is
with.
applications with most it being in cars and buildings for the purpose of gaining
entry to these facilities. These systems use a small powered battery device that
transfers an original message to the car or building for it to open or close its
doors.
Current research in this field illustrates the loopholes that existed in the
other security systems that were in place before and that the customers of such
devices were being given a raw deal. The security flaws that existed before were
and agreement techniques. For instance, the large Keeloq system that used
19
microchip was easily manipulated and broken into by researchers from the
University of Bochum. This was the case in the NXP’s Hitag-2 system.
efficient use of energy. On the contrary, the symmetric algorithms are not a good
foundation for unit verification since they need to have a well-defined key
administration strategy and ensure the safety of the transfer of clandestine keys.
key management easy and more efficient. For the asymmetric algorithms, there
secret key.
there is unity between the designer and the security principles standards entity to
where security related components are secured with various tamper identification
and defense schemes and sensitive information are protected with different
separation between the security software and hardware and a safe zone inside
20
Currently, the present security solutions for the keyless entry systems are
made of trusted hardware security modules which are incorporated with other
protected applications that are in the trusted platform module where they
some functions and a programmer’s interface that permits the cooperation and
coordination within a safe zone inside the electronic control unit that is installed in
an automobile.
are light, full and medium. The primary purpose of the E-safety Vehicle Intrusion
hardware security based on the fact that software is not adequately safe for the
separate runtime surroundings as safe and non safe modes. The National
instance, the advanced encryption standard and additional data safety standards.
The remote keyless system allows the car user to gain entry into his or her
car devoid of the use of physical lock of the car. This system signals whether the
flashing of the indicator lights and a distinctive sound similar to that of the horn.
Additional apart from the closing and opening of the car the other characteristic
Some of the keyless remote systems have a panic button which triggers
the car alarm system. The remote keyless system is operated through the use of
radio frequencies for instance in Japan and North America they operate on 315
The operating range of the spectrum differs from one manufacturer to the
other. For instance, the Ford remote keyless system is within a range of 5 meters
for Japan and 20 meters for Europe and North America and other markets where
22
the transmission power is limited by the laws of the land. The distance between
the vehicle and the remote sensing device is not straight and is affected by
corners and pillars and small window apertures slow down the signal thus
Similar technology has been used to run garage doors since the early
1950s. The transmitters that were used then were much simpler, and they
On the other hand, keyless entry system allows control of doors fitted with
Schüco door manager which provide a convenient platform for opening, closing,
and locking the door without the need of a key. The Door Control System is
high-level design with the current high-level technological devices. The Schüco
These systems ensure that only specific people are allowed entrance to secure
areas for a specified period to prevent possible use of illegal substances such as
fraud debit and credit cards. Online based Schüco fingerprints systems have a
local area network connection. In this system, access rights around the world
Viper Smart Key is another technology that uses the smartphone to lock
and unlock the vehicle. This technology works with the installation of the Viper
smart key system in the smart phone as a standalone unit to control locking and
unlocking vehicles and buildings door. On the other hand, Viper smart key can
However, the Viper Smart Key technology has a lot of advantages to the
users since it unlocks the door and disarms the Viper system as the person
approaches the door. Additionally, viper smart key technology locks the door
and arms the system as an individual walks away from the entrance. Moreover,
this system is compatible with many Viper security systems thus more
are provided to allow unlocking and to lock the door. However, incorrect entry of
the codes will prevent the door from opening whereby the user will have to
contact the providers to check on the locks. On the other hand, digital door locks
are effective and convenient since they provide a guarantee of high security
24
since no one can have access to the building without the correct combination
codes.
In addition, digital locks have various advantages in that they are battery
powered whereby they still work even during blackouts. For example, the Yale
digital locks use a set of 4 AA batteries whereby if the battery reaches a critical
level, light up warning sign is shown on the lock. In addition, digital door locks are
bought with a free hotline whereby in the case of encountering any problems, a
Moreover, digital locks are safer than ordinary locks because they have an
alarm that switches off when an intruder tries to break into the building.
Additionally, digital locks have faked pin functions which identify the owner’s pin
after a trial of numerous numbers to prevent anybody else from accessing the
pin. On the other hand, digital locks have sensitive screen keypad without
buttons thus making it hard for an intruder to trace the pin. However, digital locks
allow frequent changing of the codes to ensure the lock remains effective by
restricting access.
has been adopted widely in the day to day life. This adaptation is commonly in
laptop computers which have been widely used to replace the input of a
integrated into the keyless entry system to enhance security by preventing key
simulate the epidermis and store the changes in electric signals using packed
matrices of capacitors on the surface of the sensors. Once the changes are
stored, the fingerprint image is pre-processed to filter distortion from the noise
ensuring that different fingerprints do not produce the same value. After the
database whereby the matching score will come out after comparison. Whereby
qualification is granted when comparison score is greater than the metal crossing
comparison score is less than the metal crossing the entrance of a house or a
room.
an immobilizer. When a driver put his hand on the car door and tries to open it,
the antenna electronics sends out a low-frequency signal to the driver’s portable
All portable transponders within the transmission line will receive the
signal, but only one transponder will be used for security check. After the
the door and another signal to the control unit to initiate the automatic
re-establishment of the driver’s status. The control unit will then condition the
seat and the rear mirror in line with the driver’s preferences. (Pei, Dingyi. 2007)
2.3 Summary
Based on the presented studies and articles. Motorcycle theft has been
abrupt in our country and the same time a booming population of the motorcycle
industry brought by heavy traffics happening in the metro. Riders seek a more
secured motorcycle for daily use to avoid their motorcycle being taken away
easily. This type of device is specifically designed to provide riders for the
considered. There are thieves that do not have master keys to take the
motorcycle, rather they will carry the whole motorcycle and put it inside a van
where no one can see them when traveling, but such case is very rare, there are
also existing anti-theft devices for motorcycles but most of them are paired with a
by several smart phones and tablets. Examples include the Sony Xperia, the
The Android operating system (OS) is based on the Linux kernel. Unlike
Apple's IOS, Android is open source, meaning developers can modify and
often have different graphical user interfaces GUIs even though they use the
same OS.
building or vehicle without using a traditional mechanical key. When within a few
yards of the car, pressing a button on the remote can lock or unlock the doors,
and may perform other functions. Keyless entry systems allow you to unlock and
Security - Security refers to all the measures that are taken to protect a place, or
to ensure that only people with permission enter it or leave it. Security means
well-spaced satellites that orbit the Earth and make it possible for people with
sent to landlines.
software company, project and user community that designs and manufactures
racing, and off-road riding. Motorcycling is riding a motorcycle and related social