References
[1]. Agiwal, M., Saxena, N., & Roy, A. (2019). Towards
connected living: 5G enabled Internet of Things (IoT). IETE
Technical Review, 36(2), 190-202. https://doi.org/10.1080/
02564602.2018.1444516
[2]. Elngar, A. A., & Kayed, M. (2020). Vehicle security
systems using face recognition based on Internet of Things.
Open Computer Science, 10(1), 17-29. https://doi.org/10.
1515/comp-2020-0003
[3]. Feki, M. A., Kawsar, F., Boussard, M., & Trappeniers, L.
(2013). The internet of things: the next technological
revolution. Computer, 46(2), 24-25. https://doi.org/10.110
9/MC.2013.63
[4]. Ganesh, G. P., Balaji, B., & Varadhan, T. S. (2011, June).
Anti-theft tracking system for automobiles (AutoGSM). In
2011, IEEE International Conference on Anti-
Counterfeiting, Security and Identification (pp. 17-19).
IEEE. https://doi.org/10.1109/ASID.2011.5967406
[5]. Guo, H., Cheng, H. S., Wu, Y. D., Ang, J. J., Tao, F.,
Venkatasubramanian, A. K., Kwek, C. H., & Liow, L. H.
(2009, March). An automotive security system for anti-theft.
In 2009, Eighth International Conference on Networks (pp.
421-426). IEEE. https://doi.org/10.1109/ICN.2009.28
[6]. Hameed, S. A., Abdulla, S., Ershad, M., Zahudi, F., &
Hassan, A. (2011, May). New automobile monitoring and
tracking model: Facilitate model with handhelds. In 2011,
4th International Conference on Mechatronics (ICOM) (pp.
1-5). IEEE. https://doi.org/10.1109/ICOM.2011.5937137
[7]. Hese, S. K., & Banwaskar, M. R. (2013). Performance
Evaluation of PCA and LDA for Face Recognition.
International Journal of Advanced Research in Electronics
and Communication Engineering, 2(2), 149-152.
[8]. Hindustan Times, (2021, September 16). City of cars
Delhi reports maximum vehicle thefts, 95 stolen everyday:
NCRB. Retrieved from https://www.hindustantimes.com/ cities/delhi-news/city-of-cars-delhi-reports-maximum-vehi
cle-thefts-95-stolen-everyday-ncrb-report-101631730601
005.html
[9]. Kidambi, R., & Mathur, M. (n.d.). The contribution of the
automobile industry to technology and value creation.
Kearney.com. Retrieved from https://www.kearney.com/
automotive/article?/a/the-contribution-of-the-automobileindustry-
to-technology-and-value-creation.
[10]. Nandakumar, C., Muralidaran, G., & Tharani, N.
(2014). Real time vehicle security system through face
recognition. International Review of Applied Engineering
Research, 4(4), 371-378.
[11]. Patel, N. D., Mehtre, B. M., & Wankar, R. (2021). Thingsto-
Cloud (T2C): A Protocol-Based Nine-Layered
Architecture. In: Ranganathan G., Chen J., & Rocha Á.
(Eds.) Inventive Communication and Computational
Technologies. Lecture Notes in Networks and Systems, (Vol.
145). Springer, Singapore. https://doi.org/10.1007/978-98
1-15-7345-3_68
[12]. Ru, C. (2013). Design of BeiDou Navigation/GPRS/GIS
vehicle monitoring system based on ARM. Railway
Transport and Economy, 20(3), 80-84.
[13]. Sasi, A., & Nair, L. R. (2013). Vehicle Anti-theft System
Based on an Embedded Platform. IJRET: International
Journal of Research in Engineering and Technology, 2(9), 581-85. https://doi.org/10.15623/ijret.2013.0209090
[14]. Sehgal, V. K., Mehrotra, S., & Marwah, H. (2016, July).
st Car security using Internet of Things. In 2016, IEEE 1
International Conference on Power Electronics, Intelligent
Control and Energy Systems (ICPEICES), (pp. 1-5). IEEE.
https://doi.org/10.1109/ICPEICES.2016.7853207
[15]. Sehgal, V. K., Singhal, M., Mangla, B., Singh, S., &
Kulshrestha, S. (2012, July). An embedded interface for
GSM based car security system. In 2012, Fourth
International Conference on Computational Intelligence,
Communication Systems and Networks, (pp. 9-13). IEEE.
https://doi.org/10.1109/CICSyN.2012.12
[16]. SIAM (n.d.). Performance of Auto Industry in 2020-21.
Society of Indian Automobile Manufacturers. Retrieved
form https://www.siam.in/about-us.aspx?mpgid=1&pgidt
rail=2
[17]. TechAhead Team. (2017, April 11). Top 6
Programming Languages for IoT Projects. TechAhead.
Retrieved from https://www.techaheadcorp.com/blog/
top-6-programming-languages-for-iot-projects
[18]. Viola, P., & Jones, M. (2001). Fast and robust
classification using asymmetric AdaBoost and a detector
cascade. Advances in Neural Information Processing
System, 14.