ArticlePDF Available

Anti-theft Security System for Vehicles

Authors:

Abstract

In today's world vehicles form an important asset to us, without which our life would be incomplete. But, when it comes to the security of our vehicles, we are very helpless. It is of a great concern, especially in metropolitan cities, where these incidents occur each and every day. So, in this paper, I have focussed on the security of vehicles. The setup consists of a mix of software and hardware. In software, I will be using an android application, and in hardware, a Raspberry pi board B+ model, a jaw or a gripper and other hardware devices. This whole system will allow you to connect with your vehicle from anytime, anywhere and confirm it's security. A vehicle is usually the most expensive and important asset next to a home, so this system enables you to keep this asset at your fingertips using wireless technology. Think of it as a wireless leash to your car.
Copyright © 2018 Authors. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted
use, distribution, and reproduction in any medium, provided the original work is properly cited.
International Journal of Engineering & Technology, 7 (4.12) (2018) 42-46
International Journal of Engineering & Technology
Website: www.sciencepubco.com/index.php/IJET
Research paper
Anti-theft Security System for Vehicles
Samir Rana1*, Ritu Mewari2, Lata Nautiyal3
1
Assistant Professor,
Department of Computer Science & Engineering
,
Lovely Professional University,
Phagwara, India
2
Assistant Professor,
Department of Computer Science & Engineering
,
Baba Farid Institute of Technology, Dehradun, India
3
Assistant Professor,
Department of Computer Science & Engineering
,
Graphic Era University, Dehradun
*Corresponding author E-mail:
samir.rana7@gmail.com
Abstract
In today’s world vehicles form an important asset to us, without which our life would be incomplete. But, when it comes to the security
of our vehicles, we are very helpless. It is of a great concern, especially in metropolitan cities, where these incidents occur each and
every day. So, in this paper, I have focussed on the security of vehicles. The setup consists of a mix of software and hardware. In
software, I will be using an android application, and in hardware, a Raspberry pi board B+ model, a jaw or a gripper and other hardware
devices. This whole system will allow you to connect with your vehicle from anytime, anywhere and confirm it’s security. A vehicle is
usually the most expensive and important asset next to a home, so this system enables you to keep this asset at yo ur fingertips using
wireless technology. Think of it as a wireless leash to your car.
Keywords:
Android Application; Hardware; Internet; Raspberry pi board B+ model; Software; Vehicular Security System
1. Introduction
Vehicle’s security is of utmost importance in today’s world. As
unemployment is increasing day by day, even the literate people
are involved in theft and robbery. So, the security of our vehicles
is the foremost requirement. The system which is designed,
ensures the security of our vehicle. It mainly uses two resources,
firstly, an android app and secondly, a device, which will be
installed in our vehicles. We would be able to control our vehicle
using the app. The functions made in the app will communicate
with the device in the vehicle, to control it . But, in order for this
system to work, our android phone and the device, should have an
internet connection. Thus, as we are using an internet connection
for communication, this system has an unlimited range, means we
can control our vehicle from any part of the world, as compared to
present days, where we use a key to connect to our vehicle from a
distance, but that has a limited range. With the help of this
system , we can connect to our vehicle from anywhere, anytime,
with a simple click on a button in the android app. Moreover, we
can discover our vehicle’s location, start it, stop it, lock/unlock the
doors, disable the use of our vehicle, monitor the alarm security
system and much more.
If a thief will try to steal our vehicle, we will be immediately
informed of it, through a text message, that someone is messing
with our vehicle. Then we can lock our vehicle with a simple click
on our smartphone, that means no one can move your vehicle after
that. Infact, the accelerator, gear and brake pedals will be locked,
so that the vehicle does not move from it’s position.
Thus with this system, theft of the vehicles can be prevented to a
greater extent, which is a very important asset to us and thus
leading to a safe society.
2. Background of the Study
A system is an assemble of related components making a whole
system. Security system is a system that gives an alarm when
someone tries to break into the vehicle. Earlier people were de-
pendant on simple ways of alert to breach in security. Approxi-
mate seventy percent of the vehicles today have a remote keyless
entry (RKE) system [12,15]. Most remote keyless systems alert
the vehicle against theft, lock and unlock the doors. Remote key-
less systems are made of a key fob transmitter and a receiver
which is installed inside the vehicle. These systems use a frequen-
cy of 315 MegaHz in the the U.S. and Japan, and 433.92 MegaHz
in Europe[6]. The challenges for the remote keyless entry designs
are achieving low power consumption in both RKE transmitter
and receiver, while achieving good range and reliability for the
RKE system[6,7,8,9].
Traditionally, the Security Systems were prone to thefts as they
were not very secure as in the work of Ji Shin[14] in 2009. Later
the enhancements in security of vehicles was introduced by Mon-
taser N. Ramadan, Mohammad A. Al-Khedher, Sharaf A. Al-
Khedher[2] in 2012. After that, significant improvements has been
made towards Security of Vehicles, notably by N. M. Z. Hashim,
M. H. A. Halim, H. Bakri, S. H. Husin, M. M. Said[16] in 2013
and Harish Chandra Mohanta, Rajat Kumar Mahapatra,
Jyotirmayee Muduli[7] in 2014. Further improvements were
noticed in the work of Shubhankar Shome, Rabindranath Bera[5]
in 2015 and Michal Czubenko, Zdzislaw, Kowalczuk, Andrew
Ordys[9] in 2015.
International Journal of Engineering & Technology
43
3. Technologies used
3.1 ADT(Android Developer Tools)
ADT is a plugin for eclipse[1] that has a set of tools integrated
with the eclipse IDE. ADT helps us to develop the android apps.
ADT has SDK tools and UI design tools for rapid prototyping,
designing and building your applications user’s interface. Applica-
tion is developed in JAVA programming language using Android
SDK[19,20].
Fig.1: Emulator for android app
3.2 Java
Java is a programming language developed by Jamer Gosling at
Sun Microsystems. The Syntax of Java is developed from C and
C++. Java apps are compiled to bytecode that can run on any java
virtual machine. It is the most popular language used today. We
have used Java programming language, so that our application is
secure, no one can easily hack it.
3.3 Python
Python is an open-source and a new programming language. It is
an interactive, interpreted and object-oriented programming lan-
guage. Python [16] has a very clear syntax. It has interfaces to
many system calls and libraries. It is extensible in C and C++.
Python is a portable language across all major hardware and soft-
ware platforms. We have used python to do coding on the GPIO
pins of the Raspberry pi board B+ model, as it is the best and easy
language to use with Raspberry pi board B+ model.
4. Hardware used
4.1 Raspberry pi Board B+ model
The Raspberry pi Board B+ model[3] is a debit card-sized single
board computer developed in the UK by Raspberry pi foundation.
It is a low cost computer that can be plugged into a computer
monitor or a TV and uses a keyboard and a mouse. It is a little
device that many people can use to explore computing and to learn
how to do programming in scratch and python. A very strong
feature of Raspberry pi board is it’s GPIO(general-purpose input-
output) pins , along the top-edge of the board. GPIO pins are the
input/output pins, and any of the GPIO pins can be designated(in
software) as an input or output pin, which can be used for a wide
range of purposes. In our system, raspberry pi board B+ model
forms a part of the device, which would be installed in the car.
Fig. 2: Raspberry Pi Board B+ Model (Vertical Section)
Fig.3: Raspberry Pi B+ Model (Horizontal Section)
4.2. A jaw or a gripper
A jaw or a gripper is a hardware which is used to grasp any object.
In our system, it will be fixed inside the car near the gear,
accelerator and the brake pedals at a particular angle, so that if a
thief tries to steal the car, then with the mere press of a button on
our phone, the gripper can be moved in forward direction, with the
help of motor(to which power is provided by the voltage generated
through the internet), to hold the gear, accelerator and brake
pedals in their position, so that the thief will not be able to move
our car.
Fig. 4: A jaw or a gripper
4.3 Wi-fi Dongle
A Wi-fi Dongle is plugged into the Raspberry pi board. It will
allow us to connect to a wireless network anywhere.
Fig. 5: Wi-fi Dongle
4.4 Keyboard, Mouse and Adapter
We will be needing a keyboard, a mouse and an adapter that are
all connected to the Raspberry pi Board B+ model[6,10].
4.5 A Memory Card
A memory card will be inserted in the raspberry pi B+ model to
store the python coding done on Raspberry pi B+ board,.
4.6 Integrated Circuit(IC)
We have used L239D IC[15], to which all the motors are connect-
ed through jumpers(wires). And inputs from the raspberry pi board
are given to the IC and IC generates the corresponding output
function, which rotates the motors in clockwise and anti-clockwise
direction.
International Journal of Engineering & Technology
Fig. 6: Integrated Circuit(IC)
Fig. 7: IC diagram
4.7 A step down transformer
A step down transformer [2] is used to step down the high voltage
to the normal bearable range i.e bearable to the device from AC
220V to AC 20V.
Fig. 8:A Step down transformer
4.8 Diodes
Four diodes are used on the board for the conversion of AC into
DC voltage. Diodes[10] are connected in such a way that part of
sine wave in the negative portion is made to occur on the positive
portion.
Fig. 9: Zener Diode
4.9 Capacitor
A Capacitor[1] forms a part in conversion of AC into DC voltage.
The sine wave formed by the diodes is passed through a capacitor,
rendering waves which do not touch the x-axis and they lie far
above the x-axis.
Fig. 10: Capacitor
4.10 Voltage Regulator
A Voltage regulator[1] regulates the voltage and step downs it
further to the nominal voltage bearable by the IC’s 1 V or 1.5 V.
Fig.11: Voltage regulator
4.11 A resistor
A resistor [2,3] is used to offer resistance to the current so that the
current remains in the bearable conditions and offers nominal
voltage to the IC.
Fig.12: Resistor
4.12 Motors and Jumpers
I have used motors in my setup for locking system and door
movement
International Journal of Engineering & Technology
45
Fig. 13: Motor
Jumpers are the wires which are used to connect motors and
Raspberry pi board to the IC board.
Fig. 14: Jumper wires
5. The Working of the System
5.1 Overall description
First of all, we made an app using android developer tools. To use
the app, the user has to register on the app, and then he can login
into it’s account. After login, the user will find various options on
the application interface to control the various functions of the
vehicle and to lock the accelerator, gear and break pedals of the
vehicle, to ensure it’s security. Our main aim is to provide securi-
ty of the vehicle. It can be any vehicle, but in our case we are
taking, specifically a car.
Suppose, a thief tries to steal our car, and tamper with it, then
immediately a text message will be dropped on our phone, as well
in the app. As soon as we receive the text message, we can go to
the android application and click on the accelerator, gear and
brake buttons, given in the app.
As soon as we click on the buttons, the corresponding values will
be passed to the device installed in the car, through internet, and a
voltage of 3.3 V will be generated, which is received by the
Raspberry pi board. We have another board inside the device, on
which two IC’s are embedded. We have used L293D IC’s[3]. A
resistor, capacitor, voltage regulator and diodes are also embedded
on the board, whose functions are described in the section above.
A step down transformer is also connected to the board. The jaws
or grippers are connected to the IC’s, on the board.
The 3.3 voltage which is received by the GPIO pins of the
Raspberry pi board and the external voltage of the device, are then
fed to the board containig IC’s, through jumpers (wires). The
motive of making this board is to regulate the voltage and bring it
down to the nominal range bearable by the device, and to rotate
the motors in jaws or grippers, through IC’s, so that the jaws move
in the forward direction to hold the accelerator, gear, and brake
pedals in their position. The regulated voltage from the board
through the IC’s is now fed to the jaws or grippers, which have
motors inside them. The voltage will drive the motors and thus the
jaws would move forward and hold the acclereator, gear and brake
pedals in their position. We can also use additional motors to
control the functions of the car such as lock/unlock the doors etc.
The same motor can be rotated clockwise as well as anticlockwise
for example, for the opening of a door and closing of the door
respectively.
Thus even, if the thief is able to break into the car, then also he
will not be able to move the car. Then we can reach out to the
spot, as soon as possible, and catch the thief.
5.2 Description of the Device that will be installed in the
car.
The device that will be installed in the car contains a Raspberry pi
board B+ model and an another board containing the IC’s.
In order to simulate this system , we have used a Raspberry Pi
Board B+ model. In addition I have used a mouse, a keyboard, a
monitor and a wi-fi dongle. These can be connected to the ports of
raspberry pi board. A memory card is also inserted into it.
We have done python coding on the GPIO pins to provide various
functions of the car and for locking. When we click a button on
the app, a value is passed to the raspberry pi board, and a power of
3.3V is generated which is recieved by the GPIO input pins and
then this voltage is fed through the GPIO output pins to the board
containing the IC’s, which will regulate the voltage. This volatge
and the regulated external voltage of the device will move the
jaws or grippers in forward direction to hold the accelerator, gear
and brake pedals, in their position.
Fig. 15:Raspberry pi board Interface
Fig. 16: Python coding on Raspberry pi Board
Fig. 17: GPIO LED Output
International Journal of Engineering & Technology
Fig. 18: GPIO Numbers
6. Conclusion
In this paper, we have made an android app, which is used to
communicate with the device installed in our vehicles, which in
turn will control the functions of the vehicle, as well as ensure the
the locking of the accelerator, gear and brake pedals, so that the
vehicle does not move. Thus, the most expensive and important
asset of all of us, will be on our fingertips and fully secure. This
will prove to be a great technique to prevent the theft of the
vehicles, especially in metropolitan cities, where theft cases are
being reported, everyday.
7. Future Work
In future, we are planning to install a GPS system[8,19] into the
device, with which the location of the vehicle can be instantly
located at any time remotely from anywhere. Furthermore, more
functionalities to automate the vehicle remotely from anytime
anywhere with the app are under process too. I am also planning
to increase the security of the vehicle by cutting off the battery
supply to the vehicle, thus adding to it’s security.
Acknowledgement
We would like to express our sincere gratitude to Mr. Keshav Jha,
who helped us with his immense knowledge on this manuscript.
References
[1] N. Kiruthiga, L. latha, S. Thangasamy (2015) Real Time Biometrics
based Vehicle Security System with GPS and GSM Technology.
Procedia Computer Science
47, 471-479
[2] Montaser N. Ramadan, Mohammad A. Al-Khedher, Sharaf A. Al-
Khedher (2012) Intelligent Anti-Theft and Tracking System for Au-
tomobiles.
International Journal of Machine learning and
Computing
2 No.1.
[3] J.R.Shaikh, S. M. Kate (2012) ARM7 based Smart Car Security
System.
International of Engineering and Trends and Technology
3
Issue2.
[4] Gunaganti Ganesh (2014) Anti-Theft Contrl System of a car using
ARM7.
International Journal of Engineering and Science Research
4, 480-484
[5] Shubhankar Shome, Rabindranath Bera (2015) SMS Tracking Sys-
tem with Doppler Radar to Enhance Car Security for Intelligent
Transport System. I
.J. Intelligent Systems and Applications
02, 50-
55
[6] Narasimhula. M, Naresh Kumar Reddy, B. Subrahmanya Shar-
ma .G (2012) Designing of a Smart Car using ARM7.
International
Journal of Advances in Engineering and Technology
, 2231-1963
[7] R.Ramani, S.Valarmathy, Dr. N.SuthanthiraVani tha, S.Selvaraju,
M.Thiruppathi, R.Thangam (2013) Vehicle Tracking and Locking
System Based on GSM and GPS. I.
J. Intelligent Systems and
Applications
09, 86-93
[8] Sangita N. Gujar, Jagriti R Panchal (2014) Smart Car System Using
Sensor GPS and GSM.
Intrenational Journal of Electrical a nd
Electronic Engineering & Telecommunications
3, 2319-2518
[9] Michal Czubenko, Zdzislaw, Kowalczuk, Andrew Ordys (2015)
Cognitive Computation
7, 569-581
[10] Shital Y. Gaikwad, Maheshwari V.C. (2014)
International Press
Corporation
4, 2277-4106
[11] David Lane (2012) Car Alarm System.
California Polytechnic State
University
, Revision 7.
[12] Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho
Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar. Se-
curity and Privacy Vulnerabilities of In-Car Wireless Networks: A
Tire Pressure Monitoring System Case Study.
[13] V. Venkateswaran, N.Prakash (2014) Intelligent Approach For
Smart Car Parking Reservation And Security Maintenance System.
International Journal of Research in Engineering a nd Technology
,
2319-1163.
[14] Ji Shin (2009) Car Security System
[15] John Harvey Thomas F. doyle, Michael L Segal (2014) Vehicle Se-
curity System and Method.
[16] N. M. Z. Hashim, M. H. A. Halim, H. Bakri, S. H. Husin, M. M.
Said (2013) Vehicle Security System Using Zigbee.
International
Journal of Scientific and Research and Publications
3, 2250-3153.
[17] R. Anbazhagan, S. Vanangamudi, C. Thamotharan, S. Prabhakar, C.
Coomarasamy (2014) Desin of Intelligent Car Security System.
[18] S.P. Pingat, Shubham Rakhecha, Rishab Agarwal, Sarika Mhetre,
Pranay Roshan (2013) Real Time Smart Car Security System by us-
ing Biometrics.
International Journal of Innovative Technology and
Exploring Engineering
2, 2278-3075.
[19] Pravada P. Wankhade, Prof. S.O. Dahad (2011) Real Time Vehicle
Locking and tracking System using GSM and GPS T echnology -An
Anti-Theft System.
International Journal of Technology and
Engineering System
2.No.3.
[20] Ruchita J. Shah, Anuradha P. Gharge (2012) GSM Based Car Secu-
rity System.
International Journal of Engineering and Innovative
Technology
2, 2277-3754.
... The present paper proposes a standalone solution in terms of power source, the security module will be on standby when the suspicious movement is not intercepted. And, this is in operation with a possibility to sound the alarm, send SMS and also the geographical coordinates of the car even before the intrusion occurs [5]. ...
... The system proposed in [5], is quite long due to the fact that you have to authenticate by password, and also in case of rejection, the system sends you the message. We have simplified things by setting up a remote control for activation and deactivation of the system and other functionality mentioned above. ...
... We have simplified things by setting up a remote control for activation and deactivation of the system and other functionality mentioned above. Exemple [5]: ...
Article
Full-text available
In today's world, cars are important products that are essential to life. But when it comes to vehicle security, it's hard to start. "Vehicle theft is on the rise. Most stolen vehicles are exported abroad. The aim of this research is to develop a remote sensing notification module. In the event of a break-in, the driver is notified by SMS using GSM technology, uses GPS to track the location of the vehicle and trace the route, maps the location and uses the DIJIKSTRAT algorithm to find the nearest send a notification to the police station. The module also incorporates a prediction system for suspicious events associated with an infrared sensor. The overall idea of this research is to use large amounts of information and suspicious movements to develop a scientific model for intrusion detection. When a person approaches a parked vehicle, infrared sensors detect and compare suspicious movements in the knowledge base to detect possible intrusions. This paper proposes an anti-theft system to help car owners avoid theft and locate their car after it has been stolen. The materials referred to in this project are also actually designed.
... The rise of cases of theft and theft of motor vehicles in Indonesia is suspected by the number of notarized vehicles, both cars and motorcycles sold in Indonesia, which are not fully equipped with safety devices that are able to detect theft and at the same time can thwart theft (Rana et al., 2018). The lack of a security system (Kaushal & Pathare, 2020) for motor vehicles is one of the causes of theft cases in Indonesia. ...
Article
Full-text available
Incidents of theft and theft of motor vehicles have recently become more and more prevalent. This is suspected by the increase in the number of motorized vehicles every year. The most stolen or stolen types of motor vehicles are two-wheeled vehicles or motorcycles. So the researcher in this case conducted research in the form of designing motor vehicle safety using brittle sensors and GPS (Global Positioning System). The vibration sensor is functional to detect theft by forcibly moving the vehicle. Meanwhile, GPS functions to detect the location of the presence of the motor vehicle so that it can be monitored by the owner of the vehicle. This research focuses on measuring the accuracy and optimization of vibration sensors and GPS so that outputs in the form of simple patents and prototypes of motor vehicle safety devices can be obtained.
... The proposed research paper (Mishra 2020) presented IRTMCS which uses a polaroid known as a virtual eye along with IoT to avoid the death that occurs due to highway trac. In papers (Sanket et al. 2022;Samir et al. 2018) authors formulated a model with the software and hardware combination. Hardware like Raspberry Pi B + model, gripper, or a jaw and software such as Android application. ...
Article
Full-text available
Intelligent Integrated Vehicle Surveillance System (IIVSS) is one of the novel techniques developed by the researcher to detect and validate the authorized driver of the vehicle. IIVSS is a machine learning (ML) model built on Python intended to recognize the driver's face accurately. By implementing the application, keys are not required, which previously used key card entry for unlocking the car and starting the engine. In addition to the features listed above, the authors have created a DDS (Drowsiness Detection System) on the same board using the Python and OpenCV libraries in an attempt to prevent severe trac accidents. A mathematical model for image processing is implemented by the IIVSS, and it includes operators that alter images based on the characterisation. IIVSS uses various security components to bring the best outcome of the proposed system. We implement the data enhancement technique to increase the number of datasets including pictures of human faces to develop this system. The proposed system is examined on standard datasets and self-generated datasets. The outcome of the experiment of IIVSS shows the accuracy is 95.5% on standard datasets such as LFW, CelebA, and Multi-PIE, etc., whereas 97.4% on the self-generated dataset. It can be observed that the proposed Vehicle security system based on the IIVSS model gives favorable outcomes in aspects of consistency, robustness, and fault tolerance. IIVSS model performance was evaluated through Confusion matrix, ROC curve (Receiver Operating Characteristics Curve), Graph generation for Training loss vs. epoch graph using the dierent optimizers, and Generating graphical representation of Validation loss vs. epoch using the dierent optimizers which proved model performs exceptionally well with current data set model.
... GPSThe Global Positioning System (GPS) is a space-based satellite routing framework that provides area and time data in all climatic conditions. The GPS receiver can only receive vehicle location information from satellite when detecting potholes, and GPS (Figure 5) helps to trace the location of potholes[7]. ...
Article
Full-text available
Potholes are practically present on all roads in Mali. Malian drivers seek to locate potholes on the road when driving. And during night trips in Mali, it is very difficult to locate potholes on the road, which most often leads to fatal accidents. The objective of this article is to design an intelligent system for detecting and locating potholes and speed bumps in Mali. For pothole detection, an ultrasonic sensor was used with an Arduino microcontroller. GPS was used to locate the location of potholes and GSM (Global System for Mobile Communication) was used to transmit the location data of potholes. Detecting potholes helps reduce the number of traffic accidents in Mali and their locations will allow local and government structures to quickly repair the road. This project has enabled an improvement in human comfort in the existing system, so that the driver can be fully attentive and reassured when driving in Mali.
... Because our design includes monitoring through a PIR sensor on the exterior door and inside the cargo vehicle, no one can steal the goods inside while keeping the outside door in order to lock. Another athour presented the idea of vehicle protection with the Raspberry Pi [12]. But one fact is that it is possible to test the Raspberry Pi in steady state and get good quality output results, but after fitting it directly in a long-distance or jolted car, its output may not come as desired because there is a possibility of a loose connection in the Raspberry Pi. ...
Conference Paper
Full-text available
Logistic transportation is the backbone of the supply chain. An uninterrupted transportation of any goods keeps the supply chain well balanced and thus helps the business as well as the economy. But in this current world, the transportation of goods is being harmed in many ways. One of those is theft, where the driver is also involved or not, but the thief steals the goods with or without breaking the seal. Both the supplying company and the client are affected by this. To reduce the problem, we are proposing a two-step security system. So that even if one system is deactivated somehow, the other system can be alerted, and necessary steps can be taken accordingly. By doing so, we can maintain a constant connection with the vehicle. Through this proposed project, the outer door seal of the cargo vehicle can be locked or unlocked, and the server can observe in real time whether any items inside are being stolen without opening the door. The security of logistics supply vehicles through the proposed paper will be more robust and beneficial to both the transport service provider and the service taker.
... The paper [12] presents an antitheft system that uses a password procedure to turn on the engine. The IR sensor is used to detect the key in the keyhole. ...
Article
Full-text available
A broad range of modern technologies is used for surveillance as well as security of passengers in automobiles. These technologies include face identification, fingerprint identification, Iris identification, and speaker recognition. Among these face recognition and fingerprint recognition are most commonly used for the surveillance of the vehicle. The demand for face identification in automobiles is increasing as it serves better than that fingerprint technology. The face identification system involves both face recognition and face detection. Researchers have tried to implement a face recognition system in automobiles to detect facial features from a captured image using different machine learning algorithms. This will prevent an unauthorized person to enter the car and will lock the ignition system until and unless the person is recognized. This paper gives a brief review on different types of sensors combined with processing unit and different types of machine learning algorithms used for the vehicle security and tracking system using different technologies.
Article
Full-text available
In this current world where technology is growing up day by day and scientific researchers are presenting new era of discoveries, the need for security is also increasing in all areas. At present, the vehicle usage is basic necessity for everyone. Simultaneously, protecting the vehicle against theft is also very important. Traditional vehicle security system depends on many sensors and cost is also high. When the vehicle is stolen, no more response or alternative could be available to help the owner of the vehicle to find it back. The main goal of this paper is to protect the vehicle from any unauthorized access, using fast, easy-to-use, clear, reliable and economical fingerprint recognition technique. This vehicle security system intimates the status of the vehicle to the authoritative person (owner) using Global System for Mobile (GSM) communication technology. If the person is certified, vehicle access is allowed. Else SMS will be sent to the owner and the engine will be immobilized. The prototype model for the security system is built on the embedded platform using PIC Microcontroller which controls all the processes and cost is also very stumpy. On higher end theft attempts like cutting battery power supply, protection to the vehicle is provided by Engine Control Unit (ECU) embedded on microcontroller. By using GPS technology, vehicle can be identified very easily. Thus, the system provides security at both levels, i.e. when battery supply is provided or not.
Article
Full-text available
An efficient automotive security system is implemented for anti-theft using an embedded system occupied with a Global Positioning System (GPS) and a Global System of Mobile (GSM). The client interacts through this system with vehicles and determines their current locations and status using Google Earth. The user can track the position of targeted vehicles on Google Earth. Using GPS locator, the target current location is determined and sent, along with various parameters received by vehicle's data port, via Short Message Service (SMS) through GSM networks to a GSM modem that is connected to PC or laptop. The GPS coordinates are corrected using a discrete Kalman filter. To secure the vehicle, the user of a group of users can turn off any vehicle of the fleet if any intruders try to run it by blocking the gas feeding line. This system is very safe and efficient to report emergency situations as crash reporting or engine failure.
Article
Full-text available
Currently almost of the public having an own vehicle, theft is happening on parking and sometimes driving insecurity places. The safe of vehicles is extremely essential for public vehicles. Vehicle tracking and locking system installed in the vehicle, to track the place and locking engine motor. The place of the vehicle identified using Global Positioning system (GPS) and Global system mobile communication (GSM). These systems constantly watch a moving Vehicle and report the status on demand. When the theft identified, the responsible person send SMS to the microcontroller, then microcontroller issue the control signals to stop the engine motor. Authorized person need to send the password to controller to restart the vehicle and open the door. This is more secured, reliable and low cost.
Conference Paper
Full-text available
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, have are not well under-stood as their transmissions propagate beyond the con-fines of a car's body. To understand the risks associated with these wireless systems, this paper presents a privacy and security evaluation of wireless Tire Pressure Moni-toring Systems using both laboratory experiments with isolated tire pressure sensor modules and experiments with a complete vehicle system. We show that eaves-dropping is easily possible at a distance of roughly 40m from a passing vehicle. Further, reverse-engineering of the underlying protocols revealed static 32 bit identi-fiers and that messages can be easily triggered remotely, which raises privacy concerns as vehicles can be tracked through these identifiers. Further, current protocols do not employ authentication and vehicle implementations do not perform basic input validation, thereby allowing for remote spoofing of sensor messages. We validated this experimentally by triggering tire pressure warning messages in a moving vehicle from a customized soft-ware radio attack platform located in a nearby vehicle. Finally, the paper concludes with a set of recommenda-tions for improving the privacy and security of tire pres-sure monitoring systems and other forthcoming in-car wireless sensor networks.
Article
This project entails the design and implementation of a car alarm system for a 1977 Volkswagen Beetle.
Patent
A method and apparatus for validating a vehicle operator. In one embodiment, an apparatus comprises an input device for allowing entry of vehicle operator identification information, a transceiver for transmitting a message and receiving a response to the message, an interface for allowing a processor to communication with a vehicle sub-system, and a processor connected to the input device, the transceiver, and the interface, the processor for receiving the vehicle operator identification information from the input device, for generating the message comprising the vehicle operation identification information and providing the message to the transceiver, for receiving the response from the transceiver and for controlling the vehicle sub-system, via the interface, based on the response.
Article
The main aim of our project is to lock/unlock the devices by using password. It's highly safe control of the devices from other person. Due to the rapid development in the field of science and technology, many more advancements have been made in automation and controlling the hardware can adopt this technique. This technique is not only applicable to vehicle but also to control the various appliances in home. This marvelous technique is highly confidential as we are the only persons who can access the whole system and control various activities through password settings. Two Wheeler automation project consists of the following operation. Fuel supply opens by using Password Ignition System is ON by using correct password Side Lock or Head Light are controlled by the password.
Article
We approach a special system for smart parking reservation and security maintenance in a commercial car parking area in an urban environment. This system mainly designed to avoid unnecessary time conception to find an empty lot in a car parking area. By the same case we can also save more than 80% of fuel wastage in a car parking area to finds the empty parking slot. The reservation process is happening only by user. Hence the user finds the empty parking lot and makes the action of reservation through an internet access by an embedded process control unit (EPCU) with driver’s own knowledge. Here we give the major response to user’s reservation action and hence the driver can reserve his own likely parking slot based on the cost function. Instead of efficient car parking we need a special security options to make our vehicle very safe. By this case we have provided a best security guidance of barrier gate control security system (BGCSS) with the help of embedded process control unit (EPCU). There are number of steps taken to make a reservation with different lighting scheme mechanism (DLSM). We have proposed a system with multi-processing queuing mechanism (MPQM) to avoid multi-user approach problem (MUAP) during reservation process in our smart parking reservation system.
Article
The World report on road traffic injury prevention presents some assessments and conclusions regarding road traffic accidents, in which they state that more than 1.2 million deaths per year occur on the world’s roads and around 50 million more of injured people. To prevent this people are working for intelligent transport system (ITS). ITS is trying to make an intelligent car which will be able to avoid collation. In this paper we have tried to add a new goal in ITS system which will be activated in the intelligence fails. This SMS system will help to locate a car using GPS, if the car collides. Our total development work is divided into two parts. In first part we have tried to develop a system which will help the driver by providing the road scenario using dopple radar. Doppler radar will measure the velocity of the nearby car or passing by car, depending upon the information our car will be controlled. In second part of development we have developed a auto generated SMS sending system to a specific number if the Car collide. Both systems are described in details in next part of this article.
ARM7 based Smart Car Security System
  • J R Shaikh
  • S M Kate
J.R.Shaikh, S. M. Kate (2012) ARM7 based Smart Car Security System. International of Engineering and Trends and Technology 3