SURVEILLANCE SQUAD Home Security Computer /Device Security Global Security CCTV Fingerprint Secure Payment Securing Mobility, Defying Amplification: Guarding Cars from Digital Intrusion.
Rick Mazumder Chandni Das Riddhi Dhara Soumajoy Pal Gourav Chatterjee Anil Kumar mandal
Anil Kumar Mandal Gourav Chatterjee Team Lead Rick Mazumder Chandni Das Riddhi Dhara Soumajoy Pal Played the most Acute and Crucial role for thoroughly researching the Domain and Forming the problem Statement. Core expertise ->
Soumajoy Pal Rick Mazumder Chandni Das Gourav Chatterjee Anil Kumar Mandal Riddhi Dhara Accomplished their part of making an absolutely beautiful presentation and helped in selection of domain. Core expertise ->
Gourav Chatterjee Rick Mazumder Soumajoy Pal Anil Kumar Mandal Chandni Das Riddhi Dhara Helped in researching and refining of both the problem statement and domain, making it more better than before. Core expertise ->
Rick Mazumder Riddhi Dhara Soumajoy Pal Gourav Chatterjee Anil Kumar Mandal Chandni Das
WORK RECAP MONTH Achievements : 1. Able to Make a much refined Problem Statement. 2. Completed the Market Analysis and Scalability of our Solution. 3. Determine our potential partners and design our stakeholders’ map. 4. Implement Machine Learning Tech to train the model. Challenges : 1. Had some initial problems dealing with the team. 1 - 4
MILESTONES Semester 1 Semester 2 1.Obtained a lot of intelligence about the domain from the research work, and gathered a lot of knowledge about the problems and flaws of our domain. 2.Completed the Problem statement which accurately describes the problem which we are trying to solve. 1. We make a proper market analysis, and get to know who our competitors are and where they stand. 2. We get to know the size of our market and How fast is it growing, How scalable are our solution be in this market. 1.We find out about our target audience and have a good analysis of the situations and needs of our target audience that relate to your problem and mission statements. 2.Determine our potential partners and design our stakeholders’ map. Semester 3
KNOW YOUR TEAM MEMBERS Team Member Name Strength Weakness Job Role Assigned Rick Calm and Logical Mind Laziness Market Analysis and Problem Statement. Soumyajoy Good Analytical Ability and Foresight Lack of Public Speaking Skills Competitions and Gap Analysis Chandni Excellent written and verbal communication skills Self Criticism Technical Team and Beneficiaries Riddhi Co-operative & Organisational Skills Procrastination Technical Team and Solution Technology Gourav Hardworking Irregular Problem Statement. Anil None Irresponsible Problem Statement.
Domain Research In recent times, the automotive industry has witnessed a concerning surge in the number of car theft incidents fueled by the unauthorized access to key fob signals. This emerging threat has not only put vehicle owners on high alert but has also prompted law enforcement agencies to grapple with new challenges in maintaining public safety. In recent years, an alarming rise in car theft incidents through unauthorized access to key fob signals has become a significant concern for vehicle owners and law enforcement agencies. According to the National Highway Traffic Safety Administration (NHTSA), car thefts accounted for approximately 750,000 cases in the United States alone in the past year. Among these, a significant proportion has been attributed to tech-savvy thieves exploiting vulnerabilities in key fob security systems. The Flaws in the system are :- Inadequate Encryption Standards Extended Communication Range Unprotected Wireless Transmission Single-Step Authentication Convenience-Centric Design
Problem Statement Key fobs, once heralded as convenient advancements in automobile technology, have inadvertently opened doors to new avenues of vehicle theft. Reports from cybersecurity firms indicate that criminals are increasingly using inexpensive signal amplification and relay devices to capture key fob signals from outside homes and even public places. According to the National Highway Traffic Safety Administration (NHTSA), car thefts accounted for approximately 750,000 cases in the United States alone in the past year. Among these, a significant proportion has been attributed to tech-savvy thieves exploiting vulnerabilities in key fob security systems. Our Solution to the Problem is to build an app with different user preference profiles utilizing Dynamic Biometric Key Fob with Behavioral AI Design, which will be a dynamic biometric key fob that incorporates advanced biometric authentication and behavioral AI analysis. This solution aims to prevent unauthorized access by combining the owner's biometric data with machine learning algorithms that analyze the owner's behavioral patterns when interacting with the vehicle.
Facts and Figures The Insurance Bureau of Canada reported a notable increase in car theft incidents, with over 85,000 vehicles stolen in the country, and a concerning trend is the use of key fob signal interception by criminals. According to a study by the German Automobile Association (ADAC), around 230 car models are susceptible to relay attacks on keyless entry systems, highlighting the wide-ranging impact of this issue. In the United Kingdom, keyless car theft accounted for nearly half of all stolen vehicles, as reported by Tracker, a stolen vehicle recovery company. A survey conducted by a leading cybersecurity firm revealed that 60% of respondents were concerned about the vulnerability of their vehicles to key fob signal theft, indicating a widespread awareness of the issue among car owners. In India, where rapid urbanization and increased car ownership prevail, car theft remains a significant challenge. The National Crime Records Bureau reported over 100,000 vehicle thefts in the last year, with an increasing number of cases involving key fob signal exploitation. The Delhi Police issued an advisory cautioning car owners about the risks of key fob signal interception and encouraging preventive measures like storing key fobs in metal boxes to mitigate the threat of theft.
Mission Statement Project Mission: Enhancing Vehicle Security through Innovative Key Fob Protection The mission of this project is to design and develop a cutting-edge solution that addresses the escalating threat of car theft due to unauthorized access to key fob signals. By creating an advanced security system that combines biometric authentication and behavioral AI analysis, we aim to provide vehicle owners with a robust defense mechanism against tech-savvy thieves who exploit vulnerabilities in key fob security systems. Why we are c hoosing to Work on It : The decision to work on this project is driven by the pressing need to bridge the gap between evolving vehicle technologies and the security measures designed to protect them. The surge in car theft incidents, as reported by the National Highway Traffic Safety Administration (NHTSA) and other authoritative sources, underscores the urgency of tackling this issue. T his project aligns with a larger societal goal of promoting awareness and proactive measures against emerging threats in the automotive landscape. It's an opportunity to demonstrate that the world of technology can be harnessed not only for convenience but also for the greater good by devising solutions that protect individuals and their assets. In summary, this project's mission is rooted in the necessity of countering the rising tide of car theft through key fob vulnerabilities. By creating a forward-looking solution, we aspire to empower vehicle owners with advanced security measures and contribute to the broader dialogue surrounding cybersecurity in the automotive domain.
1. Dynamic Biometric Key Fob Integration: Our solution involves the integration of a cutting-edge Dynamic Biometric Key Fob. Unlike traditional key fobs, this dynamic system utilizes advanced biometric authentication, providing an extra layer of security. The incorporation of dynamic biometrics ensures that the authentication process is not only based on static data but adapts to real-time changes in the user's biometric features. 2. User Preference Profiles in the App: The accompanying mobile app plays a pivotal role in enhancing user experience and security. The app allows users to create and manage different preference profiles tailored to their individual needs. These profiles encompass a range of settings, from seat positions to climate control preferences. This personalized approach not only adds convenience but also contributes to a seamless and secure interaction between the user and the vehicle. 3. Behavioral AI Design: The behavioral AI design embedded in the dynamic biometric key fob goes beyond simple authentication. It employs machine learning algorithms to analyze the owner's behavioral patterns while interacting with the vehicle. This multifaceted analysis ensures that the system can distinguish between normal, authorized usage and potential security threats. By continuously learning and adapting, the behavioral AI enhances the overall security posture of the vehicle. Solution
Solution 4. Preventing Unauthorized Access: One of the primary objectives of our solution is to thwart unauthorized access effectively. The combination of advanced biometric data and behavioral AI analysis creates a formidable barrier against unauthorized users attempting to gain control of the vehicle. This proactive approach significantly reduces the risk of theft or misuse, providing owners with peace of mind regarding the security of their vehicles. 5. Real-time Adaptive Security Measures: The dynamic nature of our solution extends to real-time adaptive security measures. As the behavioral AI continuously learns and updates its understanding of the user's habits, it adapts its authentication criteria accordingly. This ensures that the system remains effective even as the user's behavior evolves over time. The real-time adaptability of the security measures adds a layer of resilience against emerging security threats and evolving attack strategies. 6. Enhanced User Trust and Experience: Beyond security enhancements, our solution focuses on elevating the overall user trust and experience. By seamlessly integrating advanced biometrics and behavioral AI, users experience a frictionless and intuitive interaction with their vehicles. This not only fosters trust in the security measures but also contributes to a positive and user-friendly driving experience, aligning with the evolving expectations of modern vehicle owners.
Technology to be Used Our product relies solely on cutting-edge software technologies including core components like a robust mobile application and a sophisticated backend system powered by advanced ML algorithms. The software seamlessly integrates with the Dynamic Biometric Key Fob , ensuring a secure and dynamic user experience. The Behavioral AI Analysis in your solution involves understanding and analyzing the owner's behavioral patterns when interacting with the vehicle. Here's a simplified graphical representation :
Technology to be Used 1. Data Collection: - Gather biometric data during initial setup. - Record user interactions with the vehicle, including access attempts, settings adjustments, and driving behaviors. 2. Feature Extraction: - Extract relevant features from biometric data . - Convert behavioral patterns into quantifiable metrics . 3. Data Preprocessing: - Normalize and preprocess the extracted features to ensure consistency and eliminate noise. - Handle missing or outlier data to maintain the integrity of the behavioral dataset. 4. Model Training: - Utilize ML algorithms, such as Neural Networks or Decision Trees. - Train the model using the preprocessed biometric and behavioral data. - Incorporate a supervised learning approach to correlate authorized behaviors with the owner's profile. 5. Real-time Analysis: - Implement a real-time analysis module within the key fob or vehicle system. - Continuously monitor the owner's interactions, updating the model with new behavioral data. - Use the trained model to assess the authenticity of each interaction based on learned patterns.
Technology to be Used 6. Decision Making: - Establish a decision-making mechanism to evaluate the risk associated with each interaction. - Set threshold values for acceptable behavioral variations. - Allow access or trigger security measures based on the model's confidence in the owner's identity. 7. Adaptability and Learning: - Implement an adaptive learning mechanism to update the model periodically. - Incorporate user feedback and system performance data to refine the model's understanding of the owner's behavior. Example of ML Algorithm to be used
Target Customers Our solution is designed for discerning vehicle owners who prioritize both security and personalized user experiences. The typical target customer is tech-savvy, values innovation, and seeks a seamless integration of technology into their daily lives. Characteristics include an affinity for smart devices, a concern for personal security, and a desire for a tailored and convenient vehicle interaction. Tech-Savvy Enthusiasts : - Stay updated on the latest technological advancements. - Embrace innovative solutions that enhance their lifestyle. Innovation Advocates : - Actively seek out and appreciate cutting-edge technologies. - Early adopters who welcome products that redefine user experiences. Seamless Integration Seekers : - Desire solutions that seamlessly fit into their daily routines. - Prioritize convenience without disrupting established habits.
Target Customers Affinity for Smart Devices : - Regularly use and own various smart gadgets. - Comfortable and familiar with interconnected devices in their lives. Security-Conscious Individuals : - Prioritize personal security in their choices. - Seek advanced solutions to enhance the safety of their possessions. Desire for Personalization : - Look for tailored experiences that align with their preferences. - Appreciate products that understand and adapt to their individual needs. Convenient Vehicle Interaction: - Value solutions that make interacting with their vehicles effortless. - Seek a user-friendly and intuitive interface for managing vehicle settings. Forward-Thinking Consumers : - Open to exploring and adopting futuristic technologies. - Show interest in products that contribute to the advancement of their lifestyle .
Business Partners Automobile Manufacturers : - Benefit: Enhanced integration with vehicle systems, ensuring seamless functionality. - Stakes: Shared responsibility in delivering a cohesive user experience. Insurance Companies: - Benefit: Collaboration on innovative security features may reduce insurance risks. - Stakes: Mutual interest in mitigating security-related claims. Technology Firms (Biometrics and AI): - Benefit: Access to cutting-edge biometric and AI advancements. - Stakes: Joint efforts in advancing technology standards. Mobile Device Manufacturers: - Benefit: Integration possibilities for a broader user base. - Stakes: Coordinated efforts for device compatibility and interoperability.
Smart Home Device Manufacturers: - Benefit: Synergies in developing interconnected smart ecosystems. - Stakes: Collaborative efforts to ensure seamless home-to-vehicle transitions. Cybersecurity Solutions Providers: - Benefit: Strengthening the security posture against potential cyber threats. - Stakes: Shared responsibility in safeguarding user data and system integrity. Government Regulatory Bodies: - Benefit: Collaboration on adhering to and shaping industry regulations. - Stakes: Mutual interest in promoting secure and compliant technologies. Business Partners
Stakes Involved Shared Resources: - Pooling resources for research, development, and implementation. Joint Research and Development: - Working collaboratively on enhancing the technology and its applications. Data Security and Privacy: - Ensuring robust measures to protect user data and privacy. Market Dynamics: - Adapting strategies based on market trends and partner dynamics. User Experience Standards: - Aligning with partners to maintain consistent user experiences across platforms. ** These potential business partnerships present opportunities for mutual benefit, leveraging shared resources, and addressing collective responsibilities to advance the success and impact of the solution.**
Introduction to Market : The market targeted by our project revolves around automotive security, specifically addressing the escalating concern of car theft through key fob signal amplification. More than ever, our project's focus lies in combating the alarming rise of car theft through the exploitation of key fob signal amplification vulnerabilities. This modern threat poses a significant challenge to the conventional notions of vehicle safety, necessitating innovative solutions that combine cutting-edge technology and proactive prevention measures. Our project takes a proactive stance in offering a solution that not only addresses the immediate concerns of car theft but also contributes to the broader discourse on automotive cybersecurity and the ever-evolving landscape of digital threats . Market Summary
Market Size and Growth Size of Market : The automobile security market is substantial, encompassing a wide range of solutions aimed at safeguarding vehicles from various threats. Car theft cases attributed to key fob vulnerabilities have surged, accounting for a notable portion of the overall car theft statistics. Data by Fact.MR -> The Current protection Against car theft market generates a revenue of 11.6 Billion Dollars. Growth Potential : As Technology Grows, the Theft by using high tech gadgets will also increase. This will buff the growth of this market. According to a study, the market is supposed to generate 16.7 Billion Dollars in revenue.
Competitive Analysis : - Many Car Manufacturers Like Tesla, Hyundai, BMW, Volkswagen etc., have taken steps into this Matter by introducing 2 key technologies: - Near Field Communication -> NFC, is a technology which is being used in smartphones for many decades now. It is the technology by which the devices that are in close proximity communicate with each other, like Bluetooth. This tech is now being used in cars for close proximity lock and unlock. It ensures that the Key fob of the car is physically Very close to it so as to ensure high security and make it difficult for car jackers to unlock to trace and copy the signatures of the Key fob. Digital Key- > This is a technology which primarily uses the internet and the Bluetooth connectivity of the user’s smartphone and a pattern lock to unlock the car. So, what basically occurs is that to unlock the car, the user needs to open the car manufacturers app and then use the inbuilt key fob of the app to unlock the car. Gap Analysis : - The Fundamental Gap that still remains in these is that, while they use secure technologies like NFC and Digital Key, they have become pretty easy to crack in recent years. Car Jackers can easily use signal amplifiers and computers to duplicate or recreate the signals of the key fob and jack the cars. Our solution is to bridge this gap by using modern technology and AI and thus enhance these current methods and provide for a better solution. Gap Analysis
Existing Solutions in the Market: Several automotive manufacturers have introduced digital key and mobile app-based solutions to enhance vehicle security. These solutions primarily focus on utilizing smartphones for secure access, often incorporating features like biometric authentication, two-factor authentication, and remote control capabilities. However, none of the existing solutions directly integrate behavioral AI analysis into their approach. Our Solution: Dynamic Biometric Key Fob with Behavioral AI Design Our solution, the Dynamic Biometric Key Fob with Behavioral AI Design, stands out as a novel and innovative approach to addressing key fob vulnerabilities and enhancing vehicle security. While some existing solutions rely on biometric and mobile app-based access, our solution goes further by integrating advanced behavioral AI analysis into the authentication process. Competitions
Differentiation and Innovative Features: Behavioral AI Integration: Our solution adapts to owners' behaviors, reducing false positives and enhancing accuracy. Comprehensive User Profiles: We combine biometrics, behavior, and context for robust authentication, unlike biometrics-only solutions. Advanced Threat Detection: Our solution spots subtle anomalies in user behavior, preempting unauthorized access. User-Centric Convenience: With behavioral AI, re-authentication needs are minimized for smoother interaction. Their USP Our USP Smartphone-based access with biometric authentication. Integration of dynamic biometric authentication and behavioral AI analysis Two-factor authentication for secure access Proactive threat detection through behavioral anomaly analysis Remote control capabilities via mobile app Comprehensive user profiles that consider biometric data, behavioral patterns, and situational context Limited adaptation to changing user behavior Adaptive learning and context-aware authentication, minimizing false positives/negatives Focus on enhancing security Balancing security and user convenience with innovative behavioral AI integration
Annexure We recommend reading :- 1. https://www.diva-portal.org/smash/get/diva2:1185893/FULLTEXT01.pdf 2. https://www.inboundlogistics.com/articles/cargo-security-the-art-of-the-steal/ 3.https://www.researchgate.net/publication/286280296_Cargo_Theft_Loss_Prevention_and_Supply_Chain_Security 4. https://www.wtcfs.com/2016/08/24/surprising-facts-about-cargo-theft/ 5. https://www.fbi.gov/news/stories/2010/november/cargo_111210/cargo_111210 6. https://hb.diva-portal.org/smash/get/diva2:1185898/FULLTEXT01.pdf 7. Wikipedia 8. Books
Thank You Thank You Thank You Thank You Thank You Thank You
Thank You Thank You Thank You Thank You Thank You Thank You
Thank You Thank You Thank You Thank You Thank You Thank You
Thank You Thank You Thank You Thank You Thank You Thank You
Thank You Thank You Thank You Thank You Thank You Thank You