You are on page 1of 36

Multi-Level Secure Authentication Cum Tracking system for Vehicles

ABSTRACT

The Mechanical keys have traditionally been used to restrict unauthorized


access to automobiles. The connectivity problems are pervasive in remote areas and
places with multi-path obstructions with no clear line-of-sight (LoS). In this scenario
availability of the network can be intermittent and is not always guaranteed especially
for untethered wireless networks consisting of mobile vehicles. A conventional online
authentication scheme, therefore, is not an effective solution when it comes to securing
the vehicles. Also, the malicious attackers could gain access to the vehicles using a
replay of the user signal that is known as “replay attack”. In order to provide an effective
authentication approach, In order to provide an effective authentication, we propose an
authentication approach based on a One-time Password (OTP). OTP is chosen due to
its protection against vehicle theft that is popular against keyless start vehicles. It also
utilizes an additional security biometric factor to enhance the security of the driver’s
authentication. The new proposed scheme provides a secure solution. In this project we
are going one step ahead with GPS and going to track a vehicle using GPS and GSM.
Tracking of vehicle is a process in which we track the vehicle location in form of URL
which redirects to location in the google maps. Whenever unauthorization occurs we
will get unauthorized message with URL link which notifies location of vehicle.

IV ECE, KEC 1
Multi-Level Secure Authentication Cum Tracking system for Vehicles

INDEX
Contents Page No
1.0. Chapter
1.1 Introduction ………3

1.2 Problem Statement ………3

1.3 Existing System ………3

1.4 Proposed System ……....4

1.5 Scope & Objective ………4

2.0. Methodology

2.1 Working ………5

2.2 Components ………6

2.3 Flow Chart ………32


2.4 Block Diagram ………33

IV ECE, KEC 2
Multi-Level Secure Authentication Cum Tracking system for Vehicles

CHAPTER-1
INTRODUCTION

The Dynamic authentication One Time Password (OTP) has focused on authentication by using
the password and user account of such a mobile phone. Authentication is an important topic in
the vehicle context. The authentication on the vehicle is therefore necessary in order to prevent
unauthorized persons from carrying out malicious actions on a vehicles. The authentication of
the vehicle is crucial and most of the existing schemes are mostly based on the continuous
availability of wireless networks.

PROBLEM STATEMENT

Safety and security are becoming more and more popular day by day. Therefore the
security of one’s vehicle must not be left behind Now a day’s vehicle theft has became a
common issue. So, to over come that there is a need of High security OTP based system and
also recognize the person biometric Authentication and act smartly by the use of stored data.

EXISTING SYSTEM

The existing ways to start the vehicle are by using a key or by remote. Vehicle security is left
behind as left as theft of vehicles are not very difficult for carjackers. Domestic and overseas
Vehicles anti-theft products are technologically classified into three categories: mechanical
lock devices, car alarm system, and vehicle tracking/recovery systems, mainly aiming at
preventing cars to be broken in and driven away. The most commonly used mechanical lock
devices is steering wheel lock, which is relatively cheap but inconvenient to use and may be
easily disarmed by skilled thieves. Car alarm systems do not coverage large areas: the area is
just less than 100m. Once the car is stolen, the owner and the police cannot track the position
of vehicle.

IV ECE, KEC 3
Multi-Level Secure Authentication Cum Tracking system for Vehicles

PROPOSED SYSTEM

The authentication approach in this paper allows only authorized users to gain access to the
vehicles. The approach uses Time-based One-time password with biometric to prevent the vehicles
from being stolen and secure them against replay attack. The proposed approach composed into two
stages OTP initialization, Biometric Authentication.

SCOPE & OBJECTIVE

The objective of this study is to create a two-step authentication system for vehicles for keyless
start by using the first step as OTP verification and second step verification as Biometric verification
if the Two steps are verified then start Engine ignition And a controllable system that can display a
vehicle using global position system (GPS) to pin point the location and global system for mobile
(GSM) as a mean for communicating with the vehicle for ease offinding after a theft attempt.

1) To design security system for vehicles and can be used for other Applications.

2) Using One Time password, Fingerprint and GSM Module.

IV ECE, KEC 4
Multi-Level Secure Authentication Cum Tracking system for Vehicles

CHAPTER-2

IMPLEMENTATION

MATERIALS

List of hardware

1. Arduino Mega 2560 Microcontroller

2. Fingerprint Sensor R307

3. GPS Vehicle Tracker

4. GSM Module 900A

5. Keypad

6. LCD

7. Relay

8. Power supply

List of Software

Arduino IDE

Programming Language

Embedded C Language

WORKING

 The Whole operation of this two step verification and vehicle tracking system is
distributed into Two parts:

 1) To provide Security to Vehicle.

2)Tracking the position of the vehicle

 Once the circuit is powered on , GSM module sends an OTP message to the owner’s
registered mobile number which contains a four digit random number.

IV ECE, KEC 5
Multi-Level Secure Authentication Cum Tracking system for Vehicles

 After entering the OTP, if the OTP is verified within 3 attempts it goes to the next step of
verification. Else if OTP doesnot match within 3 attempts it will send an un-authorised
message to owner with URL link and sounds a buzzer.

 URL link redirects the location of vehicle on google maps.

 The second step verification will be the biometric authentication, if the fingerprint is
verified vehicle ignition starts, otherwise if fingerprint does not match with stored database
then it shows that fingerprint not matched & sounds a buzzer.

 We are including features like if owner sends code message to the gsm then it disables the
first step verification and asks only for second step verification. Ie. Only biometric
authentication.

 Another thing is if u press push button then it directly starts the vehicle without any
authentication.

 Above two features enables the easy access in emergency situations.

 Multiple persons biometric can be stored depending upon the fingerprint sensor
ability.(R307 model stores upto 5 persons data).

COMPONENTS

POWER SUPPLIES

There are many types of power supply. Most are designed to convert high voltage AC mains
electricity to a suitable low voltage supply for electronics’ circuits and other devices. A power supply
can by broken down into a series of blocks, each of which performs a particular function.

For example a 5V regulated supply:

IV ECE, KEC 6
Multi-Level Secure Authentication Cum Tracking system for Vehicles

Each of the blocks is described in more detail below:

TRANSFORMER

Steps down high voltage AC mains to low voltage AC.

Transformers convert AC electricity from one voltage to another with little loss of power.
Transformers work only with AC and this is one of the reasons why mains electricity is AC.
Step-up transformers increase voltage, step-down transformers reduce voltage. Most power
supplies use a step-down transformer to reduce the dangerously high mains voltage (230V in UK) to a safer
low voltage.
The input coil is called the primary and the output coil is called the secondary. There is no
electrical connection between the two coils, instead they are linked by an alternating magnetic field.
Transformers waste very little power so the power out is (almost) equal to the power in. Note that
as voltage is stepped down current is stepped up.
The ratio of the number of turns on each coil, called the turn’s ratio, determines the ratio of the
voltages. A step-down transformer has a large number of turns on its primary (input) coil which is connected
to the high voltage mains supply, and a small number of turns on its secondary (output) coil to give a low
output voltage.

Transformer
circuit symbol
IV ECE, KEC 7
Multi-Level Secure Authentication Cum Tracking system for Vehicles

Vp Np power out = power in


turns ratio = = and
Vs Ns Vs × Is = Vp × Ip

Vp = primary (input) voltage Vs = secondary (output) voltage


Np = number of turns on primary Ns = number of turns on secondary
coil coil
Ip = primary (input) current Is = secondary (output) current

RECTIFIER

Converts AC to DC, but the DC output is varying.

There are several ways of connecting diodes to make a rectifier to convert AC to DC. The
bridge rectifier is the most important and it produces full-wave varying DC. A full-wave rectifier can
also be made from just two diodes if a centre-tap transformer is used, but this method is rarely used
now that diodes are cheaper. A single diode can be used as a rectifier but it only uses the positive (+)
parts of the AC wave to produce half-wave varying DC.

SINGLE DIODE RECTIFIER

A single diode can be used as a rectifier but this produces half-wave varying DC which has
gaps when the AC is negative. It is hard to smooth this sufficiently well to supply electronic circuits
unless they require a very small current so the smoothing capacitor does not significantly discharge
during the gaps. Please see the Diodes page for some examples of rectifier diodes.

IV ECE, KEC 8
Multi-Level Secure Authentication Cum Tracking system for Vehicles

Output: half-wave varying DC


Single diode rectifier
(using only half the AC wave)

BRIDGE RECTIFIER
A bridge rectifier can be made using four individual diodes, but it is also available in special
packages containing the four diodes required. It is called a full-wave rectifier because it uses all the
AC wave (both positive and negative sections). 1.4V is used up in the bridge rectifier because each
diode uses 0.7V when conducting and there are always two diodes conducting, as shown in the
diagram below. Bridge rectifiers are rated by the maximum current they can pass and the maximum
reverse voltage they can withstand (this must be at least three times the supply RMS voltage so the
rectifier can withstand the peak voltages). Please see the Diodes page for more details, including
pictures of bridge rectifiers.

SMOOTHING (FILTER)
Smoothing is performed by a large value electrolytic capacitor connected across the DC
supply to act as a reservoir, supplying current to the output when the varying DC voltage from the
rectifier is falling. The diagram shows the unsmoothed varying DC (dotted line) and the smoothed
DC (solid line). The capacitor charges quickly near the peak of the varying DC, and then discharges
as it supplies current to the output.
IV ECE, KEC 9
Multi-Level Secure Authentication Cum Tracking system for Vehicles

Note that smoothing significantly increases the average DC voltage to almost the peak value
(1.4 × RMS value). For example 6V RMS AC is rectified to full wave DC of about 4.6V RMS (1.4V
is lost in the bridge rectifier), with smoothing this increases to almost the peak value giving
1.4 × 4.6 = 6.4V smooth DC.

Smoothing is not perfect due to the capacitor voltage falling a little as it discharges, giving a
small ripple voltage. For many circuits a ripple which is 10% of the supply voltage is satisfactory
and the equation below gives the required value for the smoothing capacitor. A larger capacitor will
give fewer ripples. The capacitor value must be doubled when smoothing half-wave DC.

5 × Io
Smoothing capacitor for 10% ripple, C =
Vs × f

C = smoothing capacitance in farads (F)


Io = output current from the supply in amps (A)
Vs = supply voltage in volts (V), this is the peak value of the unsmoothed DC
f = frequency of the AC supply in hertz (Hz), 50Hz in the UK

REGULATOR

Voltage regulator ICs are available with fixed (typically 5, 12 and 15V) or variable output
voltages. They are also rated by the maximum current they can pass. Negative VO

To make things really simple let’s start with a simple power supply and it is also the one they
usually give you in your first electronics project. Well the reason is quite obvious because all
electronics circuits require a DC power supply to work. You really do plug in the wires of your
electronic items in AC mains supply but they do have AC to DC converters too provide DC to the
circuits. All this is done with a power supply in the right place.

IV ECE, KEC 10
Multi-Level Secure Authentication Cum Tracking system for Vehicles

Pin diagram for 7805

• 1. Unregulated voltage in
• 2. Ground
• 3. Regulated voltage out

This circuit is a small +5V power supply. The circuit will provide a regulated voltage to the
external circuit which may also I am required in any part of the external circuit or the whole external
circuit. The best part is that you can also use it to convert AC voltage to DC and then regulate it
,simply You need a transformer to make the AC main drop down to a safe value i.e 12-15 volts and
then us a rectifier to convert AC into DC.

This circuit can give +5V output at about 150 mA current, but it can be increased to 1 A when
IV ECE, KEC 11
Multi-Level Secure Authentication Cum Tracking system for Vehicles
good cooling is added to 7805 regulator chip. The circuit has over overload and terminal protection.
The capacitors must have enough high voltage rating to safely handle the input voltage feed to
circuit. The circuit is very easy to build for example into a piece of overboard.

If you need other voltages than +5V, you can modify the circuit by replacing the 7805 chips
with another regulator with different output voltage from regulator 78xx chip family. The last
numbers in the chip code tells the output voltage. Remember that the input voltage must be at least
3V greater than regulator output voltage to otherwise the regulator does not work well. Don’t forget
to check the pin diagram before connecting the IC.

TRANSFORMER ONLY

The low voltage AC output is suitable for lamps, heaters and special AC motors. It is not suitable for
electronic circuits unless they include a rectifier and a smoothing capacitor.

TRANSFORMER + RECTIFIER

The varying DC output is suitable for lamps, heaters and standard motors. It is not suitable for
electronic circuits unless they include a smoothing capacitor.

IV ECE, KEC 12
Multi-Level Secure Authentication Cum Tracking system for Vehicles

TRANSFORMER + RECTIFIER + SMOOTHING (FILTER)

The smooth DC output has a small ripple. It is suitable for most electronic circuits.

TRANSFORMER + RECTIFIER + SMOOTHING + REGULATOR

The regulated DC output is very smooth with no ripple. It is suitable for all electronic circuits.

Circuit Diagram:

Circuit Description:

The 230/240VAC line voltage is applied to the transformer primary. Step down transformer is
used to convert 230VAC to 12V/1A output voltage in the transformer secondary. This 12VAC
supply is applied to the bridge rectifier. The bridge rectifier voltage rating should be double the Vrms
of secondary AC and higher forward current rating. The bridge rectifier has four diodes in that,
available as singular. This is the most important and it produces full-wave varying DC or pulsating
DC. This rectified output is smoothed by using shunt capacitor filter (C1). The larger the filter
capacitor lowers the ripple. The larger capacitor C1 across the input bypasses AC ripples to ground.
The pure DC output reaches the regulator IC. The 7805 Voltage regulator IC (U1) gives 5V /1A
IV ECE, KEC 13
Multi-Level Secure Authentication Cum Tracking system for Vehicles
regulated output. The capacitor (C2) across the output improves transient response. Low power red
LED is used in the output for power indication. It has voltage drop of 1.8V and gives brightness at 20
mA. This is done by current limiting resistor (R1).

R = (Vout – Vf) / I

Where, Vout –output voltage; Vf- led voltage drop; I- led forward current.

From this we get R as 160E. We use the standard value of 220E. The higher value of limiting
resistor gives low brightness but longer life time. So, here 470E is used.

ARDUINO MEGA 2560

The Arduino Mega 2560 is a microcontroller board based on the ATmega2560 (datasheet). It has 54
digital input/output pins (of which 14 can be used as PWM outputs), 16 analog inputs, 4 UARTs
(hardware serial ports), a 16 MHz crystal oscillator, a USB connection, a power jack, an ICSP
header, and a reset button. It contains everything needed to support the microcontroller; simply
connect it to a computer with a USB cable or power it with a AC-to-DC adapter or battery to get
started. The Mega is compatible with most shields designed for the Arduino Duemilanove or
Diecimila.

POWER
The Arduino Mega can be powered via the USB connection or with an external power supply. The
power source is selected automatically. External (non-USB) power can come either from an AC-to-
DC adapter (wall-wart) or battery. The adapter can be connected by plugging a 2.1mm center-
positive plug into the board's power jack. Leads from a battery can be inserted in the Gnd and Vin
pin headers of the POWER connector.

IV ECE, KEC 14
Multi-Level Secure Authentication Cum Tracking system for Vehicles
The board can operate on an external supply of 6 to 20 volts. If supplied with less than 7V, however,
the 5V pin may supply less than five volts and the board may be unstable. If using more than 12V,
the voltage regulator may overheat and damage the board. The recommended range is 7 to 12 volts.

The Mega2560 differs from all preceding boards in that it does not use the FTDI USB-to-serial driver
chip. Instead, it features the ATmega16U2 (ATmega8U2 in the revision 1 and revision 2 boards)
programmed as a USB-to-serial converter.
Revision 2 of the Mega2560 board has a resistor pulling the 8U2 HWB line to ground, making it
easier to put into DFU mode.
Revision 3 of the board has the following new features:
• pinout: added SDA and SCL pins that are near to the AREF pin and two other new pins
placed near to the RESET pin, the IOREF that allow the shields to adapt to the voltage
provided from the board. In future, shields will be compatible both with the board that use the
AVR, which operate with 5V and with the Arduino Due that operate with 3.3V. The second
one is a not connected pin, that is reserved for future purposes.

• Stronger RESET circuit.

• Atmega 16U2 replace the 8U2.

The power pins are as follows:


• VIN. The input voltage to the Arduino board when it's using an external power source (as
opposed to 5 volts from the USB connection or other regulated power source). You can
supply voltage through this pin, or, if supplying voltage via the power jack, access it through
this pin.

• 5V. The regulated power supply used to power the microcontroller and other components on
the board. This can come either from VIN via an on-board regulator, or be supplied by USB
or another regulated 5V supply.

• 3V3. A 3.3 volt supply generated by the on-board regulator. Maximum current draw is 50
mA.

• GND. Ground pins.

MEMORY
The ATmega2560 has 256 KB of flash memory for storing code (of which 8 KB is used for the
bootloader), 8 KB of SRAM and 4 KB of EEPROM (which can be read and written with the

IV ECE, KEC 15
Multi-Level Secure Authentication Cum Tracking system for Vehicles
EEPROM library).
INPUT AND OUTPUT
Each of the 54 digital pins on the Mega can be used as an input or output, using pinMode(),
digitalWrite(), and digitalRead() functions. They operate at 5 volts. Each pin can provide or receive a
maximum of 40 mA and has an internal pull-up resistor (disconnected by default) of 20-50 kOhms.
In addition, some pins have specialized functions:
• Serial: 0 (RX) and 1 (TX); Serial 1: 19 (RX) and 18 (TX); Serial 2: 17 (RX) and 16 (TX);
Serial 3: 15 (RX) and 14 (TX). Used to receive (RX) and transmit (TX) TTL serial data. Pins
0 and 1 are also connected to the corresponding pins of the ATmega16U2 USB-to-TTL Serial
chip.

• External Interrupts: 2 (interrupt 0), 3 (interrupt 1), 18 (interrupt 5), 19 (interrupt 4), 20
(interrupt 3), and 21 (interrupt 2). These pins can be configured to trigger an interrupt on a
low value, a rising or falling edge, or a change in value. See the attachInterrupt() function for
details.

• PWM: 0 to 13. Provide 8-bit PWM output with the analogWrite() function.

• SPI: 50 (MISO), 51 (MOSI), 52 (SCK), 53 (SS). These pins support SPI communication
using the SPI library. The SPI pins are also broken out on the ICSP header, which is
physically compatible with the Uno, Duemilanove and Diecimila.

• LED: 13. There is a built-in LED connected to digital pin 13. When the pin is HIGH value,
the LED is on, when the pin is LOW, it's off.

• TWI: 20 (SDA) and 21 (SCL). Support TWI communication using the Wire library. Note that
these pins are not in the same location as the TWI pins on the Duemilanove or Diecimila.

The Mega2560 has 16 analog inputs, each of which provide 10 bits of resolution (i.e. 1024
different values). By default they measure from ground to 5 volts, though is it possible to change
the upper end of their range using the AREF pin and analogReference() function.
There are a couple of other pins on the board:
• AREF. Reference voltage for the analog inputs. Used with analogReference().

• Reset. Bring this line LOW to reset the microcontroller. Typically used to add a reset button
to shields which block

COMMUNICATION
The Arduino Mega2560 has a number of facilities for communicating with a computer, another
IV ECE, KEC 16
Multi-Level Secure Authentication Cum Tracking system for Vehicles
Arduino, or other microcontrollers. The ATmega2560 provides four hardware UARTs for TTL (5V)
serial communication. An ATmega16U2 (ATmega 8U2 on the revision 1 and revision 2 boards) on
the board channels one of these over USB and provides a virtual com port to software on the
computer (Windows machines will need a .inf file, but OSX and Linux machines will recognize the
board as a COM port automatically. The Arduino software includes a serial monitor which allows
simple textual data to be sent to and from the board. The RX and TX LEDs on the board will flash
when data is being transmitted via the ATmega8U2/ATmega16U2 chip and USB connection to the
computer (but not for serial communication on pins 0 and 1).
A SoftwareSerial library allows for serial communication on any of the Mega2560's digital pins.
The ATmega2560 also supports TWI and SPI communication. The Arduino software includes a Wire
library to simplify use of the TWI bus; see the documentation for details. For SPI communication,
use the SPI library.
PROGRAMMING
The Arduino Mega can be programmed with the Arduino software (download). For details, see the
reference and tutorials.
The ATmega2560 on the Arduino Mega comes preburned with a bootloader that allows you to
upload new code to it without the use of an external hardware programmer. It communicates using
the original STK500 protocol (reference, C header files).
You can also bypass the bootloader and program the microcontroller through the ICSP (In-Circuit
Serial Programming) header; see these instructions for details. The ATmega16U2 (or 8U2 in the rev1
and rev2 boards) firmware source code is available in the Arduino repository. The
ATmega16U2/8U2 is loaded with a DFU bootloader, which can be activated by:
• On Rev1 boards: connecting the solder jumper on the back of the board (near the map of
Italy) and then resetting the 8U2.

• On Rev2 or later boards: there is a resistor that pulling the 8U2/16U2 HWB line to ground,
making it easier to put into DFU mode. You can then use Atmel's FLIP software (Windows)
or the DFU programmer (Mac OS X and Linux) to load a new firmware. Or you can use the
ISP header with an external programmer (overwriting the DFU bootloader). See this user-
contributed tutorial for more information.

AUTOMATIC (SOFTWARE) RESET


Rather then requiring a physical press of the reset button before an upload, the Arduino Mega2560 is
designed in a way that allows it to be reset by software running on a connected computer. One of the
hardware flow control lines (DTR) of the ATmega8U2 is connected to the reset line of the
ATmega2560 via a 100 nanofarad capacitor. When this line is asserted (taken low), the reset line
IV ECE, KEC 17
Multi-Level Secure Authentication Cum Tracking system for Vehicles
drops long enough to reset the chip. The Arduino software uses this capability to allow you to upload
code by simply pressing the upload button in the Arduino environment. This means that the
bootloader can have a shorter timeout, as the lowering of DTR can be well-coordinated with the start
of the upload.
This setup has other implications. When the Mega2560 is connected to either a computer running
Mac OS X or Linux, it resets each time a connection is made to it from software (via USB). For the
following half-second or so, the bootloader is running on the Mega2560. While it is programmed to
ignore malformed data (i.e. anything besides an upload of new code), it will intercept the first few
bytes of data sent to the board after a connection is opened. If a sketch running on the board receives
one-time configuration or other data when it first starts, make sure that the software with which it
communicates waits a second after opening the connection and before sending this data.

The Mega2560 contains a trace that can be cut to disable the auto-reset. The pads on either side of the
trace can be soldered together to re-enable it. It's labeled "RESET-EN". You may also be able to
disable the auto-reset by connecting a 110 ohm resistor from 5V to the reset line; see this forum
thread for details.
USB OVERCURRENT PROTECTION
The Arduino Mega2560 has a resettable polyfuse that protects your computer's USB ports from
shorts and overcurrent. Although most computers provide their own internal protection, the fuse
provides an extra layer of protection. If more than 500 mA is applied to the USB port, the fuse will
automatically break the connection until the short or overload is removed.

LCD

A liquid crystal display (LCD) is a flat panel display, electronic visual display, or video
display that uses the light modulating properties of liquid crystals (LCs). LCs does not emit light
directly.
They are used in a wide range of applications, including computer monitors, television,
instrument panels, aircraft cockpit displays, signage, etc. They are common in consumer devices such
as video players, gaming devices, clocks, watches, calculators, and telephones. LCDs have replaced
cathode ray tube (CRT) displays in most applications. They are available in a wider range of screen
sizes than CRT and plasma displays, and since they do not use phosphors, they cannot suffer image
burn-in. LCDs are, however, susceptible to image persistence.
LCDs are more energy efficient and offer safer disposal than CRTs. Its low electrical power

IV ECE, KEC 18
Multi-Level Secure Authentication Cum Tracking system for Vehicles
consumption enables it to be used in battery-powered electronic equipment. It is an electronically
modulated optical device made up of any number of segments filled with liquid crystals and arrayed
in front of a light source (backlight) or reflector to produce images in color or monochrome. The
most flexible ones use an array of small pixels. The earliest discovery leading to the development of
LCD technology, the discovery of liquid crystals, dates from 1888. By 2008, worldwide sales of
televisions with LCD screens had surpassed the sale of CRT units.
Illumination
As LCD panels produce no light of their own, they require an external lighting mechanism to
be easily visible. On most displays, this consists of a cold cathode fluorescent lamp that is situated
behind the LCD panel. For battery-operated units (e.g. laptops) this requires an inverter to convert
DC to AC. Passive-matrix displays are usually not backlit, but active-matrix displays almost always
are, with a few exceptions such as the display in the original Game boy Advance.
Recently, two types of LED backlit displays have appeared in some televisions as an
alternative to conventional backlit LCDs. In one scheme, the LEDs are used to backlight the entire
LCD panel. In another scheme, a set of red, green and blue LEDs is used to illuminate a small cluster
of pixels, which can improve contrast and black level in some situations. For example, the LEDs in
one section of the screen can be dimmed to produce a dark section of the image while the LEDs in
another section are kept bright. Both schemes also allow for a slimmer panel than on conventional
displays.
Passive-matrix and active-matrix addressed LCDs
Monochrome passive-matrix LCDs were standard in most early laptops (although a few used
plasma displays) and the original Nintendo Game Boy[25] until the mid-1990s, when color active-
matrix became standard on all laptops. The commercially unsuccessful Macintosh ortable (released
in 1989) was one of the first to use an active-matrix display (though still monochrome).
Passive-matrix LCDs are still used today for applications less demanding than laptops and
TVs. In particular, portable devices with less information content to be displayed, where lowest
power consumption (no backlight), low cost and/or readability in direct sunlight are needed, use this
type of display.
Displays having a passive-matrix structure are employing super-twisted nematic STN or
double-layer STN (DSTN) technology (the latter of which addresses a color-shifting problem with
the former), and color-STN (CSTN) in which color is added by using an internal filter.
STN LCDs have been optimized for passive-matrix addressing. They exhibit a sharper
threshold of the contrast-vs-voltage characteristic than the original TN LCDs. This is important,
because pixels are subjected to partial voltages even while not selected. Crosstalk between activated
and non-activated pixels has to be handled properly by keeping the RMS voltage of non-activated
IV ECE, KEC 19
Multi-Level Secure Authentication Cum Tracking system for Vehicles
pixels below the threshold voltage,[26] while activated pixels are subjected to voltages above
threshold. STN LCDs have to be continuously refreshed by alternating pulsed voltages of one
polarity during one frame and pulses of opposite polarity during the next frame. Individual pixels are
addressed by the corresponding row and column circuits. This type of display is called passive-
matrix addressed, because the pixel must retain its state between refreshes without the benefit of a
steady electrical charge. As the number of pixels (and, correspondingly, columns and rows)
increases, this type of display becomes less feasible. Slow response times and poor contrast are
typical of passive-matrix addressed LCDs with too many pixels.
New zero-power (bi-stable) LCDs do not require continuous refreshing. Rewriting is only
required for picture information changes. Potentially, passive-matrix addressing can be used with
these new devices, if their write/erase characteristics are suitable.
High-resolution color displays, such as modern LCD computer monitors and televisions, use
an active matrix structure. A matrix of thin-film transistors (TFTs) is added to the electrodes in
contact with the LC layer. Each pixel has its own dedicated transistor, allowing each column line to
access one pixel. When a row line is selected, all of the column lines are connected to a row of pixels
and voltages corresponding to the picture information are driven onto all of the column lines. The
row line is then deactivated and the next row line is selected. All of the row lines are selected in
sequence during a refresh operation. Active-matrix addressed displays look "brighter" and "sharper"
than passive-matrix addressed displays of the same size, and generally have quicker response times,
producing much better images.

The DV-16100-S2FBLY, dot-matrix LCD unit of a 5 x 7- dot 16-character 1-line dot-matrix


LCD panel, LCD driver, controller LSI and yellow green backlight LED fabricated on a single PCB.
Incorporating mask ROM-based character generator and display data RAM in the controller LSI, the
unit can efficiently display the desired characters under microprocessor control.
General
The LCD of the unit is STN (Super Twisted Nematic) Gray, Transflective type.
Low power consumption with the dot-matrix LCD panel and CMOS LSI. Built-in backlight LED
with high luminance and stable radiation.
Thin, lightweight design permits easy installation in a variety of equipment.
IV ECE, KEC 20
Multi-Level Secure Authentication Cum Tracking system for Vehicles
Allowing for being connected at general-purpose CMOS signal level, the unit can be easily
interfaced to a microprocessor with common 4-bit and 8-bit parallel inputs and outputs.
Multiplexing driving: 1/16duty, 1/4bias, 6 o’clock
Built-in character generator ROM and RAM, and display data RAM:
Character generator ROM 225 different 5 x 7 dot-matrix character patterns (Alphanumeric and
symbols)
Character generator RAM 8 different user programmed 5 x 7 dot-matrix patterns
Display data RAM 80 x 8 bits
Numerous instructions Display clear, Cursor home, Display ON/OFF, Cursor ON/OFF, Blink
character, Cursor shift, Display shift
The unit operates from a single 5V power supply
PIN DESCRIPTION
NUMBER SYMBOL FUNCTION
1 VSS 0V Power Supply (GND Level)
2 VCC Power supply for Logic circuit
3 V0 Power Supply for Driving the LCD
4 RS Data / Instruction select
5 R/W Read / Write select
6 EN Enable signal
7-14 DB0-DB7 Data Bus line
15 LED A Power supply for LED
16 LED K Power supply for LED

FINGERPRINT SENSORS

A fingerprint sensor is an electronic device used to capture a digital image of the


fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to
create a biometric template (a collection of extracted features) which is stored and used for matching.
This is an overview of some of the more commonly used fingerprint sensor technologies.
Topaz IDGem biometric input terminals feature state-of-the-art RF or Optical imaging electronic
fingerprint sensors for accurate high-resolution fingerprint capture. This technology captures an
image of the living subcutaneous skin tissue, which unlike the fingertip’s surface is free from the

IV ECE, KEC 21
Multi-Level Secure Authentication Cum Tracking system for Vehicles
damages and defects caused by the environment. The result is a fingerprint capture technique that
will work with any user’s print, even through substances such as lotion, sweat, oil, and dirt that often
confuse other capture systems and prevent the fingerprint image from being accurately recorded.
IDGem tablets are bundled with Topaz SigID software for the capture, storage, and scoring of
electronic fingerprints against a user’s template for validation. SigID allows fingerprints to be saved
as BMP, TIF, and JPG images at a variety of sizes and resolutions or as an ASCII-hex string for
storage in a database. It is the accuracy of this RF-inductive capture system and its ability to function
despite intermediary substances that result in low False Acceptance and False Rejection Rates (FAR
and FRR). In a system where the technology must make a speedy, automated determination of the
authenticity of a fingerprint, FAR and FRR must be at or near zero. This way, authentic fingerprints
are not rejected and false prints are not accepted, saving the user time and money. Other systems that
detect a fingerprint using the actual skin surface are subject to high FAR and FRR, which is why
Topaz signature capture and RF-Imaging fingerprint technology result in the lowest false rates in the
industry.
MATCHING OR IMAGING
Topaz IDGem products create detailed high-contrast images of a fingertip's detailed skin
characteristics. SigID software captures and stores this image information to create unique user
templates. Using pattern-matching algorithms, fingerprint inputs are compared to existing templates
and verified for rejected. This method makes cumbersome high-resolution fingerprint graphics
unnecessary for recognition and matching, allowing greate freedom and ease of operation.
GOVERNMENTAL OR COMMERCIAL USE?
It is important to understand this distinction. If you are required to provide signatures by law to a
law-enforcement database such as the FBI’s advanced Automatic Fingerprint Identification Systems
(AFIS), you should be already submitting these on paper as required by a law. Providing electronic
fingerprints to these databases requires AFIS-compatible hardware that is available for prices in the
range of $5,000 to $25,000. If you need to report to these agencies, Topaz suggests that you look at
www.identix.com or www.crossmatch.com for these high-quality “roll and slap” professional law-
enforcement fingerprint imaging systems.
For commercial applications not involving government interaction, the most important factor to
consider is the quality of capture technology, reliability, and data storage options. In these
environments, capturing a fingerprint as accurately and reliably as possible is more important than
generating the highest-quality and resolution image. Topaz IDGem is an excellent choice in these
environments because of its accurate and reliable RF-Imaging technology and powerful bundled
SigID software.
For example, an employer may wish to automate timecard clock-ins and clock-outs for employees to
IV ECE, KEC 22
Multi-Level Secure Authentication Cum Tracking system for Vehicles
ensure that they are working the requisite number of hours and not billing the company for hours
they have not spent at work. At the beginning of a shift, an employee registers their presence at the
fingerprint terminal. This input is time-stamped and placed into a database. The same process is
repeated when the employee finishes their shift. In this application, having an accurate capture
technology that is able to clearly register any print is a necessity; having a super-high quality bitmap
is not. In fact, having a high-quality bitmap capture in this environment may be a liability to the
employer due to both the large size of the image file and potential liability for identity theft should
the database security be compromised. This is why Topaz SigID software enables users to save
fingerprints as small ASCII strings that contain the relevant signature identification information
without requiring a large image file to be generated. Should unauthorized persons gain access to the
database, the fingerprints of employees are not revealed, but only enough unique summary data as is
necessary to make comparisons to their existing fingerprint template. Since the state-of-the-art
IDGem sensor records the subcutaneous print data, the record is highly accurate and measured using
special sophisticated pattern-matching algorithms for precise recognition.
OPTICAL
Optical fingerprint imaging involves capturing a digital image of the print using visible light. This
type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the
finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer
which illuminates the surface of the finger. The light reflected from the finger passes through the
phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual
image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint.
A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the
quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly.
Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point
where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if
not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology
is not susceptible to electrostatic discharge damage.

IV ECE, KEC 23
Multi-Level Secure Authentication Cum Tracking system for Vehicles

FINGERPRINT SENSOR:
The sensor is a solid-state fingerprint sensor that reliably captures fingerprint information. It is
designed to integrate into devices for improved security and convenience. The sensor provides a
reliable, quick and user-friendly alternative to passwords, PIN's and other forms of user
authentication.
This fingerprint scanner is capable of gathering and storing unique finger prints. Simply hold your
finger on the optical scanner, query the device over serial, and you will be issued a unique ID. Use
that ID within your embedded system to determine access levels, time clocks, door locks, etc. Unit
includes 4 pin connector cable to connect and read to controller. The outputs is TTL level serial data.
A biometric sensor, fingerprint sensor to be specific, also known as the fingerprint reader, is a
fingerprint image capture device, the very front end of the biometric fingerprint
identification/verification module. The fingerprint sensor captures the fingerprint images, matches
the uniqueness of each print read by the sensor and compares it to the one stored in its module or
local system database.
It consists of optical fingerprint sensor, high performance DSP processor and Flash. It boasts of
functions such as fingerprint enrollment, fingerprint deletion, fingerprint verification, fingerprint
upload, fingerprint download, etc.
Applications
➢ Computer peripherals – improves security and convenience
➢ Transportation systems – validation of operators, drivers and inspectors
➢ Medical equipment – authorization of operator or technician
➢ Physical access systems – approval for entry
➢ Kiosks and vending machines – confirmation of person receiving the selection
➢ Point of Sale terminals – authentication of tellers and cashiers

IV ECE, KEC 24
Multi-Level Secure Authentication Cum Tracking system for Vehicles
Features
➢ Rugged, solid-state optical fingerprint sensor
➢ High resolution 500 DPI imager
➢ Adapts to wet/dry fingers
➢ Simple Interfacing protocol

R307 Model
This is a fingure print sensor module with TTL UART interface for direct connections to
microcontroller UART or to PC through MAX232 / USB-Serial adapter. The user can store the
finger print data in the module and can configure it in 1:1 or 1: N mode for identifying the
person.The FP module can directly interface with 3v3 or 5v Microcontroller. A level converter (like
MAX232) is required for interfacing with PC serial port.
Optical biometric fingerprint reader with great features and can be embedded into a variety of
end products, such as: access control, attendance, safety deposit box, car door locks

Features

• Integrated image collecting and algorithm chip together, ALL-in-One


• Fingerprint reader can conduct secondary development, can be embedded into a variety of
end products
• Low power consumption, low cost, small size, excellent performance
• Professional optical technology, precise module manufacturing techniques
• Good image processing capabilities, can successfully capture image up to resolution 500 dpi

Specifications

• Fingerprint sensor type: Optical


• Sensor Life: 100 million times
• Static indicators: 15KVBacklight: bright green
• Interface: USB1.1/UART(TTL logical level)
• RS232 communication baud rate: 4800BPS~115200BPS changeable
• Dimension: 55*32*21.5mm
• Image Capture Surface 15—18(mm)
• Verification Speed: 0.3 sec
• Scanning Speed: 0.5 sec
• Character file size: 256 bytes
• Template size: 512 bytes
IV ECE, KEC 25
Multi-Level Secure Authentication Cum Tracking system for Vehicles
• Storage capacity: 250
• Security level: 5 (1,2,3,4,5(highest))
• False Acceptance Rate (FAR) :0.0001%
• False Rejection Rate (FRR): 0.1%
• Resolution 500 DPI
• Voltage :3.6-6.0 VDC
• Working current: Typical 90 mA, Peak 150mA
• Matching Method: 1: N
• Operating Environment Temperature: -20 to 45° centigrades

GPS WITH INTERNAL ANTENNA

GENERAL DESCRIPTION
The Global Positioning System (GPS) is a global navigation satellite system that provides location
and time information in all weather conditions. The GPS operates independently of any telephonic or
internet reception, though these technologies can enhance the usefulness of the GPS positioning
information. GPS satellites transmit signal information to earth. This signal information is received
by the GPS receiver in order to measure the user’s correct position.
PRODUCT DESCRIPTION
The GPS concept is based on time and the known position of specialized satellites. GPS satellites
continuously transmit their current time and position. A GPS receiver monitors multiple satellites and
solves equations to determine the precise position of the receiver and its deviation from true time. At
a minimum, four satellites must be in view of the receiver for it to compute four unknown quantities.
Each GPS satellite continually broadcasts a signal (carrier wave with modulation) that includes a
pseudorandom code (sequence of ones and zeros) that is known to the receiver and a message that
includes the time of transmission (TOT) of the code epoch and the satellite position at that time.

IV ECE, KEC 26
Multi-Level Secure Authentication Cum Tracking system for Vehicles

FEATURES
Supply voltage: 12v DC
Interface: UART RS232
Optional T-TL uart also available
Precision: 5 meters
Automatic antenna switching function
APPLICATIONS
GPS trackers
Automated vehicle
Robotics
Fleet tracking

GSM/GPRS MODEM

GENERAL DESCRIPTION
SIMCom Wireless Solutions is a subsidiary of SIM Technology Group Ltd (stock code: 2000. H.K).
It is a fast-growing wireless M2M company, designing and offering a variety of wireless modules
based on GSM/GPRS/EDGE, WCDMA/HSDPA and TD-SCDMA technical platforms By partnering
with third parties, SIMCom Wireless provides customized design solutions in M2M, WLL, Mobile
Computing, GPS and other applications. SIMCom Wireless also provides ODM services for
customers. According to ABI Insight report, SIMCom Cellular Module was number two provider of
wireless modules worldwide in 2008 with 20% acquisition of global market share
PRODUCT DESCRIPTION
This GSM Modem can accept any GSM network act as SIM card and just like a mobile phone with
its own unique phone number. Advantage of using this modem will be that you can use its RS232
port to communicate and develop embedded applications. The SIM900A is a complete Dual-band
GSM/GPRS solution in a SMT module featuring an industry-standard interface; the SIM800 delivers
GSM/GPRS 900/1800MHz performance for voice, SMS, Data, and Fax in a small form factor and
with low power consumption. With a tiny configuration of 24mm x 24mm x 3 mm, SIM800 can fit
almost all the space requirements in your applications, especially for slim and compact demand of
design.

IV ECE, KEC 27
Multi-Level Secure Authentication Cum Tracking system for Vehicles

FEATURES
• High Quality Product
• RS232 interface @ RMC Connector for direct communication with computer or MCU kit
• Configurable baud rate
• SMA connector with GSM Antenna.
• SIM Card holder.
• Built in Network Status LED
• Inbuilt Powerful TCP/IP protocol stack for internet data transfer over GPRS.
• Audio interface Connector
• Normal operation temperature: -20 °C to +55 °C
• Input Voltage: 4.5V-12V DC
APPLICATIONS
• Short Message Service(SMS)
• Internet
• Incoming /outgoing calls

KEYPAD

GENERAL DESCRIPTION
A miniature keyboard or set of buttons for operating a portable electronic device, telephone, or other
equipment it is also possible to use numerous additional modules linked to the development system
through the I/O port connectors. Some of these additional modules can operate as stand-alone devices
without being connected to the microcontroller.
PRODUCT DESCRIPTION
A keypad is a set of buttons arranged in a block or pad for a specific task. It contains 5 keys arranged
in matrix format. The pulses from the microcontroller are used for switching keys in a keypad. In
IV ECE, KEC 28
Multi-Level Secure Authentication Cum Tracking system for Vehicles
order the keypad to work properly, pull-down resistors should be placed on the microcontroller’s
input pins, thus defining logic state when no button is pressed. By combining zeros and ones on the
output pins, it is determined which button is pressed. It does not require separate power supply for
switching. The keypad may be used for a multi input switching.

FEATURES
• No need of input voltage

• Multi input switching

APPLICATIONS
• Switching applications

• Speed control applications

BUZZER

Piezo buzzer is the handy sound generator used in electronic circuits to give audio indication .It is
widely used as alarm generator in electronic devices. It is available in various types and size to suit
the requirements. A Piezo buzzer has a Piezo disc and an oscillator inside. When the buzzer is
powered, the oscillator generates a frequency around 2-4 kHz and the Piezo element vibrates
accordingly to produce the sound. An ordinary Piezo buzzer works between 3 – 12 volts DC.

WORKING OF THE PIEZO ELEMENT


Piezo element is a circular shaped metal plate with a thin coating of Piezo material. The
piezomaterial used is Lead Zirconate Titanate. This material exhibits both Direct and Indirect

IV ECE, KEC 29
Multi-Level Secure Authentication Cum Tracking system for Vehicles
piezoelectric property. Indirect piezoelectric property is the vibration of the piezoelectric crystals in
the presence of an electric field. The piezoelectric crystals also show direct piezoelectric property in
which a mechanical stress like vibration or application of heat generates around 1-2 volts in the
Piezoelement. The white Piezo material coating is Positive while the rim of the element is Negative.

Oscillator circuit inside the buzzer consists of an Inductor, a transistor, capacitors and resistors.
When the oscillator circuit gets 3-12 volt DC, The transistor, Inductor combination oscillates which
are fed to the Piezo crystals and the crystals and the plate vibrate according to the frequency. In order
to give resonance, the rim of the element is glued to a plastic case so that the plate can vibrate freely.
WHY PIEZO BUZZER GENERATES PIERCING SOUND?
The oscillation in the Piezo buzzer is between 2 – 4 kHz. This sound is piercing because our hearing
threshold is maximum in this frequency. Buzzer uses this frequency to get easy attention even in a
highly noisy environment. Buzzers are used as alarms so this frequency is necessary.
HOW TO HANDLE PIEZO ELEMENT?
Piezo element is prone to weather changes and aging. The piezoelectric property may deteriorate due
to aging and the buzzer may fail to work. The Piezomaterial is coated as a thin film so that during
soldering, the wire along with the piezomaterial may detach. Once a portion of the Piezo material is
detached, that element cannot be used. So always use very thin wire and apply solder only once.
Over heating may damage the piezomaterial. If it is stored, use a plastic cover and keep it in a place
free from moisture and heat.
DIRECT PIEZOELECTRIC EFFECT
Mechanical vibration can generate electricity in Piezo element. Connect a high bright transparent
LED directly on the Piezoelement with correct polarity. Gently tap in the central white part of
Piezoelement. LED will blink.

IV ECE, KEC 30
Multi-Level Secure Authentication Cum Tracking system for Vehicles

FLOW CHART

Start

Generation Of OTP

Display: Enter OTP NO URL link Message to


Owners Mobile
Push Button
YES

NO
Verificati If OTP Mismatches
on of OTP == 3 Attempts Buzzer
Owner send a Code
Message
YES

Verification Of Finger Print

Display: “Scan Finger”

Buzzer

Compare NO
Database

YES

Display:”Fingerprint
Matched”

Vehicle Iginition Start

IV ECE, KEC 31
Multi-Level Secure Authentication Cum Tracking system for Vehicles

BLOCK DIAGRAM

LCD

Power supply
Buzzer

Finger print sensor


GPS
ARDUINO
UNO
Keypad
Relay

GSM
Motor

IV ECE, KEC 32
Multi-Level Secure Authentication Cum Tracking system for Vehicles

REFERENCES

[1] S. Mason , “Vehicle remote keyless entry system and Engine immobilizers: Do not
believe the insurer that this technology is perfect [Online]”, Retrieved March 14, 2014, from
http://dx.doi.org/doi:10:1016/j.clsr.2012.01.004, 2012.
[2]. N.Pooja and G.V.S.Jyothirmayee “ Fingerprint Based Anti-Theft System for Vehicle
Safety.” International Journal of Innovative Research in Computer and Communication
Engineering, vol. no.-5, Issue-2, February 2017.
[3]. Archie O.Pachica and Dhave S.Barsalote “ Fingerprint Based Anti-Theft System for
Vehicle Safety.” International Journal of Applied Engineering Research, vol.12 pp. 2680-2687,
November 11, 2017.
[4]. K.Sruthi, S.Ravi , Y.Kiran “ Anti-Theft Tracking System and Security System for
Automobiles using GSM and ARM ” IJEDR, Volume 4, Issue 1 2016.
[5]. K.Dinesh Kumar and B. Sasidharan “ Password Based Lock for Bike Security with
Ignition Key Control System.” IJSART,volume 2, Issue 5, May 2016.
[6]. Kompalli Supriya and M.Venkateshwarlu “ Anti Theft Control System Design Embedded
System” International Journal of Advanced Technology and Innovative Research, vol.07,
Issue.07, pp 1190-1193, July-2015.
[7]. Nitin Kumar and Jatin Aggarwal “ Smart Bike Security System” International Journal of
Education and Science Research, volume 2, Issue-2, April-2015.

IV ECE, KEC 33
Multi-Level Secure Authentication Cum Tracking system for Vehicles

IV ECE, KEC 34
Multi-Level Secure Authentication Cum Tracking system for Vehicles

IV ECE, KEC 35
Multi-Level Secure Authentication Cum Tracking system for Vehicles

IV ECE, KEC 36

You might also like