INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue I, January 2025
www.ijltemas.in Page 121
software products. It means that the evaluation tool is appropriate for the Keyless Entry System using Smartphones to ensure that
it will evaluate all the areas of the system objectively and accurately.
The following are the findings of the study:
1. The level of functional suitability, performance efficiency, compatibility, usability, reliability, security, maintainability, and
portability of the Keyless Entry System using Smartphone when taken as a whole is “Excellent”.
2. The level of performance efficiency of the Keyless Entry System using Smartphone when classified according to time
behavior is “Very Satisfactory”.
3. The level of reliability of the Keyless Entry System using Smartphone when classified according to maturity and fault
tolerance is “Very Satisfactory”.
4. The level of reliability of the Keyless Entry System using Smartphone when classified according to recoverability is
“Satisfactory”.
V. Conclusion
Based on the findings of the study, the following conclusions were formulated:
The overall results of the Keyless Entry System using Smartphone in all Systems and Software Quality Characteristics of the
ISO/IEC 25010:2011 is “Excellent” which means that the system performed accordingly and extended the safety and convenience
features by providing two-way verification, Smartphone fingerprint authentication, engine immobility, and Bluetooth Low
Energy (BLE) based keyless entry.
References
1. Akinsanmi, O., Usman, A. D., Abdulraheem A., et. al. (2015). “Two Factor Authentication Based Automobile Keyless
Entry System”. International Journal of Engineering and Applied Sciences (IJEAS), 2, 102-106.
2. Amit, A., Sarthak S., Shivam, G., et. al. (2014). “Ignition Based on Fingerprint Recognition”. International Journal of
Scientific Research and Management Studies (IJSRMS), 2, 66-71.
3. Ashworth, J., Staggs, J., & Shenoi, S. (2023). Radio frequency identification and tracking of vehicles and drivers by
exploiting keyless entry systems. International Journal of Critical Infrastructure Protection, 40, 100587.
https://doi.org/10.1016/j.ijcip.2022.100587
4. Burchette, R. (2004), US Patent No. US20050184855A1, US, US: U.S. Patent and Trademark Office.
5. Chen C., Alfayez, R., Srisopha, K., (2017). “Why Is It Important to Measure Maintainability and What Are the Best
Ways to Do It?”. Retrieved on May 31, 2018, from https://ieeexplore.ieee.org/document/7965364/.
6. Dipak A., Mhaske, Katariya S. S., Kadlag, S. S. (2013). “Review of Various Functions Controlling of Vehicle by Using
Mobile Bluetooth”. International Journal of Computer Technology and Electronics Engineering (IJCTEE), 3, 48-52.
7. Donlon, R. L. (2016). “5 things you need to know about keyless ignition systems”. Retrieved on June 1, 2018, from
https://www.propertycasualty360.com/2016/02/24/5-things-you-need-to-know-about-keyless-ignition-
s/?slreturn=20180501030521.
8. Enev, M., Takakuwa, A., Koscher, K, Kohno, T. (2015). “Automobile Driver Fingerprinting”. Proceedings on Privacy
Enhancing Technologies, 1, 34-51.
9. Haodudin Nurkifli, E., & Hwang, T. (2023). Provably secure authentication for the internet of vehicles. Journal of King
Saud University - Computer and Information Sciences, 35(8), 101721. https://doi.org/10.1016/j.jksuci.2023.101721
10. Hashim, N. M. Z., Basri, H. H., Jaafar, A., et. al. (2014). “Child In Car Alarm System using Various Sensors”. ARPN
Journal of Engineering and Applied Sciences, 9, 1653-1658.
11. ISO. (2011). “ISO/IEC 25010:2011”. Retrieved on May 31, 2018, from https://www.iso.org/standard/35733.html.
12. Jefferies, J. E., DeMay, R. W., Lachinyan, G. L. (2012). US Patent No. US20130317693A1, US, US: U.S. Patent and
Trademark Office.
13. KEYENCE Corp., (2016). “What is an Ultrasonic Sensor”.Retrieved on June 9, 2018, from
https://www.keyence.com/ss/products/sensor/sensorbasics/ultrasonic/info/.
14. Kiruthiga N., Latha L. (2014). “A Study of Biometric Approach for Vehicle Security System using Fingerprint
Recognition”. International Journal of Advanced Research Trends in Engineering Technology (IJARTET), 1(2), 10-16.
15. Kiruthiga, N., Latha, L., Thangasamy S. (2015). “Real Time Biometrics Based Vehicle Security System with GPS and
GSM Technology”. Procedia Computer Science, 47, 471-479.
16. Koo, H. (2000), WO Patent No. WO2002048485A1, WO, WO: World Intellectual Property Organization.
17. LinkLabs, (2011). “Bluetooth Vs. Bluetooth Low Energy: What's the Difference?”. Retrieved on June 9, 2018, from
https://www.link-labs.com/blog/bluetooth-vs-bluetooth-low-energy.
18. Mooney J. D., (2004). “Developing Portable Software”. Retrieved on May 31, 2018, from
https://link.springer.com/content/pdf/10.1007%2F1-4020-8159-6_3.pdf.
19. Morse, E. (2016). “Waterfall Model”. Retrieved on May 29, 2018, from https://airbrake.io/blog/sdlc/waterfall-model.
20. Pabelona, R. M., (2014). “Acceptability and Capability of Energy Consumption Monitoring System: Basis for Efficient
Energy Saving Scheme”. GRCAD 2014 Conference Proceedings, 1, 109 - 126