Escolar Documentos
Profissional Documentos
Cultura Documentos
Yahya Al Balushi
S. Zahid Hussain Lecturer
Dept. of E.C.E
Software Engineer
Middle East College, Muscat
TCS, Hyderabad
Sultanate of Oman
zahidhussains@gmail.com
yalbelushi@mec.edu.om
Abstract— Modern world vehicles are not just mechanical The block representation of proposed Person Authentication
devices but are smart enough to make decisions and act based on System illustrates the function of the proposed system.
real time inputs. This features also results in various technical The design mainly consists of ARM processor, GSM unit and
vulnerabilities. So, Security systems are inevitably part of today’s camera as main hardware unit, an effective face recognition
life. Here in the proposed work a real time vehicle security system using Matlab platform and malware identification
system and malware detection system developed and
implemented. The proposed system will ensure that the
using JAVA platform as software component. In this work
authorized person will be able to activate and use the car and initially the owner or the driver’s image is stored in the
thus ensuring that unauthorized access is prevented. When the database. Whenever a person is starting the car, the face
car ignition is to be activated, the security system will initially detection & recognition unit will take the image and compare
check the person’s valid authentication and allow the valid user with the database image. If the image is matched then the car
to access it. If it detects any unauthorized access, the proposed ignition will turn on else an alert will be transmitted to the
Person Authentication System (PAS) will prevent the person to stored Security Mobile Number (SMN) [1].
operate the car and it will send the alert information image to the
system controller. Also the malware system detects any spyware
in the image to determine the authenticity of the image. The
system is implemented integrating the hardware built on ARM
core and user interface on java platform.
Keywords—GSM module; Person Authentication System (PAS);
ARM LPC 2148
I. INTRODUCTION
In Present scenario security is a critical issue,
whether it’s home, office or a vehicle. As cars are becoming
integral part of today’s life and improvement in living
standards people wish to have cars which are need of the hour
for ease of movement. Like any other expensive asset, a car
brings with it a secondary cost. The probability of theft also
increases with increased number of cars on road. In current
situation vehicle theft has relatively increased with more focus
on high end cars which are significantly expensive. In this Fig 1: Block representation of Proposed PAS
paper a security system is proposed to overcome this issue.
II. DESIGN AND IMPLEMENTATION on the comparison results the identity or authorization can be
The two major platforms used in the proposed design are: determined [7].
1. Software Platform; and If the acquired image and database image matches
2. Hardware Platform. then there will not be any response to the SMN. But if the
image is of unauthorized person then, an alert will be sent to
A. SOFTWARE PLATFORM the SMN through GSM modem.
The face recognition system plays a key role in the if (cnt1>2 || cnt2>2)
entire operation. The simulation tool MATLAB is used for the if cnt1>cnt2
face recognition part and java platform is used for malware warndlg('Authorised Person is A');
detection. The image processing and recognition process in else
indicated in figure 2. errordlg('Person not Autherized');
To capture an image a camera that support
YUY2_640x480 format need to be used. Initially the image
that needs to be stored in database is captured and stored. The
supportable camera configuration in the MATLAB is given in
the form of the following data function video input
('winvideo'1,'YUY2_640x480'); Initially ten database sample
images are stored in the database for effective feature
extraction[3]. Once an image is captured by the camera it will
be sent to MATLAB for processing. Whenever MATLAB
reads images it is converted to grey scale format since
processing time in single plane would be minimal.
B. MALWARE DETECTION
Data Opcode
Fig.6. Reduced Feature Sets
Parser
C. Classification
Feature Train Naive Bayes classifier is built on Bayes theorem
Extractio Classifier
where different features are independent of each other. This
assumption does not hold well in real-time applications. This
algorithm has provided good results in complex applications.
Classify
J48 a decision tree algorithm adopts a top-down approach and
navigates a tree for classification.
V. MALWARE RESULTS
This malware result is purely software dependent. In
Fig 14. Malware detection of random forest algorithm.
this development WEKA a collection of machine learning
algorithm is used to detect the malware. In this tool the results The ignition driver circuit is interfaced with GPIO of ARM
are totally probability based. Using data mining the infected and interrupt service routine (ISR) is used to check whether
files are extracted from thousands of files in database. The there is any interrupt from the software subsystem. UART 1 is
project mainly focused on three algorithms i.e. Navey bias, j48 connected to GSM modem. These methods are effective to
and Random Forest. These methods are effective to detect detect malware with in a fraction of second. The malware
malware with in a fraction of second. The figures13, 14 and 15 infection is checked in two ways i.e. file name (FN) and file
shows true positive rate and false positive rate of three feature (FF). The values are indicated in table 1.
different algorithms.
2016 3rd MEC International Conference on Big Data and Smart City
Table 1: T.P, F.P, execution time, correctly and incorrectly classified [5] S Hussain, et.al. - “A Prototype Model For Realistic Driving
instances of different algorithm Environment System”International Conference on Emerging Technology
Trends in Advanced Engineering Research(ICETT- 2012), Published by
NAÏVE J48 RANDOM th st
IEEE Press and in IEEE Explorer, pp 52 - 57. Feb’ 20 -21 2012.
BIAS FOREST
[6] N. Bird, S. Atev, N. Caramelli, R. Martin, O. Masoud, and N.
F.N F.F F.N F.F F.N F.F Papanikolopoulos,“Real time, online detection of abandoned objects in public
areas,” in Proc. IEEE Conf. Robot. Automat. 2006, pp.3775–3780.
[7] D. Li, Y. Jiang, and G. Chen, “A low cost embedded color vision system
T.P(true 0.35 0 0.47 0 0.35 0 based on SX52,” in Proc. IEEE Int. Conf. Inf. Acquisit., Aug. 2006, pp. 883–
887.
positive)
[8] S Hussain, R. Subhan Tilak Basha- “ Accurate Face Recognition system
Rate based on ARM 9 processor using HAAR wavelets” International Journal of
Engineering Research(IJER),March 2014,pp:157 -161.
F.P(false 0.41 0.41 0.41 0.41 0.28 0.25
positive)
Rate
Execution 0 0 0.03 0 0 0
time(in sec)
Correctly 6 0 8 0 6 0
classified
instances
Incorrectly 11 17 9 17 11 17
classified
instances
VI. CONCLUSION
As technology is growing and it is significantly
becoming part of daily life, its effective use becomes very
much necessity. As the world is moving towards usage of
smart applications and more autonomous systems are
replacing the existing ones the proposed system could bring a
solution in system malware identification and image based
authentication. Person authentication system is an effective
mechanism that provides inputs for intelligent Car Security,
thus preventing unauthorized access and use of vehicle.
Malware detection will helps to avoid the system crash. This
development will certainly help to utilize the data collected in
various networks or applications in a smart system and
provide safer environment to live.
REFERENCES
[1] I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, “A survey on wireless
multimedia sensor networks,” Computer Networks, vol. 51, no. 4, pp.921–
960, 2007.
[2] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham,
S.Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno,
“Comprehensive experimental analyses of automotive attack surfaces,” in
Proc.20th USENIX Conf. Security, Berkeley, CA, USA, 2011, pp. 6–6.
[3] J. H. Lee and I. B. Jung, “Reliable asynchronous image transfer protocol in
wireless multimedia sensor networks,” Sensors, vol. 10, pp. 1486–1510, 2010.
[4] R. Pon, M. Batalin, M. Rahimi, Y. Yu, D. Estrin, G. Pottie,M.
Srivastava,G. Sukhatme, and W. Kaiser, “Self-aware distributed embedded
systems,” in Proc. IEEE Int.Workshop Future Trends Distrib. Comput.Syst.,
2004, pp. 102–107.