SlideShare une entreprise Scribd logo
1  sur  28
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 1
1.INTRODUCTION
1.1 Background
In the last few decades, India has progressed at such an enormous rate that many companies have
strongly established themselves here. These companies bring a huge amount of workforce with
them. Arranging transportation to such a huge mass is a cumbersome task involving many
intricacies. Generally, this transport is arranged through the local transport vendors on a yearly
contract basis, recently happen mishaps such as burglary, rape cases etc. The development of
satellite communication technology is easy to identify the vehicle locations. Vehicle tracking
systems have brought this technology to the day-to-day life of the common person. Today GPS
used in cars, ambulances, fleets and police vehicles are common sights on the roads of developed
countries. All the existing technology support tracking the vehicle place and status.The
GPS/GSM Based System is one of the most important systems, which integrate both GSM and
GPS technologies. It is necessary due to the many of applications of both GSM and GPS systems
and the wide usage of them by millions of people throughout the world [1]. This system designed
for users in land construction and transport business, provides real-time information such as
location, speed and expected arrival time of the user is moving vehicles in a concise and easy-to-
read format. This system may also useful for communication process among the two points.
Currently GPS vehicle tracking ensures their safety as travelling. This vehicle tracking system
found in clients vehicles as a theft prevention and rescue device. Vehicle owner or Police follow
the signal emitted by the tracking system to locate a robbed vehicle in parallel the stolen vehicle
engine speed going to decreased and pushed to off. After switch of the engine, motor cannot
restart without permission of password. This system installed for the four wheelers, Vehicle
tracking usually used in navy operators for navy management functions, routing, send off, on
board information and security. The applications include monitoring driving performance of a
parent with a teen driver. Vehicle tracking systems accepted in consumer vehicles as a theft
prevention and retrieval device. If the theft identified, the system sends the SMS to the vehicle
owner. After that vehicle owner sends the SMS to the controller, issue the necessary signals to
stop the motor. In this paper, the reviewed related technology in section 3. The vehicle tracking
and locking systemscarried out in section 4. The conclusions, advantages and future scope in
section 5.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 2
1.2 Problem Statement
Lecturer’s room door was not equipped with anti-theft system. Most people only take the whole
home security system into account. This project focuses specifically on the room security
system, and nothing to do with the home security system. This project is a simple version of
security system, and the scope was not so big as well. Door security is the main element which
will be taken into consideration.
Door security system is important nowadays. The whole building security system or civilian
home security system is expensive. Most security systems available in the market nowadays are
complicated, and installation of the system will cost another amount of money to be invested in
order to have a good security system. A variety of security devices for deterring, detecting, and
identifying offenders or intruders can be found. However, very few provide a working
relationship to a room. An intrusion deterrent device which activates a water spraying system has
been invented.
A triggering mechanism for a tear-gas canister was introduced for the purpose of security and
protection, but this idea did not have a working relationship to a room. 3Security devices to
identify the bank robbers using the spray gun to discharge a scent which can be detected by the
dog have a working relationship to a room. Device was installed inside the room, mounted at the
ceiling. This project will implement a simple anti-theft security system for lecturer’s room that
has a clear relationship to a room to fulfill this void. This project will also demonstrate the idea
of port programming and PC-based control system. Usage of computer software to control
security system was widely accepted, and only authorized person will have access to the system
which determines the room security. This feature can avoid unauthorized person to take control
of the system or gain access to the security system.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 3
1.3 Objectives of Project
This project was done in order to achieve some objectives at the end of the project timeline. Here
is the list of this project objectives:
1.To develop programming and software using any available software to program the security
system for the room door with auto-lock feature.
2. To demonstrate and apply the idea of computer port programming and PC-based control
system.
3. To develop Graphical User Interface (GUI) which will be used by the user to manage and
control the system.
4. To integrate the door system with personal computer using any available communication port.
5. To design and integrate hardware with electro
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 4
1.4 Scope of Project
This project will focus on programming to lock or unlock the door via PC. Port programming
which enables interrupt process for the operating system can be used to control any external
devices attached to the PC via serial or parallel port. Port programming and user interface design
can be done using programming language such as Visual Basic 6.0, Delphi, Matlab, Visual C++,
Java, or Borlant Turbo. Both software and hardware for the system will be developed in this
project. However the system will be developed using LEDs, solenoid, and some mechanical
system to demonstrate the response of the output and input devices.
Integration of hardware and software will be done in this project to create a simple PC-based
control system. Basically, the idea is to connect output device to the PC via serial or parallel port.
Then, control software to control output device will be developed using any software
development programming language. Software is used to activate the output device by a click of
a button or simply hit the key on keyboard.
Also, output device must be able to be turned off using keyboard or mouse click. The system
can control up to 8 separate outputs individually. For this project, the system will be used to lock
or unlock the door via PC. User interface must have LOCK and UNLOCK button to control the
door. The door may be locked using electromagnetic device or any relevant mechanical system.
Password is mandatory to get access into the main control panel of the system.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 5
CHAPTER 2 LITERATURE REVIEW
2.1 Definition and Architecture of Security System
Security is the condition of being protected against danger or loss. In the general sense, security
is a concept similar to safety. The nuance between the two is an added emphasis on being
protected from dangers that originate from outside. Individuals or actions that encroach upon the
condition of protection are responsible for the breach of security. The word "security" in general
usage is synonymous with "safety," but as a technical term "security" means that something not
only is secure but that it has been secured .
It is very often true that people's perception of security is not directly related to actual security.
For example, a fear of flying is much more common than a fear of driving; however, driving is
generally a much more dangerous form of transport .
According to Marston, R. M., (1998) modern electronics security system range in complexity
from simple electronic door-bell to ultra-sophisticated wireless burglar alarm system that comes
complete with an array of passive infra-red (PIR) movement detectors and contact sensors plus
full remote-control and sensormonitoring facilities.
The idea of electronics-based security system has a wide range of application. They can be
designed to be activated by physical contact or body proximity, or by variation in heat, light, or
infrared radiation levels, or in voltage, current, resistance or some other electrical properties and
parameters (Marston, 1998).
2.2 Anti-theft security
Security tests by Consumer Reports Magazine in the 1990s found that many residential doors fail
or delaminate when force is applied to them. Solid wood doors withstood more force than the
very common metal skinned wood-edged doors used in newer construction [19].
The Chula Vista Residential Burglary Reduction Project there were the following findings:
"From victim interviews, we learned that in 87% of the break-ins that occurred when intruders
defeated locked doors with tools such as screwdrivers or crowbars, the burglars targeted "the one
door that had no deadbolt lock."... not one burglar attempted to break a double-pane window
during the course of successful or attempted burglary." (Page 3, The Chula Vista Residential
Burglary Reduction Project – Summary)
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 6
2.3 Microcontroller and Assembly Language
Back to security system, Robert Gaffigan (1997) discussed in his book entitle Home Security
Projects about the usage of microcontroller to design and develop a simple security system for a
single home. He made it very clear that programming was required to design a good security
system.
High level programming language makes it easier for human being to write the code of program,
comparing to the low level language.
Using only PIC Microcontroller or Programmable Integrated Controller, Robert Gaffigan (1997)
was successfully designed a portable CO detector, pool alarm system, an early warning alarm
system, and dog bark inhibitor system.
He suggested that new user should start to learn programming using simulator. Programming
using PIC to develop a security system required a good understanding of processor working
principles. Security system was created to produce a safe and sound environment for human
being and personal properties. Security system mostly refers to electronic and computer
controlled system which can monitor and scan any given area all the time automatically.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 7
2.4 Home Security
The FBI reports that a home is burglarized in the U.S. every 15.4 seconds. Burglary is now
considered to be the most serious threat a home can face. In most cases, burglars are looking for
items that they can easily resell for cash. The most targeted items by burglars include laptop
computers, guns, jewelry, DVD players and other similar small electronic items (Kelly, 2008).
Most burglaries occur during the day when homeowners are at work. Generally, burglars use a
certain type of force when they break into a home; however, it only stands to reason that burglars
target those homes with seem to offer the easiest amount of access [20].
In order to protect their property and possessions, more people are buying home surveillance
systems. A home surveillance system protects against vandalism, burglary, and act as a deterrent
to crime (Ryan Mcelhinny, 2008).
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 8
2.5 Drawback ofElectronic Security System
However, usage of sophisticated electronic security system generates a lot of false alarm and this
issue had become more serious, where burglar alarm warning was no longer treated as an
emergency. This idea was very clear. Most convensional alarm system can only detect intruders
and emergency but fail to eliminate the situation. At some point, the user have to reset the system
manually.
Signal of emergency was then forwarded to the human being to handle. Most security system
operates like this. The idea of security system which only notify human in case of emergency
was totally outdated. However, early warning system can save a lot of life if it was applied to
fight Tsunami in 2004 . Security systems nowadays make use of wireless technology and robotic
security system.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 9
Vehicle tracking and locking system based on GSM and GPS
3.1Introduction
In the last few decades, India has progressed at such an enormous rate that many companies
have strongly established themselves here. These companies bring a huge amount of workforce
with them. Arranging transportation to such a huge mass is a cumbersome task involving many
intricacies. Generally, this transport is arranged through the local transport vendors on a yearly
contract basis, recently happen mishaps such as burglary, rape cases etc. The development of
satellite communication technology is easy to identify the vehicle locations. Vehicle tracking
systems have brought this technology to the day-to-day life of the common person. Today GPS
used in cars, ambulances, fleets and police vehicles are common sights on the roads of developed
countries. All the existing technology support tracking the vehicle place and status.
The GPS/GSM Based System is one of the most important systems, which integrate both GSM
and GPS technologies. It is necessary due to the many of applications of both GSM and GPS
systems and the wide usage of them by millions of people throughout the world . This system
designed for users in land construction and transport business, provides real-time information
such as location, speed and expected arrival time of the user is moving vehicles in a concise and
easy-to-read format. This system may also useful for communication process among the two
points.
Currently GPS vehicle tracking ensures their safety as travelling. This vehicle tracking system
found in clients vehicles as a theft prevention and rescue device. Vehicle owner or Police follow
the signal emitted by the tracking system to locate a robbed vehicle in parallel the stolen vehicle
engine speed going to decreased and pushed to off. After switch of the engine, motor cannot
restart without permission of password. This system installed for the four wheelers, Vehicle
tracking usually used in navy operators for navy management functions, routing, send off, on
board information and security. The applications include monitoring driving performance of a
parent with a teen driver. Vehicle tracking systems accepted in consumer vehicles as a theft
prevention and retrieval device. If the theft identified, the system sends the SMS to the vehicle
owner. After that vehicle owner sends the SMS to the controller, issue the necessary signals to
stop the motor. In this paper, the reviewed related technology in section 3. The vehicle tracking
and locking systems Vehicle Tracking and Locking System Based on GSM and GPS 87
Copyright © 2013 MECS I.J. Intelligent Systems and Applications, 2013, 09, 86-93 carried out
in section 4. The conclusions, advantages and future scope in section 5.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 10
II. Survey of the RelatedWork
In [2], the hardware and software of the GPS and GSM network were developed. The proposed
GPS/GSM based System has the two parts, first is a mobile unit and another is controlling
station. The system processes, interfaces, connections, data transmission and reception of data
among the mobile unit and control stations are working successfully. These results are
compatible with GPS technologies.
In [3], a vehicle tracking system is an electronic device, installed in a vehicle to enable the owner
or a third party to track the vehicle's place. This paper proposed to design a vehicle tracking
system that works using GPS and GSM technology. This system built based on embedded
system, used for tracking and positioning of any vehicle by using Global Positioning System
(GPS) and Global system for mobile communication (GSM). This design will continuously
watch a moving Vehicle and report the status of the Vehicle on demand.
In [4], Face Detection System used to detect the face of the driver, and compare with the
predefined face. The car owner is sleeping during the night time and someone theft the car. Then
Face Detection System obtains images by one tiny web camera, which is hidden easily in
somewhere in the car. Face Detection System compared the obtained images with the stored
images. If the images don't match, then the information sends to the owner through MMS. The
owners get the images of the thief in mobile phone and trace the place through GPS. The place of
the car and its speed displayed to the owner through SMS. The owner can recognize the thief
images as well as the place of the car and can easily find out the hijackers image. This system
applied in our day-to-day life.
In [5], this system provided vehicle cabin safety, security based on embedded system by
modifying the existing modules. This method monitors the level of the toxic gases such as CO,
LPG and alcohol within the vehicle provided alert information as alarm during the dangerous
situations. The SMS sends to the authorized person through the GSM. In this method, the IR
Sensor used to detect the static obstacle in front of the vehicle and the vehicle stopped if any
obstacle detected. This is avoiding accidents due to collision of vehicles with any static
obstacles.
In [6], Kai-Tai Song and Chih-Chieh Yang have a designed and built on a real-time visual
tracking system for vehicle safety applications. In this paper built a novel feature-based vehicle-
tracking algorithm, automatically detect and track several moving objects, like cars and
motorcycles, ahead of the tracking vehicle. Joint with the concept of focus of expansion (FOE)
and view analysis, the built system can segment features of moving objects from moving
background and offer a collision word of warning on real-time. The proposed algorithm using a
CMOS image sensor and NMOS embedded processor architecture. The constructed stand-alone
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 11
visual tracking system validated in real road tests. The results provided information of collision
warning in urban artery with speed about 60 km/hour both at night and day times.
In [7], the remote monitoring system based on SMS and GSM was implemented. Based on the
total design of the system, the hardware and software designed. In this paper, the GSM network
is a medium for transmitting the remote signal. This includes two parts that are the monitoring
center and the remote monitoring station. The monitoring centers consist of a computer and
communication module of GSM. The software-monitoring center and the remote monitoring
station implemented by using VB. The result of this demonstration shows that the system can
watch and control the remote communication between the monitoring center and the remote
monitoring station.
In [8] this paper, the proposed tracking system based on cloud computing infrastructure. The
sensors are used to monitor the fuel level, driver conditions, and speed of the vehicle. All the
data transferred to cloud serverusing GSM enabled device. All the vehicles equipped with GPS
antenna to locate the place. To avoid the drunk and drive, the alcohol sensor installed to monitor
the driver status. The proposed technology significantly avoids the accident in highways.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 12
III. ProposedMethod
In this proposed work, a novel method of vehicle tracking and locking system used to track the
theft vehicle by using GPS and GSM technology. This system puts into sleeping mode while the
vehicle handled by the owner or authorized person otherwise goes to active mode, the mode of
operation changed by in person or remotely. If any interruption occurred in any side of the door,
then the IR sensor senses the signals and SMS sends to the microcontroller. The controller issues
the message about the place of the vehicle to the car owner or authorized person. When send
SMS to the controller, issues the control signals to the engine motor. Engine motor speeds are
gradually decreases and come to the off place. After that all the doors locked. To open the door
or restart the engine, authorized person needs to enter the passwords. In this method, tracking of
vehicle
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 13
3.1 Block Diagram
The Block diagram of Vehicle tracking and locking system based on GSM and GPS technology
is shown in 88 Vehicle Tracking and Locking System Based on GSM and GPS Copyright ©
2013 MECS I.J. Intelligent Systems and Applications, 2013, 09, 86-93 the figure1. It consists the
power supply section, keyboard, GSM, GPS, microcontroller, MAX232driver, relay driver, IR
Transmitter, IR receiver, LCD and door locker. The GSM board has a valid SIM card with a
sufficient recharge amount to make outgoing calls. The circuits powered by +5v Dc.
Fig. 1: Block diagram of V
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 14
3.2 circuit description
The power supply section is very important for all electronic circuits. The 230V, 50Hz AC mains
is stepped down by transformer X1 to deliver a secondary output of 12V, 500 mA. The
transformer output Is rectified by a full-wave rectifier comprising diodes D1 through D4, filtered
by capacitor C1 and regulated by ICs 7812 (IC2) and 7805 (IC3). Capacitor C2 bypasses the
ripples present in the regulated supply. LED1 acts as the power indicator and R1 limits the
current through LED1.The power supply section is shown in the figure2.
Power supply
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 15
Proposedcircuit diagram
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 16
The circuit diagram of the vehicle tracking and locking embedded system using GPS and GSM
technology is shown in Fig.3.The compact circuitry is built around Atmel AT89C52
microcontroller. The AT89C52 is a low power; high performance CMOS 8- bit microcomputer
with 8 kB of Flash programmable and erasable read only memory (PEROM). It has 256 bytes of
RAM, 32 input/output (I/O) lines, three 16-bit timers/ counters, a six-vector two-level interrupt
architecture a full-duplex serial port, an on-chip oscillator and clock circuit.The system clock
also plays a significant role in operation of the microcontroller. An 11.0592MHz quartz crystal
connected to pins 18 and 19 provides basic clock to the microcontroller. Power-on reset is
provided by the combination of electrolytic capacitor C3 and resistor R1. Port pins P2.0 through
P2.7 of the microcontroller are connected to data port pins D0 through D7 of the LCD,
respectively. Port pins P0.5, P0.6 and P0.7 of the microcontroller are connected to Register-
select (RS), Read / write (RW) and enable (E) pins of the LCD, respectively. All the data is sent
to the LCD in ASCII format for display. Only the commands are sent in hex form. Registerselect
(RS) signal is used to distinguish between data (RS=1) and command (RS=0). Preset RV1 is
used to control the contrast of the LCD. Resistor 10k limits the current through the backlight of
the LCD. Port pins P3.0 (RXD) and P3.1 (TXD) of the microcontroller are used to interface with
the RFID reader through Max232 and GSM Modem are used to interface through Max232. Port
pins from P1.0 to P2.7 of the microcontroller are connected to keyboard. The GPS and GSM are
used to connect through RXD and TXD pins of the microcontroller for further processing. The
port pins of P0.0 to P0.3 are used to connect the 4 IR sensors for detecting the unauthorized
person. Port1.7 is used to connect the alarm through transistor BC547, Pin number P3.3 is used
to connect the engine motor. If unauthorized person enter into the car, the IR sensor sense the
signals if any interruption occurs in any side of the door and send to the microcontroller, then the
controller issue the message about the location of the vehicle to car owner or authorized person.
When send the SMS to controller, issues the control signals to the engine motor. Engine motor
speed is gradually decreases and comes to the off position. After that all the doors are locked. Pin
P0.4 is used to connect the door locker through relay. To open the door or to restart the engine
authorized person needs to enter the passwords. In this method, tracking of vehicle location easy
and also doors are locked automatically thereby thief cannot get away from the car. Pin P0.4,
transistor Q3 drives into saturation, and relay RL2 energizes to close or open the door lock.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 17
3.3 GPS Technology
The Global Positioning System (GPS) is a satellitebased navigation system consists of a network
of 24 satellites located into orbit. The system provides essential information to military, civil and
commercial users around the world and which is freely accessible to anyone with a GPS receiver.
GPS works in any weather circumstances at anywhere in the world. Normally no subscription
fees or system charges to utilize GPS. A GPS receiver must be locked on to the signal of at least
three satellites to estimate 2D position (latitude and longitude) and track movement. With four or
more satellites in sight, the receiver can determine the user's 3D position (latitude, longitude and
altitude). Once the vehicle position has been determined, the GPS unit can determine other
information like, speed, distance to destination, time and other. GPS receiver is used for this
research work to detect the vehicle location and provide information to responsible person
through GSM technology.
GPS Technology
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 18
3.4 GSM Modem SIM300 V7.03
The GSM modem is a specialized type of modem which accepts a SIM card operates on a
subscriber’s mobile number over a network, just like a cellular phone. It is a cell phone without
display. Modem sim300 is a triband GSM/GPRS engine that works on EGSM900MHz,
DCS1800MHz and PCS1900MHz frequencies.GSM Modem is RS232-logic level compatible,
i.e., it takes-3v to -15v as logic high and +3v to +15 as logic low.MAX232 is used to convert
TTL into RS232 logic level converter used between the microcontroller and the GSM board. The
signal at pin 11 of the microcontroller is sent to the GSM modem through pin 11 of max232.this
signal is received at pin2 (RX) of the GSM modem. The GSM modem transmits the signal from
pin3 (TX) to the microcontroller through MAX232, which is received at pin 10 of IC1 [9].
Features of GSM
 Single supply voltage 3.2v-4.5v
 Typical power consumption in SLEEP Mode: 2.5mA.
 SIM300 tri-band
 MT,MO,CB, text and PDU mode, SMS storage: SIM card
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 19
IV. Debugging and Testing Process
A microcontroller-based system is a complex activity that involves hardware and software
interfacing with the external world. Doing well design of a microcontroller-based system
requires skills to use the variety of debugging and testing tools available. The debugging and
testing of microcontroller-based systems divided into two groups: software-only tools and
software-hardware tools. Software-only tools come as monitors and simulators, which are
independent of the hardware under development. Software-hardware tools are usually hardware
dependent, more expensive and range from in-circuit emulators and in-circuit simulators to in-
circuit debuggers. In general, the higher the level of integration with the target hardware, the
greater the benefit of a tool, resulting in a shorter development time, but the greater the cost as
well. The factors to consider when choosing a debugging tool are cost, ease of use and the
features offered during the debugging process.
A software simulator is a computer program running on an independent hardware and it
simulates the CPU, the instruction set and the I/O of the target microcontroller. Simulators offer
the lowest-cost development tools for microcontroller-based systems and most companies offer
their simulator programs free of charge.
The user program operated in a simulated environment where the user can insert breakpoints
within the code to stop the code and then analyze the internal registers and memory, display and
change the values of program variables and so on. Incorrect logic or errors in computations can
analyze by stepping through the code in simulation. Simulators run at speeds 100 to 1000 times
slower than the actual micro controller hardware and, thus, long time delays should avoid when
simulating a program. Micro controllerbased systems usually have interfaces to various external
devices such as motors, I/O ports, timers, A/D converters, displays, push buttons, sensors and
signal generators, which are usually difficult to simulate.
Some advanced simulators, such as the Proteus from Labcenter Electronics allow the simulation
of various peripheral devices such as motors, LCDs, 7-segment displays and keyboards, and
users can create new peripheral devices. Inputs to the simulator can come from files that may
store complex digital I/O signals and waveforms. Outputs can be as form of digital data or
waveforms, usually stored in a file, or displayed on a screen.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 20
4.1 Hardware Assembling and Testing:
First step, we need to make single side PCB layout for the given circuit diagram. After made the
PCB the following process is required to complete the project.
1. Assemble all the components on the PCB based on circuit diagram. TX and RX pins of the
GSM modem to pins 13 and 14 of MAX 232 and insert a valid SIM in the GSM modem.
2. Connect the GPS module according to circuit diagram.
3. This projects implemented and tested successfully by us.
4. This system is very useful and secure for car owners.
V. Conclusion
In this paper, we have proposed a novel method of vehicle tracking and locking systems used to
track the theft vehicle by using GPS and GSM technology. This system puts into the sleeping
mode vehicle handled by the owner or authorized persons; otherwise goes to active mode. The
mode of operations changed by persons or remotely. When the theft identified, the responsible
people send SMS to the micro controller, then issue the control signals to stop the engine motor.
After that all the doors locked. To open the doors or to restart the engine authorized person needs
to enter the passwords. In this method, easily track the vehicle place and doors locked.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 21
5.INTRODUCTION
In a situation where there is high level of theft, there is need for better security system. It is
much safer to have a system that monitors and communicates to the device owner without
putting human life to risk in the name of “Watchman”. This tends to utilize the availability of
GSM network, mobile phone and electronics circuit to achieve an automated system which is
programmed to work as a thinking device to accomplish this purpose. By simply dialing the
phone number of the mobile phone attached to the circuit and sending a code after the phone has
automatically been answered, puts the system to either “active or inactive” state, and on any
attempt of theft the system sends a text message to the device owner, demobilizes the system
(car) and then starts up an alarm. With this, the car is always protected. The total absence of
sufficient security personnel in a packed car is a great discomfort to car owners. This insecurity
has paved way to increasing rate of stealing packed cars – even with security. In order to enhance
an improved and life risk free security system, the purpose of this study is to aid a better security
system of cars with the use of GSM. This system monitors one’s car against theft, and has a text
message sent to the car owner, telling him that his car is being tampered, and at which part of the
car (either doors or boot) is being tampered. The system will also demobilize the car (that is
stopping the car from moving), set up an alarm for the people around to notice what is
happening.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 22
The diagram in figure 1.
Describe the overall system. The system comprises of a GSM which serves as an intermediate
between the outside world (car owner) and the entire system. It is responsible for both receiving
of calls for system activation and deactivation, and sending of text message to the car owner. Its
output in the form of frequency is feed into Dual Tone Multi-Frequency (DTMF) decoder IC,
which converts these frequencies into digital voltage levels of zeros and ones. The digital voltage
levels received from the DTMF decoder [9] is now fed into microcontroller Integrated circuit.
The micro controller which is the brain and control circuit behind the entire design is controlled
with a written program stored into its Read Only Memory (ROM). The controller with the
direction of the written program co-ordinate the system’s operation as follows: i. If the system is
active, it monitors both the car doors and boot to check if anyone is opened. ii. Demobilizes the
car by disconnecting the ignition line from the battery supply via the actuator [1]. iii. Sends text
message to the car owner signifying where the attempt is made from, and finally iv. Starts up an
alarm for alert purpose. v. But, if the system is inactive, the microcontroller disables all outputs
and sensor inputs. In this paper, the design utilized locally assembled microcontroller and few
other basic electronics components to achieve both the control and the controlled. Evidently,
microcontrollers have been used to perform such simple security task in which human
performance might degrade over time. The reliability of this design makes it durable and capable
for offering guarantee security at all time. The power supply provides the voltage and current
required for effective performance of the system. This supply is tapped from the car battery and
then regulated before being fed to the system.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 23
II. DESIGN FRAME WORK
2.2 System Design
The design process is divided into two: Hardware and Software designs. 2.2.1 Hardware Design
2.2.1.1 The microcontroller. This microcontroller system is designed around the Intel’s
AT89C51 microcontroller [1]. The Intel AT89C51 microcontroller is a complete computer on a
single chip. This is because it has Read Only Memory (ROM), Random Access Memory (RAM)
and Central Processing Unit (CPU) embedded in it. The AT89C51 is a low-power, high
performance CMOS 8-bit microcomputer with 8K bytes of memory. The device is manufactured
using Atmel’s high-density non-volatile Microcontroller Based Anti-theft Security System Using
GSM Networks with Text Message… 20 memory technology and is compatible with the
industry standard 80C5l and 80C52 instruction set and pin out. The on-chip flash allows the
program memory to be reprogrammed in-system or by a conventional non-volatile memory
programmer. It also provides programmable timer, programmable I/O ports together with 256 ×
8-bit RAM for use as “scratch book” and also for stack purposes. The alarm was implemented
using a 12V/15W siren. The Dual Tone Multi-Frequency (DTMF) IC – MT8870/CM8870 is an
IC which detects frequency in the form of tone and then encodes it into different digital voltage
levels [12]. It principle is on combining two carrier frequencies of upper level and lower level
which produces a unique tone. The DTMF is made to produce different voltage level for every
key pressed on the connected phone. Opto transistor CNY-17 is serving as a tap button contactor
[9], which is used for initiating a keypad pressing command on the connected phone. FET
(IRF3205) is a power mosfet [13]. It functions as an actuator to the demobilization unit. Relay is
the demobilizer in the system. Voltage regulation is achieved by the use of LM7805.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 24
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 25
III. PERFORMANCEEVALUATION ANDTESTING
Various test was carried out before, during and after the construction has been completed. The
multi-meter was extensively used for carrying out most of these tests. Each subunit was tested
and confirmed efficient. After the construction of the entire system, the program was written and
burned into the microcontroller chip. On interfacing it to the car, it tested ok as it performed the
objective of the design. Satisfaction was gotten from the moment the system was activated and
the car opened, the system automatically disconnected the ignition, sent a text message to a
programmed recipient and then started up an alarm.
The mission of the design was accomplished. The entire system has three inputs, which are: - the
output of the DTMF decoder, the output from the phone ear piece jack and the sensors from the
car doors and boot. The system outputs are the text message controller, alarming system and
demobilization unit. The system is battery powered and was tapped from car battery and for this
reason it made it easier for dc use. With these a system that sends text message to car owner is
designed and implemented.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 26
IV. CONCLUSION
It is always better to start every design with a good proposal, which will stand as a reference
point to the work as it proceeds. The result of any design gives joy if aims and objectives are
gotten. Since the project performed its proposal, it indeed satisfactory. Now from the input to the
output of each stage was a success. The major input is like an interrupt and upon reception by
microcontroller it goes through the iteration of demobilizing the car, sending text message and
starting up an alarm. The design is thus a huge success.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 27
REFERENCES
Hawrra, H.A. & Al-Rubiae (2007). Design and Implementation of Computerized control room.
Journal of Karbala University, 5(2). Johnson, M.J.&Subramanyam, G. (1996). A parallel port
interface circuit for computer control applications involving multiple stepper motors, Circuits
and Systems, IEEE 39th Midwest symposium, 2, pp.889-892. (http://www.ivsl.org: http://
libhub.sempertool.dk.tiger.sempertool.dk/libhub?func = search & query = resid:
cf092124eb1d1d40460d090ea4ad7692) . Zhou, W., Sha, Z., Meng, Z. &Xu, Y. (2007). Design
of Serial/Parallel Communication Interface of Digital Potentiometer with PC, 8th International
Conference on Electronic Measurement and Instruments (ICEMI.2007) , Pp: 3-150-3-154 , .
(http://www.ivsl.org:http: // libhub.sempertool.dk.tiger.sempertool.dk /libhub?func
=search&query=resid:c016167283f52d2740da48e994306ff6) . Hamed, B. (2012). Efficient
Authorized Access Security System Control Using ATMEL 89C55 & Mobile Bluetooth.
International Journal of Computer Theory and Engineering, 4(1). Samuel, D. (2008). RFID
security in door locks, Master thesis performed in information coding at Linköping Institute of
Technology. Axelson, J. (2000). Parallel Port Complete.Programming, Interfacing, & Using the
PC’s Parallel Printer Port. Published by Lakeview Research. Vincent, C., Hu, D. F., Ferraiolo &
Kuhn, D. R. (2006). Assessment of Access Control Systems. National Institute of Standards and
Technology.
Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 28

Contenu connexe

Tendances

Anti drowsy alarm for drivers
Anti drowsy alarm for driversAnti drowsy alarm for drivers
Anti drowsy alarm for drivers
Duc Nguyen Van
 

Tendances (20)

Alchol detection
Alchol detectionAlchol detection
Alchol detection
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
Vehicle Security System
Vehicle Security SystemVehicle Security System
Vehicle Security System
 
ANTI THEFT PPT
ANTI THEFT PPTANTI THEFT PPT
ANTI THEFT PPT
 
Smart door project report shivnaresh likhar
Smart door project report shivnaresh likharSmart door project report shivnaresh likhar
Smart door project report shivnaresh likhar
 
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMSACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
ACCIDENT DETECTION AND VEHICLE TRACKING USING GPS,GSM AND MEMS
 
Women safety device with gps tracking and alerts
Women safety device with gps tracking  and alertsWomen safety device with gps tracking  and alerts
Women safety device with gps tracking and alerts
 
Mobile Jammer report
Mobile Jammer reportMobile Jammer report
Mobile Jammer report
 
Anti drowsy alarm for drivers
Anti drowsy alarm for driversAnti drowsy alarm for drivers
Anti drowsy alarm for drivers
 
automatic railway gate controll using ir sensor
automatic railway gate controll using ir sensorautomatic railway gate controll using ir sensor
automatic railway gate controll using ir sensor
 
Mobile detector
Mobile detectorMobile detector
Mobile detector
 
Intelligent alcohol detection system for car
Intelligent alcohol detection system for carIntelligent alcohol detection system for car
Intelligent alcohol detection system for car
 
Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)Alcohol detection system with gsm and gps (fiem , ece)
Alcohol detection system with gsm and gps (fiem , ece)
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
Density based-traffic-light-control-system project-2 (3)
Density based-traffic-light-control-system project-2 (3)Density based-traffic-light-control-system project-2 (3)
Density based-traffic-light-control-system project-2 (3)
 
Solar tracking system
Solar tracking systemSolar tracking system
Solar tracking system
 
Digital Code Lock
Digital Code LockDigital Code Lock
Digital Code Lock
 
Smart Door locking system using arduino
Smart Door locking system using arduinoSmart Door locking system using arduino
Smart Door locking system using arduino
 
Smart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle TheftSmart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle Theft
 
Speed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-camerasSpeed detection-of-moving-vehicle-using-speed-cameras
Speed detection-of-moving-vehicle-using-speed-cameras
 

Similaire à Development of anti theft security system

Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation system
TELKOMNIKA JOURNAL
 
Vehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platformVehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platform
eSAT Journals
 
Hello Class and Professor,Cloud computing will assist managers i
Hello Class and Professor,Cloud computing will assist managers iHello Class and Professor,Cloud computing will assist managers i
Hello Class and Professor,Cloud computing will assist managers i
SusanaFurman449
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
Madison Oliver
 
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIntrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin Authorization
IJMTST Journal
 

Similaire à Development of anti theft security system (20)

Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation system
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
 
Implementation security system using motorcycle fingerprint identification an...
Implementation security system using motorcycle fingerprint identification an...Implementation security system using motorcycle fingerprint identification an...
Implementation security system using motorcycle fingerprint identification an...
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
 
Vehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platformVehicle anti theft system based on an embedded platform
Vehicle anti theft system based on an embedded platform
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Hello Class and Professor,Cloud computing will assist managers i
Hello Class and Professor,Cloud computing will assist managers iHello Class and Professor,Cloud computing will assist managers i
Hello Class and Professor,Cloud computing will assist managers i
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face Recognition
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
Project ppt
Project   pptProject   ppt
Project ppt
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
Intrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIntrusion Detection in Industrial Automation by Joint Admin Authorization
Intrusion Detection in Industrial Automation by Joint Admin Authorization
 
Intrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile NetworksIntrusion Detection Techniques In Mobile Networks
Intrusion Detection Techniques In Mobile Networks
 
christopher owoicho project
christopher owoicho projectchristopher owoicho project
christopher owoicho project
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
 

Dernier

Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 

Dernier (20)

Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 

Development of anti theft security system

  • 1. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 1 1.INTRODUCTION 1.1 Background In the last few decades, India has progressed at such an enormous rate that many companies have strongly established themselves here. These companies bring a huge amount of workforce with them. Arranging transportation to such a huge mass is a cumbersome task involving many intricacies. Generally, this transport is arranged through the local transport vendors on a yearly contract basis, recently happen mishaps such as burglary, rape cases etc. The development of satellite communication technology is easy to identify the vehicle locations. Vehicle tracking systems have brought this technology to the day-to-day life of the common person. Today GPS used in cars, ambulances, fleets and police vehicles are common sights on the roads of developed countries. All the existing technology support tracking the vehicle place and status.The GPS/GSM Based System is one of the most important systems, which integrate both GSM and GPS technologies. It is necessary due to the many of applications of both GSM and GPS systems and the wide usage of them by millions of people throughout the world [1]. This system designed for users in land construction and transport business, provides real-time information such as location, speed and expected arrival time of the user is moving vehicles in a concise and easy-to- read format. This system may also useful for communication process among the two points. Currently GPS vehicle tracking ensures their safety as travelling. This vehicle tracking system found in clients vehicles as a theft prevention and rescue device. Vehicle owner or Police follow the signal emitted by the tracking system to locate a robbed vehicle in parallel the stolen vehicle engine speed going to decreased and pushed to off. After switch of the engine, motor cannot restart without permission of password. This system installed for the four wheelers, Vehicle tracking usually used in navy operators for navy management functions, routing, send off, on board information and security. The applications include monitoring driving performance of a parent with a teen driver. Vehicle tracking systems accepted in consumer vehicles as a theft prevention and retrieval device. If the theft identified, the system sends the SMS to the vehicle owner. After that vehicle owner sends the SMS to the controller, issue the necessary signals to stop the motor. In this paper, the reviewed related technology in section 3. The vehicle tracking and locking systemscarried out in section 4. The conclusions, advantages and future scope in section 5.
  • 2. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 2 1.2 Problem Statement Lecturer’s room door was not equipped with anti-theft system. Most people only take the whole home security system into account. This project focuses specifically on the room security system, and nothing to do with the home security system. This project is a simple version of security system, and the scope was not so big as well. Door security is the main element which will be taken into consideration. Door security system is important nowadays. The whole building security system or civilian home security system is expensive. Most security systems available in the market nowadays are complicated, and installation of the system will cost another amount of money to be invested in order to have a good security system. A variety of security devices for deterring, detecting, and identifying offenders or intruders can be found. However, very few provide a working relationship to a room. An intrusion deterrent device which activates a water spraying system has been invented. A triggering mechanism for a tear-gas canister was introduced for the purpose of security and protection, but this idea did not have a working relationship to a room. 3Security devices to identify the bank robbers using the spray gun to discharge a scent which can be detected by the dog have a working relationship to a room. Device was installed inside the room, mounted at the ceiling. This project will implement a simple anti-theft security system for lecturer’s room that has a clear relationship to a room to fulfill this void. This project will also demonstrate the idea of port programming and PC-based control system. Usage of computer software to control security system was widely accepted, and only authorized person will have access to the system which determines the room security. This feature can avoid unauthorized person to take control of the system or gain access to the security system.
  • 3. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 3 1.3 Objectives of Project This project was done in order to achieve some objectives at the end of the project timeline. Here is the list of this project objectives: 1.To develop programming and software using any available software to program the security system for the room door with auto-lock feature. 2. To demonstrate and apply the idea of computer port programming and PC-based control system. 3. To develop Graphical User Interface (GUI) which will be used by the user to manage and control the system. 4. To integrate the door system with personal computer using any available communication port. 5. To design and integrate hardware with electro
  • 4. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 4 1.4 Scope of Project This project will focus on programming to lock or unlock the door via PC. Port programming which enables interrupt process for the operating system can be used to control any external devices attached to the PC via serial or parallel port. Port programming and user interface design can be done using programming language such as Visual Basic 6.0, Delphi, Matlab, Visual C++, Java, or Borlant Turbo. Both software and hardware for the system will be developed in this project. However the system will be developed using LEDs, solenoid, and some mechanical system to demonstrate the response of the output and input devices. Integration of hardware and software will be done in this project to create a simple PC-based control system. Basically, the idea is to connect output device to the PC via serial or parallel port. Then, control software to control output device will be developed using any software development programming language. Software is used to activate the output device by a click of a button or simply hit the key on keyboard. Also, output device must be able to be turned off using keyboard or mouse click. The system can control up to 8 separate outputs individually. For this project, the system will be used to lock or unlock the door via PC. User interface must have LOCK and UNLOCK button to control the door. The door may be locked using electromagnetic device or any relevant mechanical system. Password is mandatory to get access into the main control panel of the system.
  • 5. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 5 CHAPTER 2 LITERATURE REVIEW 2.1 Definition and Architecture of Security System Security is the condition of being protected against danger or loss. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside. Individuals or actions that encroach upon the condition of protection are responsible for the breach of security. The word "security" in general usage is synonymous with "safety," but as a technical term "security" means that something not only is secure but that it has been secured . It is very often true that people's perception of security is not directly related to actual security. For example, a fear of flying is much more common than a fear of driving; however, driving is generally a much more dangerous form of transport . According to Marston, R. M., (1998) modern electronics security system range in complexity from simple electronic door-bell to ultra-sophisticated wireless burglar alarm system that comes complete with an array of passive infra-red (PIR) movement detectors and contact sensors plus full remote-control and sensormonitoring facilities. The idea of electronics-based security system has a wide range of application. They can be designed to be activated by physical contact or body proximity, or by variation in heat, light, or infrared radiation levels, or in voltage, current, resistance or some other electrical properties and parameters (Marston, 1998). 2.2 Anti-theft security Security tests by Consumer Reports Magazine in the 1990s found that many residential doors fail or delaminate when force is applied to them. Solid wood doors withstood more force than the very common metal skinned wood-edged doors used in newer construction [19]. The Chula Vista Residential Burglary Reduction Project there were the following findings: "From victim interviews, we learned that in 87% of the break-ins that occurred when intruders defeated locked doors with tools such as screwdrivers or crowbars, the burglars targeted "the one door that had no deadbolt lock."... not one burglar attempted to break a double-pane window during the course of successful or attempted burglary." (Page 3, The Chula Vista Residential Burglary Reduction Project – Summary)
  • 6. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 6 2.3 Microcontroller and Assembly Language Back to security system, Robert Gaffigan (1997) discussed in his book entitle Home Security Projects about the usage of microcontroller to design and develop a simple security system for a single home. He made it very clear that programming was required to design a good security system. High level programming language makes it easier for human being to write the code of program, comparing to the low level language. Using only PIC Microcontroller or Programmable Integrated Controller, Robert Gaffigan (1997) was successfully designed a portable CO detector, pool alarm system, an early warning alarm system, and dog bark inhibitor system. He suggested that new user should start to learn programming using simulator. Programming using PIC to develop a security system required a good understanding of processor working principles. Security system was created to produce a safe and sound environment for human being and personal properties. Security system mostly refers to electronic and computer controlled system which can monitor and scan any given area all the time automatically.
  • 7. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 7 2.4 Home Security The FBI reports that a home is burglarized in the U.S. every 15.4 seconds. Burglary is now considered to be the most serious threat a home can face. In most cases, burglars are looking for items that they can easily resell for cash. The most targeted items by burglars include laptop computers, guns, jewelry, DVD players and other similar small electronic items (Kelly, 2008). Most burglaries occur during the day when homeowners are at work. Generally, burglars use a certain type of force when they break into a home; however, it only stands to reason that burglars target those homes with seem to offer the easiest amount of access [20]. In order to protect their property and possessions, more people are buying home surveillance systems. A home surveillance system protects against vandalism, burglary, and act as a deterrent to crime (Ryan Mcelhinny, 2008).
  • 8. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 8 2.5 Drawback ofElectronic Security System However, usage of sophisticated electronic security system generates a lot of false alarm and this issue had become more serious, where burglar alarm warning was no longer treated as an emergency. This idea was very clear. Most convensional alarm system can only detect intruders and emergency but fail to eliminate the situation. At some point, the user have to reset the system manually. Signal of emergency was then forwarded to the human being to handle. Most security system operates like this. The idea of security system which only notify human in case of emergency was totally outdated. However, early warning system can save a lot of life if it was applied to fight Tsunami in 2004 . Security systems nowadays make use of wireless technology and robotic security system.
  • 9. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 9 Vehicle tracking and locking system based on GSM and GPS 3.1Introduction In the last few decades, India has progressed at such an enormous rate that many companies have strongly established themselves here. These companies bring a huge amount of workforce with them. Arranging transportation to such a huge mass is a cumbersome task involving many intricacies. Generally, this transport is arranged through the local transport vendors on a yearly contract basis, recently happen mishaps such as burglary, rape cases etc. The development of satellite communication technology is easy to identify the vehicle locations. Vehicle tracking systems have brought this technology to the day-to-day life of the common person. Today GPS used in cars, ambulances, fleets and police vehicles are common sights on the roads of developed countries. All the existing technology support tracking the vehicle place and status. The GPS/GSM Based System is one of the most important systems, which integrate both GSM and GPS technologies. It is necessary due to the many of applications of both GSM and GPS systems and the wide usage of them by millions of people throughout the world . This system designed for users in land construction and transport business, provides real-time information such as location, speed and expected arrival time of the user is moving vehicles in a concise and easy-to-read format. This system may also useful for communication process among the two points. Currently GPS vehicle tracking ensures their safety as travelling. This vehicle tracking system found in clients vehicles as a theft prevention and rescue device. Vehicle owner or Police follow the signal emitted by the tracking system to locate a robbed vehicle in parallel the stolen vehicle engine speed going to decreased and pushed to off. After switch of the engine, motor cannot restart without permission of password. This system installed for the four wheelers, Vehicle tracking usually used in navy operators for navy management functions, routing, send off, on board information and security. The applications include monitoring driving performance of a parent with a teen driver. Vehicle tracking systems accepted in consumer vehicles as a theft prevention and retrieval device. If the theft identified, the system sends the SMS to the vehicle owner. After that vehicle owner sends the SMS to the controller, issue the necessary signals to stop the motor. In this paper, the reviewed related technology in section 3. The vehicle tracking and locking systems Vehicle Tracking and Locking System Based on GSM and GPS 87 Copyright © 2013 MECS I.J. Intelligent Systems and Applications, 2013, 09, 86-93 carried out in section 4. The conclusions, advantages and future scope in section 5.
  • 10. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 10 II. Survey of the RelatedWork In [2], the hardware and software of the GPS and GSM network were developed. The proposed GPS/GSM based System has the two parts, first is a mobile unit and another is controlling station. The system processes, interfaces, connections, data transmission and reception of data among the mobile unit and control stations are working successfully. These results are compatible with GPS technologies. In [3], a vehicle tracking system is an electronic device, installed in a vehicle to enable the owner or a third party to track the vehicle's place. This paper proposed to design a vehicle tracking system that works using GPS and GSM technology. This system built based on embedded system, used for tracking and positioning of any vehicle by using Global Positioning System (GPS) and Global system for mobile communication (GSM). This design will continuously watch a moving Vehicle and report the status of the Vehicle on demand. In [4], Face Detection System used to detect the face of the driver, and compare with the predefined face. The car owner is sleeping during the night time and someone theft the car. Then Face Detection System obtains images by one tiny web camera, which is hidden easily in somewhere in the car. Face Detection System compared the obtained images with the stored images. If the images don't match, then the information sends to the owner through MMS. The owners get the images of the thief in mobile phone and trace the place through GPS. The place of the car and its speed displayed to the owner through SMS. The owner can recognize the thief images as well as the place of the car and can easily find out the hijackers image. This system applied in our day-to-day life. In [5], this system provided vehicle cabin safety, security based on embedded system by modifying the existing modules. This method monitors the level of the toxic gases such as CO, LPG and alcohol within the vehicle provided alert information as alarm during the dangerous situations. The SMS sends to the authorized person through the GSM. In this method, the IR Sensor used to detect the static obstacle in front of the vehicle and the vehicle stopped if any obstacle detected. This is avoiding accidents due to collision of vehicles with any static obstacles. In [6], Kai-Tai Song and Chih-Chieh Yang have a designed and built on a real-time visual tracking system for vehicle safety applications. In this paper built a novel feature-based vehicle- tracking algorithm, automatically detect and track several moving objects, like cars and motorcycles, ahead of the tracking vehicle. Joint with the concept of focus of expansion (FOE) and view analysis, the built system can segment features of moving objects from moving background and offer a collision word of warning on real-time. The proposed algorithm using a CMOS image sensor and NMOS embedded processor architecture. The constructed stand-alone
  • 11. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 11 visual tracking system validated in real road tests. The results provided information of collision warning in urban artery with speed about 60 km/hour both at night and day times. In [7], the remote monitoring system based on SMS and GSM was implemented. Based on the total design of the system, the hardware and software designed. In this paper, the GSM network is a medium for transmitting the remote signal. This includes two parts that are the monitoring center and the remote monitoring station. The monitoring centers consist of a computer and communication module of GSM. The software-monitoring center and the remote monitoring station implemented by using VB. The result of this demonstration shows that the system can watch and control the remote communication between the monitoring center and the remote monitoring station. In [8] this paper, the proposed tracking system based on cloud computing infrastructure. The sensors are used to monitor the fuel level, driver conditions, and speed of the vehicle. All the data transferred to cloud serverusing GSM enabled device. All the vehicles equipped with GPS antenna to locate the place. To avoid the drunk and drive, the alcohol sensor installed to monitor the driver status. The proposed technology significantly avoids the accident in highways.
  • 12. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 12 III. ProposedMethod In this proposed work, a novel method of vehicle tracking and locking system used to track the theft vehicle by using GPS and GSM technology. This system puts into sleeping mode while the vehicle handled by the owner or authorized person otherwise goes to active mode, the mode of operation changed by in person or remotely. If any interruption occurred in any side of the door, then the IR sensor senses the signals and SMS sends to the microcontroller. The controller issues the message about the place of the vehicle to the car owner or authorized person. When send SMS to the controller, issues the control signals to the engine motor. Engine motor speeds are gradually decreases and come to the off place. After that all the doors locked. To open the door or restart the engine, authorized person needs to enter the passwords. In this method, tracking of vehicle
  • 13. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 13 3.1 Block Diagram The Block diagram of Vehicle tracking and locking system based on GSM and GPS technology is shown in 88 Vehicle Tracking and Locking System Based on GSM and GPS Copyright © 2013 MECS I.J. Intelligent Systems and Applications, 2013, 09, 86-93 the figure1. It consists the power supply section, keyboard, GSM, GPS, microcontroller, MAX232driver, relay driver, IR Transmitter, IR receiver, LCD and door locker. The GSM board has a valid SIM card with a sufficient recharge amount to make outgoing calls. The circuits powered by +5v Dc. Fig. 1: Block diagram of V
  • 14. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 14 3.2 circuit description The power supply section is very important for all electronic circuits. The 230V, 50Hz AC mains is stepped down by transformer X1 to deliver a secondary output of 12V, 500 mA. The transformer output Is rectified by a full-wave rectifier comprising diodes D1 through D4, filtered by capacitor C1 and regulated by ICs 7812 (IC2) and 7805 (IC3). Capacitor C2 bypasses the ripples present in the regulated supply. LED1 acts as the power indicator and R1 limits the current through LED1.The power supply section is shown in the figure2. Power supply
  • 15. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 15 Proposedcircuit diagram
  • 16. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 16 The circuit diagram of the vehicle tracking and locking embedded system using GPS and GSM technology is shown in Fig.3.The compact circuitry is built around Atmel AT89C52 microcontroller. The AT89C52 is a low power; high performance CMOS 8- bit microcomputer with 8 kB of Flash programmable and erasable read only memory (PEROM). It has 256 bytes of RAM, 32 input/output (I/O) lines, three 16-bit timers/ counters, a six-vector two-level interrupt architecture a full-duplex serial port, an on-chip oscillator and clock circuit.The system clock also plays a significant role in operation of the microcontroller. An 11.0592MHz quartz crystal connected to pins 18 and 19 provides basic clock to the microcontroller. Power-on reset is provided by the combination of electrolytic capacitor C3 and resistor R1. Port pins P2.0 through P2.7 of the microcontroller are connected to data port pins D0 through D7 of the LCD, respectively. Port pins P0.5, P0.6 and P0.7 of the microcontroller are connected to Register- select (RS), Read / write (RW) and enable (E) pins of the LCD, respectively. All the data is sent to the LCD in ASCII format for display. Only the commands are sent in hex form. Registerselect (RS) signal is used to distinguish between data (RS=1) and command (RS=0). Preset RV1 is used to control the contrast of the LCD. Resistor 10k limits the current through the backlight of the LCD. Port pins P3.0 (RXD) and P3.1 (TXD) of the microcontroller are used to interface with the RFID reader through Max232 and GSM Modem are used to interface through Max232. Port pins from P1.0 to P2.7 of the microcontroller are connected to keyboard. The GPS and GSM are used to connect through RXD and TXD pins of the microcontroller for further processing. The port pins of P0.0 to P0.3 are used to connect the 4 IR sensors for detecting the unauthorized person. Port1.7 is used to connect the alarm through transistor BC547, Pin number P3.3 is used to connect the engine motor. If unauthorized person enter into the car, the IR sensor sense the signals if any interruption occurs in any side of the door and send to the microcontroller, then the controller issue the message about the location of the vehicle to car owner or authorized person. When send the SMS to controller, issues the control signals to the engine motor. Engine motor speed is gradually decreases and comes to the off position. After that all the doors are locked. Pin P0.4 is used to connect the door locker through relay. To open the door or to restart the engine authorized person needs to enter the passwords. In this method, tracking of vehicle location easy and also doors are locked automatically thereby thief cannot get away from the car. Pin P0.4, transistor Q3 drives into saturation, and relay RL2 energizes to close or open the door lock.
  • 17. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 17 3.3 GPS Technology The Global Positioning System (GPS) is a satellitebased navigation system consists of a network of 24 satellites located into orbit. The system provides essential information to military, civil and commercial users around the world and which is freely accessible to anyone with a GPS receiver. GPS works in any weather circumstances at anywhere in the world. Normally no subscription fees or system charges to utilize GPS. A GPS receiver must be locked on to the signal of at least three satellites to estimate 2D position (latitude and longitude) and track movement. With four or more satellites in sight, the receiver can determine the user's 3D position (latitude, longitude and altitude). Once the vehicle position has been determined, the GPS unit can determine other information like, speed, distance to destination, time and other. GPS receiver is used for this research work to detect the vehicle location and provide information to responsible person through GSM technology. GPS Technology
  • 18. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 18 3.4 GSM Modem SIM300 V7.03 The GSM modem is a specialized type of modem which accepts a SIM card operates on a subscriber’s mobile number over a network, just like a cellular phone. It is a cell phone without display. Modem sim300 is a triband GSM/GPRS engine that works on EGSM900MHz, DCS1800MHz and PCS1900MHz frequencies.GSM Modem is RS232-logic level compatible, i.e., it takes-3v to -15v as logic high and +3v to +15 as logic low.MAX232 is used to convert TTL into RS232 logic level converter used between the microcontroller and the GSM board. The signal at pin 11 of the microcontroller is sent to the GSM modem through pin 11 of max232.this signal is received at pin2 (RX) of the GSM modem. The GSM modem transmits the signal from pin3 (TX) to the microcontroller through MAX232, which is received at pin 10 of IC1 [9]. Features of GSM  Single supply voltage 3.2v-4.5v  Typical power consumption in SLEEP Mode: 2.5mA.  SIM300 tri-band  MT,MO,CB, text and PDU mode, SMS storage: SIM card
  • 19. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 19 IV. Debugging and Testing Process A microcontroller-based system is a complex activity that involves hardware and software interfacing with the external world. Doing well design of a microcontroller-based system requires skills to use the variety of debugging and testing tools available. The debugging and testing of microcontroller-based systems divided into two groups: software-only tools and software-hardware tools. Software-only tools come as monitors and simulators, which are independent of the hardware under development. Software-hardware tools are usually hardware dependent, more expensive and range from in-circuit emulators and in-circuit simulators to in- circuit debuggers. In general, the higher the level of integration with the target hardware, the greater the benefit of a tool, resulting in a shorter development time, but the greater the cost as well. The factors to consider when choosing a debugging tool are cost, ease of use and the features offered during the debugging process. A software simulator is a computer program running on an independent hardware and it simulates the CPU, the instruction set and the I/O of the target microcontroller. Simulators offer the lowest-cost development tools for microcontroller-based systems and most companies offer their simulator programs free of charge. The user program operated in a simulated environment where the user can insert breakpoints within the code to stop the code and then analyze the internal registers and memory, display and change the values of program variables and so on. Incorrect logic or errors in computations can analyze by stepping through the code in simulation. Simulators run at speeds 100 to 1000 times slower than the actual micro controller hardware and, thus, long time delays should avoid when simulating a program. Micro controllerbased systems usually have interfaces to various external devices such as motors, I/O ports, timers, A/D converters, displays, push buttons, sensors and signal generators, which are usually difficult to simulate. Some advanced simulators, such as the Proteus from Labcenter Electronics allow the simulation of various peripheral devices such as motors, LCDs, 7-segment displays and keyboards, and users can create new peripheral devices. Inputs to the simulator can come from files that may store complex digital I/O signals and waveforms. Outputs can be as form of digital data or waveforms, usually stored in a file, or displayed on a screen.
  • 20. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 20 4.1 Hardware Assembling and Testing: First step, we need to make single side PCB layout for the given circuit diagram. After made the PCB the following process is required to complete the project. 1. Assemble all the components on the PCB based on circuit diagram. TX and RX pins of the GSM modem to pins 13 and 14 of MAX 232 and insert a valid SIM in the GSM modem. 2. Connect the GPS module according to circuit diagram. 3. This projects implemented and tested successfully by us. 4. This system is very useful and secure for car owners. V. Conclusion In this paper, we have proposed a novel method of vehicle tracking and locking systems used to track the theft vehicle by using GPS and GSM technology. This system puts into the sleeping mode vehicle handled by the owner or authorized persons; otherwise goes to active mode. The mode of operations changed by persons or remotely. When the theft identified, the responsible people send SMS to the micro controller, then issue the control signals to stop the engine motor. After that all the doors locked. To open the doors or to restart the engine authorized person needs to enter the passwords. In this method, easily track the vehicle place and doors locked.
  • 21. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 21 5.INTRODUCTION In a situation where there is high level of theft, there is need for better security system. It is much safer to have a system that monitors and communicates to the device owner without putting human life to risk in the name of “Watchman”. This tends to utilize the availability of GSM network, mobile phone and electronics circuit to achieve an automated system which is programmed to work as a thinking device to accomplish this purpose. By simply dialing the phone number of the mobile phone attached to the circuit and sending a code after the phone has automatically been answered, puts the system to either “active or inactive” state, and on any attempt of theft the system sends a text message to the device owner, demobilizes the system (car) and then starts up an alarm. With this, the car is always protected. The total absence of sufficient security personnel in a packed car is a great discomfort to car owners. This insecurity has paved way to increasing rate of stealing packed cars – even with security. In order to enhance an improved and life risk free security system, the purpose of this study is to aid a better security system of cars with the use of GSM. This system monitors one’s car against theft, and has a text message sent to the car owner, telling him that his car is being tampered, and at which part of the car (either doors or boot) is being tampered. The system will also demobilize the car (that is stopping the car from moving), set up an alarm for the people around to notice what is happening.
  • 22. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 22 The diagram in figure 1. Describe the overall system. The system comprises of a GSM which serves as an intermediate between the outside world (car owner) and the entire system. It is responsible for both receiving of calls for system activation and deactivation, and sending of text message to the car owner. Its output in the form of frequency is feed into Dual Tone Multi-Frequency (DTMF) decoder IC, which converts these frequencies into digital voltage levels of zeros and ones. The digital voltage levels received from the DTMF decoder [9] is now fed into microcontroller Integrated circuit. The micro controller which is the brain and control circuit behind the entire design is controlled with a written program stored into its Read Only Memory (ROM). The controller with the direction of the written program co-ordinate the system’s operation as follows: i. If the system is active, it monitors both the car doors and boot to check if anyone is opened. ii. Demobilizes the car by disconnecting the ignition line from the battery supply via the actuator [1]. iii. Sends text message to the car owner signifying where the attempt is made from, and finally iv. Starts up an alarm for alert purpose. v. But, if the system is inactive, the microcontroller disables all outputs and sensor inputs. In this paper, the design utilized locally assembled microcontroller and few other basic electronics components to achieve both the control and the controlled. Evidently, microcontrollers have been used to perform such simple security task in which human performance might degrade over time. The reliability of this design makes it durable and capable for offering guarantee security at all time. The power supply provides the voltage and current required for effective performance of the system. This supply is tapped from the car battery and then regulated before being fed to the system.
  • 23. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 23 II. DESIGN FRAME WORK 2.2 System Design The design process is divided into two: Hardware and Software designs. 2.2.1 Hardware Design 2.2.1.1 The microcontroller. This microcontroller system is designed around the Intel’s AT89C51 microcontroller [1]. The Intel AT89C51 microcontroller is a complete computer on a single chip. This is because it has Read Only Memory (ROM), Random Access Memory (RAM) and Central Processing Unit (CPU) embedded in it. The AT89C51 is a low-power, high performance CMOS 8-bit microcomputer with 8K bytes of memory. The device is manufactured using Atmel’s high-density non-volatile Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message… 20 memory technology and is compatible with the industry standard 80C5l and 80C52 instruction set and pin out. The on-chip flash allows the program memory to be reprogrammed in-system or by a conventional non-volatile memory programmer. It also provides programmable timer, programmable I/O ports together with 256 × 8-bit RAM for use as “scratch book” and also for stack purposes. The alarm was implemented using a 12V/15W siren. The Dual Tone Multi-Frequency (DTMF) IC – MT8870/CM8870 is an IC which detects frequency in the form of tone and then encodes it into different digital voltage levels [12]. It principle is on combining two carrier frequencies of upper level and lower level which produces a unique tone. The DTMF is made to produce different voltage level for every key pressed on the connected phone. Opto transistor CNY-17 is serving as a tap button contactor [9], which is used for initiating a keypad pressing command on the connected phone. FET (IRF3205) is a power mosfet [13]. It functions as an actuator to the demobilization unit. Relay is the demobilizer in the system. Voltage regulation is achieved by the use of LM7805.
  • 24. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 24
  • 25. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 25 III. PERFORMANCEEVALUATION ANDTESTING Various test was carried out before, during and after the construction has been completed. The multi-meter was extensively used for carrying out most of these tests. Each subunit was tested and confirmed efficient. After the construction of the entire system, the program was written and burned into the microcontroller chip. On interfacing it to the car, it tested ok as it performed the objective of the design. Satisfaction was gotten from the moment the system was activated and the car opened, the system automatically disconnected the ignition, sent a text message to a programmed recipient and then started up an alarm. The mission of the design was accomplished. The entire system has three inputs, which are: - the output of the DTMF decoder, the output from the phone ear piece jack and the sensors from the car doors and boot. The system outputs are the text message controller, alarming system and demobilization unit. The system is battery powered and was tapped from car battery and for this reason it made it easier for dc use. With these a system that sends text message to car owner is designed and implemented.
  • 26. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 26 IV. CONCLUSION It is always better to start every design with a good proposal, which will stand as a reference point to the work as it proceeds. The result of any design gives joy if aims and objectives are gotten. Since the project performed its proposal, it indeed satisfactory. Now from the input to the output of each stage was a success. The major input is like an interrupt and upon reception by microcontroller it goes through the iteration of demobilizing the car, sending text message and starting up an alarm. The design is thus a huge success.
  • 27. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 27 REFERENCES Hawrra, H.A. & Al-Rubiae (2007). Design and Implementation of Computerized control room. Journal of Karbala University, 5(2). Johnson, M.J.&Subramanyam, G. (1996). A parallel port interface circuit for computer control applications involving multiple stepper motors, Circuits and Systems, IEEE 39th Midwest symposium, 2, pp.889-892. (http://www.ivsl.org: http:// libhub.sempertool.dk.tiger.sempertool.dk/libhub?func = search & query = resid: cf092124eb1d1d40460d090ea4ad7692) . Zhou, W., Sha, Z., Meng, Z. &Xu, Y. (2007). Design of Serial/Parallel Communication Interface of Digital Potentiometer with PC, 8th International Conference on Electronic Measurement and Instruments (ICEMI.2007) , Pp: 3-150-3-154 , . (http://www.ivsl.org:http: // libhub.sempertool.dk.tiger.sempertool.dk /libhub?func =search&query=resid:c016167283f52d2740da48e994306ff6) . Hamed, B. (2012). Efficient Authorized Access Security System Control Using ATMEL 89C55 & Mobile Bluetooth. International Journal of Computer Theory and Engineering, 4(1). Samuel, D. (2008). RFID security in door locks, Master thesis performed in information coding at Linköping Institute of Technology. Axelson, J. (2000). Parallel Port Complete.Programming, Interfacing, & Using the PC’s Parallel Printer Port. Published by Lakeview Research. Vincent, C., Hu, D. F., Ferraiolo & Kuhn, D. R. (2006). Assessment of Access Control Systems. National Institute of Standards and Technology.
  • 28. Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 28