This document is a seminar report on vehicle security and optimization presented by Anish Kumar. It discusses the history of vehicle security technologies from early car alarms to modern immobilizers. It then covers different modern security systems like car alarms, immobilizers, biometric fingerprint scanners, and GPS/GSM vehicle tracking and locking systems. The report analyzes the difference between safety and security and includes statistics on recent vehicle theft cases. It highlights how new technologies can help reduce theft but also notes drawbacks to full dependency on electronic devices for security.
In this research paper, we are focusing on automobile thief evidence giving and recovery of stolen vehicles. The main purpose of this paper is to introduce new system i.e. automatic thief evidence giving system in automobile. In this system we are using IR (Infrared) pair. Transmitter of IR pair is placed at driver’s seat and receiver is placed on speedometer in such a way that they will correspond to each other. Whenever person sits on driving seat and starts the car, power supply automatically will get to the circuit mounted inside the car and circuit gets started. As circuit is on, light emitted by transmitter will not be received by receiver mounted in circuit on speedometer, as the person is sitting on driving seat, therefore it creates barrier between transmitter and receiver. Now the generated signals go to circuit and camera will automatically turned on and starts to capture the three pictures in short span. This captured picture will send to the owner of the car in the form of MMS (Multimedia Messaging Service). Then owner receives MMS and decides the person driving the car is known personality or not. If not, then owner will report to the police with evidence of picture got via MMS. Therefore, it will be easy task for police department to find thief and stolen vehicles. So this system would be very helpful to the owner and police department too. Therefore, use of automatic thief identification system in automobile will increase the recovery of stolen vehicle.
Report on safety feature in car :::- by sachin kumar sachin kumar
This report is contained many safty feature in car with full report of many automobile industry are provied these features ( ppt of this topic are available by the name of "" safty features in car by sachin kumar
In this research paper, we are focusing on automobile thief evidence giving and recovery of stolen vehicles. The main purpose of this paper is to introduce new system i.e. automatic thief evidence giving system in automobile. In this system we are using IR (Infrared) pair. Transmitter of IR pair is placed at driver’s seat and receiver is placed on speedometer in such a way that they will correspond to each other. Whenever person sits on driving seat and starts the car, power supply automatically will get to the circuit mounted inside the car and circuit gets started. As circuit is on, light emitted by transmitter will not be received by receiver mounted in circuit on speedometer, as the person is sitting on driving seat, therefore it creates barrier between transmitter and receiver. Now the generated signals go to circuit and camera will automatically turned on and starts to capture the three pictures in short span. This captured picture will send to the owner of the car in the form of MMS (Multimedia Messaging Service). Then owner receives MMS and decides the person driving the car is known personality or not. If not, then owner will report to the police with evidence of picture got via MMS. Therefore, it will be easy task for police department to find thief and stolen vehicles. So this system would be very helpful to the owner and police department too. Therefore, use of automatic thief identification system in automobile will increase the recovery of stolen vehicle.
Report on safety feature in car :::- by sachin kumar sachin kumar
This report is contained many safty feature in car with full report of many automobile industry are provied these features ( ppt of this topic are available by the name of "" safty features in car by sachin kumar
The proposed framework faculties even the scarcest vehicle movement subsequent
to being furnished (bolted) and gives an upgraded hands-free remote keyless section
framework dependent on ZigBee remote correspondence. The venture is based upon a
continuous in-vehicle arrange that includes two incredible car conventions CAN and
LIN. The caution sign may normally be a glimmering of the lights or potentially the
sounding of the vehicle horn or an alarm. Moreover, the vehicle start power might be
specifically crippled dependent on an alert condition. The remote transmitter might be
utilized to arm and incapacitate the vehicle security framework or give other remote
control highlights from a foreordained range far from the vehicle. The ZigBee keyless
section framework allows the client to remotely open the vehicle entryways utilizing a
little handheld transmitter. Dynamic Car Finder Locate your vehicle in jam-packed
leaving lots.CAN system incorporates a movement detecting subsystem, throttle control
subsystem and Zigbee remote correspondence subsystem and a body control unit that is
helped by LIN sub organize. The LIN (Local Interconnect Network) arrange includes
vehicle subsystems, for example, headlight control and horn control.
The topic of driverless cars has caught the imaginations of many people. Who wouldn’t want to relax as his car drove him to work, then parked itself? Families could reduce the amount of vehicles if mom could take the car to work then send it home so another family member could do errands, go to the doctor, take the cat to the vet, or other tasks. To many this seems like a fantasy come true; in reality it is a fantasy that is going to be realized in the not too distant future.
While not all business and societal implications can be covered in this article, the insurance and regulatory implications are key to the future of this technology becoming readily available to the consuming public.
HARMAN Webinar - Enabling Safe, Secure and Enriched Driving Experiences by Aaron Thompson, Director, ADAS Planning & Marketing, HARMAN International And Greg Bohl, Vice President, AI with ADAS Focus, HARMAN International
Design and Implementation of an Intelligent Safety and Security System for Ve...Hamzamohammed70
In recent years, the surge in car theft cases, often linked to illicit activities, has become a growing concern. Simultaneously, countries grappling with oil shortages have shifted towards converting vehicles to run on liquid propane gas, presenting new safety challenges for car owners. This paper introduces a novel integrated intelligent system designed to address the challenges of car theft and safety concerns associated with gas-based vehicles. By seamlessly integrating these concerns into a single system, it aims to achieve significantly improved performance compared to traditional alarm systems. The proposed system consists of three primary parts: the car security subsystem, an Internet of Things (IoT)-based real-time car tracking subsystem, and the car safety subsystem. Utilizing key technologies such as the Arduino Microcontroller, Bluetooth module, vibration sensor, keypad, solenoid lock, GSM module, NodeMCU microcontroller, GPS module, MQ-4 gas sensor, flame sensor, temperature sensor, and Bluetooth module, the system aims to provide a comprehensive solution for the mentioned issues. Furthermore, the vibration sensor plays a crucial role in identifying unauthorized vehicle operations. Its significance lies in detecting the vibrations emanating from the running engine. Concurrently, other modules and sensors are utilized for real-time tracking and enhancing vehicle safety. These measures include safeguarding against incidents like fire outbreaks or gas leaks within the gas container. Finally, the system was compiled and practically tested, with results that worked well. This work provides some basic steps to enhance vehicle safety and security, as well as to prevent theft and overcome safety concerns related to gas leaks
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
The integration of wireless interfaces into vehicles has posed some challenges for the automotive industry over the years. While manufacturers strive to impress consumers with cutting-edge features, these features also bring security risks that cannot be ignored. To prevent potentially fatal incidents, a thorough protocol must be established to address system vulnerabilities. As the modern century moves towards an era of autonomous vehicles, security must be a top priority to avoid compliance breaches and delays in feature development. The significance of vehicle interfaces in the modern automotive industry cannot be overstated.
The present study aims to explore the prospective advantages and challenges associated with the integration of wireless interfaces in the automotive industry. This analysis will primarily focus on the latest technological advancements in vehicle technology and the critical need to secure against possible cyber-attacks. A wide range of topics will be covered in this paper, from the evolution of vehicle interfaces to the industry’s hurdles and strategies to minimize the risks associated with cyber threats. The objective of this study is to provide a comprehensive understanding of wireless interfaces in the automotive sector, including the benefits of implementing such technology, the challenges that it poses, and the measures needed to maintain the security and safety of vehicles, as well as the passengers.
The proposed framework faculties even the scarcest vehicle movement subsequent
to being furnished (bolted) and gives an upgraded hands-free remote keyless section
framework dependent on ZigBee remote correspondence. The venture is based upon a
continuous in-vehicle arrange that includes two incredible car conventions CAN and
LIN. The caution sign may normally be a glimmering of the lights or potentially the
sounding of the vehicle horn or an alarm. Moreover, the vehicle start power might be
specifically crippled dependent on an alert condition. The remote transmitter might be
utilized to arm and incapacitate the vehicle security framework or give other remote
control highlights from a foreordained range far from the vehicle. The ZigBee keyless
section framework allows the client to remotely open the vehicle entryways utilizing a
little handheld transmitter. Dynamic Car Finder Locate your vehicle in jam-packed
leaving lots.CAN system incorporates a movement detecting subsystem, throttle control
subsystem and Zigbee remote correspondence subsystem and a body control unit that is
helped by LIN sub organize. The LIN (Local Interconnect Network) arrange includes
vehicle subsystems, for example, headlight control and horn control.
The topic of driverless cars has caught the imaginations of many people. Who wouldn’t want to relax as his car drove him to work, then parked itself? Families could reduce the amount of vehicles if mom could take the car to work then send it home so another family member could do errands, go to the doctor, take the cat to the vet, or other tasks. To many this seems like a fantasy come true; in reality it is a fantasy that is going to be realized in the not too distant future.
While not all business and societal implications can be covered in this article, the insurance and regulatory implications are key to the future of this technology becoming readily available to the consuming public.
HARMAN Webinar - Enabling Safe, Secure and Enriched Driving Experiences by Aaron Thompson, Director, ADAS Planning & Marketing, HARMAN International And Greg Bohl, Vice President, AI with ADAS Focus, HARMAN International
Design and Implementation of an Intelligent Safety and Security System for Ve...Hamzamohammed70
In recent years, the surge in car theft cases, often linked to illicit activities, has become a growing concern. Simultaneously, countries grappling with oil shortages have shifted towards converting vehicles to run on liquid propane gas, presenting new safety challenges for car owners. This paper introduces a novel integrated intelligent system designed to address the challenges of car theft and safety concerns associated with gas-based vehicles. By seamlessly integrating these concerns into a single system, it aims to achieve significantly improved performance compared to traditional alarm systems. The proposed system consists of three primary parts: the car security subsystem, an Internet of Things (IoT)-based real-time car tracking subsystem, and the car safety subsystem. Utilizing key technologies such as the Arduino Microcontroller, Bluetooth module, vibration sensor, keypad, solenoid lock, GSM module, NodeMCU microcontroller, GPS module, MQ-4 gas sensor, flame sensor, temperature sensor, and Bluetooth module, the system aims to provide a comprehensive solution for the mentioned issues. Furthermore, the vibration sensor plays a crucial role in identifying unauthorized vehicle operations. Its significance lies in detecting the vibrations emanating from the running engine. Concurrently, other modules and sensors are utilized for real-time tracking and enhancing vehicle safety. These measures include safeguarding against incidents like fire outbreaks or gas leaks within the gas container. Finally, the system was compiled and practically tested, with results that worked well. This work provides some basic steps to enhance vehicle safety and security, as well as to prevent theft and overcome safety concerns related to gas leaks
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
The integration of wireless interfaces into vehicles has posed some challenges for the automotive industry over the years. While manufacturers strive to impress consumers with cutting-edge features, these features also bring security risks that cannot be ignored. To prevent potentially fatal incidents, a thorough protocol must be established to address system vulnerabilities. As the modern century moves towards an era of autonomous vehicles, security must be a top priority to avoid compliance breaches and delays in feature development. The significance of vehicle interfaces in the modern automotive industry cannot be overstated.
The present study aims to explore the prospective advantages and challenges associated with the integration of wireless interfaces in the automotive industry. This analysis will primarily focus on the latest technological advancements in vehicle technology and the critical need to secure against possible cyber-attacks. A wide range of topics will be covered in this paper, from the evolution of vehicle interfaces to the industry’s hurdles and strategies to minimize the risks associated with cyber threats. The objective of this study is to provide a comprehensive understanding of wireless interfaces in the automotive sector, including the benefits of implementing such technology, the challenges that it poses, and the measures needed to maintain the security and safety of vehicles, as well as the passengers.
The European Union is promoting eCall to reduce the number of roadway fatalities by minimizing the response time when an accident has occurred. eCall is a combination of an In Vehicle System (IVS), a device with a GSM cell phone and GPS location capability, and a corresponding infrastructure of Public Safety Answering Points (PSAPs) Intelligent Vehicle Safety Systems use Information and Communications Technologies for providing solutions for improving road safety in particular in the pre-crash phase when the accident can still be avoided or at least its severity significantly reduced. With these systems, which can operate either autonomously on-board the vehicle, or be based on vehicle-to-vehicle or vehicle-to-infrastructure communication (co-operative systems), the number of accidents and their severity can be reduced. Location-enhanced emergency calls like in-vehicle e-call have their primary benefit to society of saving lives and in offering an increased sense of security. The article presents the system eCall and how does it works.
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
Over the past few years, automotive security threats have gone from theory to reality. Tech-savvy thieves have stolen cars throughout Europe and North America. Online videos show hackers remotely hitting the brakes on cars in ways that can endanger drivers and passengers. Hackers can exploit some of these vulnerabilities from an adjacent lane without forewarning to the driver.
Other vulnerabilities are open to attack over the cellular network—from halfway around the world—and for large numbers of cars simultaneously.
Even though technology exists to solve many of these security problems, the challenges of deploying such technology in cars loom far larger than similar challenges do in traditional information technology (IT) systems. In traditional IT systems, most problems can be solved with a quick install, update, or configuration change—or at worst, restoring from a backup, executing a failover to a disaster recovery site, or calling in a breach response team to tackle the most sophisticated threats.
However, cars don’t work like that. Multi-year safety certification processes to meet Federal Motor Vehicle Safety Standards (FMVSS) requirements don’t engender the weekly, daily, and real-time security updates that IT teams enjoy. Nobody can call in a breach response team to investigate the millions of cars you’ve built, now happily garaged in millions of homes. A car can’t safely fail over to another car. Companies often use redundancies at critical IT layers to keep high-volume web services running reliably, but few, if any, carmakers can afford the NASA-like investment of doing this for every vehicle.
Protecting cars against such threats has to be done in a context that works both within the car, and at scale for carmakers. The responsibility doesn’t stop at the assembly line: It extends all the way from the carmakers to the full breadth, depth, and complexity of auto supplier relationships. Security is a concern at each tier of the value chain, and attackers seek the weakest links.
Auto theft prevention using gsm @1000KV Technologies 90308448771000kv technologies
electronics engineering live projects abstracts
electronics projects, electronics projects for engineering final year students, electronics and communication engineering projects for final year students,100kv,1000kv,1000kv technologies,1000kv projects,technologies,live projects,Hyderabad live projects,live projects in, diploma low cost projects,1000kv projects, , academic projects,btech live projects,Hyderabad,1000kilovolts,1000kilovolts technologies ,btech main projects ,
The Autonomous Revolution of Vehicles and TransportationMark Goldstein
This presentation to the Greater Phoenix Mensa Regional Gathering on November 29, 2019 is a detailed overview of the transformation of transportation through autonomous vehicles and the advent of Mobility-as-a-Service (MaaS) on the ground and in the air, including why Arizona is a hotbed for development and deployment, insight into the enabling sensor and communication technologies, and a forward-looking view of societal impact, markets and opportunities. Waves of change will roll through the transportation industry and practices as autonomy ramps up in personal and mass transportation, as well as in logistics/delivery segments. We examine how autonomous vehicles will be developed, deployed and monetized, creating new business models across the transportation sector. Explore autonomous vehicles roadblocks and operational challenges, emerging standards and protocols, connected services and their associated big data strategies and opportunities.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Cyber security for Autonomous Vehicles.pdfDorleControls
An overview of Cyber security for Autonomous Vehicles will be given in this introduction, along with a focus on the significance of protecting these cutting-edge modes of transportation.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
A seminar report on vehicle security
1. A Seminar Report on
“VEHICLE SECURITY & OPTIMISATION”
By
ANISH KUMAR
Class Roll No: 1757042
University Roll No: 12617007021
Under the guidance of
Prof. SHUBHAM KUNDU
Submitted in Partial Fulfilment of the Requirements
for the Award of the Degree of
Bachelor of Technology
In
MECHANICAL ENGINEERING
HERITAGE INSTITUTE OF TECHNOLOGY
2. CERTIFICATE
This is certified that the Seminar Report entitle “VEHICLE SECURITY &
OPTIMISATION” submitted by ANISH KUMAR partial fulfilment of
requirements for the award of Bachelor of Technology Degree in Mechanical
Engineering at Heritage Institute of Technology, Kolkata (HITK) is an
authentic work carried by him under my supervision and guidance.
To the best of my knowledge, the matter embodied in this Seminar Report has
not been submitted to any another University/Institute for the award of any
Degree or Diploma.
DATE:-29-07-2019
SIGNATURE:
Prof. SHUBHAM KUNDU
Associate Professor (HITK)
3. CONTENTS
1) Introduction
2) History
3) Safety vs security
4) Recent cases of thept of vehicles
5) Advancement of technologies
6) Car alarm
7) Immobiliser
8) Biometric fingerprint scan technology
9) Vehicle tracking and locking system using GSM & GPS
10) Drawbacks of dependency on electronic device
11) Conclusion
4. INTRODUCTION
The vehicle security system provides visual and audible alarm signals if
someone opens the doors when the system is armed. It is not, however, a motion
detection type system that activates when a vehicle is moved or when a
vibration occurs.
In the last few decades, India has progressed at such an enormous rate that
many companies have strongly established themselves here. These companies
bring a huge amount of workforce with them. Arranging transportation to such a
huge mass is a cumbersome task involving many intricacies. Generally, this
transport is arranged through the local transport vendors on a yearly contract
basis, recently happen mishaps such as burglary, rape cases etc. The
development of satellite communication technology is easy to identify the
vehicle locations. Vehicle tracking systems have brought this technology to the
day-to-day life of the common person. Today GPS used in cars, ambulances,
fleets and police vehicles are common sights on the roads of developed
countries. All the existing technology support tracking the vehicle place and
status.The GPS/GSM Based System is one of the most important systems,
which integrate both GSM and GPS technologies. It is necessary due to the
many of applications of both GSM and GPS systems and the wide usage of
them by millions of people throughout the world [1]. This system designed for
users in land construction and transport business, provides real-time information
such as location, speed and expected arrival time of the user is moving vehicles
in a concise and easy-toread format. This system may also useful for
communication process among the two points. Currently GPS vehicle tracking
ensures their safety as travelling. This vehicle tracking system.
5. Massive feature representing the future of security syste
HISTORY
An early version of a car alarm for use as a theft deterrent was invented by an
unknown prisoner from Denver in 1913.[1]
This version was manually armed,
and triggered when someone tried to crank the engine. A later alarm inspired by
an early version of a remote starter was published in 1916.[2]
This version had
the car owner carry a receiver, which would buzz if the car ignition system was
tampered
A car alarm is an electronic device installed in a vehicle in an attempt to
discourage theft of the vehicle itself, its contents, or both. Car alarms work by
emitting high-volume sound (often a vehicle-mounted siren, klaxon, pre-
recorded verbal warning, the vehicle's own horn, or a combination of these)
when the conditions necessary for triggering it are met. Such alarms may also
cause the vehicle's headlights to flash, may notify the car's owner of the incident
via a paging system, and may interrupt one or more electrical circuits necessary
for the car to start. Although inexpensive to acquire and install, the effectiveness
of such devices in deterring vehicle burglary or theft when their only effect is to
emit sound appears to be negligible.
6. Other than car alarm the only security in terms of thept protection was
the key which was used to start the vehicle. Car alarms should not be
confused with immobilizers; although the purpose of both may be to
deter car theft, they operate in a dissimilar fashion. An immobilizer
generally will not offer any audible or visual theft deterrence, nor require
any more input from the driver than from the driver of a non-immobilizer
car.
7. SAFETY VS SECURITY
Safety is the prevention of accidents (accidents which may or may not
involve human agents, but are in any case not intentional).
Security is the prevention of malicious activities by people (mugging,
burglary, robbery, terrorist activities, etc.).
So safety may include activities such as clearly marking pits and holes on
a building site to avoid people accidentally falling into them. Or putting
up warning signs to warn people that there is high-voltage equipment
past a certain point and the general public should stay the hell away.
Security may involve things such as the placement of heavy lorries across
access roads of farmers’ markets to stop assholes from running their cars
or vans into crowds of people. Security involved checking passengers and
their luggage for forbidden items which could be used to attack others in
flight.
8. Safety is a subset of security and is only concerned with protecting
human life. Security includes includes this but also focuses on keeping
intruders out of both physical and technical environments and
performing risk assessments related to both security specific technical
administrative, and procedural controls. Safety doesn’t care about
personal , Corporate, or government assets unless they pose a risk to
personal safety or the safety of a group of people.
RECENT CASES OF THEFT OF VEHICLES
Motor vehicle theft is one of the most commonly reported crimes in many
contries jurisdictions. Specifically in British Columbia, the Insurance
Corporation of British Columbia (ICBC) has recently indicated that, on an
average day, 48 vehicles are stolen in British Columbia (www.icbc.com). For
the most part, research on motor vehicle theft has focused on the motivations
behind the act, the various methods employed by thieves, and, more recently,
the profile and criminal development of motor vehicle thieves. However,
there is a paucity of research examining the characteristics of stolen vehicles
that are recovered and, in particular, the recovery sites in which they are
found.
Given this, this report will examine the phenomenon of motor vehicle theft in
a Canadian context using data collected from police reports of stolen vehicles
in three cities within the Fraser Valley, British Columbia. Specifically, this report
will include an analysis of dumpsites and the recovery of vehicles from within
the Fraser Valley of British Columbia
9. ADVANCEMENT OF TECHNOLOGIES
From 2007 through 2015, motor vehicle theft dropped from 1.1 million to
686,803 vehicles. However, in the past two years, motor vehicle theft
rates have bounced back – increasing 10%. Meanwhile, “smash and
grab” car break-ins are still a frequent occurrence across North America;
particularly plaguing drivers in metropolitan cities like Seattle, San
Francisco, and Philadelphia (Insurance Information Institute, iii.org).
While the introduction of “smart key” fobs has widely eliminated motor
theft via hot-wiring, thieves are continuing to cost drivers billions of
dollars a year in damage and stolen goods. In 2016 alone, $5.9 billion
was lost due to motor vehicle theft and intrusion. Thus, it is absolutely
essential that drivers do whatever they can do deter, detect, and prevent
theft of their vehicles.
Latest technologies includes:
1) Car alarm
2) Immoboliser
3) Biometric finger print scan technology
4) Vehicle tracking and locking system using GSM & GPS
10. 1)CAR ALARM
A car alarm is an electronic device installed in a vehicle in an attempt
to discourage theft of the vehicle itself, its contents, or both. Car
alarms work by emitting high-volume sound (often a vehicle-mounted
siren, klaxon, pre-recorded verbal warning, the vehicle's own horn, or
a combination of these) when the conditions necessary for triggering
it are met. Such alarms may also cause the vehicle's headlights to
flash, may notify the car's owner of the incident via a paging system,
and may interrupt one or more electrical circuits necessary for the car
to start
A typical car alarm
11. 2)IMMOBILISER
An immobiliser or immobilizer is an electronic security device fitted to
an automobile that prevents the engine from running unless the
correct transponder car key(or other token) is present. This prevents
the car from being "hot wired" after entry has been achieved and thus
reduces motor vehicle theft. Research shows that the uniform
application of immobilisers reduced the rate of car theft by 40%.
An electronic immobiliser
The electric immobiliser/alarm system was invented by St. George
Evans and Edward Birkenbuel and patented in 1919.[2]
They
developed a 3x3 grid of double-contact switches on a panel mounted
inside the car so when the ignition switch was activated, current from
the battery (or magneto) went to the spark plugs allowing the engine
to start, or immobilizing the vehicle and sounding its horn.[3]
The
system settings could be changed each time the car was
driven.[3]
Modern immobiliser systems are automatic, meaning the
owner does not have to remember to activate it.
Immobilisers have been mandatory in all new cars sold
in Germany since 1 January 1998, in the United Kingdom since 1
October 1998, in Finland since 1998, in Australia since 2001 and
in Canada since 2007. Early models used a static code in the ignition
key (or key fob) which was recognised by an RFID loop around the
lock barrel and checked against the vehicle's engine control
unit (ECU) for a match.
12. 2)BIOMETRIC FINGERPRINT SCAN TECHNOLOGY
Biometric technology is an automated access monitoring system, based
on behavioral or physiological characteristics, used for verification and
recognition of a manual access. Many versions of biometric security
system are available in the market such as voice verification,
fingerprints, hand geometry and retina/ iris/ face recognition. It’s a user-
friendly, reliable and convenient identification and monitoring method. A few
biometric vehicle control access systems have made their way to the
market such as driver identification, automatic engine starter, biometric
seats etc. The biometric car access or identification system provides
better anti-theft protection and a great sense of comfort and safety to car
owners. Major auto-brands like Mercedes-Benz, BMW, Ford and
Volkswagen are working on this technology and finding innovative ways
to strengthen their vehicles’ safety and security system.
Biometric vehicle accesss
Advantages of biometric access control automobile technology in
cars
Accuracy and high-end protection: The biometric vehicle security
system relies on biological characteristics such as retinal and fingerprint
scans, voice recognition etc. This makes it accurate and difficult for
anyone to gain access without permission of an authorized user.
13. User-friendly: It’s easy to install and user-friendly. User requires
minimum training to operate this system. It doesn’t involve any
expensive password administrators, and has a low maintenance cost.
Convenient: The biometric vehicle access devices are highly efficient
and convenient to gain control. While pins or passwords can easily be
forgotten, hacked or stolen, the biometric system includes biological
characteristics that can’t be obtained or replicated easily by an
unauthorized person.
Easy tracking: Being an automated system, it instantly tracks
unauthorized access, collects stored database, and forwards to its
owner.
Quick: Biometric vehicle control access system is quick in processing an
access request, collecting database and recognizing authorization.
4)VEHICLE TRACKING & LOCKING USING GPS &
GSM
At the present time, the rate of crime is increasing rapidly because it is a
kind of evident from the actual fact that thefts became a matter of
routine. Particularly these vehicles may incur huge losses on the part of
the amount invested on these vehicles. To overcome this problem, there
are numerous technologies are available in the market such as GPS,
GSM and GPRS systems. In the present days, most of the vehicles are
designed with GSM based vehicle theft control systems, which provides
the protection from thefts even if they are parked in the parking area.
This article mentions the anti theft system, that include: LoJack, OnStar,
Security Plus and BMW Assist, Commando FM870, Car Shield, Viper
1002, Cobra Track5, Cobra 8510, Nissan Vision 2015and VIN shield.
14. Vehicle Theft Control System
Vehicle Theft Control System Using GSM and GPS
Systems
For better understanding of this concept of the vehicle theft control
system, the projects that are based on GPS and GSM security
systems are discussed below.
These gsm and gps tracking system for cars project significantly reduce
the time, manpower and operates without interference of humanoid. In
the modern world, there are various new technologies like GPS, GSM,
RFID, Biometric Recognition. Mobile communication has been
integrated into the vehicles for security purpose. In these projects GPS
technology is used to find the exact location of the vehicle and GSM is
used to send the message to the owner of the vehicle. At once if the
vehicle seems to be theft, the owner just has to send an SMS to that
vehicle, that means a vehicle will be stopped all the doors will be closed
then the theft will be locked in the car.
GPS and GSM based Vehicle Theft Location Intimation
The main intention of this project is to find out the exact location of the
stolen vehicle by thefts and inform to the concerned authority through an
SMS
15. GPS and GSM based Vehicle
This GSM based vehicle theft control system retrieves the exact
location of a vehicle in terms of its longitude and latitude. This data is fed
to the microcontroller, that is interfaced to a GSM modem. The
microcontroller retrieves the exact location details from the GPS and
sends an SMS to the concerned authority over GSM modem on
periodical intervals which is set by the user.An LCD display is connected
to the microcontroller for crossing the data received before being sent
over GSM. This project will be very useful to people to keep track of their
vehicles.Further, this project can be developed by making an
arrangement to stop the ignition of the vehicle by the owner remotely by
sending an SMS in theft situations.
CONCLUSION
It is always better to start every design with a good proposal, which will
stand as a reference point to the work as it proceeds. The result of any
design gives joy if aims and objectives are gotten. Since the project
performed its proposal, it indeed satisfactory. Now from the input to the
output of each stage was a success. The major input is like an interrupt
and upon reception by microcontroller it goes through the iteration of
16. demobilizing the car, sending text message and starting up an alarm.
The design is thus a huge success
REFERENCES
https://en.wikipedia.org/wiki/Car_alarm
https://www.slideshare.net/VineetRaul/vehicle-security-system
https://www.rutronik.com/article/detail/News/security-and-safety-for-the-
car/
https://isssource.com/drawing-up-plans-for-auto-security/
https://www.elprocus.com/gsm-based-vehicle-theft-control-system/
https://en.wikipedia.org/wiki/Immobiliser