Brought to you by:
Paper The following article is Open access

Motorized Vehicle Security System With Master And Slave Key Models

, , , , , and

Published under licence by IOP Publishing Ltd
, , Citation Sriyadi et al 2020 J. Phys.: Conf. Ser. 1641 012092 DOI 10.1088/1742-6596/1641/1/012092

1742-6596/1641/1/012092

Abstract

Indonesian are carrying out routines both for personal gain, groups can use a variety of transportation in land, sea and air. Kinds of transportation that are available in the middle of the community that is affordable to have, are vehicles both two-wheeled and four-wheeled. The tendency of motorized vehicles to increase due to various factors including more economical compared to other transportation, simplify and speed up the duration of the trip, encourage the economy of the motorcycle taxi online or traditional. In the midst of people enjoying transportation, there are threats made by certain elements who take advantage of the owner's carelessness and of course the security weaknesses of the vehicle. The threat that occurs is motor vehicle thief. Based on data from the Central Statistics Agency for motor vehicle theft in Indonesia in January 2016 was 3,468 cases, February 3,595 cases, March 3,518 cases), meaning that in 2016 for three months as many as 10,581 people were disadvantaged because of the crimes. Di era industrial revolution 4.0 marked the massive implementation of information technology in all fields including transportation. Collaboration of information technology with the field of automation, in this case the workshop can create new innovations in securing motor vehicles so that they are not vulnerable to deception. The innovation is SIKEMO, works based on inputs known by the sensor, if the sensor recognizes the input data, the process can be continued and the motor can be used (starter is on status), and vice versa if the sensor does not recognize the input data, then SIKEMO will reject and of course the vehicle cannot be used ( starter in the off status). The Security System developed at SIKEMO uses data input with two models, namely the master key and the slave key. The master key input data has the highest authority besides being recognized by SIKEMO, the master key can be used to grant access rights to the slave key to be recognized by the SIKEMO security system. To support the work of SIKEMO which is equipped with a master and slave key, some hardware including arduino which is programmed to select whether the input data is known or not. RFID as a sensor media that connects the input data (master and slave key) with Arduino. To integrate the existing hardware and software in SIKEMO, the process uses a prototype software development methodology

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.