Tracking and Theft Prevention System For Two Wheel
Tracking and Theft Prevention System For Two Wheel
net/publication/281334797
Tracking and Theft Prevention System for Two Wheeler Using Android
CITATIONS
READS
4
4,707
2 authors, including:
Kavitha B.C
Hindustan University
2 PUBLICATIONS 15 CITATIONS
Some of the authors of this publication are also working on these related projects:
Tracking and Theft Prevention System for Two Wheeler Using Android View project
All content following this page was uploaded by Kavitha B.C on 08 November 2018.
2
Assistant Professor, department of ECE, Hindustan University.
Padur, Chennai, India
I. INTRODUCTION
This paper introduces an Android based tracking and theft Fig 1 Block diagram of security system.
prevention system. Vehicle tracking system is a miniature model
of Global Positioning System(GPS). GPS is used to find out the To provide location and time information anywhere on Earth, the
position or location of the vehicle around the world. The peltier Global Positioning System (GPS) is commonly used as a space-
unit is attached at the exhauster along with the Thermal Electric based global navigation satellite system. The location information
Generator (TEG). Through this unit the heat energy is converted provided by GPS systems can be visualized using Google Earth. In
into power using the peltier effect. The generated power will be wireless data transporting, GSM and SMS technology is a common
stored in battery used in two wheelers. GPS will be fixed in the feature with all network service providers. Utilization of SMS
vehicle to monitor current position of the vehicle. With the help technology has become popular because it is an inexpensive,
of the GPS value, we can calculate the distance with respect to convenient and accessible way of transferring and receiving data
time. The direction and the distance are fed into the with high reliability. As shown in Fig 1, when the car starts running,
microcontroller and that will be transmitted to GSM through the client receives a confirmation SMS that it is running now. If this
digital modulation techniques. At the receiver end the signal is illegal operation or any intruders try to run the car, the owner can
will be detected and demodulated with digital demodulation send SMS to switch off the car. Afterwards, the system will check
technique. Then the signal will be given to Android mobile. Android the mobile number for received message, to confirm that the phone
mobile is used to control the air solenoid, water solenoid and power number could access the security system.
cable in vehicle engine system.
1. Structure of anti-theft tracking system
II. SYSTEM ANALYSIS
The system has two main units. The first is security unit which is
Despite the various technologies that have been embedded in the vehicle. This unit consists of a GSM modem, GPS
introduced in recent years to deter car thefts and tracking, it was receiver, control relay, current sensor and Microcontroller. The
reported that as many as cars were stolen yearly across the world. current sensor will send an analog signal to the microcontroller
According to National Crime Information Center (NCIC), in 2006, when the car is running. The microcontroller will send SMS directly
1,192,809 motor vehicles were reported stolen, the losses were 7.9$ to the owner for conformation. NC control relay contacts are
billion. Several security and tracking systems are designed to assist connected with the hot line that powers the fuel pump and ECM.
corporations with large number of vehicles and several usage The microcontroller can send a signal to the relay to cut off the
3. GPS
The execution starts from the GSM modem. When the two
wheeler engine starts, it will send the message to owner mobile.
Then GPS sends the location of the two wheeler to the owner smart
phone frequently. If the owner wants to stop the stolen two wheeler,
he activates the command from the android mobile. Activated
command will be received in the microcontroller through GSM
module. Fig 7.GSM data transmission simulation result.
VII. CONCLUSION
REFERENCES