Vehicle Security System
Vehicle Security System
Published By:
Retrieval Number: l32471081219 /2020©BEIESP Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.l3247.019320 2266 & Sciences Publication
Journal Website: www.ijitee.org
Vehicle Security System
Software
Arduino IDE
Published By:
Retrieval Number: l32471081219 /2020©BEIESP Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.l3247.019320 2267 & Sciences Publication
Journal Website: www.ijitee.org
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075 (Online), Volume-9 Issue-3, January 2020
Published By:
Retrieval Number: l32471081219 /2020©BEIESP Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.l3247.019320 2268 & Sciences Publication
Journal Website: www.ijitee.org
Vehicle Security System
The above table represents the type of accident occurred various journals and a textbook on cryptography and network security.
Published many papers in the research area of datamining, network security
and indicates sms and e-mail alerts sends from User's information security, etc.,
mobile to others such as Police station and ambulance
for early services. M Srinivas Rao, Associate Professor in Department of
Computer Science and Engineering, MLR Institute of
Technology. He has published his paper in " A Case
True Positivity Rate= Study Of Secure Embedded Voting System using
Biometric "IJCIET ISSN Online: 0976-6316 2017.
=80%
T Sri Raja Rajeswari, Assistant Professor in Department
False PositivityRate of Computer Science and Engineering, MLR Institute of
Technology. She has published her paper in "Minimum
= =20% Cost Blocking Problem in Multi-path Wireless Mesh
Networks "IJISET - International Journal of Innovative
Science, Engineering & Technology, Vol. 1 Issue 8,
Here, The above formula indicates positivity Rate of October 2014. ISSN 2348 – 7968.
accidents. From the above results we identified True
positivity Rate is very high. Y Harini Reddy, BTech 2018-2019 in the Department of Computer
Science and Engineering, MLR Insitute of Technology.
VIII. CONCLUSION
The ongoing research in the field of IOT and its
implementation in full or partial manner will improve the
quality of life. Thus ,the proposed system “ Vehicle Security
System” would take the security level a step forward and try
to cover the many of loopholes which are in existing
technology, the verification shows that the IOT based
Vehicle Security System is realistic and can control the
theft automatically. The response time delay is also less.
This IOT based Vehicle Security System enables the user
safety by seat belt compulsion and air bag compulsion.
Above all these ,it gives security to the vehicles from thefts.
It is an ideal solution for all the vehicle users.
ACKNOWLEDGEMENT
Based on the research and analysis we had developed this
product to help the society in controlling the accidents that
are taking place due to rash driving and traffic and also to
control the theft for vehicles. We thank everyone for
providing this platform to implement our project and bring it
into life. We look forward to upgrade this and provide a cost
effective product in society for each and everyone to use this
in order to protect their vehicle and keep the people updated
about their things, vehicles and gadgets.
REFERENCES
1. "How to design an IoT-ready infrastructure: The 4-stage architecture",
TechBeacon, 2017. [Online]. Available: https://techbeacon.com/4-
stages-iotarchitecture
2. 2017.[Online].Available:http://wso2.com/wso2_resources/wso2_whit
epaper_areference-architecture-for-the-internet-of-things.pdf
3. ”Cite a Website - Cite This For Me", Arduino.org, 2017. [Online].
Available: http://www.arduino.org/products/boards/arduino-uno.
[Accessed: 02- Aug- 20
4. Chandra Sekhar Reddy N," Analyzing and predicting academic
performance of students using data mining techniques" In
JARDC,2018.
5. Madhuravani B " A hybrid parallel hash model based on multi-chaotic
maps for mobile data security" In JTAIT 2017.
6. Madhuravani B "Secure authentication and dynamic encryption using
ECC and wireless networks" In JARDC,2017
AUTHORS PROFILE
N. Chandra Sekhar Reddy, Professor in Department of
Computer Science and Engineering, MLR Institute of
Technology. He is very passionate towards research on
intrusion detections. Published 10 Scopus papers across
Published By:
Retrieval Number: l32471081219 /2020©BEIESP Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.l3247.019320 2269 & Sciences Publication
Journal Website: www.ijitee.org