Beruflich Dokumente
Kultur Dokumente
The objective of this project is to design a system which will enable users to remotely
control their car security feature using a cell phone-based interface. To access the car, the
user should send an authentication code along with the required/desired function/action to
his/her control system via GSM. Upon being properly authenticated, the cell phone-based
interface (control unit) would relay the commands to a microcontroller that would
perform the required function/action e.g. enables or disables the vehicle par adventure it
has been tampered with.
This is basically an electronic device fitted to an automobile which prevents the engine
from running unless the correct key (or other token) is present. This prevents the car from
being "hot-wired" after entry has been achieved.
CHAPTER ONE
INTRODUCTION
An anti-theft system is any device or method used to prevent or deter the unauthorized
appropriation of items considered valuable. Theft is one of the most common and oldest
criminal behaviours. Where the ownership of a physical possession can be altered
without the rightful owner's consent, theft prevention has been introduced to assert the
ownership whenever the rightful owner is physically absent. Anti-theft systems have been
around since individuals began stealing other people's property and have evolved
accordingly to thwart increasingly complex methods of theft. From the invention of the
first lock and key to the introduction of RFID tags and biometric identification, anti-theft
systems have evolved to match the introduction of new inventions to society and the
resulting theft of them by others. In the case of vehicle theft, the best deterrent to theft is
in the installation of an approved vehicle anti-theft immobilizer. Many vehicles have
OEM (factory installed) units and afford protection through the ignition system. OEM
immobilizers function through the ECM/PCM (computer) under the hood of the vehicle.
In general terms, the RFID tag attached to the key must be read by the ECM in order to
allow ignition to occur. Unfortunately, organized crime is able to bypass these systems
and steal any vehicle at will. An approved immobilizer uses a 3 circuit isolation system
which thwarts even the most experienced thief.
1.1
Present Scenario
The efficacy of our security system has been in question over the last few years owing to
the wide spread global crime that has caused huge loses to man in generality. Despite all
the efforts that have been expended to this bizarre situation little or no result has been
realized.
Security, as used in this context, describes measures that prevent or defer unsolicited
intrusion from accessing a vehicle by disabling the ignition or gasoline supply with the
use of mobile phone.
2
Motor vehicle theft has been a problem since the start of the automobile age. The 1900
Leach automobile featured a removable steering wheel that the driver could carry away to
prevent unauthorized vehicle use. More recently, sophisticated electronic alarms, some of
which incorporate radio beacons, and more tamper-resistant wiring and electronic locks
have been produced. Through the use of wireless technology, vehicles equipped with
Global Positioning System (GPS) satellite navigation systems may be tracked and
recovered when stolen.
Automobiles as we know them today are the product of centuries of tinkering and
innovation. Automobile production has grown from small companies making simple socalled horseless carriages to international corporations that mass-produce advanced,
reliable automobiles for consumers.
Automobile theft has become a $3 billion-a-year business, with over 1 million cars stolen
annually. In the past, most cars were stolen by joyriders and later abandoned; more than
90 percent of all stolen autos were recovered. Today, the typical thief works for a chop
shop, which dismantles the car and sells the parts (these are much more valuable than
the whole car itself); a much smaller proportion of automobiles are recovered.
Some insurance companies are fighting losses from auto theft by giving premium credits
for use of antitheft devices. Others now charge a substantial deductible in cases where the
insured leaves the keys in the ignition or is otherwise negligent.
In the 15th century, Italian inventor Leonardo da Vinci envisioned possibilities for
power-driven vehicles.
In this project a new concept is brought to the awareness of individuals; this scheme uses
a technology called DTMF Dual Tone Multi Frequency in its signaling technique to
control the action of vehicles against unauthorized user in other to dictate its action e.g.
engage/disable the door, engage/disable the brain box or and a combination of different
electrical action thus making its application a very vast and important one.
The DTMF was originally developed to allow sending control information (dialed
numbers) across the telephone network. The telephone network has a bandwidth of
approx. 300 to 3400 Hz, suitable for voice communications. Any control tones would
also need to be in this range and had to work regardless of whether voice was present or
not. A single tone or frequency could have been used. However, if voice was present, it
would interfere with the control tones, making them useless. To overcome this, a scheme
was developed whereby two tones or frequencies were combined to represent each
control code or number. A total of seven tones were needed to represent the digits
normally found on a telephone keypad, namely 0-9, * and #. An eighth tone was added so
that some extra digits were available for use. These are commonly labeled ABCD. These
eight tones were divided into two groups of four tones each, a low-frequency group and a
high-frequency group.
1.1
Description
1.2
Problem Statement
The objective of this project is to develop a device that allows for a user to remotely
control their vehicles electrical functions. This system will be a powerful and flexible tool
that will offer this service at any time, and from anywhere with the constraints of the
technologies being applied. Possible target appliances include (but are not limited to)
climate control systems, security systems and anything with an electrical interface.
The proposed approach for designing this system is to implement an auto car lock using
gsm control module that receives its instructions and commands from a Mobile phone
over the GSM network. The microcontroller then will carry out the issued commands.
For security purposes, a means of identification and user authentication will be
implemented, and will combine caller identification with a password authorization.
1.3
Operating Environment
The control system will include two separate units: the mobile phone, and the control
unit. There will therefore be two operating environments. The mobile phone will operate
indoors and outdoors whereas the control unit will operate indoors because it resides in
the vehicle.
1.4
Assumptions
CHAPTER TWO
2.0
In 1980, Ford Motor Company introduced an external keypad-type keyless entry system,
wherein the driver entered a numeric combination -- either pre-programmed at the factory
or one programmed by the owner -- to unlock the car without the key. Early- to mid1980s Nissan Maximas could also be installed with a keypad, which would also retract
the windows and moon roof once the car was successfully unlocked by pushing a specific
button on the keypad.
Currently, many luxury makers also allow the windows to be opened or closed by
pressing and holding a button on the remote control key fob, or by inserting the ignition
key and holding it in the lock or unlock position in the external driver's door lock. During
the early 1990s, Subaru offered infra-red keyless entry on the Japanese Domestic Market
Legacy, installing the transmitter in the ignition key. The Legacy could also be opened by
pulling the drivers external door handle a specific number of times to enter a passcode
number that would unlock the driver's door only.
This system confirms successful (un)locking through either a light or a horn signal, and
usually offers an option to switch easily between these two variants. Both provide almost
the same functionality, though light signals are more discreet while horn signals might
create a nuisance in residential neighborhoods and other busy parking areas (e.g. shortterm parking lots). Some manufacturers offer the ability to adjust the horn signal volume.
Other cars have a proximity system that is triggered if a keylike transducer (Advanced
Key or handsfree) is within a certain distance of the car.
Early models used a static code in the ignition key (or key fob) which was recognised by
an RFID loop around the lock barrel and checked against the vehicle's Engine Control
7
Unit (ECU) for a match. If the code is unrecognised, the ECU will not allow fuel to flow
and ignition to take place. Later models use rolling codes or advanced cryptography to
defeat copying of the code from the key or ECU.
The microcircuit inside the key is activated by a small electromagnetic field which
induces current to flow inside the key body, which in turn broadcasts a unique binary
code which is read by the automobile's ECU. When the ECU determines that the coded
key is both current and valid, the ECU activates the fuel-injection sequence.
Fig 2.0
In this project I have used the auto answer facility which is present in many of the cell
phones today, so I escaped from designing the ring detector circuit.
The aim of the system is to develop a cost effective solution that will provide controlling
of vehicles remotely and to enable it against intrusion in the absence of owner. This
system is highly feasible due to development of a low cost system. This control system
with an affordable cost was thought to be built that should be able to provide seamless
remote access via mobile phones in other to automate the conventional key lock system
thus allowing for a seamless security.
8
In this system, a cellular phone based security system that will meet todays need will be
seen at work.
2.1
This product is aimed toward average consumers who wish to control their vehicle
security outfit remotely from their mobile phones provided that it is electrically
controllable.
enable/disable
Example
security
of
feasible
systems,
applications
doors,
ignition,
under
consideration
steering,
dash
includes;
boards,
and
CHAPTER THREE
Basic Electrical Component Used
3.0
Resistors
3.1
Capacitors
These are devices that might be considered simply frequency dependent resistors. A
capacitors is more complicated than a resistor, the current is not simply proportional to
the voltage, but rather to the rate of change of voltage. Capacitors consist of two metal
plates that are separated by an insulating material .If a battery is connected to both plates;
an electric charge will flow for a short time and accumulate on each plate. If the battery is
disconnected, the capacitor retains the charge and the voltage associated with it. Rapidly
changing voltages, such as caused by an audio or radio signal, produce larger current
flows to and from the plates; the capacitor then functions as a conductor for the changing
current. This effect can be used, for example, to separate an audio or radio signal from a
direct current in order to connect the output of one amplifier stage to the input of the next
amplifier stage. Capacitors are employed in circuits for any of the following purposes;
bypass coupling, filtering, energy storage and resonant circuits.
10
3.2
Transistors
Transistors are made from semiconductors. These are materials, such as silicon or
germanium, that are doped (have minute amounts of foreign elements added) so that
either an abundance or a lack of free electrons exists. In the former case, the
semiconductor is called n-type, and in the latter case, p-type. By combining n-type and ptype materials, a diode can be produced. When this diode is connected to a battery so that
the p-type material is positive and the n-type negative, electrons are repelled from the
negative battery terminal and pass unimpeded to the p-region, which lacks electrons.
With battery reversed, the electrons arriving in the p-material can pass only with
difficulty to the n-material, which is already filled with free electrons, and the current is
almost zero.
3.3
Led Displays
Basically, LED displays are nothing else but several LEDs molded in the same plastic
case. Diodes are arranged so that different marks-commonly digits: 0, 1, and 2...9 are
displayed by activating them. There are many types of displays composed of several
dozens of built in diodes which can display different symbols.
11
The most commonly used are so called 7-segment displays. They are composed of 8
LEDs, 7 segments are arranged as a rectangle for symbol displaying and there is
additional segment for decimal point displaying. In order to simplify connecting, anodes
and cathodes of all diodes are connected to the common pin so that there are common
cathode displays and common anode displays. Segments are marked with the litters A to
G as shown on the figure on the left. When connecting, each diode is treated
independently, which means that each must have its own conductor for current limitation.
When displaying any digit, a defeating fact that microcontroller is nevertheless only a
machine made to understand only language of units and zeros is fully expressed. Namely,
it does not know what units, tens or hundreds are, nor it knows how ten digits we are
used to look like. Therefore, each number intended to be shown on display must be
prepared in the following way:
12
3.3
Clock Signal
Although the microcontroller has built in oscillator, it cannot operate without external the
quartz crystal which stabilizes its frequency (microcontrollers operating speed).
Naturally, there are some exceptions too: if this solution cannot be applied for some
reason, there are always alternative ones. One of them is to bring clock signal from
special source through invertors.
The oscillator in this circuit is an 11MHz crystal which produces a square wave signal
that is used to synchronize the system.
3.4
Microcontroller Unit
This section is the core of the system. It sees to it that all action of the traffic system is
free from contention or clash.
instruction that has been compiled and downloaded to it through a device programmer.
As all other good things, this powerful component is basically very simple and is
obtained by uniting tested and high- quality "ingredients" (components) as per following
receipt:
1.
2.
Depending on the taste of the producer, it is added: a bit of memory, a few A/D
Three things have had a crucial impact on such a success of the microcontrollers:
Powerful and intelligently chosen electronics embedded in the microcontrollers
can via input/output devices
relays) control various processes and devices such as: industrial automatics,
electric current, temperature, engine performance etc.
A very low price enables them to be embedded in such devices in which, until
recent time it was not worth embedding anything. Thanks to that, the world is
overwhelmed today with cheap automatic devices and various intelligent
appliances.
Prior knowledge is hardly needed for programming. It is sufficient to have any
kind of PC (software in use is not demanding at all and it is easy to learn to work
on it) and one simple device (programmer) used for transferring completed
programs into the microcontroller.
Power supply connectors are connected to the power supply source and everything
starts to happen at high speed! The control logic registers what is going on first. It
enables only quartz oscillator to operate. While the first preparations are in progress and
parasite capacities are being charged, the first milliseconds go by.
3.
Voltage level has reached its full value and frequency of oscillator has become
stable. The bits are being written to the SFRs, showing the state of all peripherals and all
14
pins are configured as outputs. Everything occurs in harmony to the pulses rhythm and
the overall electronic starts operating
4.
Program Counter is reset to zero address of the program memory. Instruction from
that address is sent to instruction decoder where its meaning is recognized and it is
executed with immediate effect.
5.
The value of the Program Counter is being incremented by 1 and the whole
Relay Circuitry
The output from the port of the microcontroller is given to the relay driver IC which
drives the corresponding relay, to which the security gate is connected.
Once the relay is energized, the output is used to control the conduction of the fuel pump.
15
CHAPTER FOUR
Methodology
In some vehicles, attempts to use an unauthorized or "non-sequenced" key cause the
vehicle to activate a timed no-start condition and in some highly advanced systems, even
use satellite or mobile phone communication to alert a security firm that an unauthorized
attempt was made to code a key.
Coincidentally, this information is often recorded in modern automobile ECUs, which
may record many other variables including speed, temperature, driver weight, geographic
location, throttle position and yaw angle. This information can be used during insurance
investigations, warranty claims or technical troubleshooting.
Add-on immobilisers are available for older cars or vehicles without factory
immobilisers. The insurance approval for a self-arming immobiliser is known as
"Thatcham 2" after the Motor Insurance Repair Research Centre in Thatcham, England.
Approved immobilisers must intercept at least two circuits; typically the low-voltage
ignition circuit and the fuel pump circuit. Some may also intercept the low-current starter
motor circuit from the key switch to the relay.
System Specifications:
1. An authenticated user can control his/her vehicle from any remote place having mobile
phone network.
4. The system requires two phones out of which the one present at the control unit has to
be a mobile phone with auto answer facility.
16
Block Diagram
17
The Microcontroller:
The five output bits of the decoder IC serve as an input to port of the microcontroller.
Then each tone is verified by the programmed microcontroller and once a correct
sequence of code is received, output corresponding to the tones sent by the user is made
available at the port, which is connected to the brain box of the vehicle for the proper
action depicted by the user i.e. enable/disable security systems, doors, ignition, steering,
dash boards, and heating/ventilation/air conditioning system.
The output from the port of the microcontroller is given to the relay driver IC which
drives the corresponding relay, to which the security connection is made.
Once the relay is energized, the output is set the appropriate action that is needed.
IMPLEMENTATION OF SYSTEM
System Algorithm:
1. Person who wants to lock his car calls on the phone at the receiver side which
resides in the car.
2. The call gets answered automatically if it is not picked up manually before
5seconds.
3. Once the call gets answered the password is entered for authentication (in our case
it is our four digit code).
18
4. If authenticated, the controller takes the right action i.e. locks the car.
Note:
On the transmitter side the user controlling the security features of the car has to press
each digit for a minimum duration of time, which is 40ms.
19
CHAPTER FIVE
CONCLUTION AND RECOMMENDATION
Conclusion
Since is of paramount important to remotely control prevent our cars from unauthorized
for security reasons. The distance is no longer a barrier to our remote control system this
time, because of the introduction of communication network. The technology of remote
control system has advanced in controlling security features of cars over a GSM
communication network and is also flexible.
RECOMMENDATION
I recommend the GSM remote control system for use in domestic and industrial terrain,
to remotely control security conscious devices especially in the offices where delicate
informations can be easily leaked hence the need for a security stronghold and also in
the industries were no body Can move close to the machines and some moveable parts of
the heavy machines. Because of the distance and communication network used in this
project work, I recommend users of remote control system to go for GSM remote control
system because it is more versatile.
20
Bill of Material
VALUE
QUANTITY
UNIT PRICE N
TOTAL
100nF
10uF
1K
100K
330K
C1815
Buzzer
3-in-1 Seven Seg.
Veroboard
Phone jack
18 Pin Socket
40 Pin socket
14 Pin socket
ULN2003
AT89S52 MCU
MT8870 DTMF chip
11MHz crystal
3.59475MHz crystal
Misc
Phone
Total
3
1
1
1
1
5
1
1
1
1
1
1
1
1
1
1
1
1
1
200
200
100
100
100
550
3780
1500
200
950
1500
1600
1300
4300
11000
35550
360
360
9800
3780
600
200
100
100
100
2750
3780
1500
200
950
1500
1600
1300
4300
11000
22550
360
360
9800
3780
79730
=========
21
APPENDIX
OUTPUT
DATA_IN
DATA
DATA
MOTOR
BUZZER
RELAY
DISPLAY_1 BIT
DISPLAY_2 BIT
DISPLAY_3 BIT
BIT
BIT
BIT
DELAY_REG DATA
DELAY_REG1
DATA
DELAY_REG2
DATA
STORE_1
DATA
STORE_2
DATA
STORE_3
DATA
DATA_HOLD_1
DATA
DATA_HOLD_2
DATA
DATA_HOLD_3
DATA
DATA_COUNTER DATA
TEMP_STORE
DATA
REFRESH_REG
DATA
BEEP_REG DATA
080H
090H
0A0H.0
0A0H.1
0A0H.4
0A0H.5
0A0H.6
0A0H.7
000H
001H
002H
003H
004H
005H
006H
007H
008H
009H
00AH
00BH
00CH
ORG 000H
AJMP BOOTSTRAP
ORG 003H
AJMP CHECK_FUNCTION
ORG 00BH
AJMP REFRESH_DATA
ORG 01BH
AJMP BEEP
22
ORG 03AH
BOOTSTRAP:
MOV SP,#025H
MOV OUTPUT,#000
MOV DATA_IN,#01EH
CLR RELAY
CLR BUZZER
CLR MOTOR
CLR DISPLAY_1
CLR DISPLAY_2
CLR DISPLAY_3
MOV STORE_1,#040H
MOV STORE_2,#040H
MOV STORE_3,#040H
MOV DATA_HOLD_1,#009
MOV DATA_HOLD_2,#004
MOV DATA_HOLD_3,#003
MOV DATA_COUNTER,#000
MOV REFRESH_REG,#020
MOV BEEP_REG,#003
MOV TMOD,#011H
CLR P3.3
CLR TR1
AJMP MAIN
MAIN:
MOV OUTPUT,STORE_1
SETB DISPLAY_1
ACALL DELAY_150Hz_4MHz
CLR DISPLAY_1
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
MOV OUTPUT,STORE_2
SETB DISPLAY_2
ACALL DELAY_150Hz_4MHz
CLR DISPLAY_2
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
MOV OUTPUT,STORE_3
SETB DISPLAY_3
ACALL DELAY_150Hz_4MHz
CLR DISPLAY_3
23
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
MOV IE,#10001011B
JNB TR1,CLEAR_ALL
AJMP CHECK_STATUS
CLEAR_ALL:
CLR BUZZER
CLR RELAY
CLR MOTOR
AJMP CHECK_STATUS
CHECK_STATUS:
MOV A,STORE_2
CJNE A,#03FH,STATUS_SKIP
SETB RELAY
SETB MOTOR
CLR TR1
CLR BUZZER
AJMP MAIN
STATUS_SKIP:
CHECK_FUNCTION:
SETB P3.3
JNB P3.2,$
SETB TR0
MOV A,DATA_IN
MOV TEMP_STORE,A
MOV A,DATA_COUNTER
CJNE A,#000,CHECK_2
MOV DATA_HOLD_1,TEMP_STORE
INC DATA_COUNTER
MOV REFRESH_REG,#020
RETI
CHECK_2:
CJNE A,#001,CHECK_3
MOV DATA_HOLD_2,TEMP_STORE
INC DATA_COUNTER
MOV REFRESH_REG,#020
RETI
CHECK_3:
MOV DATA_HOLD_3,TEMP_STORE
MOV DATA_COUNTER,#000
ACALL DO_FUNCTION
MOV REFRESH_REG,#020
RETI
DO_FUNCTION:
MOV A,DATA_HOLD_1
CJNE A,#014H,DO_FUNCTION_OFF
24
MOV A,DATA_HOLD_2
CJNE A,#002H,DO_FUNCTION_OFF
MOV A,DATA_HOLD_3
CJNE A,#010H,DO_FUNCTION_OFF
SETB RELAY
SETB MOTOR
CLR TR1
CLR BUZZER
MOV STORE_1,#037H
MOV STORE_2,#03FH
MOV STORE_3,#040H
MOV REFRESH_REG,#020
CLR TR1
CLR BUZZER
RETI
DO_FUNCTION_OFF:
MOV A,DATA_HOLD_1
CJNE A,#012H,DO_FUNCTION_EXIT
MOV A,DATA_HOLD_2
CJNE A,#004H,DO_FUNCTION_EXIT
MOV A,DATA_HOLD_3
CJNE A,#018H,DO_FUNCTION_EXIT
CLR RELAY
CLR MOTOR
SETB BUZZER
MOV STORE_1,#071H
MOV STORE_2,#071H
MOV STORE_3,#03FH
SETB TR1
RETI
DO_FUNCTION_EXIT:
MOV DATA_HOLD_1,#000
MOV DATA_HOLD_2,#000
MOV DATA_HOLD_3,#000
INT_RETURN:
RETI
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
REFRESH_DATA:
DJNZ REFRESH_REG,INT_RETURN
MOV REFRESH_REG,#020
MOV DATA_HOLD_1,#000
MOV DATA_HOLD_2,#000
MOV DATA_HOLD_3,#000
CLR TR0
CLR P3.3
25
RETI
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
BEEP:
RETU:
DJNZ BEEP_REG,RETU
MOV BEEP_REG,#003
CPL BUZZER
RETI
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
DELAY_150Hz_4MHz:
MOV DELAY_REG,#4
MOV DELAY_REG1,#224
LAY_150Hz_4MHz: DJNZ DELAY_REG1,LAY_150Hz_4MHz
DJNZ DELAY_REG,LAY_150Hz_4MHz
RET
END
References:
1. www.8051projects.net
2. www.edaboard.com
3. Mazidi-8051 microcontroller Dip trace Help Datasheets of the IC's
4. http://www.quasarelectronics.com/jpg/3 153_1.jpg
5. http://www.quasarelectronics.com/jpg/3 153_2.jpg
6. http://www.quasarelectronics.com/zip/dtmf.zip
7. http://www.myke.com/lcd.htm interfacing ICs
8. Chenker, L., Pushbutton Calling with a Two-Group Voice-Frequency
Code - The Bell system technical journal (IN 0005-8580) vol: 39iss:1 pp: 235-255, 1960
9. Microcontroller Technology: Atmel, at89s52, prentice hall, 7th edition,
page32, 2002
10. Coskun and H. Ardam, A Remote Controller for Home and Office Appliances by
Telephone, IEEE Trans. Consumer Electron. , vol. 44, no. 4, pp1291- 1297, November
1998
26
11. Daldal Nihat, Microcontroller Based security and Control system (In
Turkish),
27