+ All Categories
Home > Business > Development of anti theft security system

Development of anti theft security system

Date post: 16-Jul-2015
Category:
Upload: 96452128
View: 469 times
Download: 1 times
Share this document with a friend
Popular Tags:
28
Development of anti-theft security systems [Dept of E&C,GEC Ramanagara]2014-15D Page 1 1.INTRODUCTION 1.1 Background In the last few decades, India has progressed at such an enormous rate that many companies have strongly established themselves here. These companies bring a huge amount of workforce with them. Arranging transportation to such a huge mass is a cumbersome task involving many intricacies. Generally, this transport is arranged through the local transport vendors on a yearly contract basis, recently happen mishaps such as burglary, rape cases etc. The development of satellite communication technology is easy to identify the vehicle locations. Vehicle tracking systems have brought this technology to the day-to-day life of the common person. Today GPS used in cars, ambulances, fleets and police vehicles are common sights on the roads of developed countries. All the existing technology support tracking the vehicle place and status.The GPS/GSM Based System is one of the most important systems, which integrate both GSM and GPS technologies. It is necessary due to the many of applications of both GSM and GPS systems and the wide usage of them by millions of people throughout the world [1]. This system designed for users in land construction and transport business, provides real-time information such as location, speed and expected arrival time of the user is moving vehicles in a concise and easy-to- read format. This system may also useful for communication process among the two points. Currently GPS vehicle tracking ensures their safety as travelling. This vehicle tracking system found in clients vehicles as a theft prevention and rescue device. Vehicle owner or Police follow the signal emitted by the tracking system to locate a robbed vehicle in parallel the stolen vehicle engine speed going to decreased and pushed to off. After switch of the engine, motor cannot restart without permission of password. This system installed for the four wheelers, Vehicle tracking usually used in navy operators for navy management functions, routing, send off, on board information and security. The applications include monitoring driving performance of a parent with a teen driver. Vehicle tracking systems accepted in consumer vehicles as a theft prevention and retrieval device. If the theft identified, the system sends the SMS to the vehicle owner. After that vehicle owner sends the SMS to the controller, issue the necessary signals to stop the motor. In this paper, the reviewed related technology in section 3. The vehicle tracking and locking systemscarried out in section 4. The conclusions, advantages and future scope in section 5.
Transcript
Page 1: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 1

1.INTRODUCTION

1.1 Background

In the last few decades, India has progressed at such an enormous rate that many companies have

strongly established themselves here. These companies bring a huge amount of workforce with

them. Arranging transportation to such a huge mass is a cumbersome task involving many

intricacies. Generally, this transport is arranged through the local transport vendors on a yearly

contract basis, recently happen mishaps such as burglary, rape cases etc. The development of

satellite communication technology is easy to identify the vehicle locations. Vehicle tracking

systems have brought this technology to the day-to-day life of the common person. Today GPS

used in cars, ambulances, fleets and police vehicles are common sights on the roads of developed

countries. All the existing technology support tracking the vehicle place and status.The

GPS/GSM Based System is one of the most important systems, which integrate both GSM and

GPS technologies. It is necessary due to the many of applications of both GSM and GPS systems

and the wide usage of them by millions of people throughout the world [1]. This system designed

for users in land construction and transport business, provides real-time information such as

location, speed and expected arrival time of the user is moving vehicles in a concise and easy-to-

read format. This system may also useful for communication process among the two points.

Currently GPS vehicle tracking ensures their safety as travelling. This vehicle tracking system

found in clients vehicles as a theft prevention and rescue device. Vehicle owner or Police follow

the signal emitted by the tracking system to locate a robbed vehicle in parallel the stolen vehicle

engine speed going to decreased and pushed to off. After switch of the engine, motor cannot

restart without permission of password. This system installed for the four wheelers, Vehicle

tracking usually used in navy operators for navy management functions, routing, send off, on

board information and security. The applications include monitoring driving performance of a

parent with a teen driver. Vehicle tracking systems accepted in consumer vehicles as a theft

prevention and retrieval device. If the theft identified, the system sends the SMS to the vehicle

owner. After that vehicle owner sends the SMS to the controller, issue the necessary signals to

stop the motor. In this paper, the reviewed related technology in section 3. The vehicle tracking

and locking systemscarried out in section 4. The conclusions, advantages and future scope in

section 5.

Page 2: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 2

1.2 Problem Statement

Lecturer’s room door was not equipped with anti-theft system. Most people only take the whole

home security system into account. This project focuses specifically on the room security

system, and nothing to do with the home security system. This project is a simple version of

security system, and the scope was not so big as well. Door security is the main element which

will be taken into consideration.

Door security system is important nowadays. The whole building security system or civilian

home security system is expensive. Most security systems available in the market nowadays are

complicated, and installation of the system will cost another amount of money to be invested in

order to have a good security system. A variety of security devices for deterring, detecting, and

identifying offenders or intruders can be found. However, very few provide a working

relationship to a room. An intrusion deterrent device which activates a water spraying system has

been invented.

A triggering mechanism for a tear-gas canister was introduced for the purpose of security and

protection, but this idea did not have a working relationship to a room. 3Security devices to

identify the bank robbers using the spray gun to discharge a scent which can be detected by the

dog have a working relationship to a room. Device was installed inside the room, mounted at the

ceiling. This project will implement a simple anti-theft security system for lecturer’s room that

has a clear relationship to a room to fulfill this void. This project will also demonstrate the idea

of port programming and PC-based control system. Usage of computer software to control

security system was widely accepted, and only authorized person will have access to the system

which determines the room security. This feature can avoid unauthorized person to take control

of the system or gain access to the security system.

Page 3: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 3

1.3 Objectives of Project

This project was done in order to achieve some objectives at the end of the project timeline. Here

is the list of this project objectives:

1.To develop programming and software using any available software to program the security

system for the room door with auto-lock feature.

2. To demonstrate and apply the idea of computer port programming and PC-based control

system.

3. To develop Graphical User Interface (GUI) which will be used by the user to manage and

control the system.

4. To integrate the door system with personal computer using any available communication port.

5. To design and integrate hardware with electro

Page 4: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 4

1.4 Scope of Project

This project will focus on programming to lock or unlock the door via PC. Port programming

which enables interrupt process for the operating system can be used to control any external

devices attached to the PC via serial or parallel port. Port programming and user interface design

can be done using programming language such as Visual Basic 6.0, Delphi, Matlab, Visual C++,

Java, or Borlant Turbo. Both software and hardware for the system will be developed in this

project. However the system will be developed using LEDs, solenoid, and some mechanical

system to demonstrate the response of the output and input devices.

Integration of hardware and software will be done in this project to create a simple PC-based

control system. Basically, the idea is to connect output device to the PC via serial or parallel port.

Then, control software to control output device will be developed using any software

development programming language. Software is used to activate the output device by a click of

a button or simply hit the key on keyboard.

Also, output device must be able to be turned off using keyboard or mouse click. The system

can control up to 8 separate outputs individually. For this project, the system will be used to lock

or unlock the door via PC. User interface must have LOCK and UNLOCK button to control the

door. The door may be locked using electromagnetic device or any relevant mechanical system.

Password is mandatory to get access into the main control panel of the system.

Page 5: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 5

CHAPTER 2 LITERATURE REVIEW

2.1 Definition and Architecture of Security System

Security is the condition of being protected against danger or loss. In the general sense, security

is a concept similar to safety. The nuance between the two is an added emphasis on being

protected from dangers that originate from outside. Individuals or actions that encroach upon the

condition of protection are responsible for the breach of security. The word "security" in general

usage is synonymous with "safety," but as a technical term "security" means that something not

only is secure but that it has been secured .

It is very often true that people's perception of security is not directly related to actual security.

For example, a fear of flying is much more common than a fear of driving; however, driving is

generally a much more dangerous form of transport .

According to Marston, R. M., (1998) modern electronics security system range in complexity

from simple electronic door-bell to ultra-sophisticated wireless burglar alarm system that comes

complete with an array of passive infra-red (PIR) movement detectors and contact sensors plus

full remote-control and sensormonitoring facilities.

The idea of electronics-based security system has a wide range of application. They can be

designed to be activated by physical contact or body proximity, or by variation in heat, light, or

infrared radiation levels, or in voltage, current, resistance or some other electrical properties and

parameters (Marston, 1998).

2.2 Anti-theft security

Security tests by Consumer Reports Magazine in the 1990s found that many residential doors fail

or delaminate when force is applied to them. Solid wood doors withstood more force than the

very common metal skinned wood-edged doors used in newer construction [19].

The Chula Vista Residential Burglary Reduction Project there were the following findings:

"From victim interviews, we learned that in 87% of the break-ins that occurred when intruders

defeated locked doors with tools such as screwdrivers or crowbars, the burglars targeted "the one

door that had no deadbolt lock."... not one burglar attempted to break a double-pane window

during the course of successful or attempted burglary." (Page 3, The Chula Vista Residential

Burglary Reduction Project – Summary)

Page 6: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 6

2.3 Microcontroller and Assembly Language

Back to security system, Robert Gaffigan (1997) discussed in his book entitle Home Security

Projects about the usage of microcontroller to design and develop a simple security system for a

single home. He made it very clear that programming was required to design a good security

system.

High level programming language makes it easier for human being to write the code of program,

comparing to the low level language.

Using only PIC Microcontroller or Programmable Integrated Controller, Robert Gaffigan (1997)

was successfully designed a portable CO detector, pool alarm system, an early warning alarm

system, and dog bark inhibitor system.

He suggested that new user should start to learn programming using simulator. Programming

using PIC to develop a security system required a good understanding of processor working

principles. Security system was created to produce a safe and sound environment for human

being and personal properties. Security system mostly refers to electronic and computer

controlled system which can monitor and scan any given area all the time automatically.

Page 7: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 7

2.4 Home Security

The FBI reports that a home is burglarized in the U.S. every 15.4 seconds. Burglary is now

considered to be the most serious threat a home can face. In most cases, burglars are looking for

items that they can easily resell for cash. The most targeted items by burglars include laptop

computers, guns, jewelry, DVD players and other similar small electronic items (Kelly, 2008).

Most burglaries occur during the day when homeowners are at work. Generally, burglars use a

certain type of force when they break into a home; however, it only stands to reason that burglars

target those homes with seem to offer the easiest amount of access [20].

In order to protect their property and possessions, more people are buying home surveillance

systems. A home surveillance system protects against vandalism, burglary, and act as a deterrent

to crime (Ryan Mcelhinny, 2008).

Page 8: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 8

2.5 Drawback of Electronic Security System

However, usage of sophisticated electronic security system generates a lot of false alarm and this

issue had become more serious, where burglar alarm warning was no longer treated as an

emergency. This idea was very clear. Most convensional alarm system can only detect intruders

and emergency but fail to eliminate the situation. At some point, the user have to reset the system

manually.

Signal of emergency was then forwarded to the human being to handle. Most security system

operates like this. The idea of security system which only notify human in case of emergency

was totally outdated. However, early warning system can save a lot of life if it was applied to

fight Tsunami in 2004 . Security systems nowadays make use of wireless technology and robotic

security system.

Page 9: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 9

Vehicle tracking and locking system based on GSM and GPS

3.1Introduction

In the last few decades, India has progressed at such an enormous rate that many companies

have strongly established themselves here. These companies bring a huge amount of workforce

with them. Arranging transportation to such a huge mass is a cumbersome task involving many

intricacies. Generally, this transport is arranged through the local transport vendors on a yearly

contract basis, recently happen mishaps such as burglary, rape cases etc. The development of

satellite communication technology is easy to identify the vehicle locations. Vehicle tracking

systems have brought this technology to the day-to-day life of the common person. Today GPS

used in cars, ambulances, fleets and police vehicles are common sights on the roads of developed

countries. All the existing technology support tracking the vehicle place and status.

The GPS/GSM Based System is one of the most important systems, which integrate both GSM

and GPS technologies. It is necessary due to the many of applications of both GSM and GPS

systems and the wide usage of them by millions of people throughout the world . This system

designed for users in land construction and transport business, provides real-time information

such as location, speed and expected arrival time of the user is moving vehicles in a concise and

easy-to-read format. This system may also useful for communication process among the two

points.

Currently GPS vehicle tracking ensures their safety as travelling. This vehicle tracking system

found in clients vehicles as a theft prevention and rescue device. Vehicle owner or Police follow

the signal emitted by the tracking system to locate a robbed vehicle in parallel the stolen vehicle

engine speed going to decreased and pushed to off. After switch of the engine, motor cannot

restart without permission of password. This system installed for the four wheelers, Vehicle

tracking usually used in navy operators for navy management functions, routing, send off, on

board information and security. The applications include monitoring driving performance of a

parent with a teen driver. Vehicle tracking systems accepted in consumer vehicles as a theft

prevention and retrieval device. If the theft identified, the system sends the SMS to the vehicle

owner. After that vehicle owner sends the SMS to the controller, issue the necessary signals to

stop the motor. In this paper, the reviewed related technology in section 3. The vehicle tracking

and locking systems Vehicle Tracking and Locking System Based on GSM and GPS 87

Copyright © 2013 MECS I.J. Intelligent Systems and Applications, 2013, 09, 86-93 carried out

in section 4. The conclusions, advantages and future scope in section 5.

Page 10: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 10

II. Survey of the Related Work

In [2], the hardware and software of the GPS and GSM network were developed. The proposed

GPS/GSM based System has the two parts, first is a mobile unit and another is controlling

station. The system processes, interfaces, connections, data transmission and reception of data

among the mobile unit and control stations are working successfully. These results are

compatible with GPS technologies.

In [3], a vehicle tracking system is an electronic device, installed in a vehicle to enable the owner

or a third party to track the vehicle's place. This paper proposed to design a vehicle tracking

system that works using GPS and GSM technology. This system built based on embedded

system, used for tracking and positioning of any vehicle by using Global Positioning System

(GPS) and Global system for mobile communication (GSM). This design will continuously

watch a moving Vehicle and report the status of the Vehicle on demand.

In [4], Face Detection System used to detect the face of the driver, and compare with the

predefined face. The car owner is sleeping during the night time and someone theft the car. Then

Face Detection System obtains images by one tiny web camera, which is hidden easily in

somewhere in the car. Face Detection System compared the obtained images with the stored

images. If the images don't match, then the information sends to the owner through MMS. The

owners get the images of the thief in mobile phone and trace the place through GPS. The place of

the car and its speed displayed to the owner through SMS. The owner can recognize the thief

images as well as the place of the car and can easily find out the hijackers image. This system

applied in our day-to-day life.

In [5], this system provided vehicle cabin safety, security based on embedded system by

modifying the existing modules. This method monitors the level of the toxic gases such as CO,

LPG and alcohol within the vehicle provided alert information as alarm during the dangerous

situations. The SMS sends to the authorized person through the GSM. In this method, the IR

Sensor used to detect the static obstacle in front of the vehicle and the vehicle stopped if any

obstacle detected. This is avoiding accidents due to collision of vehicles with any static

obstacles.

In [6], Kai-Tai Song and Chih-Chieh Yang have a designed and built on a real-time visual

tracking system for vehicle safety applications. In this paper built a novel feature-based vehicle-

tracking algorithm, automatically detect and track several moving objects, like cars and

motorcycles, ahead of the tracking vehicle. Joint with the concept of focus of expansion (FOE)

and view analysis, the built system can segment features of moving objects from moving

background and offer a collision word of warning on real-time. The proposed algorithm using a

CMOS image sensor and NMOS embedded processor architecture. The constructed stand-alone

Page 11: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 11

visual tracking system validated in real road tests. The results provided information of collision

warning in urban artery with speed about 60 km/hour both at night and day times.

In [7], the remote monitoring system based on SMS and GSM was implemented. Based on the

total design of the system, the hardware and software designed. In this paper, the GSM network

is a medium for transmitting the remote signal. This includes two parts that are the monitoring

center and the remote monitoring station. The monitoring centers consist of a computer and

communication module of GSM. The software-monitoring center and the remote monitoring

station implemented by using VB. The result of this demonstration shows that the system can

watch and control the remote communication between the monitoring center and the remote

monitoring station.

In [8] this paper, the proposed tracking system based on cloud computing infrastructure. The

sensors are used to monitor the fuel level, driver conditions, and speed of the vehicle. All the

data transferred to cloud serverusing GSM enabled device. All the vehicles equipped with GPS

antenna to locate the place. To avoid the drunk and drive, the alcohol sensor installed to monitor

the driver status. The proposed technology significantly avoids the accident in highways.

Page 12: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 12

III. Proposed Method

In this proposed work, a novel method of vehicle tracking and locking system used to track the

theft vehicle by using GPS and GSM technology. This system puts into sleeping mode while the

vehicle handled by the owner or authorized person otherwise goes to active mode, the mode of

operation changed by in person or remotely. If any interruption occurred in any side of the door,

then the IR sensor senses the signals and SMS sends to the microcontroller. The controller issues

the message about the place of the vehicle to the car owner or authorized person. When send

SMS to the controller, issues the control signals to the engine motor. Engine motor speeds are

gradually decreases and come to the off place. After that all the doors locked. To open the door

or restart the engine, authorized person needs to enter the passwords. In this method, tracking of

vehicle

Page 13: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 13

3.1 Block Diagram

The Block diagram of Vehicle tracking and locking system based on GSM and GPS technology

is shown in 88 Vehicle Tracking and Locking System Based on GSM and GPS Copyright ©

2013 MECS I.J. Intelligent Systems and Applications, 2013, 09, 86-93 the figure1. It consists the

power supply section, keyboard, GSM, GPS, microcontroller, MAX232driver, relay driver, IR

Transmitter, IR receiver, LCD and door locker. The GSM board has a valid SIM card with a

sufficient recharge amount to make outgoing calls. The circuits powered by +5v Dc.

Fig. 1: Block diagram of V

Page 14: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 14

3.2 circuit description

The power supply section is very important for all electronic circuits. The 230V, 50Hz AC mains

is stepped down by transformer X1 to deliver a secondary output of 12V, 500 mA. The

transformer output Is rectified by a full-wave rectifier comprising diodes D1 through D4, filtered

by capacitor C1 and regulated by ICs 7812 (IC2) and 7805 (IC3). Capacitor C2 bypasses the

ripples present in the regulated supply. LED1 acts as the power indicator and R1 limits the

current through LED1.The power supply section is shown in the figure2.

Power supply

Page 15: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 15

Proposed circuit diagram

Page 16: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 16

The circuit diagram of the vehicle tracking and locking embedded system using GPS and GSM

technology is shown in Fig.3.The compact circuitry is built around Atmel AT89C52

microcontroller. The AT89C52 is a low power; high performance CMOS 8- bit microcomputer

with 8 kB of Flash programmable and erasable read only memory (PEROM). It has 256 bytes of

RAM, 32 input/output (I/O) lines, three 16-bit timers/ counters, a six-vector two-level interrupt

architecture a full-duplex serial port, an on-chip oscillator and clock circuit.The system clock

also plays a significant role in operation of the microcontroller. An 11.0592MHz quartz crystal

connected to pins 18 and 19 provides basic clock to the microcontroller. Power-on reset is

provided by the combination of electrolytic capacitor C3 and resistor R1. Port pins P2.0 through

P2.7 of the microcontroller are connected to data port pins D0 through D7 of the LCD,

respectively. Port pins P0.5, P0.6 and P0.7 of the microcontroller are connected to Register-

select (RS), Read / write (RW) and enable (E) pins of the LCD, respectively. All the data is sent

to the LCD in ASCII format for display. Only the commands are sent in hex form. Registerselect

(RS) signal is used to distinguish between data (RS=1) and command (RS=0). Preset RV1 is

used to control the contrast of the LCD. Resistor 10k limits the current through the backlight of

the LCD. Port pins P3.0 (RXD) and P3.1 (TXD) of the microcontroller are used to interface with

the RFID reader through Max232 and GSM Modem are used to interface through Max232. Port

pins from P1.0 to P2.7 of the microcontroller are connected to keyboard. The GPS and GSM are

used to connect through RXD and TXD pins of the microcontroller for further processing. The

port pins of P0.0 to P0.3 are used to connect the 4 IR sensors for detecting the unauthorized

person. Port1.7 is used to connect the alarm through transistor BC547, Pin number P3.3 is used

to connect the engine motor. If unauthorized person enter into the car, the IR sensor sense the

signals if any interruption occurs in any side of the door and send to the microcontroller, then the

controller issue the message about the location of the vehicle to car owner or authorized person.

When send the SMS to controller, issues the control signals to the engine motor. Engine motor

speed is gradually decreases and comes to the off position. After that all the doors are locked. Pin

P0.4 is used to connect the door locker through relay. To open the door or to restart the engine

authorized person needs to enter the passwords. In this method, tracking of vehicle location easy

and also doors are locked automatically thereby thief cannot get away from the car. Pin P0.4,

transistor Q3 drives into saturation, and relay RL2 energizes to close or open the door lock.

Page 17: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 17

3.3 GPS Technology

The Global Positioning System (GPS) is a satellitebased navigation system consists of a network

of 24 satellites located into orbit. The system provides essential information to military, civil and

commercial users around the world and which is freely accessible to anyone with a GPS receiver.

GPS works in any weather circumstances at anywhere in the world. Normally no subscription

fees or system charges to utilize GPS. A GPS receiver must be locked on to the signal of at least

three satellites to estimate 2D position (latitude and longitude) and track movement. With four or

more satellites in sight, the receiver can determine the user's 3D position (latitude, longitude and

altitude). Once the vehicle position has been determined, the GPS unit can determine other

information like, speed, distance to destination, time and other. GPS receiver is used for this

research work to detect the vehicle location and provide information to responsible person

through GSM technology.

GPS Technology

Page 18: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 18

3.4 GSM Modem SIM300 V7.03

The GSM modem is a specialized type of modem which accepts a SIM card operates on a

subscriber’s mobile number over a network, just like a cellular phone. It is a cell phone without

display. Modem sim300 is a triband GSM/GPRS engine that works on EGSM900MHz,

DCS1800MHz and PCS1900MHz frequencies.GSM Modem is RS232-logic level compatible,

i.e., it takes-3v to -15v as logic high and +3v to +15 as logic low.MAX232 is used to convert

TTL into RS232 logic level converter used between the microcontroller and the GSM board. The

signal at pin 11 of the microcontroller is sent to the GSM modem through pin 11 of max232.this

signal is received at pin2 (RX) of the GSM modem. The GSM modem transmits the signal from

pin3 (TX) to the microcontroller through MAX232, which is received at pin 10 of IC1 [9].

Features of GSM

Single supply voltage 3.2v-4.5v

Typical power consumption in SLEEP Mode: 2.5mA.

SIM300 tri-band

MT,MO,CB, text and PDU mode, SMS storage: SIM card

Page 19: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 19

IV. Debugging and Testing Process

A microcontroller-based system is a complex activity that involves hardware and software

interfacing with the external world. Doing well design of a microcontroller-based system

requires skills to use the variety of debugging and testing tools available. The debugging and

testing of microcontroller-based systems divided into two groups: software-only tools and

software-hardware tools. Software-only tools come as monitors and simulators, which are

independent of the hardware under development. Software-hardware tools are usually hardware

dependent, more expensive and range from in-circuit emulators and in-circuit simulators to in-

circuit debuggers. In general, the higher the level of integration with the target hardware, the

greater the benefit of a tool, resulting in a shorter development time, but the greater the cost as

well. The factors to consider when choosing a debugging tool are cost, ease of use and the

features offered during the debugging process.

A software simulator is a computer program running on an independent hardware and it

simulates the CPU, the instruction set and the I/O of the target microcontroller. Simulators offer

the lowest-cost development tools for microcontroller-based systems and most companies offer

their simulator programs free of charge.

The user program operated in a simulated environment where the user can insert breakpoints

within the code to stop the code and then analyze the internal registers and memory, display and

change the values of program variables and so on. Incorrect logic or errors in computations can

analyze by stepping through the code in simulation. Simulators run at speeds 100 to 1000 times

slower than the actual micro controller hardware and, thus, long time delays should avoid when

simulating a program. Micro controllerbased systems usually have interfaces to various external

devices such as motors, I/O ports, timers, A/D converters, displays, push buttons, sensors and

signal generators, which are usually difficult to simulate.

Some advanced simulators, such as the Proteus from Labcenter Electronics allow the simulation

of various peripheral devices such as motors, LCDs, 7-segment displays and keyboards, and

users can create new peripheral devices. Inputs to the simulator can come from files that may

store complex digital I/O signals and waveforms. Outputs can be as form of digital data or

waveforms, usually stored in a file, or displayed on a screen.

Page 20: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 20

4.1 Hardware Assembling and Testing:

First step, we need to make single side PCB layout for the given circuit diagram. After made the

PCB the following process is required to complete the project.

1. Assemble all the components on the PCB based on circuit diagram. TX and RX pins of the

GSM modem to pins 13 and 14 of MAX 232 and insert a valid SIM in the GSM modem.

2. Connect the GPS module according to circuit diagram.

3. This projects implemented and tested successfully by us.

4. This system is very useful and secure for car owners.

V. Conclusion

In this paper, we have proposed a novel method of vehicle tracking and locking systems used to

track the theft vehicle by using GPS and GSM technology. This system puts into the sleeping

mode vehicle handled by the owner or authorized persons; otherwise goes to active mode. The

mode of operations changed by persons or remotely. When the theft identified, the responsible

people send SMS to the micro controller, then issue the control signals to stop the engine motor.

After that all the doors locked. To open the doors or to restart the engine authorized person needs

to enter the passwords. In this method, easily track the vehicle place and doors locked.

Page 21: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 21

5.INTRODUCTION

In a situation where there is high level of theft, there is need for better security system. It is

much safer to have a system that monitors and communicates to the device owner without

putting human life to risk in the name of “Watchman”. This tends to utilize the availability of

GSM network, mobile phone and electronics circuit to achieve an automated system which is

programmed to work as a thinking device to accomplish this purpose. By simply dialing the

phone number of the mobile phone attached to the circuit and sending a code after the phone has

automatically been answered, puts the system to either “active or inactive” state, and on any

attempt of theft the system sends a text message to the device owner, demobilizes the system

(car) and then starts up an alarm. With this, the car is always protected. The total absence of

sufficient security personnel in a packed car is a great discomfort to car owners. This insecurity

has paved way to increasing rate of stealing packed cars – even with security. In order to enhance

an improved and life risk free security system, the purpose of this study is to aid a better security

system of cars with the use of GSM. This system monitors one’s car against theft, and has a text

message sent to the car owner, telling him that his car is being tampered, and at which part of the

car (either doors or boot) is being tampered. The system will also demobilize the car (that is

stopping the car from moving), set up an alarm for the people around to notice what is

happening.

Page 22: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 22

The diagram in figure 1.

Describe the overall system. The system comprises of a GSM which serves as an intermediate

between the outside world (car owner) and the entire system. It is responsible for both receiving

of calls for system activation and deactivation, and sending of text message to the car owner. Its

output in the form of frequency is feed into Dual Tone Multi-Frequency (DTMF) decoder IC,

which converts these frequencies into digital voltage levels of zeros and ones. The digital voltage

levels received from the DTMF decoder [9] is now fed into microcontroller Integrated circuit.

The micro controller which is the brain and control circuit behind the entire design is controlled

with a written program stored into its Read Only Memory (ROM). The controller with the

direction of the written program co-ordinate the system’s operation as follows: i. If the system is

active, it monitors both the car doors and boot to check if anyone is opened. ii. Demobilizes the

car by disconnecting the ignition line from the battery supply via the actuator [1]. iii. Sends text

message to the car owner signifying where the attempt is made from, and finally iv. Starts up an

alarm for alert purpose. v. But, if the system is inactive, the microcontroller disables all outputs

and sensor inputs. In this paper, the design utilized locally assembled microcontroller and few

other basic electronics components to achieve both the control and the controlled. Evidently,

microcontrollers have been used to perform such simple security task in which human

performance might degrade over time. The reliability of this design makes it durable and capable

for offering guarantee security at all time. The power supply provides the voltage and current

required for effective performance of the system. This supply is tapped from the car battery and

then regulated before being fed to the system.

Page 23: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 23

II. DESIGN FRAME WORK

2.2 System Design

The design process is divided into two: Hardware and Software designs. 2.2.1 Hardware Design

2.2.1.1 The microcontroller. This microcontroller system is designed around the Intel’s

AT89C51 microcontroller [1]. The Intel AT89C51 microcontroller is a complete computer on a

single chip. This is because it has Read Only Memory (ROM), Random Access Memory (RAM)

and Central Processing Unit (CPU) embedded in it. The AT89C51 is a low-power, high

performance CMOS 8-bit microcomputer with 8K bytes of memory. The device is manufactured

using Atmel’s high-density non-volatile Microcontroller Based Anti-theft Security System Using

GSM Networks with Text Message… 20 memory technology and is compatible with the

industry standard 80C5l and 80C52 instruction set and pin out. The on-chip flash allows the

program memory to be reprogrammed in-system or by a conventional non-volatile memory

programmer. It also provides programmable timer, programmable I/O ports together with 256 ×

8-bit RAM for use as “scratch book” and also for stack purposes. The alarm was implemented

using a 12V/15W siren. The Dual Tone Multi-Frequency (DTMF) IC – MT8870/CM8870 is an

IC which detects frequency in the form of tone and then encodes it into different digital voltage

levels [12]. It principle is on combining two carrier frequencies of upper level and lower level

which produces a unique tone. The DTMF is made to produce different voltage level for every

key pressed on the connected phone. Opto transistor CNY-17 is serving as a tap button contactor

[9], which is used for initiating a keypad pressing command on the connected phone. FET

(IRF3205) is a power mosfet [13]. It functions as an actuator to the demobilization unit. Relay is

the demobilizer in the system. Voltage regulation is achieved by the use of LM7805.

Page 24: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 24

Page 25: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 25

III. PERFORMANCE EVALUATION ANDTESTING

Various test was carried out before, during and after the construction has been completed. The

multi-meter was extensively used for carrying out most of these tests. Each subunit was tested

and confirmed efficient. After the construction of the entire system, the program was written and

burned into the microcontroller chip. On interfacing it to the car, it tested ok as it performed the

objective of the design. Satisfaction was gotten from the moment the system was activated and

the car opened, the system automatically disconnected the ignition, sent a text message to a

programmed recipient and then started up an alarm.

The mission of the design was accomplished. The entire system has three inputs, which are: - the

output of the DTMF decoder, the output from the phone ear piece jack and the sensors from the

car doors and boot. The system outputs are the text message controller, alarming system and

demobilization unit. The system is battery powered and was tapped from car battery and for this

reason it made it easier for dc use. With these a system that sends text message to car owner is

designed and implemented.

Page 26: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 26

IV. CONCLUSION

It is always better to start every design with a good proposal, which will stand as a reference

point to the work as it proceeds. The result of any design gives joy if aims and objectives are

gotten. Since the project performed its proposal, it indeed satisfactory. Now from the input to the

output of each stage was a success. The major input is like an interrupt and upon reception by

microcontroller it goes through the iteration of demobilizing the car, sending text message and

starting up an alarm. The design is thus a huge success.

Page 27: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 27

REFERENCES

Hawrra, H.A. & Al-Rubiae (2007). Design and Implementation of Computerized control room.

Journal of Karbala University, 5(2). Johnson, M.J.&Subramanyam, G. (1996). A parallel port

interface circuit for computer control applications involving multiple stepper motors, Circuits

and Systems, IEEE 39th Midwest symposium, 2, pp.889-892. (http://www.ivsl.org: http://

libhub.sempertool.dk.tiger.sempertool.dk/libhub?func = search & query = resid:

cf092124eb1d1d40460d090ea4ad7692) . Zhou, W., Sha, Z., Meng, Z. &Xu, Y. (2007). Design

of Serial/Parallel Communication Interface of Digital Potentiometer with PC, 8th International

Conference on Electronic Measurement and Instruments (ICEMI.2007) , Pp: 3-150-3-154 , .

(http://www.ivsl.org:http: // libhub.sempertool.dk.tiger.sempertool.dk /libhub?func

=search&query=resid:c016167283f52d2740da48e994306ff6) . Hamed, B. (2012). Efficient

Authorized Access Security System Control Using ATMEL 89C55 & Mobile Bluetooth.

International Journal of Computer Theory and Engineering, 4(1). Samuel, D. (2008). RFID

security in door locks, Master thesis performed in information coding at Linköping Institute of

Technology. Axelson, J. (2000). Parallel Port Complete.Programming, Interfacing, & Using the

PC’s Parallel Printer Port. Published by Lakeview Research. Vincent, C., Hu, D. F., Ferraiolo &

Kuhn, D. R. (2006). Assessment of Access Control Systems. National Institute of Standards and

Technology.

Page 28: Development of anti theft security system

Development of anti-theft security systems

[Dept of E&C,GEC Ramanagara]2014-15D Page 28


Recommended