0% found this document useful (0 votes)
87 views

Vehicle Theft Detection and Secure System Using Arduino

Uploaded by

Aditya Bobade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views

Vehicle Theft Detection and Secure System Using Arduino

Uploaded by

Aditya Bobade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Scientific Research in Engineering and Management (IJSREM)

Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

VEHICLE THEFT DETECTION AND SECURE SYSTEM USING ARDUINO


Tirupathi Rao Vankala1,Lokesh Borra2,Supra Deepika Runkna3,Jhansi Pinninti4 Anil Prasad D5
12345Department of ECE & ANITS

Abstract: Today vehicles form an important asset to electronic projects. The unit comes with 32KB flash
us, without which our life would be incomplete. But, memory that is used to store the number of instructions
when it comes to the security of our vehicles, we are very while the SRAM is 2KB and EEPROM is 1KB. This
helpless. It is of a great concern, especially in board includes digital I/O pins-14, a power jack, analog
metropolitan cities, where these incidents occur each and i/ps-6, ceramic resonator-A16 MHz, a USB connection,
every day. So, in this paper, we have focussed on the an RST button, and an ICSP header. All these can
security of vehicles. The Aim of this work is to support the microcontroller for further operation by
authenticate and inform the details of the vehicle to the connecting this board to the computer. The operating
owner through SMS when it is to be used by any other voltage of the unit is 5V which projects the
person. If the owner is aware of that person he can give microcontroller on the board and its associated circuitry
access through a return reply- motor on otherwise he can operates at 5V while the input voltage ranges between 6V
deny by replying –motor off. This is possible using GSM to 20V and the recommended input voltage ranges from
and fingerprint sensor. In case if the vehicle is theft by 7V to 12V.
any chance, we can detect the vehicle using RFID reader
where RFID reader is placed in the device. On the other
2.2.Arduino ide :
hand the owner can also trace the location of the vehicle
where he gets the information in terms of latitude and Arduino is an open-source electronics platform based on
longitude using GPS. All these operations are controlled easy-to-use hardware and software. This platform allows
using ATMEGA328 micro controller. you to create different types of single-board
Keywords: Arduino, GSM, GPS, RFID, Fingerprint microcomputers to which the community of creators can
Sensor, Node mcu. give different types of use. Arduino offers the Arduino
IDE (Integrated Development Environment) platform,
1.INTRODUCTION: which is a programming environment with which anyone
can create applications for Arduino boards, so that they
Vehicle theft is a common problem due to which people
can be given all kinds of utilities.
have lost their vehicles, faced many difficulties to find
them and sometimes failed even after a lot of struggle.To
overcome this problem, we introduce “VEHICLE THEFT
2.3. Fingerprint sensor:
DETECTION AND SECURE SYSTEM USING Optical fingerprint scanners are the oldest method of
ARDUINO” with which we can find the vehicles which capturing and comparing fingerprints. As the name
were either theft without any strenuous efforts. Using suggests, this technique relies on capturing an optical
fingerprint sensor, RFID reader, GSM GPS module it is image essentially a photograph. It then uses algorithms to
made easy to identify and track the vehicle. On the other detect unique patterns on the surface, such as ridges or
hand the owner can also trace the location of the vehicle
marks, by analyzing the lightest and darkest areas of the
where he gets the information in terms of latitude and
image. Just like smartphone cameras, these sensors have a
longitude using GPS. All these operations are controlled
finite resolution. The higher the resolution, the finer
using ATMEGA328 micro controller
details the sensor can discern about your finger,
increasing the level of security. However, these sensors
2.Components: capture much higher contrast images than a regular
camera. Optical scanners typically have a very high
2.1Arduino UNO: number of diodes per inch to capture these details up
close. Of course, it’s very dark when your finger is placed
Arduino UNO is a low-cost, flexible, and easy-to-use over the scanner. The scanners, therefore, incorporate
programmable open-source microcontroller board that can arrays of LEDs or even your phone’s display as a flash to
be integrated into a variety of light up the picture come scan time.

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12899 | Page 1


International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

2.4.Motor Driver: present, GSM technology supports above 1 billion mobile


subscribers around the world in the above 210 countries.
L298N module is a high voltage, high current dual full- This technology provides voice and data services from
bridge motor driver module for controlling DC motor and fundamental to complex.
stepper motor. It can control both the speed and rotation
direction of two DC motors. This module consists of an 2.7. GSM:
L298 dual-channel H-Bridge motor driver IC. This Satellite Navigation is based on a global network of
module uses two techniques for the control speed and satellites that transmit radio signals from medium earth
rotation direction of the DC motors. These are PWM – orbit. Users of Satellite Navigation are most familiar with
For controlling the speed and H-Bridge – For controlling the 31 Global Positioning System (GPS) satellites
rotation direction. These modules can control two DC developed and operated by the United States. Three other
motor or one stepper motor at the same time. PWM, or constellations also provide similar services. Collectively,
pulse width modulation is a technique which allows us to these constellations and their augmentations are called
adjust the average value of the voltage that’s going to the Global Navigation Satellite Systems (GNSS). The other
electronic device by turning on and off the power at a fast constellations are GLONASS developed and operated by
rate. The average voltage depends on the duty cycle, or the Russian Federation, Galileo developed and operated
the amount of time the signal is ON versus the amount of by the European Union, and BeiDou, developed and
time the signal is OFF in a single period of time. On the operated by China. All providers have offered free use of
other hand, for controlling the rotation direction, we just their respective systems to the international community.
need to inverse the direction of the current flow through All providers have developed International Civil Aviation
the motor, and the most common method of doing that is Organization (ICAO) Standards and Recommended
by using an H-Bridge. An H-Bridge circuit contains four Practices to support use of these constellations for
switching elements, transistors or MOSFETs, with the aviation
motor at the center forming an H-like configuration. By
activating two particular switches at the same time we can 2.8.RFID:
change the direction of the current flow, thus change the
rotation direction of the motor. RFID belongs to a group of technologies referred to as
Automatic Identification and Data Capture (AIDC).
2.5. LCD: AIDC methods automatically identify objects, collect data
about them, and enter those data directly into computer
The term LCD stands for liquid crystal display. It is one systems with little or no human intervention. RFID
kind of electronic display module used in an extensive methods utilize radio waves to accomplish this. At a
range of applications like various circuits & devices like simple level, RFID systems consist of three components:
mobile phones, calculators, computers, TV sets, etc. an RFID tag or smart label, an RFID reader, and an
These displays are mainly preferred for multi- antenna. RFID tags contain an integrated circuit and an
segment light-emitting diodes and seven segments. The antenna, which are used to transmit data to the RFID
main benefits of using this module are inexpensive; reader (also called an interrogator). The reader then
simply programmable, animations, and there are no converts the radio waves to a more usable form of data.
limitations for displaying custom characters, special and Information collected from the tags is then transferred
even animations, etc. through a communications interface to a host computer
system, where the data can be stored in a database and
2.6. GSM: analyzed at a later time. RFID tag consists of an
Digital cellular technology like GSM (Global System for integrated circuit and an antenna. The tag is also
Mobile Communication) is used to transmit mobile data composed of a protective material that holds the pieces
as well as voice services. GSM is a mobile together and shields them from various environmental
communication modem; it stands for global system for conditions. The protective material depends on the
mobile communication (GSM). The idea of GSM was application. For example, employee ID badges containing
developed at Bell Laboratories in 1970. It is a widely RFID tags are typically made from durable plastic, and
used mobile communication system in the world. GSM is the tag is embedded between the layers of plastic. RFID
an open and digital cellular technology used for tags come in a variety of shapes and sizes and are either
transmitting mobile voice and data services operate at the passive or active. Passive tags are the most widely used,
850MHz, 900MHz, 1800MHz, and 1900MHz frequency as they are smaller and less expensive to implement.
bandsGSM technology was developed as a digital system Passive tags must be “powered up” by the RFID reader
using the time division multiple access (TDMA) before they can transmit data. Unlike passive tags, active
technique for communication purposes. A GSM digitizes RFID tags have an onboard power supply (e.g., a battery),
and reduces the data, then sends it down through a thereby enabling them to transmit data at all times. For a
channel with two different streams of client data, each in more detailed discussion, refer to this article: Passive
its own particular time slot. The digital system has the RFID Tags vs. Active RFID Tags. Smart labels differ
ability to carry 64 kbps to 120 Mbps of data rates. This from RFID tags in that they incorporate both RFID and
technology was developed by using digital technology. At barcode technologies. They’re made of an adhesive label

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12899 | Page 2


International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

embedded with an RFID tag inlay, and they may also location. We can still track the exact location by using
feature a barcode and/or other printed information. Smart rfid tag and reader which are placed in car and tollgate.
labels can be encoded and printed on-demand using
desktop label printers, whereas programming RFID tags 4.Hardware Implementation:
are more time consuming and requires more advanced
equipment. During implementation, the Hardware components like
GSM, motor, GPS, and RFID are connected to Arduino
Uno board and Node MCU using jumper wires. LCD is
2.9.NODE MCU:
connected to Node MCU. Once the connections are made
The Node MCU ESP8266 development board comes
perfectly, Arduino takes input from the Fingerprint sensor
with the ESP-12E module containing the ESP8266 chip
and then if Authentication of the person is matched the
having Tensilica Xtensa 32-bit LX106 RISC
vehicle starts moving. If the Authentication of a person is
microprocessor. This microprocessor supports RTOS and
mismatched, it sends an SMS as “access denied” to the
operates at 80MHz to 160 MHz adjustable clock
owner through GSM module. If the owner is aware of a
frequency. Node MCU has 128 KB RAM and 4MB of
person, he can give access through an SMS reply. In case
Flash memory to store data and programs. Its high
if the vehicle is theft, owner can track the location of the
processing power with in-built Wi-Fi / Bluetooth and
vehicle using GPS. We can also track the vehicle using
Deep Sleep Operating features make it ideal for IoT
RFID technology where the reader is installed at toll gates
projects.
and tags are placed on vehicles. The registered tag can
be detected when the vehicle is passed through the toll
3.METHODOLOGY: gate. The status of vehicle is displayed on the LCD.
In this work we built a secure system for vehicle theft
using Arduino. We first connect our motors to the motor
driver. Actually single motor driver can operate only two
motors but here we connect the two right side motors
internally and same with the left side also. So that we can
use 4 motors with the help of single motor driver. With
the help of Arduino microcontroller and motor driver we
connect a vehicle(robot) which will move towards front
and back. Now we take a fingerprint sensor connect it
with Arduino and enrol your(owner) finger in the
fingerprint sensor with the help of inbuilt libraries in
Arduino ide.

Now make changes in the vehicle code that it only starts Fig Hardware implementation of proposed system
if valid finger is placed on the fingerprint sensor. If any
unmatched finger is placed then it don’t start the motor
rather it sends a message to the owner using gsm, that
some unauthorized persons wants to start your vehicle. If
the owner wants to give the permission then he can reply 5.Conclusion:
with a message saying YES or NO. If he says yes then the
vehicle starts otherwise it won’t. In this work we built a hardware model by using Arduino
as a main component as it is an open-source electronics
platform based on easy-to-use hardware and software. It
is verified the functionality of developed model that
provides authentication and security by using fingerprint
sensor to start a vehicle. It can also send a message to
the owner if any unauthorized person tries to start the
vehicle. Vehicle location can also be tracked by using
GPS and RFID.

ACKNOWLEDGEMENT:
We would like to thank Dr.V.Rajya laxmi (HOD,
Department of ECE), D.Anil Prasad (Project Guide) and
Fig: Block diagram of developed system management of ANITS for their support and
Let us take another situation that you gave permission to encouragement towards completion of project work.
someone but you want to track the vehicle, we can still do
it by using gps by using the location indicator in gsm
code. But we only get the latitude and longitude of the

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12899 | Page 3


International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930

REFERENCES:
1.Mohammad Jahangir Alam, Dhiman Sarma,” A Smart
Security Solution to Prevent any Mischief with the
Vehicles”, 2021 IEEE Region 10 Symposium
(TENSYMP). DOI:
10.1109/TENSYMP52854.2021.9550811, 23-25 Aug
2021

2.Shadman Sakib, Mohammad Sayem Bin Abdullah,


“GPS-GSM based inland vessel tracking system for
automatic emergency detection and position notification”,
2016 10th International Conference on Intelligent
Systems and Control (ISCO). DOI:
10.1109/ISCO.2016.7727018, 7-8 Jan. 2016.

3. Md. Akteruzzaman Arif; Md. Asif Mahmud, “Anti-


theft protection of vehicle by GSM & GPS with
fingerprint verification”, 2017 International Conference
on Electrical”, Computer and Communication
Engineering (ECCE). DOI:
10.1109/ECACE.2017.7913034, 16-18 Feb. 2017.

4. SeokJu Lee, Girma Tewolde,” Design and


implementation of a vehicle tracking system using
GPS/GSM/GPRS technology and smartphone
application”, 2014 IEEE World Forum on Internet of
Things (WF-IoT). DOI: 10.1109/WF-
IoT.2014.6803187,6-8 March 2014.

5.Vidhyotma; Jaiteg Singh,” Bluetooth Enabled Anti-


Theft System Using Android Based Handheld Device”,
2018 6th Edition of International Conference on Wireless
Networks & Embedded Systems (WECON). DOI:
10.1109/WECON.2018.8782082, 16-17 Nov. 2018

© 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12899 | Page 4

You might also like