O
Orclever
Back to Journal
Research Article Open AccessOrclever Native

Two-Factor Authentication System for Protecting Metadata and Connected Vehicles

Huseyin Karacali1,
Nevzat Donum2,
Efecan Cebel3
1TTTech Auto Turkey
2TTTech Auto Turkey
3TTTech Auto Turkey
Published:June 27, 2025

Abstract

Connected vehicles are becoming increasingly common, and they store a significant amount of data about their drivers and their surroundings. This data is attractive to attackers, and there is a need for effective security measures to protect it. This study proposes a two-factor authentication (2FA) system to protect the metadata stored in connected vehicles and the vehicles themselves. The system consists of two main components: the Central Security Unit (CSU) and the AutoGuard (AG) mobile application. The CSU is integrated with the Remote Keyless Entry System (RKES), while the AG is installed on the authorized driver's phone. The 2FA process begins when the remote key is in proximity to the vehicle. This triggers the CSU, which then initiates the second authentication factor. The AG prompts the driver to enter a valid security method, such as a biometric, pattern, or PIN code. If the second authentication is successful, the AG authorizes the CSU and the vehicle doors are opened by the RKES. The driver is notified by CSU through AG if the 2FA process is unsuccessful.  As a result, this system aims to protect the metadata stored in authorized users' vehicles and their vehicles from unauthorized invaders. Furthermore, it is possible to enhance the accuracy of the 2FA system by integrating the location of the phone with AG functionality into the authentication system.

Keywords
MetadataTwo-factor authenticationConnected vehiclesVehicle security

References

  1. 1.“Remote Keyless Entry Systems Overview | Analog Devices.” https://www.analog.com/en/app-notes/remote-keyless-entry-systems-overview.html.Link
  2. 2.“Remote Terminal Unit - an overview | ScienceDirect Topics.” https://www.sciencedirect.com/topics/engineering/remote-terminal-unit.Link
  3. 3.“Car Keyless Entry vs Remote Keyless Entry: What.” https://vaistech.com/remote-keyless-entry-vs-keyless-entry-whats-the-difference/.Link
  4. 4.“Raspberry Pi 3 Model B+.” https://datasheets.raspberrypi.com/rpi3/raspberry-pi-3-b-plus-product-brief.pdf.Link
  5. 5.“Raspberry Pi OS – Raspberry Pi.” https://www.raspberrypi.com/software/.Link
  6. 6.“PyQt - Python Wiki.” https://wiki.python.org/moin/PyQt.Link
  7. 7.“RC522 RFID Module Pinout, Features, Specs & How to Use It.” https://components101.com/wireless/rc522-rfid-module.Link
  8. 8.“Buy RC522 RFID Card Reader Module 13.56MHz Online at Robu.in.” https://robu.in/product/rc522-rfid-card-reader-module-13-56mhz/.Link
  9. 9.“Android Developers: Android Mobile App Developer Tools.” https://developer.android.com/Link
  10. 10.“Add Firebase to your Android project | Firebase for Android.” https://firebase.google.com/docs/android/setupLink
  11. 11.“What is the Simple Mail Transfer Protocol (SMTP)? | Cloudflare.” https://www.cloudflare.com/learning/email-security/what-is-smtp/Link
  12. 12.G. Zaffiro and G. Marone, “Smart Mobility: new roles for Telcos in the emergence of electric and autonomous vehicles,” 2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE), Jul. 2019, doi: 10.23919/eeta.2019.8804575.DOI
Download PDF
Cite This Article
Karacali, H., Donum, N., Cebel, E. (2025). Two-Factor Authentication System for Protecting Metadata and Connected Vehicles. *The European Journal of Research and Development*, 5(1), 34-51. https://doi.org/10.56038/ejrnd.v5i1.633

Bibliographic Info

JournalThe European Journal of Research and Development
Volume5
Issue1
Pages34–51
PublishedJune 27, 2025
eISSN2822-2296