0% found this document useful (0 votes)
205 views5 pages

Smart Vehicle Security System Using Fingerprint & GSM Technology

The document discusses a smart vehicle security system that uses fingerprint and GSM technology. It aims to reduce vehicle theft by employing a biometric system for vehicle startup authentication. The system uses an Arduino, fingerprint sensor and GSM module to allow startup only after fingerprint matching. It can also locate a stolen vehicle using the GSM and GPS technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
205 views5 pages

Smart Vehicle Security System Using Fingerprint & GSM Technology

The document discusses a smart vehicle security system that uses fingerprint and GSM technology. It aims to reduce vehicle theft by employing a biometric system for vehicle startup authentication. The system uses an Arduino, fingerprint sensor and GSM module to allow startup only after fingerprint matching. It can also locate a stolen vehicle using the GSM and GPS technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

© April 2020 | IJIRT | Volume 6 Issue 11 | ISSN: 2349-6002

Smart Vehicle Security System Using Fingerprint & Gsm


Technology
Ms.E.Catherin Reichal Jennifer M.E4, R.Esther Sandhiya2, S.Lemarina3
1
Assistant Professor/ Department Of ECE,DMI College of Engineering,Chennai 600123
2,3
UG Student/ Department Of ECE, DMI College of Engineering,Chennai 600123

Abstract— The issue of auto hijacking or car faces, not in front of the camera. Using the Global
theft thanks to quick access to vehicle’s functional System for Mobile (GSM) and GPS technology, the
system are often reduced by employing a biometric vehicle can be identified and located very easily [3-8].
system. The starting of vehicle’s engine because However, the main disadvantage is that the signal can
the necessity of protection and access restriction in
become degraded and receiver system may not provide
many luxurious assets is now vital . Biometric systems
location due to poor weather conditions.
have during a while served as a robust security system
in many various applications and it'll be implemented Automation is now a blessing for modern life. Almost
in industry . Biometric system may be a technological every industrial work is done by robots or
system that uses information a few person to spot such programmable logic controllers (PLC). As the
the person. It relies on specific data about unique increasing in the number of Automobiles on the road,
biological trait so as to figure effectively. this the crime involving it also increased like automobile
technique involves running data through algorithms stealing. Indeed, even with enhanced automobile
for a specific result, usually associated protection systems and expanded mindfulness among
with a identification of a user or other individuals. The
automobile proprietors, automobile burglary has not yet
signals are generated by the arduino to appropriate
module circuit. Fingerprint sensor module R307 along
been checked down to a noteworthy measure. A
side Arduino Uno. an individual can start the vehicle, straightforward patching up of the vehicles outside
but only upon fingerprint authentication can the person makes it difficult to track the stolen vehicle thus only a
put the vehicle into motion. In recognition of the few vehicles are recovered. To protect the precious
fingerprint, the valve fixed within the outlet of fuel tank vehicle, proprietors are currently being compelled to
opens, thereby allowing the flow of fuel to the engine. spend huge amount of cash on vehicle protection.
Ashwini et al. [1] presented a Vehicle Security System
Keywords— Vehicle,Biometric System,Security System,
based on GPS and GSM to track the vehicle in vehicle
Automobile Industry, arduino
tracking systems Global Positioning System technology
is used for finding the location of the vehicle.
I. INTRODUCTION
Vidya Sagar V.Mulge et al [2] developed an embedded
Automobile security is one of the growing concerns in system based on the Global Positioning System, the
India. Safeguarding of vehicle against theft is one of the GPS, and Radio frequency identification technology is
major issues confronting developing countries. Varied developed to prevent the automobiles from theft. A.
techniques have been tried and tested to protect and Rajasekhar et al [3] projected a system to appreciate
secure the automobiles. Embedded computing is an continuous observance and tracking the location of
emerging technology widely used in improving and cargos or product loaded on board for digital supplying.
enhancing security against the theft of vehicles. In RFID and GPS technology combined during this
2013, Radiofrequency Identification (RFID) cards were system. a low power 16-bit RISC microcontroller is
designed for ignition start of automobile [1]. However, employed because the central processing unit
the chances of losing the card or it being stolen led to considering each tiny size and high efficiency. The
the failure of the system Loaded cargos are recognized automatically by the
Kulkarni et al. proposed a face detection subsystem terminal system of the vehicle, the realtime vehicle
with GPS and GSM module [2]. A digital camera was location, the information and voice communication, and
used to capture the video which was continuously continuous observation. Combination of RFID and GPS
uploaded into the web server using the ARM9 increases the accuracy, efficiency of the system.
processor. AdaBoost algorithmFace detection was Anti-theft security system requires real fast time
adopted in a security system to identify the person who identification, the strong door control and the strong
is trying to start the vehicle. This methodology, security system which is provided to stop the ignition of
however, proved to be error-prone in detecting those vehicle, message conveying ability to owner of the

IJIRT 149103 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY


© April 2020 | IJIRT | Volume 6 Issue 12 | ISSN: 2349-6002
vehicle for unauthorized access with accurate vehicle where the tag is created with nearly huge character sets.
location using GPS and GSM which uses serial The accepting unit is brilliantly incorporated into three
communication. For completing this, a reliable system control circuits in the vehicle, to be specific, start
is designed to control the door with the help of the circuit, control unit, and programmed adapt evolving
fingerprint, RFID [4]-[5] and password combination, system, empowering it to convey the vehicle speed
give strong security system which immobilizes the down to zero of every a sheltered well-ordered way.
vehicle, able to convey message to the owner for The counter robbery auto security system proposed here
unauthorized access with accurate location vehicle was tried under various climate conditions and
using GPS and GSM technology. In this paper, an anti- conceivable flag mutilation circumstances to confirm its
theft vehicle protection system is developed to dependability.
overcome the drawbacks which offer a completely A constant automobile monitoring system introduced by
autonomous operation. Muhammad Adnan Elahi, Yasir Arfat Malkani and
Muhammad Fraz, [10] proposed a Real-Time
II. LITERATURE REVIEW
automobile monitoring system which obtains the
A combined GPS-GSM system is proposed to track automobile's area, the engine of the automobiles locked
vehicles using Google Earth application shown by while unauthorized access attempt is found. The
Mohammad A. Al-Khedher et el. [6]. The remote gathered data containing automobile location and access
module envelops a GPS attached on the moving vehicle time then send to the user’s phone. The system have no
to recognize its blessing position, and to be changed by specific input method.
GSM with entirely unexpected parameters gotten by the
auto's information port as a SMS to a recipient station. III. METHODOLOGY
The got GPS masterminds are filtered using a Kalman The Block diagram of fingerprint based vehicle starting
channel to update the accuracy of estimated position. systemis shown in figure 1, as it contributes to the
After data getting ready, Google Earth application is overall design of the work. The goal of this project is to
used to see the present zone and status of each vehicle. develop an anti-theft security system which protects
This goal of this structure is to direct naval force, police vehicle from theft. In this protect, a tilt sensor has been
cars transport and vehicle robbery cautions. used which is used for detecting any tilt of the vehicle.
A paper on real time vehicle monitoring system Arduino is a microcontroller. Here three switches are
presented by P. Muruganandham, R. Mukesh for the used for input.
applications which require ceaseless area information of Figure 1 shows the Functional block diagram of
the car [7]. For getting the autonomous positioning antitheft security system of vehicle protection. When
system that can transmit the regional data logically, giving the correct password or correct fingerprint, the
Active structures are generated. The device is a vehicle will start to run. At that the security system will
combination of GPS/GSM module and a SMS feedback be deactivated. When anyone gives the wrong password
system. Main hardware in the car unit is the GPS/GSM wrong fingerprint, the security will be activated, at that
module and a remote tracking server. time engine switch is switched off. The vehicle does not
A paper on the vehicle hostile to burglary system [8] move and the owner will get a message automatically
introduced by Ganesh G.S.P, Balaji B and Varadhan with the help of GSM module. If anyone tries to pick up
T.A.S combination of several steps of insurance with the vehicle, the tilt sensor detects the movement of the
one supplementing the other, as altered to the regular vehicle. The alarm will be switch on. The owner
against robbery system where a specific system is just receives a message about the position of the vehicle .
being utilized. This is one of the simplest vehicle
protection system which works only using GSM
technology apart from GPS system. The user can turn
on and off the vehicle just by a SMS and the vehicles
details will be sent to the nearest base station. Though
the simple structure, it consumes more time to operate
whole operation.
This paper [9] exhibited by Sangram Bana and Dr.
Davinder Kaur; a novel radio recurrence distinguishing
proof (RFID) based vehicle immobilizer system, which
includes low hacking likelihood while saving the
wellbeing of the travelers of the commandeered vehicle. Fig 1:Proposed Block Diagram
The immobilizer utilizes the dynamic RFID innovation

IJIRT 149103 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY


© April 2020 | IJIRT | Volume 6 Issue 12 | ISSN: 2349-6002
In the design of this fingerprint based vehicle starting images, generate a template of the finger based on
system, signals are generated by the arduino to processing results and store the template. When
appropriate module circuit. The whole system is aimed matching, user enters the finger through optical sensor
to be constructed in a plastic casing to enhance heat and system will generate a template of the finger and
evacuation and working efficiency of the system. The compare it with templates of the finger library. For 1:1
arduino reads the state of the input buttons which could matching, system will compare the live finger with
be either a 1 or a 0. The signal arduino gets from the specifc template designated in the Module; for 1: N
input button tells what to work on at that time. This matching, or searching, system will search the whole
project is aimed to replace the push-button in vehicle finger library for the matching finger. In both
ignition and create a more reliable and secured way of circumstances, system will return the matching result,
starting the ignition with fingerprint pattern only. The success or failure.
Arduino environment has been designed to be easy to
IV. CIRCUIT DEVELOPMENT
use for beginners who have no software or electronics
experience. With Arduino, you can build objects that anti-theft security system which consists of a
can respond to and/or control light, sound, touch, and microcontroller ATMEGA328, 5 on off switch, a
movement. Arduino has been used to create an amazing Double Pole Double Throw (DPDT) relay, a Double
variety of things, including musical instruments, robots, Pole Single Through (DPST) relay, 5V power supply
light sculptures, games, interactive furniture, and even module, ULN2003A IC, 4*3 keypad, buzzer, GPS,
interactive clothing. Arduino is used in many GSM module (SIM808), Fingerprint module (RC307) ,
educational programs around the world, particularly by a tilt sensor & a LCD display. Pin 1 of microcontroller
designers and artists who want to easily create is used for master clear reset pin. The RA0, RA1, RA2
prototypes but do not need a deep understanding of the pin of microcontroller is connected with three on off
technical details behind their creations. Because it is switch named Password, RFID & Fingerprint for using
designed to be used by nontechnical people, the as input. The RB0 microcontroller pin is connected to
software includes plenty of example code to RS pin of 2*16 LCD display. The RW pin of LCD
demonstrate how to use the Arduino board’s various display is grounded. The RB1 pin of LCD display is
facilities. used as the enable pin of LCD display. The RB4 to RB7
of microcontroller pin are connected with the pin of D4
A. FINGER PRINT SENSOR
to D7 for data pin. RC0 to RC3 of microcontroller are
connected with the 4 rows of keypad.RA0 to RA2 pin
of microcontroller are connected with three columns of
keypad for giving input. Here, The ULN2003A IC is
used as a relay driver switch. Pin 1 and 2 of ULN2003A
is connected with the pin RC5 & RC4 of
microcontroller for driving DPDT. Pin 3 and 4 of
ULN2003A is connected with RA4 & RA5. RB2 pin is
connected with a junction of engine switch. RB3 pin is
connected with a Tilt sensor. Pin 14 of ULN2003A IC
is connected with a junction of buzzer .The another
Figure 2: FingerPrint Sensor junction of buzzer connected with the power supply. Pin
Secure with biometrics - this all-in-one optical 13 of ULN2003A IC is connected with a junction of
fingerprint sensor will make adding fingerprint DPST . Another junction of DPST is directly connected
detection and verification super simple. These modules with the 5v power supply. RC6 and RC7 is connected
are typically used in safes - there's a high powered DSP with pin 6 and 5 of Relay 1. Pin 1 and 3 of relay 2 is
chip that does the image rendering, calculation, feature connected with the TX and RX of GPS & GSM module
finding and searching. Connect to any microcontroller .Pin 2 and 4 of relay 2 is connected with the TX and RX
or system with TTL serial, and send packets of data to of Fingerprint module.
take photos, detect prints, hash and search. You can also
enroll new fingers directly up to 162 finger prints can
be stored in the onboard FLASH memory. There's a red V. OPERATING PRINCIPLE
LED in the lens that lights up during a photo so you This anti-theft security system basically two mode:
know it’s working as shown in fig.2. Activated and Deactivated mode. Activated mode is
When enrolling, user needs to enter the finger two where the security system of this device is activated.
times. The system will process the two time finger The door of vehicle can be opened by the three ways.

IJIRT 149103 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY


© April 2020 | IJIRT | Volume 6 Issue 12 | ISSN: 2349-6002
They are password or fingerprint. The unauthorized
person does not open the door of the vehicle when he
will press wrong password or or imprint wrong
fingerprint. The password will be given by the keypad.
For giving password, this system checks the given
password is matched or not. If the password is not
matched, this system will detect that and will give a
message to owner mobile with vehicle location by the
GPS and GSM technology. Due to unmatched the
fingerprint, this system senses it and a message will be
sent owner’s mobile with the position of the vehicle..
Deactivated mode is the system security off mode. On Fig 3:Experimental Prototype
account of matching correct password or correct III.COMPARISON WITH PREVIOUS WORKS
fingerprint, the security system of device is deactivated.
So, the owner is freely to start the vehicle. This GPS-GSM system [6] planned by Mohammad A.
Al-Khedher et el. to track vehicles using Google Earth
VI. ALGORITHM DEVELOPMENT application. A GPS module is mounted on the remote
After initializing, GPS and GSM module starts. If any module on the moving vehicle to separate its present
input is selected, check if it is password, or fingerprint. position, and to be changed by GSM with totally unique
If corresponding security choice matches, the security parameters obtained by the vehicle's data port as a SMS
system will deactivate. And the car will ready to start. If to a recipient station. A Kalman channel filtered the
the corresponding security pattern violates, the system GPS arrangements to update the precision of estimated
will lock the engine of the car and will send coordinate position. After getting ready the data, Google Earth
to its owner. It will also give alarm notification. If tilt application is used to see the present zone and status of
sensor reading is true, the device will also send its each vehicle. The significant disadvantage of the device
coordinate continuously to its owner. is its complexity and costly enature. While this
1.Start proposed system is less difficult and practical.
2. Place a finger and press enter button (top button) to A vehicle terminal system is proposed [1] to
start engine. acknowledge ceaseless observing and following the
3. If finger already stored in the scanner module, start area of payloads or products stacked on board for
the engine. advanced coordination. The installed outline of the
4. If not, go back to number 1 and give no output. terminal system is joins both the RFID with GPS
5. Press ENTER button (bottom button) to enter advances. The vehicle terminal system can give the
passcode. 6. If passcode matches with saved code in programmed distinguishing proof of freights stacked,
chip’s EPROM. Open user admin, activate module to the ongoing vehicle area, the information and voice
receive finger image data and store it and go to number correspondence, and constant checking. The outcomes
7. determine that the mix of RFID what's more, GPS can
7. If passcode entered does not correlate with chip’s give the unwavering quality of the system, which
value in the EPROM, signify wrong passcode and go additionally enhance the exactness and productivity of
back to number 4. computerized coordination administration. But the
8. Navigate through options in user admin to edit project only based on RFID whereas this proposed
passcode and exit interface. system has several security choices like Password,
9. Stop. Fingerprint and RFID.

VII. RESULT ANALYSIS IX. CONCLUSION


As the outputs of the system are SMS and Alarm so This is a methodology of designing and grouping an
there is no graphical representation. Figure 3 shows the affordable, theft control system for associate degree
overview of the system automobiles providing multiple input method where any
one input method needs to match. This device is an
ultimate treat to the thieves because any unauthorized
access attempt will block the engine and ignition system
of the vehicle. However, making an anti-theft security
system for vehicle protection with all necessary features
is not possible due to some limitation including cost,

IJIRT 149103 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY


© April 2020 | IJIRT | Volume 6 Issue 12 | ISSN: 2349-6002
availability of equipment and complexity of interfacing [4] Finkenzeller and R. Handbook, “Radio-frequency
etc. Due to these limitations, all necessary features identification fundamentals and applications,”
could not be added for developing the anti-theft security Chippenham: John Wiley & Son, 1999.
system. So this anti-theft security system has some [5] S. Shepard, RFID: radio frequency identification.
future work: Using Voice Recognizing technology, the McGraw Hill Professional, 2005.
door of the vehicle could be open by the voice of its [6] Mohammad A. Al-Khedher, “Hybrid GPS-GSM
Owner. This device can also be used in accident Localization Of Automobile Tracking System,”
prevention system by using highly sensitive vibration International Journal of Computer Science &
system. If somehow an accident occurs then it will Information Technology (IJCSIT), Vol 3, No 6, Dec
notice the location to the hospitals and nearest police 2011.
station. Traffic system can be improved by this system [7] P.Muruganandham, R. Mukesh, “Real Time Web
by monitoring the location of the vehicle. Based Vehicle Tracking Using GPS”, World Academy
of Science, Engineering and Technology, 61, 2010.
[8] Ganesh G.S.P, Balaji B and Varadhan T.A.S, “Anti-
REFERENCES theft tracking system for Automobiles,” IEEE
[1] Ashwini Dilip Lahire, “GPS & GSM based vehicle International Conference on AntiCounterfeiting,
tracking and security system,” International Journal of Security and Identification (ASID), pp. 17-19, 2011.
Engineering Research and Development, Volume 12, [9] Sangram Bana and Dr. Davinder Kaur, “Fingerprint
Issue 6, PP.55-60 ,June 2016. Recognition using Image Segmentation,” International
[2] V.Mulge, Mrs G. Sathyaprabha, Mr Journal on Advanced Engineering Sciences and
P.V.VaraPrasad Rao, “Anti-Theft Security System Technologies”, Vol.No.5, Issue No.1, pp 12-23.
Using GSM, GPS, RFID Technology Based On Arm7,” [10] Muhammad Adnan Elahi, Yasir Arfat Malkani and
International Journal of Research in Information Muhammad Fraz, “Design and Implementation of Real
Technology(IJRIT), Volume 2, Issue 9,Pg. 764-769, Time Vehicle Tracking System,” 2nd International
September 2014. Conference on Computer, Control and Communication,
[3] A.Rajasekhar reddy, P.Anwar basha ,“The Terminal Pakistan, 2009.
System Design based on hybrid RFID-GPS in Vehicular
communications,” International Journal of Modern
Engineering Research (IJMER), Vol.2, Issue.4, pp-
2316-2319, July-Aug 2012.

IJIRT 149103 INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy