SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 2, Issue 10 (August 2012), PP. 18-22


    Microcontroller Based Anti-theft Security System Using GSM
             Networks with Text Message as Feedback
                                   Visa M. Ibrahim1, Asogwa A. Victor2.
        1,2
              Department of Electrical and Electronic Engineering,School Of Engineering and Engineering Technology,
                            ModibboAdamma University of Technology Yola, Adamawa State. Nigeria



Abstract––Antitheft security system utilizes an embedded system design with Dual Tone Multi Frequency (DTMF) and a
GSM to monitor and safeguard a car. It secures the car against theft. Upon activation, it automatically demobilizes the
car by disconnecting the ignition key supply from the car battery. This now makes it impossible for anybody so starts the
car, let alone moving with it. In an attempt of theft through the car doors or boot, the system sends text message to the car
owner and at the same time starts up an alarm.This design popped out due to the increasing rate at which packed cars are
stolen especially in our country, but with this design this packed car is being monitored irrespective of where it is packed,
provided there is GSM network coverage.From the research conducted, it was found out that majority of the existing car
security system uses only alarm, and doesn’t send text message to the car owner let alone of demobilizing the car. But
with the use of GSM network, the owner is guaranteed that the car will send text message to his phone, and at the same
time, have people around alerted of what is happening. Added to this is that the car will not be move because it has been
demobilized.

Keywords––Communication, DTMF, GSM, Networks, Microcontroller, Text message, Feedback.

                                               I.        INTRODUCTION
          In a situation where there is high level of theft, there is need for better security system. It is much safer to have a
system that monitors and communicates to the device owner without putting human life to risk in the name of “Watchman”.
This tends to utilize the availability of GSM network, mobile phone and electronics circuit to achieve an automated system
which is programmed to work as a thinking device to accomplish this purpose.
          By simply dialing the phone number of the mobile phone attached to the circuit and sending a code after the phone
has automatically been answered, puts the system to either “active or inactive” state, and on any attempt of theft the system
sends a text message to the device owner, demobilizes the system (car) and then starts up an alarm. With this, the car is
always protected. The total absence of sufficient security personnel in a packed car is a great discomfort to car owners. This
insecurity has paved way to increasing rate of stealing packed cars – even with security.
          In order to enhance an improved and life risk free security system, the purpose of this study is to aid a better
security system of cars with the use of GSM. This system monitors one’s car against theft, and has a text message sent to the
car owner, telling him that his car is being tampered, and at which part of the car (either doors or boot) is being tampered.
The system will also demobilize the car (that is stopping the car from moving), set up an alarm for the people around to
notice what is happening.




                                                              18
Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message…

1.1 System Description




                                   Figure 1: Functional Block Diagram of the System.

          The diagram in figure 1. Describe the overall system. The system comprises of a GSM which serves as an
intermediate between the outside world (car owner) and the entire system. It is responsible for both receiving of calls for
system activation and deactivation, and sending of text message to the car owner. Its output in the form of frequency is feed
into Dual Tone Multi-Frequency (DTMF) decoder IC, which converts these frequencies into digital voltage levels of zeros
and ones. The digital voltage levels received from the DTMF decoder [9] is now fed into microcontroller Integrated circuit.
The micro controller which is the brain and control circuit behind the entire design is controlled with a written program
stored into its Read Only Memory (ROM). The controller with the direction of the written program co-ordinate the system’s
operation as follows:
     i. If the system is active, it monitors both the car doors and boot to check if anyone is opened.
     ii. Demobilizes the car by disconnecting the ignition line from the battery supply via the actuator [1].
     iii. Sends text message to the car owner signifying where the attempt is made from, and finally
     iv. Starts up an alarm for alert purpose.
     v. But, if the system is inactive, the microcontroller disables all outputs and sensor inputs.

          In this paper, the design utilized locally assembled microcontroller and few other basic electronics components to
achieve both the control and the controlled. Evidently, microcontrollers have been used to perform such simple security task
in which human performance might degrade over time. The reliability of this design makes it durable and capable for
offering guarantee security at all time.
          The power supply provides the voltage and current required for effective performance of the system. This supply is
tapped from the car battery and then regulated before being fed to the system.

                                        II.       DESIGN FRAME WORK
2.2         System Design
The design process is divided into two: Hardware and Software designs.

2.2.1 Hardware Design
2.2.1.1 The microcontroller.
          This microcontroller system is designed around the Intel’s AT89C51 microcontroller [1]. The Intel AT89C51
microcontroller is a complete computer on a single chip. This is because it has Read Only Memory (ROM), Random Access
Memory (RAM) and Central Processing Unit (CPU) embedded in it. The AT89C51 is a low-power, high performance
CMOS 8-bit microcomputer with 8K bytes of memory. The device is manufactured using Atmel’s high-density non-volatile

                                                            19
Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message…

memory technology and is compatible with the industry standard 80C5l and 80C52 instruction set and pin out. The on-chip
flash allows the program memory to be reprogrammed in-system or by a conventional non-volatile memory programmer. It
also provides programmable timer, programmable I/O ports together with 256 × 8-bit RAM for use as “scratch book” and
also for stack purposes. The alarm was implemented using a 12V/15W siren.
           The Dual Tone Multi-Frequency (DTMF) IC – MT8870/CM8870 is an IC which detects frequency in the form of
tone and then encodes it into different digital voltage levels [12]. It principle is on combining two carrier frequencies of
upper level and lower level which produces a unique tone. The DTMF is made to produce different voltage level for every
key pressed on the connected phone.
           Opto transistor CNY-17 is serving as a tap button contactor [9], which is used for initiating a keypad pressing
command on the connected phone. FET (IRF3205) is a power mosfet [13]. It functions as an actuator to the demobilization
unit. Relay is the demobilizer in the system. Voltage regulation is achieved by the use of LM7805 [13]. The fig. 2 below
gives clearer view of thesehardware.




                                           Figure 2: Complete circuit diagram.



                                                            20
Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message…

2.2.1.2 Interfacing the microcontroller to coordinate the entire system.
Port zero (P0) of the microcontroller is used for collecting DTMF converted data for programming analysis. Port three bit
zero (P3.0) is used as DTMF valid tone signaling. Port zero bit zero (P0.0) and Port zero bit one (P0.1) respectively are used
as input for doors sensor and boot sensor. Port two bit zero through Port two bit three (P2.0 – P2.3) are used as output pins
for text message(feedback) control. Port two bit four (P2.4) of the microcontroller is used for controlling the alarming unit
and finally the actuator which demobilizes the car is controlled through Port two bit five (P2.5).

2.2 Software Design
         The program was written in assembly language using the 8051 instruction set. The flowchart for the program is
shown in Figure 3.




                                           Figure 3: Controlled Program Flowchart.

                         III.      PERFORMANCE EVALUATION ANDTESTING
           Various test was carried out before, during and after the construction has been completed. The multi-meter was
extensively used for carrying out most of these tests. Each subunit was tested and confirmed efficient.
After the construction of the entire system, the program was written and burned into the microcontroller chip. On interfacing
it to the car, it tested ok as it performed the objective of the design. Satisfaction was gotten from the moment the system was
activated and the car opened, the system automatically disconnected the ignition, sent a text message to a programmed
recipient and then started up an alarm. The mission of the design was accomplished.
The entire system has three inputs, which are: - the output of the DTMF decoder, the output from the phone ear piece jack
and the sensors from the car doors and boot. The system outputs are the text message controller, alarming system and
demobilization unit. The system is battery powered and was tapped from car battery and for this reason it made it easier for
dc use. With these a system that sends text message to car owner is designed and implemented.

                                                IV.        CONCLUSION
          It is always better to start every design with a good proposal, which will stand as a reference point to the work as it
proceeds. The result of any design gives joy if aims and objectives are gotten. Since the project performed its proposal, it
indeed satisfactory. Now from the input to the output of each stage was a success. The major input is like an interrupt and
upon reception by microcontroller it goes through the iteration of demobilizing the car, sending text message and starting up
an alarm. The design is thus a huge success.


                                                              21
Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message…

                                                    BIBLIOGRAPHY
[1].    Muhammad Ali Mazidi and Janice GillispieMazadi (www.asadali.tk)” the 8051 microcontroller and embedded systems” ;
        Department of Computer Science and Information Engineering, National Cheng Kung University of Taiwan.
[2].    Paul Horowtz and Winfield Hill (2002) The Art of Electronics, 2nd Edition, Cambridge University press.
[3].    Ronald J. (Monroe Community College) and Neal S.Widmer (Purdue University) (2005) Digital Systems Principles and
        Application, 8th Edition, Prentice- Hall India.
[4].    Robert R. (1998) Modern Control System,8th Edition, New York.
[5].    Donal Heffernan (2002) 8051 Tutorial, University of Limerick.
[6].    Theraja B. L. and Theraja A. K. (2003) A Text of Electrical Technology, 23 th Edition, Schand and Company Ltd. New Delhi.
[7].    Mazidi M. (1987) 8051 Assembly Language Programming and Interfacing, Prentice Hall, USA.
[8].    Hall F. and Lister P.F (1980), Microprocessor Fundamentals, Pitman, London.
[9].    Horowitz P. and Hill W. (1989), The Art of Electronics, 2nd Edition, Cambridge University press.
[10].   http//www.gogle/Ebedtroniccs.
[11].   Muhammed Ali Mazidi (2nd edition) The 8051 Microcontroller and Embedded System Using Assembly and C
[12].   Zarlink Semiconductor (1993) Application Note on MT8870 Integrated DTMF Receiver.
[13].   Rashid R. (1998) Power Electronics, Circuit Device and Application, 2th Edition, Prentice hall.




                                                               22

More Related Content

What's hot

Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance IOSR Journals
 
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEMINTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEMwisdom0313
 
A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...theijes
 
Embedded Tsunami Warning System
Embedded Tsunami Warning System Embedded Tsunami Warning System
Embedded Tsunami Warning System cscpconf
 
Smart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A ReviewSmart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A ReviewIRJET Journal
 
Project report on embedded system using 8051 microcontroller
Project  report on embedded system using 8051 microcontrollerProject  report on embedded system using 8051 microcontroller
Project report on embedded system using 8051 microcontrollerVandna Sambyal
 
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sdCn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sdkissingerman
 
Design of Management Application
Design of Management ApplicationDesign of Management Application
Design of Management ApplicationYatish Bathla
 
IRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent LiftIRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent LiftIRJET Journal
 
Voice recognition based advance patients room automation
Voice recognition based advance patients room automationVoice recognition based advance patients room automation
Voice recognition based advance patients room automationeSAT Journals
 
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)slmnsvn
 
Project Report On Micro-controller Embedded System
Project Report On Micro-controller Embedded SystemProject Report On Micro-controller Embedded System
Project Report On Micro-controller Embedded SystemRkrishna Mishra
 
Intro to micro controller (Atmega16)
Intro to micro controller (Atmega16)Intro to micro controller (Atmega16)
Intro to micro controller (Atmega16)Ramadan Ramadan
 

What's hot (18)

Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance
 
819 data sheet
819 data sheet819 data sheet
819 data sheet
 
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEMINTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
 
R034301240136
R034301240136R034301240136
R034301240136
 
A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...
 
Embedded system ppt
Embedded system pptEmbedded system ppt
Embedded system ppt
 
Embedded Tsunami Warning System
Embedded Tsunami Warning System Embedded Tsunami Warning System
Embedded Tsunami Warning System
 
Smart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A ReviewSmart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A Review
 
Project report on embedded system using 8051 microcontroller
Project  report on embedded system using 8051 microcontrollerProject  report on embedded system using 8051 microcontroller
Project report on embedded system using 8051 microcontroller
 
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sdCn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
 
Design of Management Application
Design of Management ApplicationDesign of Management Application
Design of Management Application
 
Embedded system
Embedded  systemEmbedded  system
Embedded system
 
IRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent LiftIRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent Lift
 
Voice recognition based advance patients room automation
Voice recognition based advance patients room automationVoice recognition based advance patients room automation
Voice recognition based advance patients room automation
 
GSM BASED e-NOTICE BOARD SRS
GSM BASED e-NOTICE BOARD SRSGSM BASED e-NOTICE BOARD SRS
GSM BASED e-NOTICE BOARD SRS
 
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
 
Project Report On Micro-controller Embedded System
Project Report On Micro-controller Embedded SystemProject Report On Micro-controller Embedded System
Project Report On Micro-controller Embedded System
 
Intro to micro controller (Atmega16)
Intro to micro controller (Atmega16)Intro to micro controller (Atmega16)
Intro to micro controller (Atmega16)
 

Viewers also liked

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

Viewers also liked (8)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development

Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadNishanth C
 
Project ppt
Project pptProject ppt
Project pptAshu0711
 
Gsm anti theft
Gsm anti theftGsm anti theft
Gsm anti theftAshu0711
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAshu0711
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft systemAshu0711
 
Home Security System Using Gsm Modem
Home Security System Using Gsm ModemHome Security System Using Gsm Modem
Home Security System Using Gsm ModemIJERA Editor
 
home autimation using GSM
home autimation using GSMhome autimation using GSM
home autimation using GSMramraj meena
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyIJRES Journal
 
Vehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPSVehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPSAshutha K
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...IRJET Journal
 
Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iaetsd Iaetsd
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft systemKshitij Rokde
 
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd Iaetsd
 
Gsm based emergency calling system
Gsm based emergency calling systemGsm based emergency calling system
Gsm based emergency calling systemIAEME Publication
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 upload
 
D017651519
D017651519D017651519
D017651519
 
Project ppt
Project pptProject ppt
Project ppt
 
F0463842
F0463842F0463842
F0463842
 
Gsm anti theft
Gsm anti theftGsm anti theft
Gsm anti theft
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 final
 
F04123137
F04123137F04123137
F04123137
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
 
Home Security System Using Gsm Modem
Home Security System Using Gsm ModemHome Security System Using Gsm Modem
Home Security System Using Gsm Modem
 
home autimation using GSM
home autimation using GSMhome autimation using GSM
home autimation using GSM
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm Technology
 
Vehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPSVehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPS
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
 
Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft system
 
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsm
 
G3602050055
G3602050055G3602050055
G3602050055
 
Gsm based emergency calling system
Gsm based emergency calling systemGsm based emergency calling system
Gsm based emergency calling system
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 2, Issue 10 (August 2012), PP. 18-22 Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message as Feedback Visa M. Ibrahim1, Asogwa A. Victor2. 1,2 Department of Electrical and Electronic Engineering,School Of Engineering and Engineering Technology, ModibboAdamma University of Technology Yola, Adamawa State. Nigeria Abstract––Antitheft security system utilizes an embedded system design with Dual Tone Multi Frequency (DTMF) and a GSM to monitor and safeguard a car. It secures the car against theft. Upon activation, it automatically demobilizes the car by disconnecting the ignition key supply from the car battery. This now makes it impossible for anybody so starts the car, let alone moving with it. In an attempt of theft through the car doors or boot, the system sends text message to the car owner and at the same time starts up an alarm.This design popped out due to the increasing rate at which packed cars are stolen especially in our country, but with this design this packed car is being monitored irrespective of where it is packed, provided there is GSM network coverage.From the research conducted, it was found out that majority of the existing car security system uses only alarm, and doesn’t send text message to the car owner let alone of demobilizing the car. But with the use of GSM network, the owner is guaranteed that the car will send text message to his phone, and at the same time, have people around alerted of what is happening. Added to this is that the car will not be move because it has been demobilized. Keywords––Communication, DTMF, GSM, Networks, Microcontroller, Text message, Feedback. I. INTRODUCTION In a situation where there is high level of theft, there is need for better security system. It is much safer to have a system that monitors and communicates to the device owner without putting human life to risk in the name of “Watchman”. This tends to utilize the availability of GSM network, mobile phone and electronics circuit to achieve an automated system which is programmed to work as a thinking device to accomplish this purpose. By simply dialing the phone number of the mobile phone attached to the circuit and sending a code after the phone has automatically been answered, puts the system to either “active or inactive” state, and on any attempt of theft the system sends a text message to the device owner, demobilizes the system (car) and then starts up an alarm. With this, the car is always protected. The total absence of sufficient security personnel in a packed car is a great discomfort to car owners. This insecurity has paved way to increasing rate of stealing packed cars – even with security. In order to enhance an improved and life risk free security system, the purpose of this study is to aid a better security system of cars with the use of GSM. This system monitors one’s car against theft, and has a text message sent to the car owner, telling him that his car is being tampered, and at which part of the car (either doors or boot) is being tampered. The system will also demobilize the car (that is stopping the car from moving), set up an alarm for the people around to notice what is happening. 18
  • 2. Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message… 1.1 System Description Figure 1: Functional Block Diagram of the System. The diagram in figure 1. Describe the overall system. The system comprises of a GSM which serves as an intermediate between the outside world (car owner) and the entire system. It is responsible for both receiving of calls for system activation and deactivation, and sending of text message to the car owner. Its output in the form of frequency is feed into Dual Tone Multi-Frequency (DTMF) decoder IC, which converts these frequencies into digital voltage levels of zeros and ones. The digital voltage levels received from the DTMF decoder [9] is now fed into microcontroller Integrated circuit. The micro controller which is the brain and control circuit behind the entire design is controlled with a written program stored into its Read Only Memory (ROM). The controller with the direction of the written program co-ordinate the system’s operation as follows: i. If the system is active, it monitors both the car doors and boot to check if anyone is opened. ii. Demobilizes the car by disconnecting the ignition line from the battery supply via the actuator [1]. iii. Sends text message to the car owner signifying where the attempt is made from, and finally iv. Starts up an alarm for alert purpose. v. But, if the system is inactive, the microcontroller disables all outputs and sensor inputs. In this paper, the design utilized locally assembled microcontroller and few other basic electronics components to achieve both the control and the controlled. Evidently, microcontrollers have been used to perform such simple security task in which human performance might degrade over time. The reliability of this design makes it durable and capable for offering guarantee security at all time. The power supply provides the voltage and current required for effective performance of the system. This supply is tapped from the car battery and then regulated before being fed to the system. II. DESIGN FRAME WORK 2.2 System Design The design process is divided into two: Hardware and Software designs. 2.2.1 Hardware Design 2.2.1.1 The microcontroller. This microcontroller system is designed around the Intel’s AT89C51 microcontroller [1]. The Intel AT89C51 microcontroller is a complete computer on a single chip. This is because it has Read Only Memory (ROM), Random Access Memory (RAM) and Central Processing Unit (CPU) embedded in it. The AT89C51 is a low-power, high performance CMOS 8-bit microcomputer with 8K bytes of memory. The device is manufactured using Atmel’s high-density non-volatile 19
  • 3. Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message… memory technology and is compatible with the industry standard 80C5l and 80C52 instruction set and pin out. The on-chip flash allows the program memory to be reprogrammed in-system or by a conventional non-volatile memory programmer. It also provides programmable timer, programmable I/O ports together with 256 × 8-bit RAM for use as “scratch book” and also for stack purposes. The alarm was implemented using a 12V/15W siren. The Dual Tone Multi-Frequency (DTMF) IC – MT8870/CM8870 is an IC which detects frequency in the form of tone and then encodes it into different digital voltage levels [12]. It principle is on combining two carrier frequencies of upper level and lower level which produces a unique tone. The DTMF is made to produce different voltage level for every key pressed on the connected phone. Opto transistor CNY-17 is serving as a tap button contactor [9], which is used for initiating a keypad pressing command on the connected phone. FET (IRF3205) is a power mosfet [13]. It functions as an actuator to the demobilization unit. Relay is the demobilizer in the system. Voltage regulation is achieved by the use of LM7805 [13]. The fig. 2 below gives clearer view of thesehardware. Figure 2: Complete circuit diagram. 20
  • 4. Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message… 2.2.1.2 Interfacing the microcontroller to coordinate the entire system. Port zero (P0) of the microcontroller is used for collecting DTMF converted data for programming analysis. Port three bit zero (P3.0) is used as DTMF valid tone signaling. Port zero bit zero (P0.0) and Port zero bit one (P0.1) respectively are used as input for doors sensor and boot sensor. Port two bit zero through Port two bit three (P2.0 – P2.3) are used as output pins for text message(feedback) control. Port two bit four (P2.4) of the microcontroller is used for controlling the alarming unit and finally the actuator which demobilizes the car is controlled through Port two bit five (P2.5). 2.2 Software Design The program was written in assembly language using the 8051 instruction set. The flowchart for the program is shown in Figure 3. Figure 3: Controlled Program Flowchart. III. PERFORMANCE EVALUATION ANDTESTING Various test was carried out before, during and after the construction has been completed. The multi-meter was extensively used for carrying out most of these tests. Each subunit was tested and confirmed efficient. After the construction of the entire system, the program was written and burned into the microcontroller chip. On interfacing it to the car, it tested ok as it performed the objective of the design. Satisfaction was gotten from the moment the system was activated and the car opened, the system automatically disconnected the ignition, sent a text message to a programmed recipient and then started up an alarm. The mission of the design was accomplished. The entire system has three inputs, which are: - the output of the DTMF decoder, the output from the phone ear piece jack and the sensors from the car doors and boot. The system outputs are the text message controller, alarming system and demobilization unit. The system is battery powered and was tapped from car battery and for this reason it made it easier for dc use. With these a system that sends text message to car owner is designed and implemented. IV. CONCLUSION It is always better to start every design with a good proposal, which will stand as a reference point to the work as it proceeds. The result of any design gives joy if aims and objectives are gotten. Since the project performed its proposal, it indeed satisfactory. Now from the input to the output of each stage was a success. The major input is like an interrupt and upon reception by microcontroller it goes through the iteration of demobilizing the car, sending text message and starting up an alarm. The design is thus a huge success. 21
  • 5. Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message… BIBLIOGRAPHY [1]. Muhammad Ali Mazidi and Janice GillispieMazadi (www.asadali.tk)” the 8051 microcontroller and embedded systems” ; Department of Computer Science and Information Engineering, National Cheng Kung University of Taiwan. [2]. Paul Horowtz and Winfield Hill (2002) The Art of Electronics, 2nd Edition, Cambridge University press. [3]. Ronald J. (Monroe Community College) and Neal S.Widmer (Purdue University) (2005) Digital Systems Principles and Application, 8th Edition, Prentice- Hall India. [4]. Robert R. (1998) Modern Control System,8th Edition, New York. [5]. Donal Heffernan (2002) 8051 Tutorial, University of Limerick. [6]. Theraja B. L. and Theraja A. K. (2003) A Text of Electrical Technology, 23 th Edition, Schand and Company Ltd. New Delhi. [7]. Mazidi M. (1987) 8051 Assembly Language Programming and Interfacing, Prentice Hall, USA. [8]. Hall F. and Lister P.F (1980), Microprocessor Fundamentals, Pitman, London. [9]. Horowitz P. and Hill W. (1989), The Art of Electronics, 2nd Edition, Cambridge University press. [10]. http//www.gogle/Ebedtroniccs. [11]. Muhammed Ali Mazidi (2nd edition) The 8051 Microcontroller and Embedded System Using Assembly and C [12]. Zarlink Semiconductor (1993) Application Note on MT8870 Integrated DTMF Receiver. [13]. Rashid R. (1998) Power Electronics, Circuit Device and Application, 2th Edition, Prentice hall. 22