Keyless Entry System Using a Smartphone for Vehicle: A Development of Vehicle Security Performance

Article Sidebar

Main Article Content

Richard M. Pabelona Jr., DIT
Joe Marie D. Dormido, DIT

Abstract: This study involves developing a keyless entry system using a smartphone for vehicles. The system comprises a mobile application and apparatus with main and secondary modules. The main module comprises a mini-computer, Bluetooth Low Energy module, NFC module, ultrasonic sensor, and control circuit installed inside the vehicle. Connected to it is the Secondary module comprising a Car Battery voltage reader circuit, EFI and Fuel Pump control circuit, and a microcontroller located inside the vehicle hood. The mobile application connects to the apparatus wirelessly and acts as a key. A chip-enabled card is a backup key in case the Smartphone is unavailable. It can activate the application by tapping the chip-enabled card through the Smartphone's NFC. The participants of the study are the vehicle owners and are determined through purposive sampling, which is important in examining the subject characteristics involved in the study. Experts evaluated the system using the ISO/IEC 25010:2011 Systems and Software Quality Requirements and Evaluation Questionnaire. The level of acceptability of the Keyless Entry System using Smartphones in terms of functional suitability, performance efficiency, compatibility, usability, reliability, security, maintainability, and portability was "Excellent". Upon Overall, the system performed its intended function and extended a vehicle's safety features.

Keyless Entry System Using a Smartphone for Vehicle: A Development of Vehicle Security Performance. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(1), 116-122. https://doi.org/10.51583/IJLTEMAS.2025.1401012

Downloads

Downloads

Download data is not yet available.

References

Akinsanmi, O., Usman, A. D., Abdulraheem A., et. al. (2015). “Two Factor Authentication Based Automobile Keyless Entry System”. International Journal of Engineering and Applied Sciences (IJEAS), 2, 102-106.

Amit, A., Sarthak S., Shivam, G., et. al. (2014). “Ignition Based on Fingerprint Recognition”. International Journal of Scientific Research and Management Studies (IJSRMS), 2, 66-71.

Ashworth, J., Staggs, J., & Shenoi, S. (2023). Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems. International Journal of Critical Infrastructure Protection, 40, 100587. https://doi.org/10.1016/j.ijcip.2022.100587 DOI: https://doi.org/10.1016/j.ijcip.2022.100587

Burchette, R. (2004), US Patent No. US20050184855A1, US, US: U.S. Patent and Trademark Office.

Chen C., Alfayez, R., Srisopha, K., (2017). “Why Is It Important to Measure Maintainability and What Are the Best Ways to Do It?”. Retrieved on May 31, 2018, from https://ieeexplore.ieee.org/document/7965364/.

Dipak A., Mhaske, Katariya S. S., Kadlag, S. S. (2013). “Review of Various Functions Controlling of Vehicle by Using Mobile Bluetooth”. International Journal of Computer Technology and Electronics Engineering (IJCTEE), 3, 48-52.

Donlon, R. L. (2016). “5 things you need to know about keyless ignition systems”. Retrieved on June 1, 2018, from https://www.propertycasualty360.com/2016/02/24/5-things-you-need-to-know-about-keyless-ignition-s/?slreturn=20180501030521.

Enev, M., Takakuwa, A., Koscher, K, Kohno, T. (2015). “Automobile Driver Fingerprinting”. Proceedings on Privacy Enhancing Technologies, 1, 34-51. DOI: https://doi.org/10.1515/popets-2015-0029

Haodudin Nurkifli, E., & Hwang, T. (2023). Provably secure authentication for the internet of vehicles. Journal of King Saud University - Computer and Information Sciences, 35(8), 101721. https://doi.org/10.1016/j.jksuci.2023.101721 DOI: https://doi.org/10.1016/j.jksuci.2023.101721

Hashim, N. M. Z., Basri, H. H., Jaafar, A., et. al. (2014). “Child In Car Alarm System using Various Sensors”. ARPN Journal of Engineering and Applied Sciences, 9, 1653-1658.

ISO. (2011). “ISO/IEC 25010:2011”. Retrieved on May 31, 2018, from https://www.iso.org/standard/35733.html.

Jefferies, J. E., DeMay, R. W., Lachinyan, G. L. (2012). US Patent No. US20130317693A1, US, US: U.S. Patent and Trademark Office.

KEYENCE Corp., (2016). “What is an Ultrasonic Sensor”.Retrieved on June 9, 2018, from https://www.keyence.com/ss/products/sensor/sensorbasics/ultrasonic/info/.

Kiruthiga N., Latha L. (2014). “A Study of Biometric Approach for Vehicle Security System using Fingerprint Recognition”. International Journal of Advanced Research Trends in Engineering Technology (IJARTET), 1(2), 10-16.

Kiruthiga, N., Latha, L., Thangasamy S. (2015). “Real Time Biometrics Based Vehicle Security System with GPS and GSM Technology”. Procedia Computer Science, 47, 471-479. DOI: https://doi.org/10.1016/j.procs.2015.03.231

Koo, H. (2000), WO Patent No. WO2002048485A1, WO, WO: World Intellectual Property Organization.

LinkLabs, (2011). “Bluetooth Vs. Bluetooth Low Energy: What's the Difference?”. Retrieved on June 9, 2018, from https://www.link-labs.com/blog/bluetooth-vs-bluetooth-low-energy.

Mooney J. D., (2004). “Developing Portable Software”. Retrieved on May 31, 2018, from https://link.springer.com/content/pdf/10.1007%2F1-4020-8159-6_3.pdf.

Morse, E. (2016). “Waterfall Model”. Retrieved on May 29, 2018, from https://airbrake.io/blog/sdlc/waterfall-model.

Pabelona, R. M., (2014). “Acceptability and Capability of Energy Consumption Monitoring System: Basis for Efficient Energy Saving Scheme”. GRCAD 2014 Conference Proceedings, 1, 109 - 126

Pan, J. (1999). “Software Reliability”. Retrieved on May 31, 2018, from https://users.ece.cmu.edu/~koopman/des_s99/sw_reliability/.

Protopapas, M. E. (2012), US Patent No. US8937528B2, US, US: U.S. Patent and Trademark Office.

Qixin, C., Weidong, L., Li, Z., Jianmei W. (2015), China Patent No. CN205149794U, CN, CN: China Patent and Trademark Office.

Rana, T., Shah, A., Rana, P., Chandak, S. (2017). “Smart Vehicle Security”. International Journal of Engineering Science and Computing, 7(4), 10264-10266.

Rouse, M., (2012) “Microcontroller”. Retrieved on June 9, 2018, from https://internetofthingsagenda.techtarget.com/definition/microcontroller.

Sakhare, M., Ganer, S., Mulchandi, M. (2015). “Car Remote Locking Via Bluetooth using Android”. International Research Journal of Engineering and Technology (IRJET), 2, 766-767.

Secondes, A., (2018). “Adaptive Centralized Communication Management System”. Unpublished dissertation. Iloilo Science and Technology University, Iloilo, Philippines.

Seffah, A., Donyaee, M., Kline, R.B. et al. (2006). “Usability measurement and metrics: A consolidated model”. Retrieved on May 31, 2018, from https://doi.org/10.1007/s11219-006-7600-8.

Simmons, M. S. (2013), US Patent No. US20150048927A1, US, US: U.S. Patent and Trademark Office.

Square Inc., (2017). “Near Field Communication”. Retrieved on June 9, 2018, from http://nearfieldcommunication.org/about-nfc.html.

Techopedia, (2018). “Fingerprint Scanner”. Retrieved on June 9, 2018, from https://www.techopedia.com/definition/29808/fingerprint-scanner.

Xiaolei, L., High release. (2010), CN Patent No. CN101890932A, CN, CN: China Patent and Trademark Office.

Xie, X., Jiang, K., Dai, R., Lu, J., Wang, L., Li, Q., & Yu, J. (2023). Access Your Tesla without Your Awareness: Compromising Keyless Entry System of Model 3. Proceedings 2023 Network and Distributed System Security Symposium. Network and Distributed System Security Symposium, San Diego, CA, USA. https://doi.org/10.14722/ndss.2023.24082 DOI: https://doi.org/10.14722/ndss.2023.24082

Article Details

How to Cite

Keyless Entry System Using a Smartphone for Vehicle: A Development of Vehicle Security Performance. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(1), 116-122. https://doi.org/10.51583/IJLTEMAS.2025.1401012

Similar Articles

You may also start an advanced similarity search for this article.