ABSTRACT
This project deals with the design & development of a theft control system for an automobile, which is being used to prevent/control the theft of a vehicle. The developed system makes use of an embedded system based on Global System for Mobile communication (GSM) technology. The designed & developed system is installed in the vehicle. An interfacing mobile is also connected to the microcontroller, which is in turn, connected to the engine. Once, the vehicle is being stolen, the information is being used by the vehicle owner for further processing. The information is passed onto the central processing insurance system which is in the form of the SMS, the microcontroller unit reads the SMS and sends it to the Global Positioning System (GPS) module and using the triangulation method, GPS module feeds the exact location in the form of latitude and longitude to the user’s mobile. By reading the signals received by the mobile, one can control the ignition of the engine; say to lock it or to stop the engine immediately. The main concept in this design is introducing the mobile communication into an embedded system. The designed unit is very simple& low cost. The entire designed unit is on a single chip.
PURPOSE: The main aim of the project is to design and develop an advanced vehicle locking system in the real time environment. The user can send a STATUS message from his cell phone and as soon as the GSM module gets the message, it will check for the user’s authentication and if found to be valid, it will immediately send the details of the locations like the latitude and the longitude using GPS module. So the user can get to know the exact location of the vehicle. At the same time message will b sent to a personal computer where user can get the exact location of vehicle pointed out on the Google maps.
PROJECT DESCRIPTION:
In this paper we present a novel anti theft control system for automobiles that tries to prevent the theft of a vehicle. This system makes use of an embedded chip that has an inductive proximity sensor, which senses the key during insertion and sends a text message to the owner’s mobile stating that the car is being accessed. This is followed by the system present in the car asking the user to enter a unique password. The password consists of few characters and the car key number. If the user fails to enter the correct password in three trials, a text message is sent to the police with the vehicle number and the location tracked using a GPS module. The message is also sent to the owner about the unauthorized usage. Further the fuel injector of the car deactivated so that the user cannot start the car by any means. At the same time a secret lock system gets activated and the unauthorized user gets trapped inside the car and only the owner who is equipped with the key to the secret lock system can deactivate the mechanism. This technique helps in taking fast steps towards an attempt to steal the .The design is robust and simple.
WORKING OF THE ANTI-THEFT CONTROL SYSTEM: When the key is inserted in the key hole the inductive proximity sensor detects the key and triggers the microcontroller. A password check message is displayed on the LCD provided inside the car and at the same time the owner is alerted with a message about the usage of his car. Totally three trials are provided to enter the correct password. If the entered password is incorrect a second electronic lock system gets activated and the doors are locked. An alert message is sent to the police and the owner about the illegal access of his car. With the help of GPS the exact location of his car is found and the key of the second lock system is available only with the owner hence a total control over the vehicle is established.
Step Down
Transformer
Bridge
Rectifier
Filter
Circuit
Regulator section
Power Supply:
GPS
GPS MODULE
RELAY
ENGINE
GSM MODULE
Proximity sensor
Key
Photodiode
Micro
Controller
POWER SUPPLY
KEYPAD (4X3)
LCD DISPLAY
IR TX
Block Diagram: VEHICLE section
OUTPUT WINDOW:
Technology:
GPS:
GPS (Global Positioning System) technology is used to find the location of any object or vehicle to monitor a child continuously using satellite signals. Three satellite signals are necessary to locate the receiver in 3D space and fourth satellite is used for time accuracy.GPS will give the information of parameters like longitude, latitude and attitude. With the help of these parameters one can easily locate the position of any object. In this GPS technology, the communication takes place between GPS transceiver and GPS satellite.
GSM:
GSM (Global System for Mobile communications) is the technology that underpins most of the world's mobile phone networks. The GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement and cooperation. GSM has become the world's fastest growing communications technology of all time and the leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular technology used for transmitting mobile voice and data services. GSM operates in the 900MHz and 1.8GHz bands GSM supports data transfer speeds of up to 9.6 kbps, allowing the transmission of basic data services such as SMS.
HARDWARE REQUIREMENT:
* MICRO CONTROLLER * GPS MODEM * LCD * MAX232 * GSM MODEM * BUZZER * POWER SUPPLY * MATRIX KEYPAD * LINEAR KEYPAD * LCD * PROXIMITY SENSOR * ENGINE * IGNITION KEY
SOFTWARES:
1. EMBEDDED C 2. KEIL µVISION4 3. FLASH MAGIC 4. EXPRESS PCB
RESULT
This project deals with the design & development of a theft control system for an automobile, which is being used to prevent or control the theft of a vehicle. This system is designed to improve vehicle security and accessibility. With the use of wireless technology vehicle owners are able to enter as well as protect their automobiles with more passive involvement. Ideally, this project could be made more convenient and secure with the use of satellite modems instead of cell phones as tracking device as the system may fail when there is no network coverage. This design can be made more enhanced in future to support camera, handset phone / hands free, mobile data LCD display, web based tracking software, and also PC based stand alone software. In our project the security system is based on embedded control which provides security against theft. The GSM modem provides information to the user on his request. The owner can access the position of the vehicle at any instant. He sends a message in order to lock the vehicle. The GPS receiver on the kit will locate the latitude and longitude of the vehicle using the satellite service. This is reliable and efficient system for providing security to the vehicles through GSM, GPS and serial communication. The maximum speed according to the standard is 20kbits/sec.
You May Also Find These Documents Helpful
-
Change the default settings for installations and configurations on the operating systems. By removing unnecessary systems that are running, it will help to secure unused and open ports.…
- 781 Words
- 4 Pages
Good Essays -
Automobile industry are starting to have many wireless benefits to its auto consumers. There are two main areas of telematics that are popular choices. CD ROM telematics is one and the second is the call center telematics. This is a great advantage for the automobile business enterprise, because millions of consumers spend several hours a day in their automobiles. Nevertheless, the greatest demands to the development of mobile transaction are the consumers assurance when it comes to the issues of privacy and internet security (Aloi,et.al., 2007).…
- 657 Words
- 3 Pages
Good Essays -
There are many features and capabilities of the Vehicle Management system (VMS) which is the latest application of data communications for Wal-Mart. The VMS has the ability to send two way text messages to assist management in being more effective in the material handling of resources to the most appropriate destinations. The VMS also works effectively with Radio-Frequency Identification (RFID) systems.…
- 387 Words
- 2 Pages
Satisfactory Essays -
3) A simplified scoring model addresses all the weakness of a checklist model for project screening.…
- 6717 Words
- 36 Pages
Satisfactory Essays -
Our project presents a new design for an anti-theft protection System as an inexpensive solution to protect cars from theft and from non-authorized users.…
- 3516 Words
- 15 Pages
Powerful Essays -
Suppose a company's security manager would like to have a system that precisely tells at every moment where the cars of the company are: in the garage or out on roads. The key issue of this task is that the registration of the movement of the vehicles should be done automatically by the system, otherwise it would require manpower.…
- 1361 Words
- 6 Pages
Good Essays -
Introduction Having been involved with Vehicle Tracking over the years and observed the many installations it is clear that there are 7 major barriers that have been encountered when looking at implementing the application. The 7 problems that needed addressing are: 1. 2. 3. 4. 5. 6. They all appear to be Cost Prohibitive Vehicle Tracking is seen as intrusive Quantifying the Return on Investment The contract period was cumbersome System Reliability of all the components Too difficult to integrate into back office systems to get the best use of the information 7. Too many third parties involved…
- 1809 Words
- 8 Pages
Powerful Essays -
this project is being done by the “A-Parking lot” which is future famous car parking lot company which provides the automated car parking.company main objective is to give such a system to reduce the time waste of human in finding the appropriate car parking.…
- 1481 Words
- 6 Pages
Good Essays -
The vehicle anti-theft tracking system based on Internet of things is designed in this article,…
- 308 Words
- 2 Pages
Satisfactory Essays -
GATELESS ELECTRONIC TOLL COLLECTION USING RFID A.N.V.K.Chaitanya and D. Kishore Kumar anvkchaitanya@gmail.com, d.mohankishore@gmail.com Department Of Electronics and Communications Engineering Koneru Lakshmaiah University Vaddeswaram, Guntur. Abstract: An effective and efficient utilization of communication link between RF Modems over a wireless channel to facilitate monitoring, authentication and automated toll collection of vehicles on the highways is proposed in the paper. The system is implemented to automatically register vehicles getting on or off a motorway or highway, shortening the amount of time for paying toll in large queues.…
- 1201 Words
- 5 Pages
Best Essays -
After deploying the security system into vehicle, the administrator will send control of vehicle to an authorized person. The moment instruction received to the system by administrator, system will send a SMS to the authorized person & also intimates the administrator about change of control. All these intimation is through Short Messaging Service from the system, now the authorized person can send prescribed messages to the system. Sending Alert messages is also a part of automated message from the system. 5TOP Q.4 - How Can I Protect My Vehicle In Case Of Theft ?…
- 752 Words
- 4 Pages
Satisfactory Essays -
1. Provide real-time data regarding the school bus location by using RFID and GPS technology…
- 1284 Words
- 6 Pages
Good Essays -
Since the use of global positioning system (GPS), Knight has more information than before. Firstly, the company can locate the trucks through GPS by using the Terion’s product Fleet View. Second, after the supplementary product Cargo Sensor has added, the company can detect the presence of cargo inside the trailer. It can be instantly reported to the company when the cargo is empty. Also, the sensor can detect the fuel level and tire air pressure of the trucks so that drivers can notice and then maintain the trucks at the proper time. Lastly, staff at the headquarters can receive all information about the trucks such as their location, where are they moving and the cargo’s condition. Therefore the staff can detect when the theft stole the cargo.…
- 653 Words
- 3 Pages
Good Essays -
Usage of GPS Shield, GPRMS/GSM Shield and GizDuino microcontroller in developing Ikot Tracker will benefit the university. These are the device attached to the jeepney, it receives data through sms and displays its current location in the areas plotted in the map and has corresponding pictures to be clearer on its location. It should have an application and must be downloadable in smartphones to make an update to the students, faculty, and visitors whom are interested to have a ride for Ikot La Salle. For installing these devices it will cost P3, 000 and for making an application for this tracker will range P1, 000 to P2, 000.…
- 357 Words
- 2 Pages
Satisfactory Essays -
What was your first job? Do you have to work on Sundays? Do you like your job? Do you think it is more important to make a lot of money? We always hear that when we are applying in a company. We as a human being we find jobs that suites our personalities and dreams. Sometimes are job can change our whole life. And are job can affect our relationship to our family and friends. You as a person can change yourself for your work? Can you balance your time in working and in bonding to your family? You, can you relate yourself in the film “The Devil Wears Prada”? This movie is all about work.” A million girls would kill for this job. – Emily Charlton”, “I love my job, I love my job.- Emily Charlton”, “it's not fair! I mean, you eat carbs for Christ's sake! - Emily Charlton”.…
- 1971 Words
- 8 Pages
Better Essays