SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering Trends and Technology- Volume2Issue3- 2011
ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 60
A Study on Auto Theft Prevention Using GSM
K. Veeranna Reddy1
, Y. Tirumala Babu2
Assoc.Professor & Head, Dept.of ECE, Sri Sai Madhavi Institute of Science & Technology, Rajahmundry, A.P., India.
M.Tech (Embedded Systems), St.Mary's College of Engineering & Technology, Hyderabad, India.
ABSTRACT
This paper deals with the design & development of a
theft control system for an automobile, which is being
used to prevent / control the theft of a vehicle. The
developed system makes use of an embedded system
based on GSM technology. An interfacing mobile is
also connected to the microcontroller, which is in
turn, connected to the engine. Once, the vehicle is
being stolen, the information is being used by the
vehicle owner for further processing. The information
is passed onto the central processing insurance
system, where by sitting at a remote place, a
particular number is dialed by them to the interfacing
mobile that is with the hardware kit which is installed
in the vehicle. By reading the signals received by the
mobile, one can control the ignition of the engine;
say to lock it or to stop the engine immediately.
Again it will come to the normal condition only after
entering a secured password. The owner of the
vehicle & the central processing system will know
this secured password. The main concept in this
design is introducing the mobile communications into
the embedded system.
Keywords – GSM, Microcontroller, mobile, vehicle.
I. INTRODUCTION
More than 93 percent of car thefts occur in
metropolitan areas where motor vehicle theft remains
a pervasive problem. Western states, in particular,
experience high rates of motor vehicle theft, while
nationally a car or truck was stolen every 28.8
seconds in 2007. The FBI Uniform Crime Reports
released in September 2008 estimate 1.1 million
motor vehicle thefts in 2007, with an estimated value
of $7.4 billion. The most costly property crime in the
United States, auto theft results in monetary losses to
victims and affects auto insurance costs for the
driving public and public safety costs for state and
local governments. Casual car theft, such as those
committed by joyriding juveniles, still exists but has
become a lesser part of the auto theft problem.
Increasingly, car theft is a sophisticated criminal
enterprise that involves title fraud, vehicle
identification cloning, and stripping cars for parts in
“chop shops.” The domestic and international black
market for stolen vehicles and their parts is a
profitable business. Vehicle identification cloning
helps facilitate the crime of dealing in stolen vehicles.
A thief copies a Vehicle Identification Number from
a legally owned and documented vehicle and uses it
to create counterfeit VIN tags for a similar vehicle,
making it easier to sell the “cloned” vehicle without
detection. Thieves also create phantom or paper
vehicles by obtaining insurance on a car that does not
exist or that they do not own, reporting it as stolen
and collecting on the claim. Antique and luxury
vehicles often are used for these schemes because
they yield large insurance settlements. The parts from
popular older models often are collectively worth
more than the intact vehicle. Many of these stolen
cars end up in “chop shops,” where they are
disassembled for parts sold to unscrupulous or
unsuspecting repair shops or parts dealers. Some
stolen vehicles are sold on the export market. Older,
“classic” American cars are among those most valued
overseas. It is estimated that at least 10 percent of
automobile theft is a false report of a stolen car; that
is, the vehicle has been given up or disposed of to
pursue a fraudulent insurance claim. Some of these
cars are simply abandoned, and some may end up at
illegitimate chop shops and be fraudulently re-tagged
and resold. Insurers estimate that one in six stolen
cars in the United States is shipped overseas or driven
across state or international borders. Some vehicles
that are fraudulently reported as stolen instead may
have been traded for drugs. Stolen cars also are
International Journal of Engineering Trends and Technology- Volume2Issue3- 2011
ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 61
sometimes used in drug trafficking, drive-by
shootings and armed robberies. These cars, often
abandoned after they serve their purpose, help the
perpetrator elude authorities, since he has no legal tie
to the car involved.
The Global System for Mobile
communications (GSM) is the most popular standard
for mobile phones in the world. Over billion people
use GSM service across the world. The usability of
the GSM standard makes international roaming very
common between mobile phone operators, enabling
subscribers to use their phones in many parts of the
world. GSM differs significantly from its
predecessors in that both signaling and speech
channels are digital, which means that it is considered
a second generation (2G) mobile phone system. This
fact has also meant that data communication was built
into the system from very early on [1]. The structure
of the GSM network is explained in the following
paragraphs. The network behind the GS complicated
in order to provide all of the services, which are
required & is divided into a number of sections, viz.,
 The base station sub-system (the base stations
and their controllers).
 The network and switching sub-system (the
part of the network most similar to a fixed
network): sometimes also called as the core
network.
 The GPRS core network (the optional part
which allows packet based internet
connection).

All of the elements in the system described above
combine to produce many GSM services such as
voice calls and SMS. One of the key features of GSM
is the Subscriber Identity Module (SIM), commonly
known as a SIM card. The SIM is a detachable smart
card containing the user’s subscription information
and phonebook. This allows the user to retain his
information after switching handsets. Alternatively,
the user can also change operators while retaining the
handset simply by changing the SIM [2].
II. METHODOLOGY
The study was based on data from the New South
Wales Roads and Traffic Authority’s Traffic
Accident Database System on vehicle crashes that
occurred between the 1999/2000 and 2006/2007
financial years. This data comprised all crashes that;
(1) were reported to the police, (2) occurred on a road
open to the public, (3) involved at least one moving
road vehicle, and (4) involved at least one person
being killed or injured or at least one motor vehicle
being towed away.
The data was matched with CARS data on motor
vehicle thefts in New South Wales based on the
following conditions:
 a match on registration plate, and
 a recorded crash date/time between the
earliest possible theft incident date/time
(minus 10 minutes to allow for differences in
time estimates) and theft recovery
date/time(plus 10 minutes), or
 a recorded crash date/time on or after the
earliest possible theft incident date/time
(minus 10 minutes) where the stolen vehicle
remained unrecovered.
The Roads and Traffic Authority also provides CARS
with data on all motorised vehicles currently
registered in the state biannually. This study was
based on the data at 31st December
2006. In addition, to be consistent with the Roads and
Traffic Authority’s terminology, the word controller
is used in this report and encompasses all road
vehicle users including drivers and riders.
III. LIMITATIONS
There are several limitations to be noted.
Approximately 2.2% of the motor vehicles in the
crash data did not have a valid registration plate to
allow a join with the CARS vehicle theft data. This
means that the number of stolen vehicles involved in
road crashes may be slightly under-represented in this
study. Manual checks of the crash data were also
carried out. Three crash incidents which resulted in a
join with the stolen data were removed from the
stolen vehicle group due to a match on an invalid
registration plate (e.g. registration plate ‘000’) or
because the stolen vehicle was reportedly recovered
following the first of two crashes.
Additionally, a high proportion of data on the age and
sex of individuals in crashes involving stolen vehicles
was missing due to individuals fleeing the scene of
the crash thus impossible to obtain the data. This also
International Journal of Engineering Trends and Technology- Volume2Issue3- 2011
ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 62
impacts injury numbers in crashes involving stolen
vehicles. This makes some comparisons with crashes
not involving a stolen vehicle difficult.
IV. FINDINGS
4.1 Crashes involving stolen vehicle
Since the 1999/00 financial year, the number of road
crashes in New South Wales has fallen by
approximately 15.3% (53,331 crashes in 1999/00;
45,161 in 2006/07). The proportion of crashes
involving a stolen vehicle also shows a downward
trend over the period with the majority of the decline
occurring between 2000/01 and 2003/04, after which
the proportion remains relatively stable. In 1999/00,
approximately 2.0% of road crashes involved a stolen
vehicle with the proportion falling to 1.2% by
2006/07. Over the entire eight-year period, 1.7% of
crashes involved a stolen vehicle.
V. FUNDING AUTO THEFT REVENTION
AUTHORITIES
Dedicated, continuous funding of auto theft
prevention authorities contributes to their success.
Most states fund them with a small sum per vehicle
collected from insurance companies that issue
coverage in the state. The Washington Auto Theft
Prevention Authority receives its revenue from a $10
surcharge on traffic infraction fees.
In Maryland, legislation to establish the
Vehicle Theft Prevention Council also created a
Vehicle Theft Prevention Fund that consists, in part,
of approximately $2 million from penalties collected
for terminated or lapsed automobile insurance, and of
appropriated state funds. The fund is used for Council
expenses and has provided more than $20 million for
vehicle theft prevention programs consistent with a
statewide strategy. According to the 2007 annual
report of the Maryland Vehicle Theft Prevention
Council, effectiveness correlates to funding levels
over the 13 years it has operated. Overall, auto thefts
in Maryland in 2007 remained below the 1994 base
year. The most significant success occurred in and
around Baltimore, where the Baltimore Regional
Auto Theft Team, (RATT), a multi-jurisdictional task
force, has seen a 50 percent drop in motor vehicle
theft rates since 1995. The Michigan Auto Theft
Prevention Board requires all grantees to provide
matching funds for anti-theft efforts. Police
departments and other grant fund recipients must
provide 25 percent of total program costs.
Most state statutes require the governing board of the
auto theft prevention authority to ensure that grant
money is dedicated solely to auto theft prevention
activities. Washington’s statute provides that:
“Expenditures from the account may be used only for
activities relating to motor vehicle theft, including
education, prevention, law enforcement,
investigation, prosecution and confinement.”Vehicle
titling and branding lawsState laws address how car
titles and title branding are handled. A certificate of
title for a vehicle provides definitive proof of
ownership[4]. The title brand is the official state
record of information on the vehicle, including any
damage. Title brands— indicators, symbols or other
notations—are printed on the certificate of title to
indicate the history or condition of a vehicle. A title
brand will indicate significant damage to the vehicle
and brand it as “junk” or “salvage.” Ideally, a title
brand remains on record for the life of the vehicle.
Some states, such as Illinois, have only a few
branding designations, while Virginia has nearly 20.
Montana’s 15 title branding designations provide a
typical example (Table 1).
Definitions and brands differ significantly from state
to state. A salvage brand is required in Georgia, for
example, if restoration would require replacement of
two or more component parts. In Kentucky, a salvage
brand is required if the cost to repair exceeds 75
percent of the vehicle’s value. Vermont requires a
salvage brand on any vehicle that an insurer declares
a total loss. Varying thresholds exist for other brands
such as “junk” or “flood.” In Virginia, a vehicle
receives a flood brand if there is more than $1,000 in
International Journal of Engineering Trends and Technology- Volume2Issue3- 2011
ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 63
water damage, while in Wyoming a vehicle receives a
flood brand if water reached over the door and into
the passenger or trunk compartment. Risk of flood is
greater in some states than others; at least half the
states do not have a motor vehicle title flood brand.
The variety of brands and descriptions of what
constitutes a brand creates opportunities for auto theft
and fraud. Differences in title branding laws make it
easier to sell stolen vehicles through title washing and
VIN cloning.
VI. PRINCIPLES OF SOUND AUTO THEFT
PREVENTION
The above interests and strategies represent principles
of sound auto theft prevention.
 Local, state and regional distinctions in the
amount and kind of auto theft are suitably
reflected in policy and practice. The role of
state legislatures is valuable in responding to
auto theft in the contexts in which it occurs.
Federal leadership should accommodate
tailored state approaches in line with NCSL
federalism policy.
 Categories and classifications of auto theft in
state criminal codes vary widely.
Policymakers can review auto theft criminal
provisions in the context of modern issues
and needs in their state. This is especially
true in states where active theft rings and
enterprises are suitably distinguished from
unauthorized use crimes that often involve
juveniles.
 Automobile title branding designations are
diverse across the states. Policymakers can
examine branding laws to determine if gaps
exist in brand definitions and if additional
brands – that perhaps are more consistent
with other states – are needed.
 Policymakers can consider how the National
Motor Vehicle Title Information System
might serve their state’s objectives in
reducing auto theft and title fraud. State
information technology upgrades to motor
vehicle titling systems can facilitate
participation, and Bureau of Justice
Assistance grants to states have helped with
some needed improvements.
 The education, prevention and information
sharing role of auto insurance companies is
valuable to state efforts to address auto theft.
Policymakers can use the research and
expertise of insurers on auto theft-related
issues. Consumers benefit from a ready
source on crime prevention practices and
from customer incentives to use car security
systems. The strong relationship of the
insurance industry to state auto theft
prevention authorities is important to their
success. States also can continue to use
insurance industry-developed systems to
address auto theft-related title and insurance
fraud.
 State auto theft prevention authorities have
demonstrated their usefulness. They create
statewide umbrellas that can focus resources
and expertise in jurisdictions in the state that
experience the highest incidence of auto
theft. Policymakers can consider whether an
auto theft prevention authority can help
address auto theft and determine what
funding mechanisms will provide for
effective implementation and operation of a
new or existing auto theft prevention
authority.
 Auto theft prevention authorities and other
state initiatives can contribute to funding and
training for specialized law enforcement
units, technologies, and related efforts to
combat auto theft and motor vehicle fraud.
VII. CONCLUSION
A novel method of designing a low-cost, compact
theft control system for a vehicle was designed &
demonstrated in this paper. This work is an ultimate
threat for vehicle thieves. Nowadays, the vehicles are
least secured when it is stolen by thieves. By this
work which is presented in this paper, it is very easy
to track the vehicle at a higher degree of accuracy,
since it is based on GSM Technology, which is very
developed now. So, it is very much easy to get back
the vehicle. The crux of the work is that the whole
process is done at the least possible cost and it is
almost accomodable to the practical implementation.
In future, there is no doubt that all of the vehicles will
be embedded with this unique kit.
International Journal of Engineering Trends and Technology- Volume2Issue3- 2011
ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 64
REFERENCES
[1] Kenneth J. Ayala, “The 8051 Microcontroller
Architecture, programming &applications”, Penram
International, India, 2006.
[2] Douglas V Hall, “Microprocessor and Interfacing-
Programming & Hardware.
[3] National Insurance Crime Bureau
www.nicb.org/cps/rde/xchg/nicb/hs.xsl/index.htm.
[4] Livingston, D.H., Merritt, S., Callori, S., and Vanek, S.
(1998). Auto theft-related trauma. The Journal of Trauma,
Vol 45(4), p 780-783.
[5] Ziersch, E.N and Ransom, S. (2008). Road crashes
involving stolen vehicles in South Australia. Journal of the
Australasian College of Road Safety, Vol 19(2), p 38.
AUTHORS PROFILE
K. Veeranna Reddy working as Assoc.Professor & Head,
Dept. of ECE at Sri Sai Madhavi Institute of Science &
Technology, Mallampudi, Rajahmundry, A.P., India. His
research interest includes Microprocessor, Embedded
Systems, and Control Systems.
Y. Tirumala Babu pursuing his M.Tech (ECE) with
specialization in Embedded Systems at St. Mary’s College
of Engineering & Technology, Hyderabad, India. His
research interest includes Microprocessor, Embedded
Systems, and Control Systems.

More Related Content

What's hot

Job-Hunt FREE 15-Minute Guide to Layoff Self-Defense
Job-Hunt FREE 15-Minute Guide to Layoff Self-DefenseJob-Hunt FREE 15-Minute Guide to Layoff Self-Defense
Job-Hunt FREE 15-Minute Guide to Layoff Self-Defense
pleasure16
 

What's hot (8)

Distracted driving presentation
Distracted driving presentationDistracted driving presentation
Distracted driving presentation
 
No cell-commercial-drivers
No cell-commercial-driversNo cell-commercial-drivers
No cell-commercial-drivers
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 
Vessel Identification System Overview
Vessel Identification System OverviewVessel Identification System Overview
Vessel Identification System Overview
 
With Problematic Car Thefts Increasing, MicroTRAK's AutoTRAK GPS Will Be the ...
With Problematic Car Thefts Increasing, MicroTRAK's AutoTRAK GPS Will Be the ...With Problematic Car Thefts Increasing, MicroTRAK's AutoTRAK GPS Will Be the ...
With Problematic Car Thefts Increasing, MicroTRAK's AutoTRAK GPS Will Be the ...
 
Driver Behaviour State Recognition based on Speech
Driver Behaviour State Recognition based on SpeechDriver Behaviour State Recognition based on Speech
Driver Behaviour State Recognition based on Speech
 
Job-Hunt FREE 15-Minute Guide to Layoff Self-Defense
Job-Hunt FREE 15-Minute Guide to Layoff Self-DefenseJob-Hunt FREE 15-Minute Guide to Layoff Self-Defense
Job-Hunt FREE 15-Minute Guide to Layoff Self-Defense
 
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
 

Similar to Auto theft prevention using gsm @1000KV Technologies 9030844877

Towards Improving Crash Data Management System in Gulf Countries
Towards Improving Crash Data Management System in Gulf CountriesTowards Improving Crash Data Management System in Gulf Countries
Towards Improving Crash Data Management System in Gulf Countries
IJERA Editor
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
Hamzamohammed70
 
autonomous_vehicle_working_paper_01072020-_508_compliant.pdf
autonomous_vehicle_working_paper_01072020-_508_compliant.pdfautonomous_vehicle_working_paper_01072020-_508_compliant.pdf
autonomous_vehicle_working_paper_01072020-_508_compliant.pdf
PandurangGurakhe
 
Advanced High Speed Black Box Based Vehicle Crash Investigation System
Advanced High Speed Black Box Based Vehicle Crash Investigation SystemAdvanced High Speed Black Box Based Vehicle Crash Investigation System
Advanced High Speed Black Box Based Vehicle Crash Investigation System
ijtsrd
 

Similar to Auto theft prevention using gsm @1000KV Technologies 9030844877 (20)

Enhancing the Security of Vehicles and the Work of the DVLA Using GSM/SMS Tec...
Enhancing the Security of Vehicles and the Work of the DVLA Using GSM/SMS Tec...Enhancing the Security of Vehicles and the Work of the DVLA Using GSM/SMS Tec...
Enhancing the Security of Vehicles and the Work of the DVLA Using GSM/SMS Tec...
 
Enhancing the Security of Vehicles and the Work of the DVLA Using GSM/SMS Tec...
Enhancing the Security of Vehicles and the Work of the DVLA Using GSM/SMS Tec...Enhancing the Security of Vehicles and the Work of the DVLA Using GSM/SMS Tec...
Enhancing the Security of Vehicles and the Work of the DVLA Using GSM/SMS Tec...
 
Towards Improving Crash Data Management System in Gulf Countries
Towards Improving Crash Data Management System in Gulf CountriesTowards Improving Crash Data Management System in Gulf Countries
Towards Improving Crash Data Management System in Gulf Countries
 
A seminar report on vehicle security
A seminar report on vehicle security A seminar report on vehicle security
A seminar report on vehicle security
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
Smart vehicle management by using sensors and an IoT based black box
Smart vehicle management by using sensors and an IoT based  black boxSmart vehicle management by using sensors and an IoT based  black box
Smart vehicle management by using sensors and an IoT based black box
 
Global Telematics Market 2017 - 2022 - Sample Pages
Global Telematics Market 2017 - 2022 - Sample PagesGlobal Telematics Market 2017 - 2022 - Sample Pages
Global Telematics Market 2017 - 2022 - Sample Pages
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
 
autonomous_vehicle_working_paper_01072020-_508_compliant.pdf
autonomous_vehicle_working_paper_01072020-_508_compliant.pdfautonomous_vehicle_working_paper_01072020-_508_compliant.pdf
autonomous_vehicle_working_paper_01072020-_508_compliant.pdf
 
IRJET - Automobile Black Box System for Vehicle Accident Analysis
IRJET - Automobile Black Box System for Vehicle Accident AnalysisIRJET - Automobile Black Box System for Vehicle Accident Analysis
IRJET - Automobile Black Box System for Vehicle Accident Analysis
 
Vehicle security system using ARM controller
Vehicle security system using ARM controllerVehicle security system using ARM controller
Vehicle security system using ARM controller
 
Survey on Enhancing Accident Safety: Technological Solutions
Survey on Enhancing Accident Safety: Technological SolutionsSurvey on Enhancing Accident Safety: Technological Solutions
Survey on Enhancing Accident Safety: Technological Solutions
 
IRJET- Digitalized Vehicle Identification and Paperless Drivers
IRJET-  	  Digitalized Vehicle Identification and Paperless DriversIRJET-  	  Digitalized Vehicle Identification and Paperless Drivers
IRJET- Digitalized Vehicle Identification and Paperless Drivers
 
IRJET - Smart Vehicle System for Accident Prevention
IRJET - Smart Vehicle System for Accident PreventionIRJET - Smart Vehicle System for Accident Prevention
IRJET - Smart Vehicle System for Accident Prevention
 
Smart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoTSmart Vehicle Authentication and Due Date Monitoring System using IoT
Smart Vehicle Authentication and Due Date Monitoring System using IoT
 
Automated Fare Collection Market.pdf
Automated Fare Collection Market.pdfAutomated Fare Collection Market.pdf
Automated Fare Collection Market.pdf
 
IRJET- Analysis of Mechanical Properties and Microstructure of Al 7075-Glass ...
IRJET- Analysis of Mechanical Properties and Microstructure of Al 7075-Glass ...IRJET- Analysis of Mechanical Properties and Microstructure of Al 7075-Glass ...
IRJET- Analysis of Mechanical Properties and Microstructure of Al 7075-Glass ...
 
Bi fmam4-ps
Bi fmam4-psBi fmam4-ps
Bi fmam4-ps
 
Advanced High Speed Black Box Based Vehicle Crash Investigation System
Advanced High Speed Black Box Based Vehicle Crash Investigation SystemAdvanced High Speed Black Box Based Vehicle Crash Investigation System
Advanced High Speed Black Box Based Vehicle Crash Investigation System
 
Automotive Semiconductor Market : Future Demand, Market Analysis & Outlook to...
Automotive Semiconductor Market : Future Demand, Market Analysis & Outlook to...Automotive Semiconductor Market : Future Demand, Market Analysis & Outlook to...
Automotive Semiconductor Market : Future Demand, Market Analysis & Outlook to...
 

More from 1000kv technologies

More from 1000kv technologies (20)

Bm 08 FINGER PRINT RECOGNIZED ATM SYSTEM
Bm 08 FINGER PRINT RECOGNIZED ATM SYSTEMBm 08 FINGER PRINT RECOGNIZED ATM SYSTEM
Bm 08 FINGER PRINT RECOGNIZED ATM SYSTEM
 
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEMBm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
 
Bm 06 FINGER PRINT BASED SECURITY SYSTEM
Bm 06 FINGER PRINT BASED SECURITY SYSTEMBm 06 FINGER PRINT BASED SECURITY SYSTEM
Bm 06 FINGER PRINT BASED SECURITY SYSTEM
 
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEMBm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
 
Bm 04 FINGERPRINT BASED LIFT OPERATING SYSTEM
Bm 04 FINGERPRINT BASED LIFT OPERATING SYSTEMBm 04 FINGERPRINT BASED LIFT OPERATING SYSTEM
Bm 04 FINGERPRINT BASED LIFT OPERATING SYSTEM
 
Bm 03 Fingerprint Based Attendance and Exam Hall Exam Paper Set Generation Sy...
Bm 03 Fingerprint Based Attendance and Exam Hall Exam Paper Set Generation Sy...Bm 03 Fingerprint Based Attendance and Exam Hall Exam Paper Set Generation Sy...
Bm 03 Fingerprint Based Attendance and Exam Hall Exam Paper Set Generation Sy...
 
Bm 02 FINGER PRINT BASED BANK LOCKER SYSTEM
Bm 02 FINGER PRINT BASED BANK LOCKER SYSTEMBm 02 FINGER PRINT BASED BANK LOCKER SYSTEM
Bm 02 FINGER PRINT BASED BANK LOCKER SYSTEM
 
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEMBm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
 
Andriod 6. water level monitoring and control
Andriod 6. water level monitoring and control Andriod 6. water level monitoring and control
Andriod 6. water level monitoring and control
 
Andriod 5. systolic blood pressure
Andriod 5. systolic blood pressureAndriod 5. systolic blood pressure
Andriod 5. systolic blood pressure
 
Andriod 4. abash android based smart home monitoring
Andriod 4. abash   android based smart home monitoring Andriod 4. abash   android based smart home monitoring
Andriod 4. abash android based smart home monitoring
 
Andriod 3. smart home system using android mobile
Andriod 3. smart home system using android mobileAndriod 3. smart home system using android mobile
Andriod 3. smart home system using android mobile
 
Andriod 1. CONVENIENCE PROBE: A PHONE-BASED SYSTEM FOR RETAIL TRADE-AREA ANAL...
Andriod 1. CONVENIENCE PROBE: A PHONE-BASED SYSTEM FOR RETAIL TRADE-AREA ANAL...Andriod 1. CONVENIENCE PROBE: A PHONE-BASED SYSTEM FOR RETAIL TRADE-AREA ANAL...
Andriod 1. CONVENIENCE PROBE: A PHONE-BASED SYSTEM FOR RETAIL TRADE-AREA ANAL...
 
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER ...
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER         ...Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER         ...
Bm 09 FINGER PRINT BASED PHYSICAL ACCESS CONTROL VEHICLE IMMOBILIZER ...
 
Andriod 2. android based navigation system
Andriod 2. android based navigation systemAndriod 2. android based navigation system
Andriod 2. android based navigation system
 
Km247 semi operated vertical car parking prototype system controlling with sw...
Km247 semi operated vertical car parking prototype system controlling with sw...Km247 semi operated vertical car parking prototype system controlling with sw...
Km247 semi operated vertical car parking prototype system controlling with sw...
 
Km249 rope manufacturing extracting from waste plastic bottles
Km249 rope manufacturing extracting from waste plastic bottlesKm249 rope manufacturing extracting from waste plastic bottles
Km249 rope manufacturing extracting from waste plastic bottles
 
Km246 scotch yoke and propeller blade solar grass cutter
Km246 scotch yoke and propeller blade solar grass cutterKm246 scotch yoke and propeller blade solar grass cutter
Km246 scotch yoke and propeller blade solar grass cutter
 
Km244 multipurpose agriculture robot
Km244 multipurpose agriculture robot Km244 multipurpose agriculture robot
Km244 multipurpose agriculture robot
 
Km243 metal cutting and foot step power generation
Km243 metal cutting and foot step power generationKm243 metal cutting and foot step power generation
Km243 metal cutting and foot step power generation
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

Auto theft prevention using gsm @1000KV Technologies 9030844877

  • 1. International Journal of Engineering Trends and Technology- Volume2Issue3- 2011 ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 60 A Study on Auto Theft Prevention Using GSM K. Veeranna Reddy1 , Y. Tirumala Babu2 Assoc.Professor & Head, Dept.of ECE, Sri Sai Madhavi Institute of Science & Technology, Rajahmundry, A.P., India. M.Tech (Embedded Systems), St.Mary's College of Engineering & Technology, Hyderabad, India. ABSTRACT This paper deals with the design & development of a theft control system for an automobile, which is being used to prevent / control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. An interfacing mobile is also connected to the microcontroller, which is in turn, connected to the engine. Once, the vehicle is being stolen, the information is being used by the vehicle owner for further processing. The information is passed onto the central processing insurance system, where by sitting at a remote place, a particular number is dialed by them to the interfacing mobile that is with the hardware kit which is installed in the vehicle. By reading the signals received by the mobile, one can control the ignition of the engine; say to lock it or to stop the engine immediately. Again it will come to the normal condition only after entering a secured password. The owner of the vehicle & the central processing system will know this secured password. The main concept in this design is introducing the mobile communications into the embedded system. Keywords – GSM, Microcontroller, mobile, vehicle. I. INTRODUCTION More than 93 percent of car thefts occur in metropolitan areas where motor vehicle theft remains a pervasive problem. Western states, in particular, experience high rates of motor vehicle theft, while nationally a car or truck was stolen every 28.8 seconds in 2007. The FBI Uniform Crime Reports released in September 2008 estimate 1.1 million motor vehicle thefts in 2007, with an estimated value of $7.4 billion. The most costly property crime in the United States, auto theft results in monetary losses to victims and affects auto insurance costs for the driving public and public safety costs for state and local governments. Casual car theft, such as those committed by joyriding juveniles, still exists but has become a lesser part of the auto theft problem. Increasingly, car theft is a sophisticated criminal enterprise that involves title fraud, vehicle identification cloning, and stripping cars for parts in “chop shops.” The domestic and international black market for stolen vehicles and their parts is a profitable business. Vehicle identification cloning helps facilitate the crime of dealing in stolen vehicles. A thief copies a Vehicle Identification Number from a legally owned and documented vehicle and uses it to create counterfeit VIN tags for a similar vehicle, making it easier to sell the “cloned” vehicle without detection. Thieves also create phantom or paper vehicles by obtaining insurance on a car that does not exist or that they do not own, reporting it as stolen and collecting on the claim. Antique and luxury vehicles often are used for these schemes because they yield large insurance settlements. The parts from popular older models often are collectively worth more than the intact vehicle. Many of these stolen cars end up in “chop shops,” where they are disassembled for parts sold to unscrupulous or unsuspecting repair shops or parts dealers. Some stolen vehicles are sold on the export market. Older, “classic” American cars are among those most valued overseas. It is estimated that at least 10 percent of automobile theft is a false report of a stolen car; that is, the vehicle has been given up or disposed of to pursue a fraudulent insurance claim. Some of these cars are simply abandoned, and some may end up at illegitimate chop shops and be fraudulently re-tagged and resold. Insurers estimate that one in six stolen cars in the United States is shipped overseas or driven across state or international borders. Some vehicles that are fraudulently reported as stolen instead may have been traded for drugs. Stolen cars also are
  • 2. International Journal of Engineering Trends and Technology- Volume2Issue3- 2011 ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 61 sometimes used in drug trafficking, drive-by shootings and armed robberies. These cars, often abandoned after they serve their purpose, help the perpetrator elude authorities, since he has no legal tie to the car involved. The Global System for Mobile communications (GSM) is the most popular standard for mobile phones in the world. Over billion people use GSM service across the world. The usability of the GSM standard makes international roaming very common between mobile phone operators, enabling subscribers to use their phones in many parts of the world. GSM differs significantly from its predecessors in that both signaling and speech channels are digital, which means that it is considered a second generation (2G) mobile phone system. This fact has also meant that data communication was built into the system from very early on [1]. The structure of the GSM network is explained in the following paragraphs. The network behind the GS complicated in order to provide all of the services, which are required & is divided into a number of sections, viz.,  The base station sub-system (the base stations and their controllers).  The network and switching sub-system (the part of the network most similar to a fixed network): sometimes also called as the core network.  The GPRS core network (the optional part which allows packet based internet connection).  All of the elements in the system described above combine to produce many GSM services such as voice calls and SMS. One of the key features of GSM is the Subscriber Identity Module (SIM), commonly known as a SIM card. The SIM is a detachable smart card containing the user’s subscription information and phonebook. This allows the user to retain his information after switching handsets. Alternatively, the user can also change operators while retaining the handset simply by changing the SIM [2]. II. METHODOLOGY The study was based on data from the New South Wales Roads and Traffic Authority’s Traffic Accident Database System on vehicle crashes that occurred between the 1999/2000 and 2006/2007 financial years. This data comprised all crashes that; (1) were reported to the police, (2) occurred on a road open to the public, (3) involved at least one moving road vehicle, and (4) involved at least one person being killed or injured or at least one motor vehicle being towed away. The data was matched with CARS data on motor vehicle thefts in New South Wales based on the following conditions:  a match on registration plate, and  a recorded crash date/time between the earliest possible theft incident date/time (minus 10 minutes to allow for differences in time estimates) and theft recovery date/time(plus 10 minutes), or  a recorded crash date/time on or after the earliest possible theft incident date/time (minus 10 minutes) where the stolen vehicle remained unrecovered. The Roads and Traffic Authority also provides CARS with data on all motorised vehicles currently registered in the state biannually. This study was based on the data at 31st December 2006. In addition, to be consistent with the Roads and Traffic Authority’s terminology, the word controller is used in this report and encompasses all road vehicle users including drivers and riders. III. LIMITATIONS There are several limitations to be noted. Approximately 2.2% of the motor vehicles in the crash data did not have a valid registration plate to allow a join with the CARS vehicle theft data. This means that the number of stolen vehicles involved in road crashes may be slightly under-represented in this study. Manual checks of the crash data were also carried out. Three crash incidents which resulted in a join with the stolen data were removed from the stolen vehicle group due to a match on an invalid registration plate (e.g. registration plate ‘000’) or because the stolen vehicle was reportedly recovered following the first of two crashes. Additionally, a high proportion of data on the age and sex of individuals in crashes involving stolen vehicles was missing due to individuals fleeing the scene of the crash thus impossible to obtain the data. This also
  • 3. International Journal of Engineering Trends and Technology- Volume2Issue3- 2011 ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 62 impacts injury numbers in crashes involving stolen vehicles. This makes some comparisons with crashes not involving a stolen vehicle difficult. IV. FINDINGS 4.1 Crashes involving stolen vehicle Since the 1999/00 financial year, the number of road crashes in New South Wales has fallen by approximately 15.3% (53,331 crashes in 1999/00; 45,161 in 2006/07). The proportion of crashes involving a stolen vehicle also shows a downward trend over the period with the majority of the decline occurring between 2000/01 and 2003/04, after which the proportion remains relatively stable. In 1999/00, approximately 2.0% of road crashes involved a stolen vehicle with the proportion falling to 1.2% by 2006/07. Over the entire eight-year period, 1.7% of crashes involved a stolen vehicle. V. FUNDING AUTO THEFT REVENTION AUTHORITIES Dedicated, continuous funding of auto theft prevention authorities contributes to their success. Most states fund them with a small sum per vehicle collected from insurance companies that issue coverage in the state. The Washington Auto Theft Prevention Authority receives its revenue from a $10 surcharge on traffic infraction fees. In Maryland, legislation to establish the Vehicle Theft Prevention Council also created a Vehicle Theft Prevention Fund that consists, in part, of approximately $2 million from penalties collected for terminated or lapsed automobile insurance, and of appropriated state funds. The fund is used for Council expenses and has provided more than $20 million for vehicle theft prevention programs consistent with a statewide strategy. According to the 2007 annual report of the Maryland Vehicle Theft Prevention Council, effectiveness correlates to funding levels over the 13 years it has operated. Overall, auto thefts in Maryland in 2007 remained below the 1994 base year. The most significant success occurred in and around Baltimore, where the Baltimore Regional Auto Theft Team, (RATT), a multi-jurisdictional task force, has seen a 50 percent drop in motor vehicle theft rates since 1995. The Michigan Auto Theft Prevention Board requires all grantees to provide matching funds for anti-theft efforts. Police departments and other grant fund recipients must provide 25 percent of total program costs. Most state statutes require the governing board of the auto theft prevention authority to ensure that grant money is dedicated solely to auto theft prevention activities. Washington’s statute provides that: “Expenditures from the account may be used only for activities relating to motor vehicle theft, including education, prevention, law enforcement, investigation, prosecution and confinement.”Vehicle titling and branding lawsState laws address how car titles and title branding are handled. A certificate of title for a vehicle provides definitive proof of ownership[4]. The title brand is the official state record of information on the vehicle, including any damage. Title brands— indicators, symbols or other notations—are printed on the certificate of title to indicate the history or condition of a vehicle. A title brand will indicate significant damage to the vehicle and brand it as “junk” or “salvage.” Ideally, a title brand remains on record for the life of the vehicle. Some states, such as Illinois, have only a few branding designations, while Virginia has nearly 20. Montana’s 15 title branding designations provide a typical example (Table 1). Definitions and brands differ significantly from state to state. A salvage brand is required in Georgia, for example, if restoration would require replacement of two or more component parts. In Kentucky, a salvage brand is required if the cost to repair exceeds 75 percent of the vehicle’s value. Vermont requires a salvage brand on any vehicle that an insurer declares a total loss. Varying thresholds exist for other brands such as “junk” or “flood.” In Virginia, a vehicle receives a flood brand if there is more than $1,000 in
  • 4. International Journal of Engineering Trends and Technology- Volume2Issue3- 2011 ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 63 water damage, while in Wyoming a vehicle receives a flood brand if water reached over the door and into the passenger or trunk compartment. Risk of flood is greater in some states than others; at least half the states do not have a motor vehicle title flood brand. The variety of brands and descriptions of what constitutes a brand creates opportunities for auto theft and fraud. Differences in title branding laws make it easier to sell stolen vehicles through title washing and VIN cloning. VI. PRINCIPLES OF SOUND AUTO THEFT PREVENTION The above interests and strategies represent principles of sound auto theft prevention.  Local, state and regional distinctions in the amount and kind of auto theft are suitably reflected in policy and practice. The role of state legislatures is valuable in responding to auto theft in the contexts in which it occurs. Federal leadership should accommodate tailored state approaches in line with NCSL federalism policy.  Categories and classifications of auto theft in state criminal codes vary widely. Policymakers can review auto theft criminal provisions in the context of modern issues and needs in their state. This is especially true in states where active theft rings and enterprises are suitably distinguished from unauthorized use crimes that often involve juveniles.  Automobile title branding designations are diverse across the states. Policymakers can examine branding laws to determine if gaps exist in brand definitions and if additional brands – that perhaps are more consistent with other states – are needed.  Policymakers can consider how the National Motor Vehicle Title Information System might serve their state’s objectives in reducing auto theft and title fraud. State information technology upgrades to motor vehicle titling systems can facilitate participation, and Bureau of Justice Assistance grants to states have helped with some needed improvements.  The education, prevention and information sharing role of auto insurance companies is valuable to state efforts to address auto theft. Policymakers can use the research and expertise of insurers on auto theft-related issues. Consumers benefit from a ready source on crime prevention practices and from customer incentives to use car security systems. The strong relationship of the insurance industry to state auto theft prevention authorities is important to their success. States also can continue to use insurance industry-developed systems to address auto theft-related title and insurance fraud.  State auto theft prevention authorities have demonstrated their usefulness. They create statewide umbrellas that can focus resources and expertise in jurisdictions in the state that experience the highest incidence of auto theft. Policymakers can consider whether an auto theft prevention authority can help address auto theft and determine what funding mechanisms will provide for effective implementation and operation of a new or existing auto theft prevention authority.  Auto theft prevention authorities and other state initiatives can contribute to funding and training for specialized law enforcement units, technologies, and related efforts to combat auto theft and motor vehicle fraud. VII. CONCLUSION A novel method of designing a low-cost, compact theft control system for a vehicle was designed & demonstrated in this paper. This work is an ultimate threat for vehicle thieves. Nowadays, the vehicles are least secured when it is stolen by thieves. By this work which is presented in this paper, it is very easy to track the vehicle at a higher degree of accuracy, since it is based on GSM Technology, which is very developed now. So, it is very much easy to get back the vehicle. The crux of the work is that the whole process is done at the least possible cost and it is almost accomodable to the practical implementation. In future, there is no doubt that all of the vehicles will be embedded with this unique kit.
  • 5. International Journal of Engineering Trends and Technology- Volume2Issue3- 2011 ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 64 REFERENCES [1] Kenneth J. Ayala, “The 8051 Microcontroller Architecture, programming &applications”, Penram International, India, 2006. [2] Douglas V Hall, “Microprocessor and Interfacing- Programming & Hardware. [3] National Insurance Crime Bureau www.nicb.org/cps/rde/xchg/nicb/hs.xsl/index.htm. [4] Livingston, D.H., Merritt, S., Callori, S., and Vanek, S. (1998). Auto theft-related trauma. The Journal of Trauma, Vol 45(4), p 780-783. [5] Ziersch, E.N and Ransom, S. (2008). Road crashes involving stolen vehicles in South Australia. Journal of the Australasian College of Road Safety, Vol 19(2), p 38. AUTHORS PROFILE K. Veeranna Reddy working as Assoc.Professor & Head, Dept. of ECE at Sri Sai Madhavi Institute of Science & Technology, Mallampudi, Rajahmundry, A.P., India. His research interest includes Microprocessor, Embedded Systems, and Control Systems. Y. Tirumala Babu pursuing his M.Tech (ECE) with specialization in Embedded Systems at St. Mary’s College of Engineering & Technology, Hyderabad, India. His research interest includes Microprocessor, Embedded Systems, and Control Systems.