You are on page 1of 50

Vehicle theft detection and tracking notification with remote engine locking

CHAPTER-1 INTRODUCTION

1.1 INTRODUCTION TO THE PROJECT

In recent years vehicle theft has become a significant issue which should be traced
and detected. The safety and security of the vehicle is essential. Even there are many
existing mechanisms this have some limitations and high cost. So, an efficient
security mechanism is needed. This project detects vehicle theft. Arduino is the main
component which is used to user interface DC motor and GPS, GSM. The place of
the vehicle detected using Global positioning system (GPS) and Global system mobile
communication (GSM) with the help of Wi-Fi module ESP 8266. GPS is a
spacebased navigation system used to track the vehicle and it gives the location of the
stolen device in all weather conditions.

It gives the latitude and longitude co-ordinates of the device using GPS antenna.
GSM is a specialized type of modem it accepts a SIM card, and operates like a mobile
phone. It is used to provide information to the user and alert him with a message
having latitude and longitude of the vehicle. This total system is operated with a
switch which is made on, when we park the vehicles out. Now if the vehicle theft
happened, dc motor starts, the above procedure continues and the information is
posted using internet of things. This vehicle theft prevention and tracking system is
used in client’s vehicle as a theft prevention and rescue device.

is increasing day by day. The automobile manufacturers are try to improve the
security features of their products by introducing advanced technologies to avoid the
thefts particularly in the case of cars. Despite the various technologies that have been
introduced in recent years to deter car thefts and tracking it, It was reported that as
many as cars were stolen yearly in the world. According to the National Crime
Information Centre (NCIC), in 2006, 1,192,809 motor vehicles were reported stolen,
the losses were 7.9$ billion. Several security and tracking systems are designed to aid
corporations with large number of vehicles and several usage purposes.

Dept of ECE, TKRCET 1


Vehicle theft detection and tracking notification with remote engine locking

A fleet management system can minimize the cost and effort of employees to
complete road assignments within a minimal time. Besides, assignments can be
scheduled in planed based on, current vehicles location. Therefore, central fleet
management is essential to all large enterprises to meet the varying requirements of
customers and to improve the productivity. However, there are still some security
gaps where these technologies can't prevent a vehicle from theft, don‘t assist to
recover it and don‘t allow the users to know the status of their vehicles. They can‘t
permit the user to communicate with the vehicle online, even if the user is certain that
his vehicle was stolen. In wireless data transporting, it is a common feature with all
mobile network service providers. Utilization of WIFI technology has become
popular because it is low cost, convenient and accessible way of transferring and
receiving data with high reliability

CHAPTER-2 LITERATURE SURVEY

Dept of ECE, TKRCET 2


Vehicle theft detection and tracking notification with remote engine locking

With the advancement of innovation in the recent years, various systems and
developments are utilized in different fields. Vehicle burglary discovery focuses
essentially on the different lock framework or observing and controlling of vehicle
from a far off area. These kinds of gadgets can't be for all intents and purposes
inferred as there are different deficiencies and the rationales should be reconsidered.
A sensor based vehicle burglary discovery framework alongside certain highlights
like fire identification is executed in the vehicle.

Two android gadgets speak with one another one from the vehicle and the other is
with the proprietor of the vehicle. A secret phrase lock is utilized to control the
vehicle. At the point when a client attempts to get to the vehicle the proposed utilizes
should be approved really at that time the vehicle start can be turned on. Steady
observation of any article is kept up on vehicle. Distant checking of vehicle is spilled
through the observation cushion.

An occasion discovery module consists of occasion location sensor and occasion


recognition rationale. At whatever point the start is begun the area is refreshed in the
cushion. Secret phrase locks with distant start remove components are utilized with
the regulator of the vehicle. Assuming any inaccurate secret word is experienced
multiple occasions, the motor is cut off and the vehicle can't be gotten to any longer.
At the point when any occasion of robbery has happened is cautions the close by
client with a signal sound. Face acknowledgment systems are utilized when the motor
is turned over an image is caught and shipped off the proprietor of the vehicle. This
individual can confirm the client and recognize if the vehicle is taken. The picture is
put away in the compacted design and just when the picture is checked is vehicle's
start can be empowered.

VEHICLE TRACKING AND ANTI-THEFT SYSTEM USING INTERNET OF


THINGS, The framework developed successfully gives a use of associated gadgets or
Internet of things in Transportation. The Modules like GPS and GSM are assist us with
following the area of vehicle utilizing the GPS antenna in the vehicle. Since, utilization of
this open source technologies makes system financially savvy and easy to understand.
Versatile organization suppliers gave the security standards and subsequently security is
very good.[6]

Dept of ECE, TKRCET 3


Vehicle theft detection and tracking notification with remote engine locking

With the help of Raspberry Pi, checking and tracking gets conceivable, System plays
a significant role in controlling and tracking vehicle live. At whatever point there is
vehicle theft situation or vehicle's mishap situations occur, the proposed system gives
the vehicle's present location, speed to the vehicle proprietor's portable. One of the
advantage is live tracking of vehicle prior. There is concern that arrangement is given
to a student according to circumstances.

Handling of data is finished by GPS device: Vehicle tracking is reflecting situation,


System mirroring the tracking scenario of a vehicle by using SPSS. The position of
vehicle as scope latitude and longitude not analysed through investigation report table
as well as tracked by line chart respect to time. The movement of vehicle as speed not
only analyzed through the report table as well as tracked by line chart concerning
time. various inputs regarding efficiency in tracking task has been recognized during
the data analysis.

4. Advance innovations like GPS/GSM/GPRS and android application are possible,


this paper has describe the design and execution of our vehicle tracking system. server
and cell phone applications make the tracking system more

CHAPTER-3 BLOCK DIAGRAM


3.1 WORKING PRINCIPLE
Vehicle theft has become a major issue, which should be traced and prevented.
The proposed system overcomes most of the limitations and the cost effectiveness
and also reducing complications by making use of few high quality products like

Dept of ECE, TKRCET 4


Vehicle theft detection and tracking notification with remote engine locking

ignition key. In proposed method we have 4 pin Push button Patton based
unlocking system to turn ON the ignition. This system activates only when the GPS
module is gets activated and this extension for controlling mechanisms which
remotely locks the vehicle engine and prevents the theft. In proposed technique,
user can start/stop the vehicle either by using the android application or by the
ignition keypad based security unlocking system..

3.2 BLOCK DIAGRAM

CHAPTER-4 HARDWARE COMPONENTS

4.1 SYSTEM HARDWARE DESIGN

The monitoring system contains several components. This chapter gives a detailed
review of each of this part along with its working.

Dept of ECE, TKRCET 5


Vehicle theft detection and tracking notification with remote engine locking

4.1.1 POWER SUPPLY


The Power supplies are designed to convert high voltage AC mains electricity
to a sustainable low voltage supply for electronic circuits and other devices. A
power supply can be divided into a series of blocks, each of which performs a
particular function. A DC power supply which maintains the output voltage
constant irrespective of AC mains.

The 5V regulated power supply system as shown in below:

Block Diagram of

Power Supply

As shown in the figure above, this circuit is a way to obtain DC 12V and 5V DC
power. This circuit uses two integrated circuits 7812 (IC1) and 7805 (IC2) to obtain
the required voltage. The AC power supply voltage will be reduced by the
transformer T1, filtered and rectified by the capacitor C1 to obtain a constant DC
level. IC1 regulates this voltage to bypass B1 to obtain a constant 12V DC. The
output of IC1 will be regulated by IC2 to obtain a constant DC voltage of 5V at its
output. In this way 12V and 5V DC are obtained. This type of circuit is very useful
when we need two DC voltages to run the circuit. The LM78XX series of three
terminal positive regulators are packaged in TO-220 with multiple fixed output
voltages and can be used in a wide range of applications. Each type uses internal
current limit, thermal shutdown, and safe operation area protection, making it
basically indestructible. If they provide enough heat dissipation, they can provide
more than 1A of output current. Although primarily designed as fixed voltage
regulators, these devices can be used with external components to obtain adjustable
voltage and current. The power supply part is the part that provides +5V power
supply for the components. The IC LM7805 is used to provide a constant +5V power
supply. The AC voltage (usually 220 V) is connected to the transformer to reduce the

Dept of ECE, TKRCET 6


Vehicle theft detection and tracking notification with remote engine locking

AC voltage to the required DC output level. The diode rectifier then provides a
fullwave rectified voltage, which is initially filtered through a simple capacitor filter
to generate a DC voltage. The resulting DC voltage usually has some AC voltage
fluctuations or changes. Even if the input DC voltage changes or the load connected
to the output DC voltage changes, the voltage regulator circuit will eliminate the
ripple and keep the same DC value. This voltage regulation is generally
accomplished using a popular voltage regulator IC unit.

Transformer

Transformers convert alternating current from one voltage to another with almost
no power loss. The transformer only works on alternating current, which is one of
the reasons why the grid is alternating current.

The step-up transformer steps up the voltage, and the step-down transformer
steps down the voltage. Most power supplies use step-down transformers to
reduce the dangerous high supply voltage (230V in India) to a safer low voltage.
The input coil is called as the primary and the output coil is called the secondary.
There is no electrical connection between the two coils; instead, they are
connected by an alternating magnetic field generated in the soft iron core of the
transformer. The transformer wastes very little energy, so the output energy is
(almost) equal to the input. Note that as the voltage decreases, the current
increases. The transformer reduces the supply voltage (0-230 V) to (0-6 V) level.

Dept of ECE, TKRCET 7


Vehicle theft detection and tracking notification with remote engine locking

Then connect the secondary of the voltage transformer to the rectifier bridge,
which is constructed with the help of PN junction diodes. The advantage of using
a bridge rectifier is that it can provide a DC peak voltage output.

Rectifier

There are several ways to connect diodes to make a rectifier that converts
alternating current to direct current. The bridge rectifier is the most important, it
produces a full-wave variable DC. If you use a center tapped transformer, you can
also use only two diodes to make a full-wave rectifier, but this method is rarely
used now because the diodes are cheaper. A single diode can be used as a
rectifier, but it uses only the positive (+) part of the AC waveform to generate a
DC variable half-wave

Bridge Rectifier
When four diodes are connected as shown, the circuit is called a rectifier bridge. The
input of the circuit is applied to the diagonal of the network, and the output comes
from the remaining two corners. Assuming that the transformer works normally,
point A is a positive potential, point B is a negative potential, and the positive
potential of point A will drift forward by D3 and backward by D4.

Bridge rectifier

Dept of ECE, TKRCET 8


Vehicle theft detection and tracking notification with remote engine locking

The negative potential at point B will forward D1 and reverse D2. At this time, D3
and D1 are forward biased to allow current to flow; D4 and D2 are reverse biased to
prevent current flow.
One advantage of the bridge rectifier over the traditional full-wave rectifier is that for
a given transformer, the voltage output produced by the bridge rectifier is almost
twice that of the traditional full-wave circuit. Chapter
I. The main advantage of this bridge circuit is that it doesn’t require a special center-
tapped transformer, thereby reducing its size and cost
II. The single secondary winding is connected to one side of the diode bridge
network and the load is connected to the other side
III. The result is still pulsating DC, but the frequency is doubled.

Output
Waveform Of
DC

Smoothing
Smoothing is completed by the large-capacity electrolytic capacitors connected to
both ends of the DC power supply, which act as a reservoir and provide current to the
output when the variable DC voltage of the rectifier drops. The capacitor quickly
charges around the peak of the variable DC, and then discharges when supplying
current to the output.

Dept of ECE, TKRCET 9


Vehicle theft detection and tracking notification with remote engine locking

Voltage Regulators

Voltage regulators include a class of widely used integrated circuits. The


voltage regulator IC unit contains circuits for reference source, comparator
amplifier, control equipment and overload protection in a single IC. The IC unit
provides adjustment to a fixed positive voltage, a fixed negative voltage, or an
adjustable adjustment voltage. A voltage stabilizer can be selected for

operation. Charging current ranges from hundreds of milliamps to tens of


amps, corresponding to the milliwatts to tens of watts rating. A fixed
threeterminal regulator has an unregulated DC input voltage Vi, applied to an
input terminal, from the second terminal to a regulated DC output voltage Vo, the
third terminal is grounded. The
78 Series regulators provide a fixed positive regulated voltage of 5 to 24 volts.
Similarly, the 79 series regulators provide a fixed negative regulating voltage of 5
to 24 volts. Voltage regulator ICs can provide fixed (typically 5, 12, and 15 V) or
variable output voltages. They are also rated according to the maximum current
they can pass. Provide a negative voltage regulator, mainly used for dual power
supplies. Most regulators include some automatic protection against overcurrent
("overload protection") and overheating ("thermal protection").

Many fixed voltage regulator ICs have 3 wires and look like power transistors,
such as 7805 + 5V 1Amp regulators. If necessary, they include a hole to connect
the heat sink.

Dept of ECE, TKRCET 10


Vehicle theft detection and tracking notification with remote engine locking

7805 voltage

NODE MCU :

Node MCU is an open source firmware and development kit that can help you use a
few lines of Lua scripts to build your IoT product prototype. ESP8266 is the name of
a microcontroller designed by Expressive Systems.
This module has a built-in USB connector and a variety of pins. Using a micro USB
cable, you can connect the Node MCU devkit to your laptop and flash it in easily, just
like an Arduino. It also works with breadboard Node MCU out of the box Features:

• Open source
• Interactive
• Programmable
• Low cost
• Simple and easy
• Smart
• Supports WI-FI

ESP8266 INTRODUCTION:

ESP8266 is a low-cost MCU with built-in Wi-Fi. It can be paired with another host
microcontroller (such as Arduino) to provide Wi-Fi network functions for the basic

Dept of ECE, TKRCET 11


Vehicle theft detection and tracking notification with remote engine locking

IoT development platform. In addition, ESP8266 can be used as a standalone MCU,


including a 32-bit 80MHz processor, 16 GPIO pins (enable 4 PWM), and built-in
analog-to-digital converter, SPI and I2C interfaces, etc. … The working voltage of the
MCU is 2.5V-3.6V, and the average working current is 80 mA.

ESP8266 – ESP-12E version

The Node MCU team designed a complete open source development board around
ESP8266, including an additional USB to serial UART adapter, a micro USB port for
programming, and a 3.3v voltage regulator. The Node MCU board is ready to use,

Dept of ECE, TKRCET 12


Vehicle theft detection and tracking notification with remote engine locking

you can connect to the computer, install the USB driver and start programming to
connect to the Wi-Fi network. The average price for all of these on eBay is about $ 4.

ESP8266 – Block Diagram

Features of ESP8266:

• 802.11 b/g/n

• Integrated low-power 32-bit MCU

• Integrated 10-bit ADC

• Integrated TCP/IP protocol stack

• Integrated TR switch, balun, LNA, power amplifier and relative network

• Built-in PLL, voltage regulator and power management unit

• Support antenna diversity

• Wi-Fi 2.4 GHz, support WPA / WPA2

• Support STA / AP / STA + AP operation mode

• Support Android device and iOS Smart Link function

• SDIO 2.0, (H) SPI, UART, I2C, I2S, IR remote control, PWM, GPIO

Dept of ECE, TKRCET 13


Vehicle theft detection and tracking notification with remote engine locking

• STBC, 1x1 MIMO, 2x1 MIMO

• A-MPDU and A-MSDU aggregation and protection range of 0.4 seconds

• Deep suspension Power supply < 5uA

• Activate and transmit data packets <2ms

Dept of ECE, TKRCET 14


Vehicle theft detection and tracking notification with remote engine locking

• Standby power consumption <1.0mW (DTIM3) • +20 dBm output power in 802.11b

mode • Operating temperature range -40C ~ 125C

• FCC, CE, TELEC, Wi-Fi Alliance and SRRC certified

You must hold down the SW2 switch (switch programming) to keep the GPIO-0 pin
grounded. So we can enter the programming mode and upload the code. Once the
code is released, the switch can be released.

ESP8266 Pin Configuration:

ESP8266 Pin Configuration


Pin Pin Alternate Normally used for Alternate purpose
Number Name Name

1 Ground - Connected to the ground -


of the circuit

2 TX GPIO – 1 Connected to Rx pin Can act as a


of programmer/uC General purpose
to upload program
Input/output pin
when not used as
TX

3 GPIO-2 - General purpose -


Input/output pin

4 CH_EN - Chip Enable – Active -

Dept of ECE, TKRCET 15


Vehicle theft detection and tracking notification with remote engine locking

There are many methods and IDEs for ESP modules, but the most widely used is
Arduino IDE. The

ESP8266 module is only suitable for 3.3V, any value higher than 3.7V will kill the
module. Use the FTDI board that supports 3.3V programming to program the ESP-01.
A common problem that everyone faces when using ESP-01 is the ignition problem.
This module consumes quite a lot of power when you are programming, and uses the
3.3V pin on the Arduino to power it, or only uses a voltage divider. Therefore it is
important to make a small voltage regulator for 3.31v that can provide at least 500mA
of current. A recommended regulator is the LM317. Below is a simplified circuit
diagram using the ESP8266-01 module

Dept of ECE, TKRCET 16


Vehicle theft detection and tracking notification with remote engine locking

Circuit diagram

PIEZO-BUZZER

The buzzer or beeper is a voice signaling device, that can be mechanical,


electromechanical or piezoelectric. Typical buzzers and beepers applications include
confirmation of user inputs, such as alarms, timers and mouse clicks or pulsations.
The piezoelectric element can be operated by a vibrating electronics or another source
of audio signal driven by a piezoelectric audio amplifier. The sound is commonly used
to indicate that the button has been pressed is click, ring or beep.
It is most commonly connected to a controller that is generally pressed or
preset, or is generally connected to a controller that illuminates the button light or the
appropriate control panel, usually the appropriate buttons or controls. It consists of
switches or sensors that illuminate the light of the panel and illuminate a warning.

Dept of ECE, TKRCET 17


Vehicle theft detection and tracking notification with remote engine locking

Form in the form of a live sound or continuous or intermittent sound. Initially, this
device was based on an electromechanical system identical to the electrical bell
without a metal gang (sound noise). In many cases, these units were fixed to walls and
ceilings and ceilings and walls used as sound boards. Another implementation that
uses several AC connection devices drives a speaker in trouble and implements
circuits to increase the current to sufficient noise to engage this circuit in a low-cost
8Ω speaker. Nowadays, it is more common to use a piezoelectric probe based on
ceramic as Sonalert making an acute tone. In general, these were connected to the
"driver" circuit that changes the sound tone.

Dept of ECE, TKRCET 18


Vehicle theft detection and tracking notification with remote engine locking

Specifications:
Rated Voltage:
The piezoelectric buzzer is driven by a square wave (V p-p). Operating voltage:

used for normal work. However, there is no guarantee that the minimum sound

pressure level will be reached below nominal voltage. current consumption:

The stable current consumption in normal operation. However, when starting


work, it generally requires three times the current.

Capacitor:

The Piezo Buzzer can generate a higher sound pressure level with a higher

capacitance, but it consumes more power. sound output:

sound output is measured with a decibel meter. Apply a nominal voltage and a
square wave at a distance of 10 cm.

Nominal Frequency:

The buzzer can emit sounds of any frequency, but we recommend that the highest and
most stable sound pressure level comes from the nominal frequency.

Dept of ECE, TKRCET 19


Vehicle theft detection and tracking notification with remote engine locking

working temperature:

keeps working well between -30℃ and +70℃.

RELAY

A Relay is an electromechanical switch, which perform ON and OFF activities


without any human connection. General portrayal of twofold contact hand-off is

Dept of ECE, TKRCET 20


Vehicle theft detection and tracking notification with remote engine locking

appeared in fig. Transfers are utilized where it is important to control a circuit by a


low-power signal (with complete electrical confinement among control and controlled
circuits), or where a few circuits should be constrained by one signal.

Relay

Working
In most of the part, the relay consists of a inductor coil, a spring (not appeared in the
figure), Swing terminal, and two high force contacts named as ordinarily shut (NC)
and typically opened (NO). Hand-off utilizes an Electromagnet to move swing
terminal between two contacts (NO and NC). When there is no force applied to the
inductor curl (Relay is OFF), the spring holds the swing terminal is connected to NC
contact.

Dept of ECE, TKRCET 21


Vehicle theft detection and tracking notification with remote engine locking

Representation of Relay

Whenever required power is applied to the inductor coil, the current flowing through
the coil generates a magnetic field which is helpful to move the swing terminal and
attached it to the normally open (NO) contact. Again when power is OFF, the spring
restores the swing terminal position to NC.

Advantage of Relay:
A relay takes small power to turn ON, however it can handle high force gadgets to
turn ON and OFF. Think about a model; a transfer is utilized to control the roof FAN
at our home. The roof FAN may runs at 230V AC and draws a current limit of 4A. In
this manner the force required is 4X230 = 920 watts. Off base we can handle AC,
lights, and so on, depend up on the hand-off evaluations. Transfers can be utilized to
control DC engines in ROBOTICs.

Relay Driver Circuit:


ULN2003:-
The ULN2003 is a solid IC consists of seven NPN Darlington semiconductor sets with
high voltage and current capacity. It is usually utilized for applications, for example,
transfer drivers, engine, show drivers, driven light drivers, rationale supports, line
drivers, hammer drivers and other high voltage flow applications. It comprises of
normal cathode brace diodes for each NPN Darlington pair which makes this driver
IC valuable for exchanging inductive loads.

Dept of ECE, TKRCET 22


Vehicle theft detection and tracking notification with remote engine locking

The output of the driver is open collector and the gatherer ebb and flow rating of each
Darlington pair is 500mA. Darlington sets might be resembled if higher current is
required. The driver IC likewise comprises of a 2.7KΩ base resistor for each
Darlington pair. Hence each Darlington pair can be worked straightforwardly with
TTL or 5V CMOS gadgets. This driver IC can be utilized for high voltage
applications up to 50V.

Dept of ECE, TKRCET 23


Vehicle theft detection and tracking notification with remote engine locking

Logic Diagram 0f ULN2003


Note that the driver gives open collector output, so it can just sink ebb and flow, can't
source. In this manner when a 5V is given to 1B terminal, 1C terminal will be
associated with ground by means of Darlington pair and the most extreme current that
it can deal with is 500A. From the above rationale graph we can see that cathode of
insurance diodes are shorted to ninth pin called COM. So for driving inductive
burdens, it should interface with the stock voltage.

ULN2003 is generally utilized in hand-off driving and stepper engine driving


applications.

Features
* 500mA appraised collector current (Single output)

* High-voltage output: 50V

* Inputs viable with different kinds of logic.

Dept of ECE, TKRCET 24


Vehicle theft detection and tracking notification with remote engine locking

* Relay driver application

PUSH BUTTONS

A push-button (also spelled pushbutton) or simply button is a simple switch


mechanism for controlling some aspect of a machine or an interaction. Catches are
commonly made out of hard material, normally plastic or metal. The surface is
typically level or formed to oblige the human finger or hand, in order to be handily
discouraged or pushed. Catches are regularly one-sided switches, however even
numerous un-one-sided catches (because of their actual nature) require a spring to get
back to their un-pushed state. Various individuals utilize various terms for the
"pushing" of the catch, like press, push down, crush, and punch.

Uses:

In modern and business applications press catches can be connected together by a


mechanical linkage with the goal that the demonstration of pressing one catch makes
the other catch be delivered. Along these lines, a stop catch can "power" a beginning
catch to be delivered. This technique for linkage is utilized in straightforward manual
tasks in which the machine or cycle have no electrical circuits for control.

Pushbuttons are frequently shading coded to connect them with their capacity so the
administrator won't press some unacceptable catch in mistake. Usually utilized tones
are red for halting the machine or interaction and green for beginning the machine or
cycle.

Red pushbuttons can likewise have enormous heads (mushroom formed) for simple
activity and to work with the halting of a machine. These pushbuttons are called crisis
stop fastens and are commanded by the electrical code in numerous wards for

Dept of ECE, TKRCET 25


Vehicle theft detection and tracking notification with remote engine locking

expanded wellbeing. This enormous mushroom shape can likewise be found in


catches for use with administrators who need to wear gloves for their work and
couldn't incite an ordinary flush-mounted press button. As a guide for administrators
and clients in modern or business applications, a pilot light is generally added to draw
the consideration of the client and to give criticism if the catch is pushed. Commonly
this light is incorporated into the focal point of the pushbutton and a focal point
replaces the pushbutton hard focus plate.

The wellspring of the energy to enlighten the light isn't straightforwardly attached to
the contacts on the rear of the pushbutton yet to the activity the pushbutton controls.
In this manner a beginning catch when pushed will cause the interaction or machine
activity to be begun and an auxiliary contact planned into the activity or cycle will
near turn on the pilot light and imply the activity of pressing the catch made the
resultant interaction or activity start.

In mainstream society, the expression "the catch" alludes to a (typically anecdotal)


button that a military or government pioneer could press to dispatch atomic weapons.

Push to ON button

Fig 4.7(a): push on button


Initially, the two contacts of the button are open. At when the button is pressed they
become connected. This makes the switching operation, using the push button.

DC MOTOR
What is DC Motor?
A DC motor is an electric motor that sudden spikes in demand for direct flow (DC)
power. In any electric engine, activity depends on straightforward electromagnetism.
A current-conveying conductor creates an attractive field; when this is then positioned

Dept of ECE, TKRCET 26


Vehicle theft detection and tracking notification with remote engine locking

in an outer attractive field, it will encounter a power corresponding to the current in


the conductor, and to the strength of the outside attractive field. As you are very much
aware of from playing with magnets as a child, inverse (North and South) polarities
draw in, while like polarities (North and North, South and South) repulse. The inner
arrangement of a DC engine is intended to bridle the attractive connection between a
current-conveying conductor and an outer attractive field to create rotational
movement.

How about we start by taking a gander at a straightforward 2-pole DC electric engine


(here red addresses a magnet or twisting with a "North" polarization, while green
addresses a magnet or twisting with a "South" polarization).

Fig.4.8(c) DC motor
Each DC motor has six essential parts - hub, rotor (a.k.a., armature), stator,
commutator, field magnet(s), and brushes. In most basic DC engines, the outer
attractive field is delivered by high-strength lasting magnets1. The stator is the fixed
piece of the engine - this incorporates the engine packaging, just as at least two lasting
magnet shaft pieces. The rotor pivots concerning the stator. The rotor comprises of
windings (by and large on a center), the windings being electrically associated with
the commutator. The above chart shows a typical engine design - with the rotor inside
the stator (field) magnets.

The calculation of the brushes, commutator contacts, and rotor windings are to such
an extent that when force is applied, the polarities of the invigorated winding and the
stator magnet(s) are skewed, and the rotor will pivot until it is nearly lined up with the
stator's field magnets. As the rotor arrives at arrangement, the brushes move to the

Dept of ECE, TKRCET 27


Vehicle theft detection and tracking notification with remote engine locking

following commutator contacts, and invigorate the following winding. Given our
model two-post engine, the revolution turns around the bearing of current through the
rotor twisting, prompting a "flip" of the rotor's attractive field, driving it to keep
pivoting.

All things considered, however, DC engines will consistently have multiple posts
(three is an exceptionally basic number). Specifically, this maintains a strategic
distance from "dead spots" in the commutator. You can envision how with our model
two-post engine, if the rotor is actually at the center of its turn (consummately lined
up with the field magnets), it will get "stuck" there. In the mean time, with a two-shaft
engine, there is a second where the commutator shorts out the force supply (i.e., the
two brushes contact both commutator contacts at the same time). This would be
terrible for the force supply, squander energy, and harm engine segments also. One
more detriment of such a basic engine is that it would display a high measure of force
"swell".

So since most little DC engines are of a three-post plan, we should dabble with the
functions of one through an intuitive movement (JavaScript required)

Dept of ECE, TKRCET 28


Vehicle theft detection and tracking notification with remote engine locking

You'll notice a couple of things from this - in particular, each post is completely
invigorated in turn (yet two others are "mostly" stimulated). As each brush changes
starting with one commutator contact then onto the next, one curl's field will quickly
fall, as the following loop's field will quickly energize (this happens inside a couple of
microsecond). We'll see more about the impacts of this later, however meanwhile you
can see that this is an immediate aftereffect of the loop windings' arrangement wiring.

GPS (GLOBAL POSITIONING SYSTEM):


The Global Positioning System (GPS) is a U S. space based global route satellite
system. It gives reliable positioning, navigation, and timing services to worldwide
users on a continuous basis in all weather, day and night, anywhere on or near the
Earth.

GPS is made up of three parts: in between 24 and 32 satellites orbiting the Earth, four
control and monitoring stations on Earth, and the GPS receivers owned by users. GPS

Dept of ECE, TKRCET 29


Vehicle theft detection and tracking notification with remote engine locking

satellites broadcast signals from space that are used by GPS receivers to give
threedimensional location (latitude, longitude, and altitude) plus the time.
Why do we require GPS?
• To determine position locations.

The Global Positioning System (GPS) is a U.S. space-based worldwide route satellite
framework. It gives dependable situating, route, and timing administrations to overall
clients consistently in all climate, day and night, anyplace on or close to the Earth.

GPS is comprised of three sections: somewhere in the range of 24 and 32 satellites


circling the Earth, four control and checking stations on Earth, and the GPS collectors
claimed by clients. GPS satellites broadcast signals from space that are utilized by
GPS recipients to give three-dimensional area (scope, longitude, and elevation) in
addition to the time.

For what reason do we require GPS?

• To decide position areas;

For example, you need to radio a helicopter pilot the directions of your position area
so the pilot can get you.

• To explore starting with one area then onto the next; for instance, you need to
go from a post to the fire border.

• To make digitized maps; for instance, you are allocated to plot the fire border
and problem areas.

• To decide distance between two focuses or how far you are from another area.

Working:

GPS satellites circle the earth double a day in an extremely exact circle and
communicate signal data to earth. GPS beneficiaries take this data and use
triangulation to figure the client's definite area. Basically, the GPS collector thinks
about the time a sign was communicated by a satellite with the time it was gotten. The
time contrast tells the GPS collector the distance away the satellite is. Presently, with
distance estimations from a couple of more satellites, the recipient can decide the
client's position and show it on the unit's electronic guide.

The premise of the GPS is a heavenly body of satellites that are consistently circling
the earth. These satellites, which are furnished with nuclear clocks, send radio signals
that contain their accurate area, time, and other data. The radio signs from the
satellites, which are checked and remedied by control stations, are gotten by the GPS
collector.

Dept of ECE, TKRCET 30


Vehicle theft detection and tracking notification with remote engine locking

A GPS recipient needs just three satellites to plot an unpleasant, 2D position, which
won't be extremely precise. Preferably, at least four satellites are expected to plot a 3D
position, which is substantially more precise.

Three Segments of GPS

The three fragments of GPS are the space, control, and client.

a. Space Segment — Satellites circling the earth

The space fragment comprises of 29 satellites orbiting the earth at regular intervals at
12,000 miles in height. This high elevation permits the signs to cover a more
prominent region. The satellites are organized in their circles so a GPS recipient on
earth can get a sign from in any event four satellites at some random time. Each
satellite contains a few nuclear tickers. The satellites send low radio signs with an
exceptional code on various frequencies, permitting the GPS beneficiary to recognize
the signs.

The primary motivation behind these coded signals is to permit the GPS collector to
compute travel season of the radio sign from the satellite to the recipient. The
movement time duplicated by the speed of light equivalents the separation from the
satellite to the GPS collector.

b. Control Segment — the control and observing stations

A GPS collector should be bolted on to the sign of at any rate three satellites to
compute a 2D position (scope and longitude) and track development. With at least
four satellites in see, the collector can decide the client's 3D position (scope, longitude
and height). When the client's position has been resolved, the GPS unit can figure
other data, like speed, bearing, track, trip distance, distance to objective, dawn and
dusk time and the sky is the limit from there.

The control fragment tracks the satellites and afterward furnishes them with rectified
orbital and time data. The control portion comprises of five automated screen stations
and one Master Control Station. The five automated stations screen GPS satellite
signals and afterward send that data to the Master Control Station where oddities are
remedied and sent back to the GPS satellites through ground recieving wires.

c. User Segment — The GPS recipients claimed by regular folks and military

The client section comprises of the clients and their GPS beneficiaries. The quantity of
concurrent clients is boundless.

GPS RECEIVER SPECIFICATIONS

Route FEATURES:

Waypoints/symbols: 500 with name and realistic image, 10 closest (programmed), 10


(closeness)

Dept of ECE, TKRCET 31


Vehicle theft detection and tracking notification with remote engine locking

Courses: Automatic turn-by-turn highways; 20 manual highlight point courses with up


to 50 focuses each.

Tracks: Automatic track log; 10 saved tracks let you follow your way in the two ways
Outing PC: Resettable odometer, clocks, normal and most extreme rates

Cautions: Anchor drag, approach and appearance, off base and nearness waypoint

Tables: Built-in heavenly tables for best occasions to fish and chase, sun and moon
rise/set dependent on date and area

Guide datums: More than 100, or more client datum

Position design: Lat/Lon, UTM/UPS, Maidenhead, MGRS, Loran TDs and different
frameworks, including client matrix

Execution

Collector: WAAS empowered, 12 equal station GPS recipient constantly tracks and
uses up to 12 satellites to process and refresh your position

Procurement Times:

Warm: Approximately 15 seconds

Cold: Approximately 45 seconds

Auto Locate®: Approximately 5 minutes

Update rate: 1/second, consistent

GPS Accuracy:

• Position: < 15 meters, 95% typical*

• Velocity: 0.05 meter/sec consistent state

WAAS precision:

• Position: < 3 meters, 95% average

• Velocity: 0.05 meter/sec consistent state

Elements: 6g's

Interfaces: RS232 with NMEA 0183, RTCM 104 DGPS information configuration
and restrictive Garmin

Dept of ECE, TKRCET 32


Vehicle theft detection and tracking notification with remote engine locking

Recieving wire: Detachable with standard BNC connector

Differential: RTCM-104, WAAS

Actual Size: 5.0"W x 2.3"H x 1.6"D (12.7 x 5.9 x 4.1 cm)

Weight: 9 ounces (255 g) w/batteries

Show: 2.2"W x 1.5"H (5.6 x 3.8 cm), 256 x 160 pixels, high-balance FSTN with
splendid backdrop illumination. Switchable direction.

Case: Fully gasketed, high-sway plastic composite, waterproof to IEC 529 IPX7
principles

Temperature range: 5° F to 158° F (– 15° C to 70° C)

Client information stockpiling: Indefinite, no memory battery required

Force Source: 8-35v DC, 4 "AA" batteries (excluded)

2.7.4 Applications:

There are such countless gadgets made with the execution of Global Positioning
System. Google Earth is the most acclaimed application that utilizes the signs got by
the GPS beneficiaries. It empowers public likewise to get to the guides which educate
the clients concerning the areas all around the world.3DEM is uninhibitedly accessible
programming that will make 3D landscape scenes and flyby movements and fare GIS
territory information records utilizing any of the accompanying openly accessible
landscape information as a source. Individuals utilize Global Positioning System for a
few employments. An exploration distributed on a magazine expresses that the level
of employments for each few necessity is as per the following.

Car route 37%

Hand held 26%

Tracking 10%

GIS 8%

Survey 7%

Manufacturing 7%

Vessel Voyage 2%

Military Related 1%

Dept of ECE, TKRCET 33


Vehicle theft detection and tracking notification with remote engine locking

Application GPS:

While initially a tactical venture, GPS is viewed as a double use innovation, which
means it has huge military and regular citizen applications.

Military Navigation:

GPS permits troopers to discover goals, even in obscurity or in new region, target
following, rocket and shot direction and search and salvage.

Non military personnel: Many regular citizen applications utilize at least one of GPS's
three fundamental parts: supreme area, relative development, and time transfer.

Dept of ECE, TKRCET 34


Vehicle theft detection and tracking notification with remote engine locking

CHAPTER-5 SOFTWARE
ARDUINO UNO INSTALLATION:
In this we will get know of the process of installation of Arduino IDE and
interface Arduino uno to Arduino IDE.
Step 1:
First we should have our Arduino board (we can pick our favorite board) and a
USB cable. In case we use Adriana UNO, Arduino Duemilanove, Nano, Arduino
Mega 2560, or Diecimila, we will require a standard USB cable (A plug to B plug), t
In that case we use Arduino Nano, we will need an A to Mini-B cable.
Step 2 − Download Arduino IDE Software. We can get various forms of Arduino IDE
from the Download page on the Arduino Official site. We should choose wer
programming, which is viable with wer working framework (Windows, IOS, or
Linux).
After wear document download is finished, unfasten the record

Step 3 − Power up our board.


The Arduino Uno, Mega Duemilanove and Arduino Nano automatically draw
power from either, the USB connection to the pc or an external power supply. If we
are using an Arduino Diecimila, we need to make sure the board is configured to draw
power from the USB connection. The power source is selected with a jumper, a small
piece of plastic that fits over the two of the three pins between the USB and power
jacks.
Check that it is on the two pins, closest to the USB port.

Dept of ECE, TKRCET 35


Vehicle theft detection and tracking notification with remote engine locking

Connect the Arduino board to wer computer by using the USB cable. The green power
LED
(labeled PWR) should glow.
Step 4 − Launch Arduino IDE.

After our Arduino IDE software is downloaded, we need to unfasten the folder. Inside
the folder, we can find the application icon with an infinity label (application.exe).
Double click on the icon to start the IDE.

Step 5 − Now open our first project.


Once the software starts or begins, we have two options *
Create a new project.

* Open an previous project example.


To create a new or another project, select File → New.

Dept of ECE, TKRCET 36


Vehicle theft detection and tracking notification with remote engine locking

To open an existing project example, select File → Example → Basics → Blink.


Here, we are selecting just one of the examples with the name Blink. It go around the
LED on and off with some time delay. We can select some other example from the
list.
Step 6 − Select our Arduino board.

To stay away from any blunder while transferring wear program to the board, we
should choose the right Arduino board name, which matches with the board
associated with wer PC.

Go to Tools → Board and select wear board.

Dept of ECE, TKRCET 37


Vehicle theft detection and tracking notification with remote engine locking

Here, we have selected Arduino Uno board, according to our tutorial, but we must
select the name matching with the board that we are using.

Step 7 − Select wer serial port.

Select the sequential device of the Arduino board. Go to Tools → Serial Port menu.
This is probably going to be COM3 or higher (COM1 and COM2 are normally saved
for equipment sequential ports). To discover, we can detach wer Arduino board and
re-open the menu, the section that vanishes ought to be of the Arduino board.
Reconnect the board and select that sequential port.

Stage 8 − Upload the program to wer board.

Dept of ECE, TKRCET 38


Vehicle theft detection and tracking notification with remote engine locking

Prior to clarifying how we can transfer our program to the board, we should exhibit
the capacity of every image showing up in the Arduino IDE toolbar.

A − Used to check if, there is any compilation error.


B − Used to transfer a program to the Arduino board.
C − Shortcut are used to create a new sketch.
D − Used to directly open one of the example sketch.
E − Used to save wer sketch.
F – Serial screen used to get sequential data from the board and send the sequential
data to the board. Presently, essentially click the "Transfer" button in the climate.
Stand by a couple of moments; we will see the RX and TX LEDs on the board,
blazing. On the off chance that the transfer is effective, the message

"Done transferring" will show up in the status bar.

Note − If we have an Arduino Mini, NG, or other board, we need to press the reset
button

truly on the board, preceding tapping the transfer button on the Arduino Software.

Dept of ECE, TKRCET 39


Vehicle theft detection and tracking notification with remote engine locking

BLYNK APP
Blynk was intended for the Internet of Things. It can handle hardware distantly, it can
show sensor data, and it can store data, visualize it and do numerous other cool things.

There are three significant parts in the stage:

• Blynk App - permits to you make astounding interfaces for your activities
utilizing different gadgets we give.

• Blynk Server - answerable for every one of the correspondences between the cell
phone and equipment. You can utilize our Blynk Cloud or run your private Blynk
worker locally. Its open-source, could undoubtedly deal with a huge number of
gadgets and can even be dispatched on a Raspberry Pi.

• Blynk Libraries - for all the mainstream equipment stages - empower


correspondence with the worker and cycle all the approaching and out coming orders.

Presently envision: each time you press a Button in the Blynk application, the message
goes to the Blynk Cloud, where it mysteriously discovers its way to your equipment.
It works something similar the other way and everything occurs in a blynk of an eye.

Dept of ECE, TKRCET 40


Vehicle theft detection and tracking notification with remote engine locking

• Similar API & UI for all supported hardware & devices • Connection to the
cloud using: o Wi-Fi
o Bluetooth and BLE o Ethernet
o USB (Serial)
o GSM
• Set of easy-to-use Widgets
• Direct pin manipulation with no code composing
• Easy to integrate and add new functionality using virtual pins
• History data monitoring via Super Chart widget
• Device-to-Device communication using Bridge Widget
• Sending messages, tweets, push notifications, etc.
• New highlights are constantly added.
You can discover example sketches covering basic Blynk Features. They are included
in the library, All the sketches are designed to be simply combined with each other.

The Blynk App is well designed interface builder. It works on both iOS and Android,
so no holy wars here,

Dept of ECE, TKRCET 41


Vehicle theft detection and tracking notification with remote engine locking

Create a Blynk Account

After you download the Blynk App, we need to create a New Blynk account. This
account is unrelated from the accounts used for the Blynk Forums, in case you already
have now one.
We recommend using a real email address because it will work on things later.

Dept of ECE, TKRCET 42


Vehicle theft detection and tracking notification with remote engine locking

Create a New Project

After you’ve successfully signed into your account, start by creating a new project.

Choose Your Hardware

Dept of ECE, TKRCET 43


Vehicle theft detection and tracking notification with remote engine locking

Select the hardware model you will use. Check out at the list of supported hardware

Auth Token

Auth Token is a unique identifier which is used to connect your hardware to your
smartphone. Every new project you create have its own Auth Token. You’ll get Auth
Token automatically to your email after project creation. You can likewise copy it
manually. Click on devices section and select required device:

Dept of ECE, TKRCET 44


Vehicle theft detection and tracking notification with remote engine locking

NOTE: Don’t share your Auth Token with anyone, unless if you want someone to
have access to your hardware.
It’s very convenient to send it over email. Press the email button and the token will be
sent to the e-mail address you used for registration. You can also click on the Token
line and it will be copied to the clipboard.
Now press on the “Create” button.

Dept of ECE, TKRCET 45


Vehicle theft detection and tracking notification with remote engine locking

5. Add a Widget

Your project canvas is empty, let’s we add a button to control our LED.
Tap anywhere on the material to open the widget box, all the available widgets are
located here. Now pick a button.
Widget Box

Drag-n-Drop - Tap and hold the Widget to drag it to the new position.

Dept of ECE, TKRCET 46


Vehicle theft detection and tracking notification with remote engine locking

Widget Settings - Each Widget has it’s own settings. Tap on the widget to, get to
them.

The most important parameter is to set PIN . The rundown of pins reflects physical
pins defined by your hardware. If your LED is interface to Digital Pin 8 - then select
D8 (D - stands for Digital).
Run The Project

When you are finish with the Settings - press the PLAY button. This will switch you
from EDIT mode to PLAY mode where you can interface with the hardware. While in
PLAY mode, you will not be able to drag or set up new widgets, press STOP and get
return to EDIT mode.
You will get a message saying “Arduino UNO is offline”. We’ll manage with that in
the next section

Dept of ECE, TKRCET 47


Vehicle theft detection and tracking notification with remote engine locking

CHAPTER-6 RESULTS AND DISCUSSION

This project is well prepared and acting accordingly (including all the
hardware and software) as per the initial specifications and requirements of our
project. Because of the creative nature and design the idea of applying this
project is very new, the oppurtunities for this project are immense.

The practical representation of an experimental board is shown below

Fig.6.1 Practical Representation of Experiment

CHAPTER-7 CONCLUSION

Dept of ECE, TKRCET 48


Vehicle theft detection and tracking notification with remote engine locking

An IoT based vehicle theft detection and remote engine locking system is GPS
technology that helps the users identify the vehicle in theft mode and enables the
controlling mechanism technique and In this way vehicles are provided with better
controlling mechanism and thus reducing the crimes.
.

REFERENCES

[1] A. Saad and U. Weinmann, ―Automotive software engineering and concepts,‖


GI. Jahrestagung., vol. 34, pp. 318–319, 2003.

Dept of ECE, TKRCET 49


Vehicle theft detection and tracking notification with remote engine locking

[2] E. Nickel, ―IBM automotive software foundry,‖ in Proc. Conf. Comput. Sci.
Autom. Ind., Frankfurt, Germany, 2003.
[3] M.Wolf,A.Weimerskirch,andT.Wollinger,―Stateof theart:Embedding security
in vehicles,‖ EURASIP J. Embedded Syst., vol. 2007, no. 5, p. 1, 2007.
[4] R. Charette, This Car Runs on Code. [Online]. Available: http://www.
spectrum.ieee.org/feb09/7649
[5] T.Nolte,H.Hansson,andL.L.Bello,―Automotiveco mmunicationspast, current
and future,‖ in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2005, vol. 1,
pp. 992–999.
[6] K. H. Johansson, M. Torngren, and L. Nielsen, ―Vehicle applications of
controller area network,‖ in Handbook of Networked and Embedded Con-
trolSystems. NewYork,NY,USA:SpringerVerlag,2005,pp.741–765.
[7] T. Hoppe and J. Dittman, ―Sniffing/replay attacks on CAN buses: A simulated
attack on the electric window lift classified using an adapted CERT taxonomy,‖ in
Proc. Conf. Embedded Syst. Security, 2007, pp. 1–6.
[8] T. Hoppe, S. Kiltz, and J. Dittmann, ―Security threats to automotive CAN
networks—Practical examples and selected shortterm countermeasures,‖ Rel. Eng.
Syst. Safety, vol. 96, no. 1, pp. 11– 25, Jan. 2011.
[9] K. Koscher et al., ―Experimental security analysis of a modern automo- bile,‖ in
Proc. IEEE Security Privacy. Symp., Oakland, CA, USA, 2010, pp. 447–462. [10]
The EVITA project, 2008, Webpage. [Online]. Available: http:// evitaproject.org

Dept of ECE, TKRCET 50

You might also like