You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/322486605

Design and Fabrication of a Password Protected Vehicle Security and


Performance Monitoring System

Conference Paper · December 2017


DOI: 10.1109/R10-HTC.2017.8289022

CITATIONS
READS
0
2,218

3 authors:

Safayet Khan
Obaidur Rahman
Bangladesh University of Engineering and
Technology Bangladesh University of Engineering and Technology

2 PUBLICATIONS 5 CITATIONS 1 PUBLICATION 0 CITATIONS

Md Ehsan
Bangladesh University of Engineering and Technology
23 PUBLICATIONS 213 CITATIONS

Some of the authors of this publication are also working on these related projects:

Score Stove View project

UN-ESCAP View project

All content following this page was uploaded by Safayet Khan on 14 January 2018.
The user has requested enhancement of the downloaded file.
2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)
21 - 23 Dec 2017, Dhaka, Bangladesh

Design and Fabrication of a Password Protected


Vehicle Security and Performance Monitoring System
Safayet Khan∗ , Obaidur Rahman† and Md. Ehsan‡
Department of Mechanical Engineering, Bangladesh University of Engineering and Technology
Dhaka, Bangladesh
Email: ∗ ratulme12@gmail.com, †xionrahman.buet@gmail.com, ‡ehsan@me.buet.ac.bd

Abstract—Vehicle security has been one of the most pressing a vulnerable issue which created the urge of developing new
concerns for the last few years. There has been a number of security system.
researches to increase the security of the vehicle. This paper
Security and performance monitoring system of a vehicle
presents the design and fabrication process of a security system
for vehicles using a password protected initiation. A simple goes hand in hand. The most important component of a vehicle
portable hardware module has been made by assembling a liquid performance monitoring system is the speedometer. Tradi-
crystal display (LCD), a 4*4 matrix membrane keypad and a tional speedometers are very expensive. Although the low-
relay switch on a printed circuit board (PCB). The whole system cost speedometers based on Infrared Radiation (IR) are very
works on an intricate algorithm implemented in an Arduino
processor. The fuel injection in the engine of the vehicle is
accurate but they are very vulnerable in nature. Any sort of
controlled by the relay added in the fuel line near the fuel pump disturbance in the path of radiation results in inaccuracy. This
and switches on only when the owner of the vehicle enters the necessitated the fabrication of a cost-effective performance
correct password in the module. The module acts as an extra monitoring system.
keylock for the engine in addition to the ignition key. Along
with the security system, a cost-effective performance monitoring II. EXISTING SYSTEMS
system is fabricated by using proximity switch which acts as a
motion sensor and shows the speed of the vehicle at any instant Most of the modern vehicles are entrenched with many anti-
in the display. The two projects has been crafted into a state theft systems. Different systems like an Engine Control Unit
of the art system which remains active even after the ignition (ECU) connected to the Info-Security Circuit Board and sen-
key is bypassed. This significantly improves the security and sors inside the vehicle, in-vehicle engine immobilizer, smart
surveillance concerns of the vehicle and in turn prevents any card interface with vehicle [2], Global Positioning System
sort of theft or insecurities of the vehicle. This paper gives an
optimum insight on the amount of work done on the project and (GPS) [3], Radio Frequency Identification (RFID) [4] used in
presents an extensive view on the scope of betterment that can Intelligent Computerized Anti-theft (ICAT) system, Real Time
be done to this project. Biometrics based security system [1] and auto cop mechanism
Keywords—Encrypted Initiation, Password Protection, Fuel which is a video surveillance solution etc. has been developed
Pump, Arduino, Proximity Switch, Vehicle Security, Vehicle till the date. All of these systems have different shortcomings.
Surveillance
There is data timeliness and network delays, lack of secure
processor and smart card chips, possible signal degradation,
I. INTRODUCTION
key malfunction and different natural factors like light,
At present, vehicle thefts are increasing at a startling rate rainfall, fog and snowfall [5] acting as setbacks. Furthermore,
around the globe. Statistics on vehicle theft across various these commercially available products are over-priced. Hence
countries are shown in table [1]. a comparatively inexpensive attempt to design and develop an
efficacious vehicle theft control scheme using is done [6].
Countries Vehicle Thefts Year
The conventional speedometers which are based on infrared
Italy 196,589 2012
radiation, Hall effect, rare earth magnet, encoder possess sim-
United States 721,053 2012
ilar predicaments when it comes down to cost-effectiveness.
Brazil 185,288 2013
The ones that are more effective cost higher and vice versa.
India 147,475 2012
So the fabrication of a cost-effective speedometer is done
United Kingdom 179,829 2011
and integrated with the security system in a module for both
With the increasing vehicle theft, the prime concern for security and surveillance of the vehicle [7]. The module is an
vehicle safety and surveillance is arising. The primary security embedded system for vehicles. It continuously stores all sort
system for a vehicle is its unique ignition key. Ignition key of data from the vehicle. The three major objectives are:
system uses unique key for every car and it is associated • To ensure an encrypted starting system for a vehicle
with a number of wires. By disconnecting the wires from to strengthen the security
the ignition key and through combination of certain set of • To monitor performance of the vehicle
wires a car can be started without being bothered about the • To develop an attachable module for the vehicle to
unique ignition key. Thus safety of the automobile has become ensure above two objectives

978-1-5386-2175-2/17/$31.00 ©2017 IEEE

56
III. SECURITY S YSTEM USING PASSWORD PROTECTED a buzzer, a potentiometer and LEDs were used in the system.
INITIATION For the simulation purposes Autodesk Circuit was used which
A. Methodology is an online simulator.
A password protected relay switch is installed in between C. Algorithm
the battery and the Electronic Fuel Injection (EFI) pump The algorithm for the work flow process is shown in the
(shown in Fig. 1). When ignition key is turned on, rather than block diagram (shown in Fig. 3). There are three main
powering the EFI pump the password panel is powered. As the working processes here:
installed relay is normally open (NO), no current flows • Entering a password
through the relay to the pump. Hence, the pump does not • Changing the password
supply fuel to the engine even if the battery supplies power. • Entering a master password in case one forgets the
The buzzer sets off an alarm when the given password does previously set password
not match the set password for three consecutive times. Only Each individual device is assigned a unique master pass-
when correct password is provided, the relay switch is closed word. In case the owners of the vehicle forgets their own
and current flows through it to start the EFI pump which starts password, they can override the system through entering the
the engine of the vehicle. master password.

Fig. 1. Proposed Password Protected Fuel Injection System.

B. Simulation
A simulation circuit was built (shown in Fig. 2) including
all the major components of the proposed security system and
the corresponding parts of the algorithm of the system was run
in the simulator. The simulation ran successfully necessitating
the real life development of the security system. Instead of
using Arduino MEGA as used in the main system, Arduino
UNO was used in this simulation. A 4*4 Matrix keypad, an
LCD,

Fig. 3. Algorithm of the Vehicle Security System.

D. Schematic Design of PCB for the Security System


This circuit for the security system was designed (shown
in Fig. 4) in PROTEUS software [8]. A 7805 IC is used to
convert the voltage from a 12V Lithium polymer battery
which replicates the 12V power system of the vehicle into 5V
and this is the logic voltage of the system. A DPDT button is
Fig. 2. Proposed Circuit Diagram of Security System. used to switch the circuit on or off.
Both security and monitoring system have some common
components like Arduino, LCD and same power system etc.
The additional components are a proximity switch, poten-
tiometer, an L298 motor driver module and a 12V 600 rpm
micro metal gear motor (shown in Fig. 5).

C. Study of Performance
The performance comparison between the speedometer data
and the tachometer data of the setup during the rotation of the
motor is demonstrated in the graph (shown in Fig. 6). This
graph shows that the fabricated speedometer performs in a
very accurate manner similar to that of the tachometer [10].
The variation of data of the speedometer and tachometer with
Fig. 4. Schematic Design of PCB in PROTEUS Software. the corresponding variation in Pulse Width Modulation
(PWM) when the motor rotates is shown in this graph. The
graph also shows that the data available from the speedometer
IV. FABRICATION OF A COST -EFFECTIVE P ERFORMANCE and a standard tachometer has very small deviation. The motor
MONITORING SYSTEM used for demonstration had a maximum speed of 600 rpm. So
A. Methodology the deviation of reading is shown upto that limit of rotating
speed.
The most integral part of a vehicle performance monitor-
ing system, a speedometer is developed using a proximity
switch [9] which acts as a motion sensor. The proximity
switch senses distances to objects by generating magnetic
fields through solid state sensing. A coil of wire is charged
with electrical current, and an electronic circuit measures this
current. If a metallic part gets close enough to the coil, the
current will increase and the proximity switch will open or
close accordingly. The proximity switch is used to measure
the rpm of the rotating wheels. It is placed in proximity to a
pointer attached to the wheel. The pointer is a protruding in
the wheel surface. So, during the rotation of wheel whenever
the pointer gets close to the switch, it will generate a signal Fig. 6. Error band of speedometer with respect to tachometer.
which when analyzed gives the accurate speed of the vehicle.
B. Schematic Design of Printed Circuit Board (PCB) for V. O RIGINAL PROTOTYPE
the Performance Monitoring System
The design of the security system is shown in Fig. 7.
The PCB for the system is double layered with a 6.15in x
4.9in dimension. On the top side of the module the keypad,
the LCD, LEDs and battery and on the bottom side the
Arduino is placed. The major components of the module can
be dissembled from the board making it a portable module.

Fig. 5. Schematic Design of PCB in PROTEUS Software.


Fig. 7. Labelled Design of Security System.
2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)
21 - 23 Dec 2017, Dhaka, Bangladesh

The design of the performance monitoring system is shown which (s)he can change later on. Once the password is set the
Fig. 8. The PCB is double layered of 7.75in x 5.3in dimension. module is good to go. In case the owner forgets the current
The motor, motor driver and proximity switch are placed on password, a unique master password is given to overwrite the
the upper side of the PCB. The major components of this current password. Every time the owners want to start the
module can be dissembled from the board making it a portable car, (s)he has to put in the password. The ignition system of
module as well. A motor and an L298 motor driver is installed the vehicle will repudiate to start until the given password
for demonstration purposes. matches the preset password. A full functional performance
monitoring system which includes speedometer is fabricated
at a very low cost using the proximity switch. In perspective
of the Bangladesh, this is a very crucial and sophisticated
part. Most of the public vehicles (CNGs, Taxis etc.) in the
subcontinent lacks a decent speedometer that relays absolute
information about its speed. With the module comes an ardent
solution to such a plight.
The module manufactured will help in pruning the current
hurdles associated with the transportation sector of
Bangladesh to some extent. Although this module is well
working there’s scope for enhancement for the module:
• The speedometer data from the module can be relayed to
a distant device through usage of Wi-Fi.
• A mobile application can be developed to track down the
vehicle [11] [12] and receive real-time data from module.
Besides the mobile app can be developed to such an
extent that the password can be overrode.
Fig. 8. Labelled Design of Performance Monitoring System. • For commercial purposes, the system can be designed in
stronger way and marketed as an industrial package.
The integrated system prototype is shown in Fig. 9. It has
REFERENCES
all the components of both security and monitoring system in
one layout. This module can be easily attached to a vehicle [1] N. Kiruthiga, S. Thangasamy et al., “Real time biometrics based vehicle
security system with gps and gsm technology,” Procedia Computer
dashboard. Besides private cars, the module can also be Science, vol. 47, pp. 471–479, 2015.
installed in different types of vehicles like CNG, Bus, Truck [2] S. Z. M. Muji, M. H. A. Wahab, M. A. b. M. Zin, and J. Ayob,
and motorcycle etc. “Simulation of smart card interface with pic for vehicle security
system,” in Computer and Communication Engineering, 2008. ICCCE
2008. International Conference on. IEEE, 2008, pp. 878–882.
[3] R. Ramani, S. Valarmathy, N. SuthanthiraVanitha, S. Selvaraju,
M. Thiruppathi, and R. Thangam, “Vehicle tracking and locking system
based on gsm and gps,” International Journal of Intelligent Systems and
Applications, vol. 5, no. 9, p. 86, 2013.
[4] K. Finkenzeller, RFID handbook: fundamentals and applications in
contactless smart cards, radio frequency identification and near-field
communication. John Wiley & Sons, 2010.
[5] C. Peijiang and J. Xuehua, “Design and implementation of remote
monitoring system based on gsm,” in Computational Intelligence and
Industrial Application, 2008. PACIIA’08. Pacific-Asia Workshop on,
vol. 1. IEEE, 2008, pp. 678–681.
[6] A. Leni et al., “Instance vehicle monitoring and tracking with internet
of things using arduino.” International Journal on Smart Sensing &
Intelligent Systems, vol. 10, 2017.
[7] M. Kumar and T. Kim, “Dynamic speedometer: dashboard redesign to
discourage drivers from speeding,” in CHI’05 extended abstracts on
Human factors in computing systems. ACM, 2005, pp. 1573–1576.
[8] W. M. C. Lin, “Design and simulation of led display based on proteus
Fig. 9. Design of Integrated System Prototype. [j],” Microcomputer Information, vol. 16, p. 098, 2008.
[9] W. Steinegger, “Proximity switch,” Apr. 12 1983, uS Patent 4,380,007.
[10] R. Bonert, “Design of a high performance digital tachometer with a mi-
VI. CONCLUSION AND RECOMMENDATION crocontroller,” IEEE Transactions on Instrumentation and
Measurement, vol. 38, no. 6, pp. 1104–1108, 1989.
The attachable module created for a certain vehicle helps [11] H. Alshamsi, V. Ke¨ puska, and H. Alshamsi, “Real time vehicle
the owner to set up a password protected initiation of the tracking using arduino mega,” International Journal of Science and
vehicle. At the initial phase of installation of the module in the Technology, vol. 5, no. 12, 2016.
vehicle the owner gets to set up a security password for the [12] W. W. Brown, “Automobile tracking and anti-theft system,” May 21
2002, uS Patent 6,392,565.
module

57
View publication stats

You might also like