ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III,...
Transcript of ADDRESSING PUBLIC SERVICE VEHICLE … Journal of Computer Engineering & Applications, Vol. III,...
International Journal of Computer Engineering & Applications, Vol. III, Issue III
ADDRESSING PUBLIC SERVICE VEHICLE SECURITY CHALLENGES USING AN SMS AND USSD IDENTITY
CONFIRMATION SYSTEM
Moses M. Thiga*
Kabarak University
ABSTRACT:
The Public Service Vehicle (PSV) sector in Kenya has over time been faced with crimes such as carjacking, hijacking, robbery and even murder often perpetuated by persons posing as passengers. The lack of passenger records makes it difficult to solve these crimes. This paper presents a model and prototype based on the use of SMS, USSD and the web to deliver a simple identity verification system for use in this largely informal sector. The system registration process captures the user’s identity information such as names, identity card numbers, mobile phone numbers and photo. An exchange of codes generated by the system sends the ID information to both the PSV operator as well as the passenger’s mobile phones. The use of this system can help to deter crime given that criminals would hesitate to register or use it as well as help in providing information for crime investigations.
Keywords: SMS, USSD, Identity Verification, Public Service Vehicle
[I] INTRODUCTION
There are various types of public transport services in Kenya such as taxis, matatus (14 and 30 seater
minibuses), boda bodas (motorcycle taxis) and tuk tuks. The informal and small or microenterprise
nature of these public service operators has over time exposed them to a variety of challenges that
impact on their growth, operations and profitability. These challenges include high operational costs
occasioned by high fuel and maintenance costs, loss of income through theft by crews and demands
for bribes by policemen, high insurance costs due to the prevalence of bogus and inflated claims and
crime leading to the loss of vehicles through theft and carjackings.
Crime involving public service vehicles takes on a number of forms; carjackings where criminals
board vehicles and then rob passengers or alternatively hire the vehicles and then proceed to
commandeer them. These cases of hijacking have in many instances led to the loss of life as well as
that of the vehicles. A major challenge in all these cases is the lack of passenger records from these
public service vehicles. Such records would be of great help in initiating crime investigations by law
enforcement agencies.
IJCEA, JULY-SEPT - 2013 229
International Journal of Computer Engineering & Applications, Vol. III, Issue III
Their level of automation is very low and they rely on manual passenger receipting with no reliable
passenger records. Only the first name is requested and it is not verified by requesting the ID. In the
event of accidents or crimes then the identities of the passengers is hard or impossible to ascertain.
While passenger manifest systems exist, they are not suitable for use in the informal transport sector
due to their relatively high cost and complexity. They are often enterprise kind of systems requiring
intensive investment in the hardware and software. The platforms they are developed on result in
systems that require substantial training in order to achieve effective use. These factors conspire to
keep them out of reach of most public transport operators whose small and informal operations make
it difficult to afford and operate them.
An effective, affordable and easy to use solution is thus required to address the challenge of
maintaining passenger manifests in the public transport sector.
The problem:
The lack of passenger records from these public service vehicles and boda bodas makes crime
investigations by law enforcement agencies a very daunting task. There is often no way to accurately
identify persons who board these vehicles in the event of crime making it very difficult to initiate
investigations. The availability of a record would thus be a very good starting point for investigations
as well as a deterrent to crime.
Objectives of the study:
To develop an effective, affordable and easy to use ID verification and passenger manifest
system for use in the informal and microenterprise public transport sector.
[II] LITERATURE REVIEW
2.1 The public service vehicle crime challenge
Public service vehicles are the most commonly used mode of transport in Kenya. There are a variety
of options available which include taxis, matatus (minibuses), boda boda (motorcycle taxis) and
buses. Over time these modes of transport have been faced with numerous challenges such as high
operational costs due to poor roads, high insurance costs, bribe demands by the police and crime
targeting both crews and passengers.
IJCEA, JULY-SEPT - 2013 230
International Journal of Computer Engineering & Applications, Vol. III, Issue III
The crimes targeting the PSV sector often take the form of hijacking, robbery of personal effects and
money and in some cases murder. The crimes are perpetuated by criminals who pose as passengers
and commandeer the vehicles during journeys. In a majority of the cases reported the police have
absolutely no clues on the identity of the criminals who carry out these crimes. A summary of
incidences is presented in Error: Reference source not found
PSV Type Crime Matatu In this case a matatu was hijacked, passengers robbed and the vehicle stolen. Tracking devices helped to trace the
vehicle but the identity of the gangsters remains unknown [1].Matatu Gangsters boarded a matatu posing as passengers and all were searched at the police station. However, midway into the
journey they commandeered the vehicle, robbed passengers and disappeared into the darkness. It was not possible to trace the gangsters because no ID information was taken on boarding the vehicle [2].
Matatu This incident happened on Ngong road, Nairobi. Thugs posed as passengers, took control of vehicle and robbed passengers. They fled and could not be traced [3].
Bus A 60 seater bus headed to a city suburb, Githurai, was hijacked by 8 gangsters armed with pistols. They robbed passengers of cash and valuables. [4].
Boda boda A boda boda operator was hijacked, killed and his motorcycle stolen. Thugs had posed as passengers [5].Boda boda Two people posing as customers robbed a boda boda operator and in a related incident another one was robbed and
killed. [6].Boda boda Two boda boda operators were robbed and killed in coffee farm. Interestingly the Police advised operators to ‘look’
carefully at customers and to inform their colleagues of destinations before departing with passengers [7].Taxi In this incident a Taxi driver was strangled and robbed of his vehicle [8].Taxi Two people posing as passengers coming from a night of drinking drugged and robbed taxi drive of their vehicle [9].
The incidences discussed above a just but a drop in the ocean and are derived purely from media
reports. Police records are likely to paint a grimmer picture of the crime situation in the PSV sector.
However, these instances are sufficient to paint the picture of a sector grappling with a serious
security challenge.
Accurate passenger records can go a long way in preventing and investigating these crimes. However,
operators in the informal transport sector lack systems to help them in maintaining passenger records.
This challenge is typical of small businesses that have been found to have limited knowledge of and
access to technology and information systems [10-12].
2.2 SMS and USSD
SMS is a basic service offered on GSM, GPRS and CDMA networks that allows mobile devices to
exchange messages with a short amount of text limited to 160 characters. SMS utilizes a store and
forward approach to transmit messages between mobile phones which allows messages to be stored
briefly in case the recipient is not available [13, 14].
SMS has been used in the delivery of a wide range of services to mobile phone subscribers. These
include; (1) Consumer applications such as person to person messaging, interactive information
IJCEA, JULY-SEPT - 2013 231
International Journal of Computer Engineering & Applications, Vol. III, Issue III
services (obtaining weather forecasts), entertainment services (downloading ringtones) and location
based services (restaurant suggestions based on handset locations), (2) Corporate applications that
include notification and alert services (product expiry and renewal dates, emergencies), contact,
correspondence and appointment management and vehicle tracking, and (3) Mobile service provider
applications that include SIM card updates (customer profiles and address book entries) and WAP
push with URLs for advertisements to be viewed on the user’s mobile browsers [15]. The simplicity
and low cost of SMS has made it the most popular mobile messaging method with over 7 trillion
messages being sent worldwide in 2010 [16].
USSD (Unstructured Supplementary Service Data) is a GSM communication technology that is used
to send messages between a mobile phone and a network based application server [17]. It is a device
and SIM independent and highly cost effective messaging service that is seven times faster than SMS.
USSD is able to support interactive menu based applications that make simultaneous voice and data
communications possible [18]. A typical GSM network architecture with USSD capabilities is
presented in Error: Reference source not found.
USSD is used for the development of mobile chatting, m-commerce, pre-paid balance inquiries,
callback services, software upgrades and mobile banking services [17, 18]. These services are
available as (i) ‘pull’ based services such as news updates, weather, movie information, sports
updates, currency updates, stock market reports, telephone directory and yellow pages, and (ii) ‘push’
based services that include voting / polling and emergency information services. It is also used for
advertising where businesses get listed on menu based USSD systems in order to promote their
services [17].
The use of SMS and USSD is a feasible approach in delivering the PSV security solution in Kenya
given that there are approximately 30M mobile phone users accounting for 75.8% of the population.
In addition, over 4 Billion SMS messages were sent in Kenya during quarter 1 of 2013 making it a
highly utilized mode of mobile communications [19].
[III] The ID verification model
A model requiring the use of SMS, USSD and a web application is thus proposed to provide an
accessible and affordable public sector passenger manifest system. The model comprises of two parts;
the user registration process and the passenger manifest process.
IJCEA, JULY-SEPT - 2013 232
International Journal of Computer Engineering & Applications, Vol. III, Issue III
The user registers by providing their full names, a copy of an identification document and a photo
taken at the time of registration. These details are then keyed in to the system which subsequently
sends an SMS to the user requesting them to confirm their registration. This confirmation is accessed
via a USSD menu.
The registration process is the most critical aspect of the system. User details, which the system
relies on, must be captured accurately in order to inspire confidence in the beneficiaries of the
information.
Figure 1: User registration process
System
Registration Form
Name: KEN KEN KEN
ID Number: 999999999999
Mobile Number: 7788991122
Gender: MALE
Year of Birth: 1970
Signed:
Provide Registration
Details
Key in Registration
Details Request User to Confirm
User Confirms Registration
The user registers by providing their full names, a copy of an identification document and a photo
taken at the time of registration. These details are then keyed in to the system which subsequently
sends an SMS to the user requesting them to confirm their registration. This confirmation is accessed
via a USSD menu. The registration process is the most critical aspect of the system. User details,
which the system relies on, must be captured accurately in order to inspire confidence in the
beneficiaries of the information.
3.2 ID Verification process
IJCEA, JULY-SEPT - 2013 233
International Journal of Computer Engineering & Applications, Vol. III, Issue III
Once users have been registered then the ID verification process can then take place as follows;
1. The PSV operator accesses the system using a USSD menu and requests for an identification
(ID) code.
2. The potential client sends the ID code to a designated short code or by USSD.
3. The system responds to the PSV operator with the ID details of the potential client and sends
the ID details of the PSV operator to the client.
4. The details sent to both parties include; Mobile number, Name and ID number.
This exchange of ID codes is recorded by the system for future reference.Client
SystemProvider
Process Request
Send ID Code ABC
Send ID Code XYZ
Receive and Verify ID Codes
Client gives ID code ABC to Provider
Provider gives ID code XYZ to Client
Client sends code XYZ to System
Provider sends code ABC to System
System confirms Identity
Code XYZ has been given to you by Chris
Mann, ID number 565656565,
mobile number 0733114455
System confirms Identity
Code ABC has been given to you by John
Doe, ID number 98989898, mobile
number 0722778866
Exchange ID Codes
Request for ID code
Request for ID code
The exchange of identity information can server two main purposes; (i) to deter crime when would be
criminals either refuse to register on the service and to have their identity known, and (ii) to facilitate
IJCEA, JULY-SEPT - 2013 234
International Journal of Computer Engineering & Applications, Vol. III, Issue III
investigations in the event that crime is committed given that the identities of both the operator and
passengers are on record.
3.3 Online passenger manifest process
While the SMS and USSD approach is easy to use and convenient it is limited to receiving identity
information only. There are instances where PSV operators may wish to query historical records or
analyze passenger volumes. For such requirements the system can also be extended to include a web
based module that allows them to manage passenger records online. With the use of the system online
additional functionality such as ticketing and reporting can be included in the system. The
proposed extension is illustrated in Error: Reference source not found.
System
Create Trip - Enter fare &
generate Code
Receive Code Display passenger information
Receive payment &
generate Receipt
Give Code to passenger
Send Code to system
1
2
3
4
5
This process as depicted in Error: Reference source not found is preceded by two processes; (i) the
registration or capture of details such as the registration number and passenger capacity of the
vehicles involved, and (ii) the creation of routes that the vehicles ply.
Step1- Create a trip: A trip or journey is created using a web interface. A vehicle is selected, a route
is specified and the fare payable is indicated. Once these details are captured by the system a random
ID code for the particular vehicle and trip is generated by the system and displayed.
IJCEA, JULY-SEPT - 2013 235
International Journal of Computer Engineering & Applications, Vol. III, Issue III
Step 2 – Share ID code with passenger: The ID code is then given to prospective passengers.
Step 3 – Passenger sends ID code: The passenger then sends the ID code to a designated short code
or through a USSD menu.
Step 4 – System displays passenger details: The system then retrieves the ID details of the
passenger and displays them to the PSV operator.
Step 5 – Receive payment and produce receipt: The PSV operator then receives the payment and
produces a receipt with the full details of the passenger.
Based on the process above the system is capable of producing a number of reports such as the
number and details of passengers on various trips, the total number of trips per vehicle, the total
amount of money collected per vehicle, the routes travelled by the vehicle and passenger specific
reports such as number of trips and the total spend over a period of time.
[IV] SYSTEM DESIGN
Based on the model proposed in the previous section a prototype was designed.
4.1 System Flowcharts
The system flowcharts are presented in Figure 4, Figure 5 and Figure 6.
IJCEA, JULY-SEPT - 2013 236
International Journal of Computer Engineering & Applications, Vol. III, Issue III
4.2 System Database
Figure 2: System database
IJCEA, JULY-SEPT - 2013 237
International Journal of Computer Engineering & Applications, Vol. III, Issue III
[V] PROOF OF CONCEPT
A prototype based on the proposed model and system design was then developed. The process
proposed in Error: Reference source not found and Error: Reference source not found is implemented
in the prototype as illustrated from Figure 3 to The system is capable of displaying the passenger’s
details as shown in The system is capable of displaying the passenger’s details as shown in .
5.1 User registration
User details are keyed in to the system and their photo is also uploaded as shown in Figure 3.
Figure 3: User details entry screen
Figure 4: ID confirmation messages
Message Received
ID Confirmation for code H5FX8: Name: Moses Mwangi Thiga ID No: 28767450 Mobile: 0726785634
Options Reply Back
Message Received
ID Confirmation for code H5FX8: Name: Henry Kibet Kiplagat ID No: 2453478 Mobile: 0727564590
Options Reply Back
The PSV Operator confirmation message
The passenger confirmation message
IJCEA, JULY-SEPT - 2013 238
International Journal of Computer Engineering & Applications, Vol. III, Issue III
5.3 ONLINE PASSENGER MANIFEST PROCESS
Vehicle management: Vehicles are created and listed as shown in Figure 5and Figure 6.
Figure 5: Create new vehicle
Figure 6: List of vehicles
Route management: Routes are created and listed as shown in Figure 7and Error: Reference source
not found.
Figure 7: Create route
IJCEA, JULY-SEPT - 2013 239
International Journal of Computer Engineering & Applications, Vol. III, Issue III
Trip management: Trips or journeys are created and listed as shown in Figure 8 and .
Figure 8: Create trip
Figure 9: List of trips
Populating the passenger manifest: The population of the passenger manifest begins with the user
sending the ID code to the system as shown in Figure 10
Figure 10: User sends ID code
Your Message:
Options Send to Exit
NS567
IJCEA, JULY-SEPT - 2013 240
International Journal of Computer Engineering & Applications, Vol. III, Issue III
The operator access the list of the trips currently available and selects the one they wish to receive
payments for as shown in The operator access the list of the trips currently available and selects the
one they wish to receive payments for as shown in . .
Figure 11: Receive payment – list of trips
The list of passengers who have sent the ID code to the system for the particular vehicle and trip are
displayed as shown in Error: Reference source not found. Links are enabled for those who have not
paid and for all passengers to allow for viewing of their details.
Figure 12: Passenger manifest
The operator proceeds to receive payment for the selected passenger as shown in The
operator proceeds to receive payment for the selected passenger as shown in . The passenger
photo is shown in the payments receipt screen. . The passenger photo is shown in the
payments receipt screen.
Figure 13: Receive payment
IJCEA, JULY-SEPT - 2013 241
International Journal of Computer Engineering & Applications, Vol. III, Issue III
The system is capable of displaying the passenger’s details as shown in The system is
capable of displaying the passenger’s details as shown in
Figure 14: Passenger details
[VII] DISCUSSION
7.1 Advantages
The proposed system presents a number of advantages to the operators of PSV vehicles;
1. User detail capture: These details are captured once, used many times and can be shared
among all the operators.
2. User detail availability: The PSV operators are able to get ID details that they would
ordinarily not have access to due to their inability to capture and maintain them as well as the
nature of their operations.
Accurate passenger manifests: The capture of passenger details at the beginning of every trip
makes it possible to have an accurate record of all persons in a particular vehicle. This information
is useful in a number of scenarios such as in the processing of insurance claims, crime
investigations and even customer loyalty programs.
3. Easy to use system: The utilization of SMS and USSD for passenger interaction with the
system makes it very easy to use.
IJCEA, JULY-SEPT - 2013 242
International Journal of Computer Engineering & Applications, Vol. III, Issue III
4. Affordable operation: The use of SMS and USSD is relatively low cost especially when
multiple PSV’s connect to a common system.
5. Report generation: The use of this system can make it possible to produce summary reports
of total revenues and no of trips per vehicle. This information is often not availably and accurate
in the present setup that relies on manual records.
7.2 Challenges
The main challenge facing the utilization of such a system from the PSV perspective is that it will
require a PC and internet access to operate the system for receipting and viewing of reports.
7.3 Assumptions
The main assumption made in the development of the SMS and USSD ID verification model and
prototype is that all the users required to use the system have mobile phones and valid identification
documents required for both the use of the system as well as registration.
A number of additional assumptions have been made in proposing the online passenger manifest
system;
1. That internet is available in the areas where the system will be used.
2. That the PSV operators have IT literate staff to operate the system.
3. That all potential passengers have mobile phones.
[VIII] CONCLUSIONS
There is great potential in a system that can provide a practical, effective and affordable solution to
the challenges of improving security and maintaining passenger manifests among public service
vehicle operators. The proposed use of SMS, USSD and the web in delivering the solution is a viable
approach given the fact that a majority of potential passengers and PSV operators are already familiar
with these technologies.
[IX ]AREAS FOR FURTHER STUDY
IJCEA, JULY-SEPT - 2013 243
International Journal of Computer Engineering & Applications, Vol. III, Issue III
The proposed system or an enhanced version is applicable in scenarios where people must deal with
people they do not know. These kind of scenarios include events such as concerts and football
matches as well as in land transactions and transport hire among others.
[VIII] CONCLUSIONS
There is great potential in a system that can provide a practical, effective and affordable solution to
the challenges of improving security and maintaining passenger manifests among public service
vehicle operators. The proposed use of SMS, USSD and the web in delivering the solution is a viable
approach given the fact that a majority of potential passengers and PSV operators are already familiar
with these technologies.
[IX ]AREAS FOR FURTHER STUDY
The proposed system or an enhanced version is applicable in scenarios where people must deal with
people they do not know. These kind of scenarios include events such as concerts and football
matches as well as in land transactions and transport hire among others.
References
[
IJCEA, JULY-SEPT - 2013 244