SECURE BIKE USING RFID AND GSM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 2
Abstract
The main goal of this paper is to design and implement a security of bike based on RFID and GSM technology which can be used in bike. In this system only authentic person can be use bike. We have implemented a secure bike based on RFID and GSM technology containing RFID Tag using RFID which can activate, authenticate, and validate the user. Else unlock the bike in real time for BIKE SECURITY. The main advantage of using passive RFID and GSM is more secure compare to other systems. This system have of microcontroller (89c51), RFID reader, GSM modem, and LCD, in this system. The RFID reader reads the ID number from passive tag and given to the microcontroller, if the ID number is valid & passwords are matched the bike will be opened otherwise it will be remain in locked position and send Tag ID which is used at that time. This system is more secure than other systems because to RFID Tag (password) required for verification.
Authors and Affiliations
Kumkar Y. V.
NOVEL TECHNIQUES TO SAFEGUARD PRIVACY AND SECURITY ON MOBILE DEVICES THROUGH OPTIMAL ALGORITHMS
The rapid proliferation of smart phone technology in urban communities has enabled mobile users to utilize context aware - services on their devices. Today’s highly interconnected urban population is increasingly de...
A Survey on Wireless Broadcast Services
In a mobile wireless communication network, broadcast signaling can be transmitted to multiple (two or more) receivers simultaneously. In networking, a distinction is made between broadcasting and multicasting. Broadca...
OPTIMIZATION OF SEPARATION PROCESSES IN CHROMATOGRAPHY USING LIQUAC MODEL
The work is devoted to the evaluation of the process of separation and optimization by column chromatography using LIQUAC model. The possibility of using this approach to the separation of mixture of methyl esters...
SECURE TEMPLATE GENERATION USING NON-INVERTIBLE TRANSFORMFOR ONLINE MOBILE SIGNATURE VERIFICATION
The theme possesses the novel property of being strong against AN adjust chosen-message attack: AN somebody UN agency receives signatures for messages of his alternative (where every message could also be chosen d...
A COMPARATIVE STUDY OF CLOCK GATED ETCAM WITH ZTCAM
Ternary Content Addressable memory is a kind of memory which allows the required memory to be searched by content, instead of searching by address. It implements high speed lookup operations within a single clock...