You are on page 1of 13

International Journal of Research In Science & Engineering e-ISSN: 2394-8299

Volume: 1 Issue: 4 p-ISSN: 2394-8280

APPLICATION ON ANTI THEFT CONTROL SYSTEM

Ms.Padmaja Adgulwar1, Prof. Nilesh Chaubey2, Prof.Shyam P Dubey3


1
(Dept. of Computer science & Engineering, Nuva College Of Engineering & Technology , Nagpur,
India,padmajaadgulwar@gmail.com)
2
(Asst.Professor, Dept. of Electronics & Communication, Manoharbhai Patel Institute of Engg. &
Technology,Gondia , India,chaubey.nilesh@gmail.com)
3
(Asst.Professor & Head, Dept. of Computer science & Engineering, Nuva College Of Engineering &
Technology, Nagpur,India,shyam.nuva@rediffmail.com)

ABSTRACT
This Projected System will stress on developing an improvement of the vehicle security system through
SMS(Short Message Service). Understanding of telecommunication stays an exhilarating field since it
includes signal and systems, digital signal processing, programming and many more things. The aim of this
proposed system is to trigger OTP(One Time Password) SMS sending by the embedded system via GSM
Technology. This motivates people to develop the technology into regular use. In this proposed system ,SMS
is incorporated existing vehicle security system. Here insist of human to human telecommunication, this
method constructs new thing which remains machine to human telecommunication. This scheme is an
progress plus refining vehicle security system by adding SMS features to alert vehicle owners whenever
intrusion happens. This projected system includes hardware along with software parts building and the
incorporation of both parts to make the system efficiently. We succeed in achieving the aim and in fact, added
another feature to the system which will send SMS to owner in case of fuel theft as well, If there is drastic
change in fuel level then alert SMS is send to owner informing about threat. We will document all the
hardware and software development and provide a simulation model of the system.

Keywords:Anti theft mechanism,fuel theft , GSM, Microcontroller based ,embedded , security system ,OTP .

1.INTRODUCTION

In current years, automobile theft are growing at an disturbing rate throughout the world.. Commercially
present anti-theft vehicular systems are too costly. We mark a modest effort to design & develop a low cost
,simple vehicle theft control scheme using an integral microcontroller. The Global System for Mobile
communications (GSM) is the most popular
standard for mobile phones in the world. This system involves a microcontroller & a mobile for the
communication purposes [1].
There are many alternatives to prevent the car theft, car alarm system which nearly all cars have the
system installed, Global Positioning System (GPS) where the whereabouts of the car can be mark out. Further
replacements include steering and tire lock ,gear lock, hidden kill switches which incapacitate fuel flow and
many others.

The latest trend of car theft involves the car being pulled away, alarm signal capturing where the alarm
disabler signal can be traced and duplicate by a thief with t he device to capture the signal and use it to disable
the alarm.. Usually, car owner realizes that their car has been stolen long after the incident, disables all the
security features in the car, cannibalized the car for expensive items and spare parts , which the car thief
probably gotten away.It happens when the owner is far away from the vehicle to hear the alarm. The SMS
message gives immediate alert to the car vendor, even if the thief escaped away with the car, thus that the owner
can immediately take instant actions to notify the local police department or contact the car immobilizer service
which come with most GPS car system to immobilize the vehicle.

The existing security system is not effective because of the following reasons:

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

1.Same sound (siren) for most of the cars

2. Not 100% secure

3. Distance- Cover Area, the siren cannot be heard over a long distance

4. False Alarm

5. Cannot be heard in buildings

Using data supplied by the United Nations Office on Drugs and Crime,[8] the estimated worldwide auto-
theft rate exists 65.8 for each 100,000 residents.

1.2 Problem Statement

Based on the discussion and data related to stolen cars this one is observed that the car theft is a global
problem. No one likes his or her car to become stolen. Insurance companies also sense the pressure as they have
to pay the claims made by the clients. As a result ,the insurance companies have to increase the insurance
premium. As soon as this happened only a small percentage of people could afford a good insurance premium.
Increase of the insurance premium also due to the lack of security system installed to the car .Car manufacture rs
installed a minimum standard security system such as an alarm based security system. This device is not
operational sufficient. It does not have any pager system attached to this one. The car thief takes only a few
minutes to deactivate the security system. Nobody will pay an attention when the car alarm goes off.
So it is proposed that a GSM-based vehicle anti-theft system progress is designed and developed to
improve the presentation of the current automobile security system.

1.3 Objective

The projected security system for smart cars used to avoid them from theft using AVR microcontroller.
This system is use to provide the locking and unlocking system through OTP sent to user through GSM
technology .This method makes use of an embedded chip that has an sensor, which senses the key through
insertion and sends an OTP to the owners mobile the user have to enter the identical password which is sent to
the authorized mobile number then vehicle will be started .In case if the user be unsuccessful to enter the
correct password in three trials, then it is treated as theft situation a text message is sent to the owner ,a close
relative or friend and police with the vehicle number .Further the fuel injector of the car disabled so that the user
cannot start the car by any means. In addition it can also helpful in detecting fuel theft from the vehicle by
monitoring fuel level in the vehicle.
The following works were carried out, in order to achieve the objectives of the project .

1. Design and develop the hardware of the proposed system.

2. Develop a control program of the proposed system.

3. Appropriate selection of OTP Algorithm and implementation.

4. Conduct appropriate tests for the proposed system.

2. EXISTING SCENARIOS

2.1 The Available Control System In The Market

Data such as global position, speed and velocity of the vehicle is transmitted over the cellular network
to the users private account ,so the user can get to know about the vehicle and can give command to the ve hicle
such as stopping the vehicle ,door lock etc through the PDA devices or mobile phones.

Other systems include an in vehicle anti-theft component [1]that will not enable the functions of the
applications if it should find itself is illegally moved to one more car. There are numerous remote controlled
security systems that restricts key auto systems of automobile through remote control when it is stolen .The

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

restriction for first system is that it needs a secure processor and smart card chips to store in the Group
Identification Number, and second type of system needs secure vehicle-vehicle communications.

2.2 Disadvantages Of The Existing System


Due to the inefficient conventional car security alarm system, the possibility of the car can be stolen is
great as that the alarm is limited to the audible distance. Somehow if there is another way of transmitting the
alarm to the car owner that is not limited to the audible and line of sight, the system can be upgraded, SMS is a
good choice of the communication to replace the typical alarm, because it can be done and does not require
much cost.
Although most of people know GPS can provide more security for the car but the main reason people
does not apply it because the cost. Advance car security system is too costly, as the cost for the gadget is too
high. Beside that, people also must pay for the service monthly .

3. PROPOSED WORK

In this project we present a novel antitheft control system for automobiles that tries to prevent the theft
of a vehicle. This system makes use of an embedded chip that has an infra -red sensor, which senses the key
during insertion and sends an OTP to the owners mobile the u ser have to enter the same password which is sent
to the authorized mobile number then vehicle will be started.

If the user fails to enter the correct password in three trials, then it is treated as theft condition a text
message is sent to the police with the vehicle number . The message is also sent to the owner about the
unauthorized usage. Further the fuel injector of the car deactivated so that the user cannot start the car by any
means.

In addition to it can also helpful in detecting fuel theft from t he vehicle by monitoring fuel level in the
vehicle.

POWER SUPPLY LCD


AVR
DOOR SENSOR
MICRO
CONTROLLER
ACTUATOR FLOW
4*4 KEYPAD (FUEL KNOB )

GSM
MODEM
FUEL LEVEL
SENSOR

Fig-3.1: Basic block diagram

3.1 Hardware Requirement:-

Micro-controller(avr atmega16)

Door sensor(infra-red sensor)

Fuel level detector sensor

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

4*4 keypad(alpha numeric keypad)

LCD LM016L

L293D IC (motor driver ic)(it is used for opening and closing of door)

Max232IC serial communication interface(USART)

7805 Voltage Regulator

Power supply

GSM module

3.2 Software Requirement:-

Code Vision Avr

Protecus Design Suit

4.IMPLEMENTATION

Implementation is the stage of the project when the theoretical design is turned out into a working
system, Therefore it can be measured to be the most serious stage in attaining a positive successful new
system and in giving the user confidence that the new system will definitely work and be effective .The
implementation stage involves careful planning, scheduling ,forecasting, investigation of the existing system and
its constraints on implementation of application along with designing of methods to achieve changeover and
evaluation of changeover methods.

4.1 Modules

4.1.1 Interfacing of LCD with micro-controller

4.1.2Interfacing of Keypad with micro-controller

4.1.3 OTP Algorithm Implementation

4.1.4 GSM Module

4.1.1 Interfacing of LCD with micro-controller:-

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

Fig -4.1: Interfacing of LCD with micro-controller

Here, the LCD is connected to Port C (PC.0 to PC.7) of the microcontroller. It is used to display messages
(either error or accepted). Fixed value resistor of 100R connected to Pin3 of LCD, is used to control t he
brightness of LCD. A liquid crystal display is a low cost, low power device capable of displaying text and
images. LCDs are extremely common in embedded systems; since such systems often do not have video
monitors like those that Come standard with des ktop systems.

4.1.2 Interfacing of Keypad with micro-controller:-

Keypad Used Here For Inputting The Data Is Of The Form (4 4) Matrix Board, Which Is Used To Connect To
Port B Of The Microcontroller .It is used to input the password for validation purpos es. a (4 4) matrix
connected to port b. The Row 1 to 4 are connected to an Port b.0 to port b. 3 and the columns are Connected to
port b.7 to port b .4 . If no key has been pressed, reading the input port will yield 1s for all columns since they
are all connected to high (vcc). If all the rows are grounded and a key is pressed, one of the columns will have 0
since the key pressed provides the path to ground. It is the function of the microcontroller to scan the keyboard
continuously to detect and identify the key pressed.

4.1.3 HMAC-Based One -Time Password Algorithm

HMAC uses the following parameters: B Block size (in bytes) of the input to the Approved hash function. H An
Approved hash function. I pad Inner pad; the byte x36 repeated B times. K Secret key shared between the
originator and the intended receiver(s)[4].

K0 The key K after any necessary pre-processing to form a B byte key.

L Block size (in bytes) of the output of the Approved hash function.

O pad Outer pad; the byte x5c repeated B times.

t The number of bytes of MAC.

text The data on which the HMAC is calculated; text does not include the padded key. The length of text is n
B
bits, where 0 n < 2 - 8B.

x N Hexadecimal notation, where each symbol in the string N represents 4 binary bits.

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

|| Concatenation

Exclusive-Or operation.

HMAC SPECIFICATION
To compute a MAC over the data text using the HMAC function, the following operation is
performed:

MAC(text)t = HMAC(K, text)t = H((K0 o pad )|| H((K0 I pad) || text))t

Fig illustrates the step by step process in the HMAC algorithm[4]

FIG -4.2: STEPS OF HMAC ALGORITHM

HASH FUNCTION :-SHA-1

SHA stands for Secure Hash Algorithm

SHA-1 produces a 160-bit (20-byte) hash value. A SHA-1 hash value is typically rendered as
a hexadecimal number, 40 digits long.
SHA-1 is the most widely used of the existing SHA hash functions, and is employed in several widely
used applications and protocols.

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

Which generates/verifies the signature for the message.


Runs in 80 rounds

SHA1 ALGORITHM STEP WISE

STEP 1:APPEND PADDING BITS

STEP2:APPEND LENGTH

STEP3:INITIALIZE MD BUFFER

STEP4:PROCESS MESSAGE IN 512 BIT (16 word)BLOCK

Fig -4.3 :SHA-1 Compression function

The operations of the Functions f1, f2, f3, f4 can be expressed by the following diagram[5]:

where t is equal to the step number and f can be expressed as:

f1 = f(t, B, C, D): (B AND C) OR (B` AND D)

f2 = f(t, B, C, D): B + C + D

f3 = f(t, B, C, D): (B AND C) OR (B AND D) OR (C AND D)

f4 = f(t, B, C, D): B + C + D

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

Fig -4.4 : Elementary SHA Operation single step[5]

4.1.4 GSM (Global System For Mobile Communication)Module

GSM modem is a specific type of modem which accepts a SIM card, and works over a subscription to
a mobile operator, just like a mobile phone .When a GSM modem is connected to a computer, this allows the
computer to use the GSM modem to communicate over the mobile network. From the mobile operator
perspective, a GSM modem looks just like a mobile phone While these GSM modems are most frequently used
to provide mobile internet connectivity, many of them can also be used for sending and receiving SMS and
MMS messages[2].

Fig-4.5: GSM Modem

Introduction to AT Commands

AT commands are instructions used to control a modem. AT is the abbreviation of


ATTENTION. Every command line starts with "AT" or "at". That's the reason modem commands are called
AT commands. Many of the commands that are used to control wired dial-up modems, such as ATD (Dial),
ATA (Answer), ATH (Hook control) and ATO (Return to online data state) are also supported by GSM modems
and mobile phones.

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

Besides this common AT command set, GSM modems and mobile phones support an AT command set
that is specific to the GSM technology, which includes SMS-related commands like AT+CMGS (Send SMS
message), AT+CMSS (Send SMS message from storage), AT+CMGL (List SMS messages) and AT+CMGR
(Read SMS messages).

It should be noted that the starting "AT" is the prefix that informs the modem about the start of a
command line. It is not part of the AT command name. For example, D is the actual AT command name in ATD
and +CMGS is the actual AT command name in AT+CMGS[3].

5.RESULT ANALYSIS AND DESCUSSION

5.1 COST ANALYSIS OF THE PROPOSED SYSTEM


Microcontroller Unit= Rs. 200

Keypad=Rs.150

LCD Screen(16*2)=Rs.140

GSM Module=Rs.1200

Other ICs=Rs.610

Total Cost= Rs . 2,300

5.2 SIMULATION RESULTS

Fig -5.1:SIMULATION CIRCUIT DIAGRAM

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

Fig -5.2 :OTP GENERATION SCREENS HOT

Fig- 5.3 :ENTER PASSWORD SCREENS HOT

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

Fig -5.4 :WRONG PASSWORD SCREENSHOT

Fig -5.5: SENDING ALERT MESSAGE TO OWNER

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

Fig -5.6 :ACCESS SCREENS HOT

Fig -5.7: FUEL THEFT FOUND MESSAGE TO OWNER

6. CONCLUS ION
The developed system is powerful enough to control theft of vehicle and fuel theft from the vehicle .In
future we can developed mobile application in order to handle whole system remotely and can work on multi
level security so as to make system more effective ,competent and secure.
Image Based Password Authentication can be done in order to provide additional future.

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]


International Journal of Research In Science & Engineering e-ISSN: 2394-8299
Volume: 1 Issue: 4 p-ISSN: 2394-8280

REFERENCES
[1] Vinoth Kumar Sadagopan,Upendran Rajendran,

Albert Joe Francis,Anti Theft Control System Design Using Embedded System,Vehicular Electronics and
Safety (ICVES), 2011 IEEE International Conference

[2] Mohd Rosmanizam Bin Hamad Rodzi,An Enhancement Of Vehicle Security Alarm System Via Sms

https://ir.uitm.edu.my/679

[3] Divya Jadhav ,B. Mounika ,Smitha Panchal ,

S. Sirisha Advanced Vehicle Security System With Theft Control And Accident Notification

https://grietinfo.in

[4]The Keyed-Hash Message Authentication Code (HMAC)

csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf

[5] Cryptography And Network Security Principles And Practice Fifth Edition William Stallings.

[6] Car Cost analysis given by

http://cars.about.com/od/helpforcarbuyers/tp/Cheapest_09.htm

[7] Raj Kamal Embedded Systems architecture , programming and designSecond Edition 2009

[8] Recent car theft statistics as given

https://en.wikipedia.org/wiki/Motor_vehicle_theft

IJRISE| www.ijrise.org|editor@ijrise.org [53-65]

You might also like