Professional Documents
Culture Documents
ABSTRACT
This Projected System will stress on developing an improvement of the vehicle security system through
SMS(Short Message Service). Understanding of telecommunication stays an exhilarating field since it
includes signal and systems, digital signal processing, programming and many more things. The aim of this
proposed system is to trigger OTP(One Time Password) SMS sending by the embedded system via GSM
Technology. This motivates people to develop the technology into regular use. In this proposed system ,SMS
is incorporated existing vehicle security system. Here insist of human to human telecommunication, this
method constructs new thing which remains machine to human telecommunication. This scheme is an
progress plus refining vehicle security system by adding SMS features to alert vehicle owners whenever
intrusion happens. This projected system includes hardware along with software parts building and the
incorporation of both parts to make the system efficiently. We succeed in achieving the aim and in fact, added
another feature to the system which will send SMS to owner in case of fuel theft as well, If there is drastic
change in fuel level then alert SMS is send to owner informing about threat. We will document all the
hardware and software development and provide a simulation model of the system.
Keywords:Anti theft mechanism,fuel theft , GSM, Microcontroller based ,embedded , security system ,OTP .
1.INTRODUCTION
In current years, automobile theft are growing at an disturbing rate throughout the world.. Commercially
present anti-theft vehicular systems are too costly. We mark a modest effort to design & develop a low cost
,simple vehicle theft control scheme using an integral microcontroller. The Global System for Mobile
communications (GSM) is the most popular
standard for mobile phones in the world. This system involves a microcontroller & a mobile for the
communication purposes [1].
There are many alternatives to prevent the car theft, car alarm system which nearly all cars have the
system installed, Global Positioning System (GPS) where the whereabouts of the car can be mark out. Further
replacements include steering and tire lock ,gear lock, hidden kill switches which incapacitate fuel flow and
many others.
The latest trend of car theft involves the car being pulled away, alarm signal capturing where the alarm
disabler signal can be traced and duplicate by a thief with t he device to capture the signal and use it to disable
the alarm.. Usually, car owner realizes that their car has been stolen long after the incident, disables all the
security features in the car, cannibalized the car for expensive items and spare parts , which the car thief
probably gotten away.It happens when the owner is far away from the vehicle to hear the alarm. The SMS
message gives immediate alert to the car vendor, even if the thief escaped away with the car, thus that the owner
can immediately take instant actions to notify the local police department or contact the car immobilizer service
which come with most GPS car system to immobilize the vehicle.
The existing security system is not effective because of the following reasons:
3. Distance- Cover Area, the siren cannot be heard over a long distance
4. False Alarm
Using data supplied by the United Nations Office on Drugs and Crime,[8] the estimated worldwide auto-
theft rate exists 65.8 for each 100,000 residents.
Based on the discussion and data related to stolen cars this one is observed that the car theft is a global
problem. No one likes his or her car to become stolen. Insurance companies also sense the pressure as they have
to pay the claims made by the clients. As a result ,the insurance companies have to increase the insurance
premium. As soon as this happened only a small percentage of people could afford a good insurance premium.
Increase of the insurance premium also due to the lack of security system installed to the car .Car manufacture rs
installed a minimum standard security system such as an alarm based security system. This device is not
operational sufficient. It does not have any pager system attached to this one. The car thief takes only a few
minutes to deactivate the security system. Nobody will pay an attention when the car alarm goes off.
So it is proposed that a GSM-based vehicle anti-theft system progress is designed and developed to
improve the presentation of the current automobile security system.
1.3 Objective
The projected security system for smart cars used to avoid them from theft using AVR microcontroller.
This system is use to provide the locking and unlocking system through OTP sent to user through GSM
technology .This method makes use of an embedded chip that has an sensor, which senses the key through
insertion and sends an OTP to the owners mobile the user have to enter the identical password which is sent to
the authorized mobile number then vehicle will be started .In case if the user be unsuccessful to enter the
correct password in three trials, then it is treated as theft situation a text message is sent to the owner ,a close
relative or friend and police with the vehicle number .Further the fuel injector of the car disabled so that the user
cannot start the car by any means. In addition it can also helpful in detecting fuel theft from the vehicle by
monitoring fuel level in the vehicle.
The following works were carried out, in order to achieve the objectives of the project .
2. EXISTING SCENARIOS
Data such as global position, speed and velocity of the vehicle is transmitted over the cellular network
to the users private account ,so the user can get to know about the vehicle and can give command to the ve hicle
such as stopping the vehicle ,door lock etc through the PDA devices or mobile phones.
Other systems include an in vehicle anti-theft component [1]that will not enable the functions of the
applications if it should find itself is illegally moved to one more car. There are numerous remote controlled
security systems that restricts key auto systems of automobile through remote control when it is stolen .The
restriction for first system is that it needs a secure processor and smart card chips to store in the Group
Identification Number, and second type of system needs secure vehicle-vehicle communications.
3. PROPOSED WORK
In this project we present a novel antitheft control system for automobiles that tries to prevent the theft
of a vehicle. This system makes use of an embedded chip that has an infra -red sensor, which senses the key
during insertion and sends an OTP to the owners mobile the u ser have to enter the same password which is sent
to the authorized mobile number then vehicle will be started.
If the user fails to enter the correct password in three trials, then it is treated as theft condition a text
message is sent to the police with the vehicle number . The message is also sent to the owner about the
unauthorized usage. Further the fuel injector of the car deactivated so that the user cannot start the car by any
means.
In addition to it can also helpful in detecting fuel theft from t he vehicle by monitoring fuel level in the
vehicle.
GSM
MODEM
FUEL LEVEL
SENSOR
Micro-controller(avr atmega16)
LCD LM016L
L293D IC (motor driver ic)(it is used for opening and closing of door)
Power supply
GSM module
4.IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned out into a working
system, Therefore it can be measured to be the most serious stage in attaining a positive successful new
system and in giving the user confidence that the new system will definitely work and be effective .The
implementation stage involves careful planning, scheduling ,forecasting, investigation of the existing system and
its constraints on implementation of application along with designing of methods to achieve changeover and
evaluation of changeover methods.
4.1 Modules
Here, the LCD is connected to Port C (PC.0 to PC.7) of the microcontroller. It is used to display messages
(either error or accepted). Fixed value resistor of 100R connected to Pin3 of LCD, is used to control t he
brightness of LCD. A liquid crystal display is a low cost, low power device capable of displaying text and
images. LCDs are extremely common in embedded systems; since such systems often do not have video
monitors like those that Come standard with des ktop systems.
Keypad Used Here For Inputting The Data Is Of The Form (4 4) Matrix Board, Which Is Used To Connect To
Port B Of The Microcontroller .It is used to input the password for validation purpos es. a (4 4) matrix
connected to port b. The Row 1 to 4 are connected to an Port b.0 to port b. 3 and the columns are Connected to
port b.7 to port b .4 . If no key has been pressed, reading the input port will yield 1s for all columns since they
are all connected to high (vcc). If all the rows are grounded and a key is pressed, one of the columns will have 0
since the key pressed provides the path to ground. It is the function of the microcontroller to scan the keyboard
continuously to detect and identify the key pressed.
HMAC uses the following parameters: B Block size (in bytes) of the input to the Approved hash function. H An
Approved hash function. I pad Inner pad; the byte x36 repeated B times. K Secret key shared between the
originator and the intended receiver(s)[4].
L Block size (in bytes) of the output of the Approved hash function.
text The data on which the HMAC is calculated; text does not include the padded key. The length of text is n
B
bits, where 0 n < 2 - 8B.
x N Hexadecimal notation, where each symbol in the string N represents 4 binary bits.
|| Concatenation
Exclusive-Or operation.
HMAC SPECIFICATION
To compute a MAC over the data text using the HMAC function, the following operation is
performed:
SHA-1 produces a 160-bit (20-byte) hash value. A SHA-1 hash value is typically rendered as
a hexadecimal number, 40 digits long.
SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely
used applications and protocols.
STEP2:APPEND LENGTH
STEP3:INITIALIZE MD BUFFER
The operations of the Functions f1, f2, f3, f4 can be expressed by the following diagram[5]:
f2 = f(t, B, C, D): B + C + D
f4 = f(t, B, C, D): B + C + D
GSM modem is a specific type of modem which accepts a SIM card, and works over a subscription to
a mobile operator, just like a mobile phone .When a GSM modem is connected to a computer, this allows the
computer to use the GSM modem to communicate over the mobile network. From the mobile operator
perspective, a GSM modem looks just like a mobile phone While these GSM modems are most frequently used
to provide mobile internet connectivity, many of them can also be used for sending and receiving SMS and
MMS messages[2].
Introduction to AT Commands
Besides this common AT command set, GSM modems and mobile phones support an AT command set
that is specific to the GSM technology, which includes SMS-related commands like AT+CMGS (Send SMS
message), AT+CMSS (Send SMS message from storage), AT+CMGL (List SMS messages) and AT+CMGR
(Read SMS messages).
It should be noted that the starting "AT" is the prefix that informs the modem about the start of a
command line. It is not part of the AT command name. For example, D is the actual AT command name in ATD
and +CMGS is the actual AT command name in AT+CMGS[3].
Keypad=Rs.150
LCD Screen(16*2)=Rs.140
GSM Module=Rs.1200
Other ICs=Rs.610
6. CONCLUS ION
The developed system is powerful enough to control theft of vehicle and fuel theft from the vehicle .In
future we can developed mobile application in order to handle whole system remotely and can work on multi
level security so as to make system more effective ,competent and secure.
Image Based Password Authentication can be done in order to provide additional future.
REFERENCES
[1] Vinoth Kumar Sadagopan,Upendran Rajendran,
Albert Joe Francis,Anti Theft Control System Design Using Embedded System,Vehicular Electronics and
Safety (ICVES), 2011 IEEE International Conference
[2] Mohd Rosmanizam Bin Hamad Rodzi,An Enhancement Of Vehicle Security Alarm System Via Sms
https://ir.uitm.edu.my/679
S. Sirisha Advanced Vehicle Security System With Theft Control And Accident Notification
https://grietinfo.in
csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf
[5] Cryptography And Network Security Principles And Practice Fifth Edition William Stallings.
http://cars.about.com/od/helpforcarbuyers/tp/Cheapest_09.htm
[7] Raj Kamal Embedded Systems architecture , programming and designSecond Edition 2009
https://en.wikipedia.org/wiki/Motor_vehicle_theft