Beruflich Dokumente
Kultur Dokumente
CHAPTER 1
INTRODUCTION
With the rapid development of national economy, automobiles have increased greatly as the
human's important vehicles. In todays world owing a car is not a big deal but safeguarding
the owned car has become a great deal. Even though the modern automobiles are
heterogeneously combined by the combination of latest digital components it had also created
the opportunity for new attacks. However, it is the development of modern technology that
makes the commit means of crimes become smarter and the automobiles stolen events more
frequent.
Several security and tracking systems are designed to assist corporations with large
number of vehicles and several usage purposes. A fleet management system can minimize the
cost and effort of employees to finish road assignments within a minimal time. Besides,
assignments can be scheduled in advanced based on current vehicles location. Therefore,
central fleet management is essential to large enterprises to meet the varying requirements of
customers and to improve the productivity. However, there are still some security gaps where
these technologies dont prevent a vehicle from theft, dont assist to recover it and dont
allow the users to know the status of their vehicles. They cant permit the owner to
communicate with the vehicle online, even if the owner is certain that the vehicle was stolen.
Compounding this issue, in order to resolve the attack over the automotives many
security systems such as car alarm, radar communication system and immobilizer perceptions
are in existence. The current prevailing security system has certain disadvantages by itself.
Hence it has become evident to develop a security system to make an identity and monitor the
security of an automotive.
Electronics anti-theft is the most widely used among all the appliances at the moment.
But the chip one and the network one are the developing directions of the auto-guard
technology.
Page 1
GSM (Global System for Mobile communications) is the technology that underpins
most of the world's mobile phone networks. The GSM platform is a hugely successful
wireless technology and an unprecedented story of global achievement and cooperation.
GSM has become the world's fastest growing communications technology of all time and the
leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular
technology used for transmitting mobile voice and data services. GSM operates in the
900MHz and 1.8GHz bands GSM supports data transfer speeds of up to 9.6 kbps, allowing
the transmission of basic data services such as SMS.
The system mainly includes three parts controller, RFID and mobile communication, as
shown in figure1.1.
Page 2
RFID
RFID system consists of three parts. They are antenna, tag and reader. The principle of RFID
system is that the reader puts the signals to be sent into a carrier signal with a certain
frequency after encoding. And then the signals will be sent out by antenna. When the pulse
signals are received by tag which works within the scope of the reader, the circuit in the chip
will do some work like modulating, decrypting and decoding. And then it will distinguish
between the command request, passwords or permission. If it is the read command, the
control logical circuit will get the message from the memory.
After encrypting, encoding and modulating, the message will be sent to reader by the
antenna in the chip. And then after demodulating, decoding and decrypting, the reader is
going to send the message out to the center of message system to manipulate data. If it is the
write command of message modification, the inner charge pump originated by control logical
circuit will pull the working voltage up, so that the content in the E2PROM will be modified.
Only when the key with right identification code is inserted into ignition switch, the
auto can start up in a right way. When the ignition switch is turned off, the reader will send
a13.56MHz charge pulse out to the tag. It will charge the capacitor as soon as the pulses are
received. So the responder is able to give a specific code to reader. As a result, the signals are
transmitted between the antenna of reader and the antenna of tag. The control part of the
reader will encode signals and compare them with the codes in microcomputer. If they are in
the same, the control process of engine and ignition switch will start up immediately by the
control part. As soon as there is one bit different from each other, the system will send the
alarm information out.
Dept. of TE, GSSSIETW, Mysore
Page 3
Page 4
CHAPTER 2
LITERATURE SURVEY
Security systems nowadays have become a need for vehicles available with many modern
features. This includes car security system with extra access and intelligent alarming. This
system will be accessed and configured by owner using bluetooth module communication via
mobile phone to turn in on or off. The system suggests that GSM based security system are
more stout than an ordinary security system. Due to the insecure environment the ratio of the
vehicle theft increases rapidly. Because of this the manufactures of the automotive are taking
some serious steps for the protection of their valuable vehicles which includes activating
alarms, steering wheel lock systems. They ensure authorization for the owners and also
inbuilt these anti-theft system to prevent car from theft.
Most modern car alarm systems are much more sophisticated than this. They consist
of an array of sensors that can include switches, pressure sensors and motion detectors. A
siren often is able to create a variety of sounds so that user can pick a distinct sound for the
car. A radio receiver allows wireless control from a key fob. An auxiliary battery is also
provided so that the alarm can operate even if the main battery gets disconnected. A computer
control unit monitors everything and also sounds the alarm. It also known as the "brain" of
the system.
Page 5
The system shown in figure2.2 is activated when the ignition key is removed. Every
time there is an attempt to start the car, the system transmits a new code. Only when the ECU
Page 6
Page 7
Page 8
CHAPTER 3
DESIGN METHODOLOGY
3.1 Proposed method
Antitheft security system using AT instructions utilizes a system design with GSM to monitor
and safeguard a car. It secures the car against theft. Upon activation, it automatically
demobilizes the car by disconnecting the ignition key supply from the car battery. This now
makes it impossible for anybody to start the car, let alone moving with it.
3.2 Goal
The main intention of this system is to reduce the theft rate of the car and meet the
Intellectualized auto-guard demand of people.
Page 9
It is the AT instructions that transported between the MCU and GSM through the very
two channels. In addition, the GSM module includes voice system channel and MIC channel.
These channels are switched by MCU because of the AT instructions which are mainly
applied to the switching between the voice and microphone in the monitor system. When the
user communicates with the phone equipped in the car, if the button is pressed, it will
produce DTMF signal which is sent out to the multi Frequency decode chip to analyze and
produce Q signal through IN+ and IN-.At this moment, the MCU decides how to operate
according to the Q signal.
Dept. of TE, GSSSIETW, Mysore
Page 10
Page 11
Page 12
Page 13
CHAPTER 4
4.2 Disadvantages
1. The use of RFID can cause interference; overloaded reading (fail to read), increase
cost and also some materials may create signal problem.
2. Theft cannot be avoided fully due to few disadvantages in the components used.
3. The RFID card must be carefully kept.
4.3 Applications
1. Preventing theft of automobiles.
2. Many more auto-guards with additional features such as GPS, embedded systems and
computer control were used solely for the anti-theft system in cars for maintaining the
safety of cars from evasion.
3. The software design of the auto-guard system can be implemented using LABVIEW.
4. Auto Guard Anti-Theft is implemented in all Cadillac, Chevrolet, GM and Ford cars.
Page 14
CHAPTER 5
The advantages mentioned above meet the requirements of auto-guard system, so that
a better effect was made in practice. In addition, it is easy to extend functions. If the function
of position tracking is needed, the GPS module can be added. If the Internet of Things is to be
entered, user only needs to rewrite the software. As a result, the radio technology at present
can be replaced completely. So the practical value and the market prospect are considerable.
Page 15
Brahmastra solution
GPS cannot penetrate forest cover, parking garages or other obstructions. It relays on a short
visible antenna that can be easily broken by a thief. The operations are similar to that of a
GSM or GPS based system with a difference that the SMS is sent to the single board
computer. The single board computer gives the appropriate command to the master ECU
which disables the mechanical parts. Impact sensors are also incorporated to ensure if there is
a break into the car by breaking a glass the siren shall go off and cause an electric shock to
the thief by programming the sensor with PIC microcontroller, when this happens the thief
shall flee out of the car. With areas of less coverage the satellite technology shall come into
effect which shall in turn help with above tasks. The main advantage is that it can be afforded
by the general public and could also be added with additional features as required by the
customer.
Multilevel security system for automotives using RFID and biometric techniques in Lab
VIEW
The system aims at securing the automotive using the technologies like Radio Frequency
Identification (RFID) technology, thumb registration system and face recognition which is
efficient by nature. Initially the RFID system gets authenticated. The proposed system
possesses three modes of operations namely training mode, automatic mode and the manual
Page 16
Figure 5.2 Multilevel security system for automotives using RFID and biometric techniques in
LabVIEW
Page 17
REFERENCES
Journals
[1] HuaqunGuo,ChengH.S.,Wu Y.D.,AngJ.J.,TaoF.,etal.,An automotive security system
for anti-theft, Proceedings of the Eighth International Conference on Digital Object
Identifier,pp.421-426, Mar. 2009.
[2] Hui Song,Sencun Zhu,Guohong Cao,SVATS:a sensor-network-based vehicle antitheft
system,
Proceedings
of
The
27th
Conference
on
Computer
Communications,pp.2128-2136,May,2008.
[3] Yang Wang,Xian-Jun Gao,ZhangGang,A study on Mn coding for guarding against
theft and remote control device of an automobile, Proceedings of International
Conference on Vehicle Electronics,pp.294- 297,1999.
[4] KhanguraK.S.,Middleton N.V.,OllivierM.M.,Vehicle anti-theft system uses radio
frequency identification,Proceedings of IEE Colloquium on Vehicle Security
Systems,pp.1-7,Oct. 1993.
[5] Hirano M.,Takeuchi M.,TomodaT.,Nakano K.-I.,Keyless entry system with radio
card transponder [automobiles],Proceedings of IEEE Transactions on Industrial
Electronics,vol.35,no.2,pp.208-216, May 1988.
[6] Wan
Lili,ChenTiejun,Automobile
GSM,Proceedings
of
International
anti-theft
system
Conference
on
design
Advanced
based
on
Computer
Control,pp.551-554,Jan. 2009.
[7] Jayendra G.,Kumarawadu S.,Meegahapola L.,RFID-based anti-theft auto security
system with an immobilizer, Proceedings of International Conference on Industrial
and Information Systems,pp.441-446, Aug. 2007.
[8] GuoHongzhi,ChenHong,JiGuohuang,ZhouXin,The vehicle passive keyless entry
system
Page 18