SlideShare a Scribd company logo
1 of 6
Download to read offline
ISSN: 2278 – 7798
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 2, Issue 4, April 2013
All Rights Reserved © 2013 IJSETR
992
Vehicle Monitoring and Theft Prevention System
Using ARM Cortex
Nurul Hutha.S1
and ArunKumar.B2
1
M.E-Embedded System Technologies
2
Assistant professor Dept. of EEE
V.R.S.College of Engineering and Technology, Arasur,Villupuram, Tamilnadu, India.
Abstract-Automotive theft has been a persisting problem
around the world and greater challenge comes from professional
thieves. A modern vehicle utilizes remote keyless entry system
and immobilizer system as the main weaponry against vehicle
theft. But these systems prevent unauthorized access of the
vehicle to a certain extent. Smart gravitational lock is used to
prevent the theft by providing the air gesture key from key fob
to the vehicle which provides high security to the vehicle. When
there is no usage of key fob, then the vehicle is secured by touch
screen ignition where the software key gesture is given to the
touch screen. GPS and GSM technologies enable the vehicle
owners to track and monitor the vehicle at anytime from
anywhere. During GPS outage environment, inertial navigation
sensor is used that contains 3-axis MEMS magnetometer and
accelerometer which inform the vehicle positions to the owner
by use of dead reckoning method. To restrict the vehicle
movement within a particular area, GPS fencing is used in
which fence radius can be programmed in the touch screen
display. The integrated motions sensing subsystem is used which
measures the vehicles 3-D position and detects if vehicle is
moved or tilted, when the threshold level is exceeded. In case of
auto theft, fuel supply will be made to cut off slowly by sending
the message thereby disabling the vehicle.
Keyword-MEMS Accelerometer, fuel cutoff, GPS
fencing, Keyfob, Smart Gravity Lock.
I INTRODUCTION
The automobiles have been stolen for different reasons
viz. For using the vehicles for transport, commission of
crimes and for reusing or reselling parts dismantled from the
vehicles or resale of the vehicle itself. In this paper, an
automotive security system to disable an automobile and its
key auto systems through remote control when it is stolen is
designed. It hence deters thieves from committing the theft.
Italso effectively prevents stealing of key auto systems for re-
selling by introducing air gesture security key. The details of
system design and implementation are described in the paper.
To reduce the theft rate of the car and meet the
intellectualized auto-guard demand of people, the vehicle is
provided with the accelerometer for secret key gesture. GSM
Modem Company finished setting and dismissing the
prevention of message or call and controlled the car’s states
remotely. To improve the security and reliability of the
vehicle, it has achieved the unity between intellectualized
safeguard and remote control.
Various technologies have been introduced in recent years
to deter car thefts, for example, Immobilizers to remotely
disable the lost vehicles, Microdot Identification to identify
auto parts using unique microdots, Electronic Vehicle
Identification (EVI) to identify the vehicle against a
registration database, lojack System to use in-built
transponders for tracking down vehicle, GPS to locate the
position of the lost vehicles using global positioning system,
and so on.
There are still some security gaps which these
technologies do not address. For example, while the
immobilizer can prevent a thief from starting a car engine and
driving away, it is unable to stop professional thieves from
towing the car away. The professional thieves can then
dismantle the stolen vehicle and re-sell the components. The
thieves will also have the luxury of time to remove the
immobilizer and re-sell the car using another identity the EVI
approach is efficient when it comes to identification and
verification of vehicles since this is done electronically.
However, EVI is less effective against the chop shop
scenario where stolen vehicles are dismantled and their parts
are re-sold into the market. In addition, the EVI approach is
ineffective against thieves who export the stolen vehicles or
the chopped car parts to countries which do not implement
the EVI system; while lojack Systems may be good at
tracking the lost vehicles, it may take a few
hours/days/months or even cannot find the stolen vehicle. In
addition, they cannot disable an automobile and its key auto
systems. Thus, if their radio transponders are removed, the
stolen automobiles still function well and the thieves can
drive them or sell them. The thieves can also dismantle the
auto systems and re-sell auto parts; finally, GPS cannot
penetrate forest cover, parking garages, or other obstructions.
GPS relying on a short visible antenna can easily be broken
off by a thief. Thus, greater challenge comes from
professional thieves because they are capable of removing the
immobilizers, lojackor GPS parts from the automobile and re-
sell the vehicles or auto parts. In short the existing systems
are designed to give intimation to the owner only after the car
is thefted.
The project proposed here aims to design a next
generation auto theft prevention system by adding significant
enhancements and modernizing the existing system and thus
ISSN: 2278 – 7798
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 2, Issue 4, April 2013
All Rights Reserved © 2013 IJSETR
993
try to overcome the above drawbacks. By implementing this
techniques, the possibility of a car Theft is very less or no
theft. The following modules are implemented in this project.
First a new Innovative car key is designed, the car key
transfers a random data by providing the air gesture each and
every time the car is unlocked. The transaction of password
from key to car is known only to these devices and any
intermittent unit cannot diagnose the transaction as each and
every time the data is changing. The cryptographic technique
is used which provides encrypted data transmission and
reception.
A dual layer keying approach is followed during vehicle
ignition process. This consists of software and hardware keys.
A unique touch gesture is made on the 65K Color
Touchscreen TFT Display that acts as the software key. The
system verifies this and then accepts the hardware key which
is the actual key fob normally used. This feature can be
temporarily disabled and enabled via SMS sent by the owner.
This is useful in situations such as when someone (like a
mechanic) other than the owner wants to handle the vehicle
and the owner does not want the other person to know the
secret onscreen password. A serial EEPROM memory is used
to store the password
The vehicle unit constantly monitors the vehicle motion
after being armed (locked). The integrated motion sensing
subsystem measures the vehicles three dimensional position
and detects any unauthorized motion if the vehicles is moved
or tilted that exceeds a threshold level. The sensitivity of this
function can be adjusted on the touchscreen display GUI to
effectively avoid any false warnings that are common with
existing vehicle security systems. When someone tries to
break into the vehicle forcibly, the alarm triggers the siren
and head lamps and sends an SMS to the owner.
GPS and GSM technologies enable the vehicle owners to
track and monitor the vehicle with cellphone at anytime from
anywhere. The important enhancement in this feature is its
ability to inform the vehicle position even during a GPS
outage using dead reckoning method. This is achieved with
the help of Inertial Navigation Sensors that consists of a 3-
axis MEMSMagnetometer and a 3-axis MEMS
Accelerometer which will act as a tilt compensated compass
module.
When the owner approaches the vehicle, the system
automatically verifies the code from remote key and the
vehicle emits a head light flash and horn beep to show its
presence. This feature is known as car finder and it assists the
owner to locate the vehicle in a parking lot where several
vehicles are parked.
GPS Fencing is used to restrict the vehicle movement
within a particular area. For example, if the owner wants the
car to move only within a particular city, once it moves out of
city borders the owner would immediately receive an SMS
alert as to the current location of the vehicle. The interesting
feature here is the fence radius can be programmed by the
user in the touchscreen display. This flexibility allows the
user to set a virtual fence that can be at building level, street
level, city level or state level.
Remote Fuel Cut-off is very useful especially in case of
auto theft. If the vehicle is somehow hacked into and taken,
you can send message that will slowly cut-off the fuel supply,
thereby disabling the vehicle. A Servo Motor controlled valve
is used to cut the fuel supply.
II BLOCK DIAGRAM
Fig.1. Keyfob unit block diagram
Fig.2.Vehicle Unit block diagram
ISSN: 2278 – 7798
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 2, Issue 4, April 2013
All Rights Reserved © 2013 IJSETR
994
III GESTURE RECOGNITION
The MEMS Accelerometer MMA7660 IC is used shown
in fig 3. This gives the three dimensions (x, y, and z) readings
of a particular object. It is a low power, low profile capacitive
3-axis accelerometer commonly called as free fall detection
sensor. Because of a sleep mode pin on the accelerometer
makes it ideal for the handheld battery powered electronics.
The program memory of the Arm controller is coded in such
a way that it recognizes the values in the tilt register of the
accelerometer connected through I2C bus. So if we move the
key fob in any direction then the corresponding values are
noted by the accelerometer. Through embedding the MEMS
Accelerometer the vehicle can be armed by gesture
performance in the air.
Fig.3. MEMS accelerometer
The application of this three axis accelerometer is
interfaced with the ARM Cortex-M3 micro controller which
could recognize the hyper terminal input instructions can
perform functions controlled by gesture. We need to move
the accelerometer in a particular set of directions then it will
recognize one of the directions and the vehicle is locked/
unlocked by performing the secret gesture. The accelerometer
consists of a tilt register which give the orientation logic of
the gesture. First the values are defined for the gesture
performance. The Arm controller is processed in such a way
that depending up on the orientation logic performed by the
accelerometer the tilt values keep on changing. These values
are read through the SCL, SDA and the INT lines which are
interfaced to one of the port in Arm controller LPC 1300.
Apart from sending the gesture key, they are also displayed
on the LCD interfaced to the Arm 7 micro controller.
The gesture key is transmitted to the vehicle through the
IEEE 802.15.4 wireless transreceiver. The vehicle recognizes
this key with the already stored key and verifies it. If these
key matches then it allows the vehicle door to open to prevent
the wireless key transmission from theft persons. The
cryptographic keyless entry scheme is used. Here RC4
algorithm is used to encrypt and decrypt the sending data
during transmission.
A. IEEE 802.15.4
The Microchip MiWi™ P2P Wireless Protocol is a
variation of IEEE 802.15.4, using Microchip’s MRF24J40
2.4 GHz transceiver and any Microchip 8, 16 or 32-bit
microcontroller with a Serial Peripheral Interface (SPI).
The protocol provides reliable direct wireless
communication via an easy-to-use programming interface.
The MiWi P2P protocol is a variation of IEEE 802.15.4 and
supports both peer-to-peer and star topologies. It has no
routing mechanism, so the wireless communication coverage
is defined by the radio range. The MiWi P2P stack uses only
a portion of the IEEE 802.15.4 specification’s rich PHY and
MAC layers’ definitions as shown in fig 3. The specification
defines three PHY layers, operating on a spectrum of 868
MHz, 915 MHz and 2.4 GHz. The MRF24J40 radio operates
on the 2.4 GHz, ISM band – freely available worldwide. The
total bandwidth for the IEEE 802.15.4, 2.4 GHz ISM band is,
theoretically, 250 kbps. In reality, for reliable
communication, the bandwidth is 20-30 kbps.
There are two ways to transmit a message: BROADCAST
AND UNICAST. Uncast transmissions have only one
destination and use the long address as the destination
address. The MiWi P2P stack requires Acknowledgement for
all unicast messages. If the transmitting device has at least
one device that turns off its radio when Idle, the transmitting
device will save the message in RAM and wait for the
sleeping device to wake-up and request the message. This
kind of data transmitting is called indirect messaging.
In the MiWi P2P stack, only the messaged device will be
notified by the radio. If the messaged device turns off its
radio when Idle, it can only receive a message from the
device to which it is connected. IEEE 802.15.4 deals with
only PHY layer and portion of Data link layer. The higher-
layer protocols are left to industry and the individual
applications.
IV CRYPTOGRAPHIC KEYLESS ENTRY
RC4 is a stream cipher, symmetric key algorithm. The
same algorithm is used for both encryption and decryption as
the data stream is simply XORed with the generated key
sequence. The key stream is completely independent of the
plaintext used. It uses a variable length key from 1 to 256 bit
to initialize a 256-bit state table. The state table is used for
subsequent generation of pseudo-random bits and then to
generate a pseudo-random stream which is XORed with the
plaintext to give the cipher text.
The algorithm can be broken into two stages:
initialization, and operation. In the initialization stage the
256-bit state table, S is populated, using the key, K as a seed.
Once the state table is setup, it continues to be modified in a
regular pattern as data is encrypted. This algorithm produces
a stream of pseudo-random values.
ISSN: 2278 – 7798
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 2, Issue 4, April 2013
All Rights Reserved © 2013 IJSETR
995
The input stream is XORed with these values, bit by bit.
The encryption and decryption process is the same as the data
stream is simply XORed with the generated key sequence. If
it is fed in an encrypted message, it will produce the
decrypted message output, and if it is fed in plaintext
message, it will produce the encrypted version [6].
V VEHICLE SECURITY SYSTEM
A vehicle security system combines the installation of an
electronic device in a vehicle, or fleet of vehicles, with
purpose designed computer software at least at one
operational base to enable the owner or a third party to track
the vehicle’s location, collecting data in the process from the
field and deliver it to the base of operation. Modern vehicle
tracking systems commonly use GPS technology for locating
the vehicle, but other types of automatic vehicle location
technology such as MEMS accelerometer and magnetometer,
adjustable alarming system, fuel cut-off can also be used.
The GPS and GSM technologies enable the vehicle
owners to track and monitor the vehicle with cellphone at
anytime from anywhere. The block diagram for vehicle unit
security system is shown in fig 5. The protocols such as I2C,
SPI, UART are used to interface the security devices to the
ARM processor.
A. GPS
The Global Positioning System (GPS) is a space-based
global navigation satellite system (GNSS) that provides
reliable location and time information in all weather and at all
times and anywhere on or near the Earth when and where
there is an unobstructed line of sight to four or more GPS
satellites. It is maintained by the United States government
and is freely accessible by anyone with a GPS receiver.
GPS satellites are orbited high enough to avoid the
problems associated with land based systems, yet can provide
accurate positioning 24 hours a day, anywhere in the world.
Uncorrected positions determined from GPS satellite signals
produce accuracies in the range of 50 to 100 meters. When
using a technique called differential correction, users can get
positions accurate to within 5 meters or less. GPS receiver
will automatically collect this information and store it for
future reference.
B. GPS Fencing
GPS fencing notifies the system when a vehicle is
equipped with the tracking device crosses a virtual boundary.
The notification can be sent to the owner’s cell phone . It
usually includes the time, date and location that the virtual
boundary was crossed, allowing for an immediate
investigation or response to the situation. GPS fencing is
suitable for keeping vehicles out of prohibited areas e.g.
Sacred Sites, blast zones, environmentally sensitive areas,
construction zones. Automatically speed limiting vehicles in
designated areas. This feature restricts the vehicle movement
within a particular area. For example, if the owner wants the
car to move only within a particular city, once it moves out of
city borders the owner would immediately receive an SMS
alert as to the current location of the vehicle. The interesting
feature here is the fence radius can be programmed by the
user in the touchscreen display. This flexibility allows the
user to set a virtual fence that can be at building level, street
level, city level or state level.
C. GSM Modem
Global system for mobile communication (GSM) is a
globally accepted standard for digital cellular
communication. GSM is the name of a standardization group
mobile cellular radio system operating at 900 MHz.A GSM
modem as shown in fig 4 is a wireless modem that works
with a GSM wireless network. A wireless modem behaves
like a dial-up modem. The main difference between them is
that a dial-up modem while a wireless modem sends and
receives data through radio waves.
Fig.4.GSM modem
The working of GSM modem is based on commands, the
commands always start with AT (which means Attentions)
and finish with a <CR> character. For example, the dialing
command is ATD<number>; ATD3314629080; here the
dialing command ends with semicolon. The AT commands
are given to the GSM modem with the help of PC or
controller. The GSM modem is serially interfaced with the
controller with the help of UART.
D. MEMS Magnetometer & Accelerometer
The important enhancement in this feature is its ability to
inform the vehicle position even during a GPS outage using
dead reckoning method. This is achieved with the help of
Inertial Navigation Sensors that consists of a 3-axis MEMS
Magnetometer and a 3-axis MEMS Accelerometer which will
act as a tilt compensated compass module. It is interfaced
with ARM using I2C protocol.
E. Servo Motor
If the vehicle is made theft or misused by the driver or
vehicle is taken to the places without the knowledge of the
owned, then the owner can be able to control their car
through GSM. This feature is very useful especially in case of
auto theft. The control message is send to the processor by
the owner. Now the processor intimates the servo motor that
ISSN: 2278 – 7798
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 2, Issue 4, April 2013
All Rights Reserved © 2013 IJSETR
996
wills slowly cut-off the fuel supply, thereby disabling the
vehicle. It uses the PWM technique to control the value. The
servo motor is shown in fig 5.
Fig.5. Servo motor rotation diagram
VI CONCLUSION
This paper describes a air gesture recognition system by
using MEMS accelerometer. The innovative vehicle key is
designed in which gesture key from key fob is compared with
the stored key to secure opening of the vehicle door. This
provides more protection to the vehicle even when the key
fob is stolen. Secondly a navigation device for land vehicle
involves the MEMS accelerometer and magnetometer
integrated with the GPS, so during GPS outage the vehicle is
navigated using navigation sensor. The adjustable motion
alarm is used which helpful to intimate the vehicle owner
about the intentional touch given by the thief. When there is
no usage of key fob, the touch screen is used to ignite the
vehicle through software key that is given to the screen.GPS
fencing is implemented to restrict the vehicle within the
particular area by the owner. Remote fuel cutoff is used to
reduce or cut the fuel when the vehicle is hacked by thief or
misused by the other persons. Thus the techniques presented
in this paper provide high security and reliability to the
vehicle.
REFERENCES
[1] Jacques Georgy, Member, IEEE, AboelmagdNoureldin,
Senior Member, IEEE, and Chris Goodall “ Vehicle
Navigator using a Mixture Particle Filter for Inertial
Sensors/Odometer/Map Data/GPS Integration “IEEE
Transactions on Consumer Electronics, Vol. 58, No. 2,
May 2012.
[2] RuizeXu, Shengli Zhou, and Wen J.L.MEMS
Accelerometer Based Nonspecific-User Hand Gesture
Recognition”ieee sensors journal, vol. 12, no. 5, may
2012.
[3] Kichun Jo, Student Member, IEEE, Keounyup Chu,
Student Member, IEEE, and MyounghoSunwoo,
Member, IEEE Interacting Multiple Model Filter-Based
Sensor Fusion of GPS With In-Vehicle Sensors for Real-
Time Vehicle Positioning, IEEE transactions on
intelligent transportation systems, vol. 13, no. 1, march
2012.
[4] M.M. Atia, J. Georgy, M.J. Korenberg, A. Noureldin,
“Real-time implementation of mixture particle filter for
3D RISS/GPS integrated navigation solution”, Electron.
Lett., vol.46, no.15, July 2010.
[5] S. Zhou, Q. Shan, F. Fei, W. J. Li, C. P. Kwong, and C.
K. Wu et al., “Gesture recognition for interactive
controllers using MEMS motion sensors,” in Proc.
IEEE Int. Conf. Nano/Micro Engineered and Molecular
Systems, Jan. 2009.
[6] N. Ndjeng, S. Glaser, and D. Gruyer, “A multiple model
localization system for outdoor vehicles,” in Proc. IEEE
Intell. Vehicles Symp., Istanbul, Turkey, 2007. IEEE Int.
Conf. Nano/Micro Engineered and Molecular Systems,
Jan. 2009.
[7] Mohammed Abuzalata,MuntaserMomani, Sayel Fayyad
and Suleiman Abu-EinDepartments of Mechatronics and
Mechanical Engineering,Faculty of Engineering, Al-
Balqa’ Applied University, Technology, Amman, Jordan
“A Practical Design of Anti-Theft Car Protection System
Based on Microcontroller” 2012 Science Publications
[8] Alaqeeli, A., J. Starzyk and F.V. Graas, 2003. Realtime
acquisition and tracking for GPS receivers. Proceedings
of the 2003 International Symposium on Circuits and
Systems, May 25-28, IEEE Xplore Press, pp:IV-500-IV-
503DOI:10.1109/ISCAS.2003.1205933
[9] R. Toledo-Moreo and M. A. Zamora-Izquierdo, “IMM-
based lane-change prediction in highways with low-cost
GPS/INS,” IEEE Trans. Intell.Transp. Syst., vol. 10, no.
1, pp. 180–185, Mar. 2009.
[10]M. S. Grewal, L. R. Weill, and A. P. Andrews, Global
Positioning Systems, Inertialavigation,andIntegration,
2nd ed., New Jersey:Wiley-Interscience, 2007.
[11]T. Schlomer, B. Poppinga, N. Henze, and S. Boll,
“Gesture recognition with a Wii controller,” in Proc. 2nd
Int. Conf. Tangible and EmbeddedInteraction (TEI’08),
Bonn, Germany, 2008, pp. 11–14.
[12]N. Popoviciu and M. Boncut, “On the Hopfield
algorithm.Foundations and examples,” Gen. Math., vol.
13, no. 2, pp. 35–50, 2005.
[13] A. H. F. Lam, W. J. Li, Y. Liu, and N. Xi, “MIDS:
Micro input devices system using MEMS sensors,”
presented at the IEEE/RSJ Int. Conf. Intelligent Robots
and Systems (IROS), Oct. 2002.
ISSN: 2278 – 7798
International Journal of Science, Engineering and Technology Research (IJSETR)
Volume 2, Issue 4, April 2013
All Rights Reserved © 2013 IJSETR
997
BIBLIOGRAPHY
Mrs. NURUL HUTHA.S,
Completed B.E(ECE) degree in
V.R.S College of Engineering
and Technology, Villupuram in
April 2009, and currently
pursuing M.E (Embedded
System Technologies) in V.R.S
College of Engineering and
Technology, Villupuram.
Mr.ARUNKUMAR.B,
Completed B.E(ECE) degree in
Pallavan College of Engineering,
Kancheepuram in April 2009,
M.E (Embedded & Real time
System) in PSG College of
Technology, Coimbatore, in 2011.
Now he is working as an Assistant
Professor in the Department of
EEE in V.R.S. College of Engineering and Technology,
has a teaching experience of 2 Years

More Related Content

What's hot

Car Security System #CSALS
Car Security System #CSALSCar Security System #CSALS
Car Security System #CSALSAlex Vishwa
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system96452128
 
Report of Advance car security system major project
Report of Advance car security system major projectReport of Advance car security system major project
Report of Advance car security system major projectAmi Goswami
 
Finger print authentication for bikes
Finger print authentication for bikes Finger print authentication for bikes
Finger print authentication for bikes Saiprasad
 
anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security systemAkshay Gaikwad
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadNishanth C
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Jyothsna Sridhar
 
Smart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A ReviewSmart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A ReviewIRJET Journal
 
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...IJCSEA Journal
 
Auto theft prevention using fingerprint scanner
Auto theft prevention using fingerprint scannerAuto theft prevention using fingerprint scanner
Auto theft prevention using fingerprint scannerSubin S.B
 
IRJET - Intelligent System for Vehicle Controlling with Alcohol Detection...
IRJET -  	  Intelligent System for Vehicle Controlling with Alcohol Detection...IRJET -  	  Intelligent System for Vehicle Controlling with Alcohol Detection...
IRJET - Intelligent System for Vehicle Controlling with Alcohol Detection...IRJET Journal
 
IRJET- Smart Helmet an Intelligent Bike System
IRJET- 	  Smart Helmet an Intelligent Bike SystemIRJET- 	  Smart Helmet an Intelligent Bike System
IRJET- Smart Helmet an Intelligent Bike SystemIRJET Journal
 
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET Journal
 
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGFINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGAnn Mathew
 
IRJET- Driver State Monitoring System and Vehicle Control
IRJET- Driver State Monitoring System and Vehicle ControlIRJET- Driver State Monitoring System and Vehicle Control
IRJET- Driver State Monitoring System and Vehicle ControlIRJET Journal
 
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...IRJET Journal
 

What's hot (18)

Car Security System #CSALS
Car Security System #CSALSCar Security System #CSALS
Car Security System #CSALS
 
auto theft Project1
auto theft Project1auto theft Project1
auto theft Project1
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system
 
Report of Advance car security system major project
Report of Advance car security system major projectReport of Advance car security system major project
Report of Advance car security system major project
 
Finger print authentication for bikes
Finger print authentication for bikes Finger print authentication for bikes
Finger print authentication for bikes
 
anti theft vehicular security system
anti theft vehicular security systemanti theft vehicular security system
anti theft vehicular security system
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 upload
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things
 
Smart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A ReviewSmart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A Review
 
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
 
Auto theft prevention using fingerprint scanner
Auto theft prevention using fingerprint scannerAuto theft prevention using fingerprint scanner
Auto theft prevention using fingerprint scanner
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
 
IRJET - Intelligent System for Vehicle Controlling with Alcohol Detection...
IRJET -  	  Intelligent System for Vehicle Controlling with Alcohol Detection...IRJET -  	  Intelligent System for Vehicle Controlling with Alcohol Detection...
IRJET - Intelligent System for Vehicle Controlling with Alcohol Detection...
 
IRJET- Smart Helmet an Intelligent Bike System
IRJET- 	  Smart Helmet an Intelligent Bike SystemIRJET- 	  Smart Helmet an Intelligent Bike System
IRJET- Smart Helmet an Intelligent Bike System
 
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
 
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVINGFINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
FINGERPRINT BASED LICENSING SYSTEM FOR DRIVING
 
IRJET- Driver State Monitoring System and Vehicle Control
IRJET- Driver State Monitoring System and Vehicle ControlIRJET- Driver State Monitoring System and Vehicle Control
IRJET- Driver State Monitoring System and Vehicle Control
 
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...IRJET-  	  Implementation of Smart Secure System in Motorbike using Bluetooth...
IRJET- Implementation of Smart Secure System in Motorbike using Bluetooth...
 

Similar to Ieeepro techno solutions ieee 2013 embedded project vehicle monitoring and theft prevention system using arm cortex

Ieeepro techno solutions ieee 2013 embedded project next generation auto t...
Ieeepro techno solutions    ieee 2013 embedded project next generation auto t...Ieeepro techno solutions    ieee 2013 embedded project next generation auto t...
Ieeepro techno solutions ieee 2013 embedded project next generation auto t...srinivasanece7
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedeSAT Publishing House
 
Ijisa v5-n9-10
Ijisa v5-n9-10Ijisa v5-n9-10
Ijisa v5-n9-10Anil Kumar
 
Intelligent vehicle using embedded system
Intelligent vehicle using embedded systemIntelligent vehicle using embedded system
Intelligent vehicle using embedded systemijiert bestjournal
 
Smart theft detection of vehicles by GSM and GPS with fingerprint verification
Smart theft detection of vehicles by GSM and GPS with fingerprint verificationSmart theft detection of vehicles by GSM and GPS with fingerprint verification
Smart theft detection of vehicles by GSM and GPS with fingerprint verificationIRJET Journal
 
ARM Based Vehicle Theft Control, Positioning and Collision Detection System
ARM Based Vehicle Theft Control, Positioning and Collision Detection SystemARM Based Vehicle Theft Control, Positioning and Collision Detection System
ARM Based Vehicle Theft Control, Positioning and Collision Detection SystemIRJET Journal
 
ARM Based Vehicle Theft Control, Positioning and Collision Detection System
ARM Based Vehicle Theft Control, Positioning and Collision Detection SystemARM Based Vehicle Theft Control, Positioning and Collision Detection System
ARM Based Vehicle Theft Control, Positioning and Collision Detection SystemIRJET Journal
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT ApplicationIRJET Journal
 
IRJET - Accident Prevention Control System and Detection of Lost Key
IRJET - Accident Prevention Control System and Detection of Lost KeyIRJET - Accident Prevention Control System and Detection of Lost Key
IRJET - Accident Prevention Control System and Detection of Lost KeyIRJET Journal
 
IRJET- A Survey on Vehicle Security System using IoT
IRJET- A Survey on Vehicle Security System using IoTIRJET- A Survey on Vehicle Security System using IoT
IRJET- A Survey on Vehicle Security System using IoTIRJET Journal
 
VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...
VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...
VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...IRJET Journal
 
Implementation Of Vehicle Theft Detection and Identification System
Implementation Of Vehicle Theft Detection and Identification SystemImplementation Of Vehicle Theft Detection and Identification System
Implementation Of Vehicle Theft Detection and Identification SystemIRJET Journal
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving SystemIRJET Journal
 
Advanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPSAdvanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPSrahulmonikasharma
 

Similar to Ieeepro techno solutions ieee 2013 embedded project vehicle monitoring and theft prevention system using arm cortex (20)

Ieeepro techno solutions ieee 2013 embedded project next generation auto t...
Ieeepro techno solutions    ieee 2013 embedded project next generation auto t...Ieeepro techno solutions    ieee 2013 embedded project next generation auto t...
Ieeepro techno solutions ieee 2013 embedded project next generation auto t...
 
Vehicle anti theft system based on an embedded
Vehicle anti theft system based on an embeddedVehicle anti theft system based on an embedded
Vehicle anti theft system based on an embedded
 
Smart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle TheftSmart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle Theft
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
Ijisa v5-n9-10
Ijisa v5-n9-10Ijisa v5-n9-10
Ijisa v5-n9-10
 
Intelligent vehicle using embedded system
Intelligent vehicle using embedded systemIntelligent vehicle using embedded system
Intelligent vehicle using embedded system
 
Smart theft detection of vehicles by GSM and GPS with fingerprint verification
Smart theft detection of vehicles by GSM and GPS with fingerprint verificationSmart theft detection of vehicles by GSM and GPS with fingerprint verification
Smart theft detection of vehicles by GSM and GPS with fingerprint verification
 
ARM Based Vehicle Theft Control, Positioning and Collision Detection System
ARM Based Vehicle Theft Control, Positioning and Collision Detection SystemARM Based Vehicle Theft Control, Positioning and Collision Detection System
ARM Based Vehicle Theft Control, Positioning and Collision Detection System
 
ARM Based Vehicle Theft Control, Positioning and Collision Detection System
ARM Based Vehicle Theft Control, Positioning and Collision Detection SystemARM Based Vehicle Theft Control, Positioning and Collision Detection System
ARM Based Vehicle Theft Control, Positioning and Collision Detection System
 
IRJET- Vehicle Security System using IoT Application
IRJET-  	  Vehicle Security System using IoT ApplicationIRJET-  	  Vehicle Security System using IoT Application
IRJET- Vehicle Security System using IoT Application
 
IRJET - Accident Prevention Control System and Detection of Lost Key
IRJET - Accident Prevention Control System and Detection of Lost KeyIRJET - Accident Prevention Control System and Detection of Lost Key
IRJET - Accident Prevention Control System and Detection of Lost Key
 
IRJET- A Survey on Vehicle Security System using IoT
IRJET- A Survey on Vehicle Security System using IoTIRJET- A Survey on Vehicle Security System using IoT
IRJET- A Survey on Vehicle Security System using IoT
 
VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...
VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...
VEHICLE THEFT DETECTION WITH ALCOHOL DETECTION,SMOKE DETECTION AND FINGERPRIN...
 
Implementation Of Vehicle Theft Detection and Identification System
Implementation Of Vehicle Theft Detection and Identification SystemImplementation Of Vehicle Theft Detection and Identification System
Implementation Of Vehicle Theft Detection and Identification System
 
External ppt
External pptExternal ppt
External ppt
 
journal
journaljournal
journal
 
50120130405010
5012013040501050120130405010
50120130405010
 
50120130405010
5012013040501050120130405010
50120130405010
 
IRJET- Automative Impregnable Driving System
IRJET-  	  Automative Impregnable Driving SystemIRJET-  	  Automative Impregnable Driving System
IRJET- Automative Impregnable Driving System
 
Advanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPSAdvanced Vehicle Tracking system using GSM/GPRS and GPS
Advanced Vehicle Tracking system using GSM/GPRS and GPS
 

More from srinivasanece7

Ieeepro techno solutions ieee embedded project zigbee wsn - train
Ieeepro techno solutions  ieee embedded project zigbee wsn - trainIeeepro techno solutions  ieee embedded project zigbee wsn - train
Ieeepro techno solutions ieee embedded project zigbee wsn - trainsrinivasanece7
 
Ieeepro techno solutions ieee embedded project intelligent wireless street l...
Ieeepro techno solutions  ieee embedded project intelligent wireless street l...Ieeepro techno solutions  ieee embedded project intelligent wireless street l...
Ieeepro techno solutions ieee embedded project intelligent wireless street l...srinivasanece7
 
Ieeepro techno solutions ieee embedded project solar powering
Ieeepro techno solutions  ieee embedded project solar poweringIeeepro techno solutions  ieee embedded project solar powering
Ieeepro techno solutions ieee embedded project solar poweringsrinivasanece7
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...srinivasanece7
 
Ieeepro techno solutions ieee embedded project - multi channel remote contr...
Ieeepro techno solutions   ieee embedded project - multi channel remote contr...Ieeepro techno solutions   ieee embedded project - multi channel remote contr...
Ieeepro techno solutions ieee embedded project - multi channel remote contr...srinivasanece7
 
Ieeepro techno solutions ieee embedded project a micromachined refreshable ...
Ieeepro techno solutions   ieee embedded project a micromachined refreshable ...Ieeepro techno solutions   ieee embedded project a micromachined refreshable ...
Ieeepro techno solutions ieee embedded project a micromachined refreshable ...srinivasanece7
 
Ieeepro techno solutions ieee embedded project - low power wireless sensor...
Ieeepro techno solutions   ieee embedded project  - low power wireless sensor...Ieeepro techno solutions   ieee embedded project  - low power wireless sensor...
Ieeepro techno solutions ieee embedded project - low power wireless sensor...srinivasanece7
 
Ieeepro techno solutions ieee embedded project - multi channel remote contr...
Ieeepro techno solutions   ieee embedded project - multi channel remote contr...Ieeepro techno solutions   ieee embedded project - multi channel remote contr...
Ieeepro techno solutions ieee embedded project - multi channel remote contr...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project zigbee based intelligen...
Ieeepro techno solutions   2013 ieee embedded project zigbee based intelligen...Ieeepro techno solutions   2013 ieee embedded project zigbee based intelligen...
Ieeepro techno solutions 2013 ieee embedded project zigbee based intelligen...srinivasanece7
 
Ieeepro techno solutions 2014 ieee embedded project - power outlet system f...
Ieeepro techno solutions   2014 ieee embedded project - power outlet system f...Ieeepro techno solutions   2014 ieee embedded project - power outlet system f...
Ieeepro techno solutions 2014 ieee embedded project - power outlet system f...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project study of the accuracy r...
Ieeepro techno solutions   2013 ieee embedded project study of the accuracy r...Ieeepro techno solutions   2013 ieee embedded project study of the accuracy r...
Ieeepro techno solutions 2013 ieee embedded project study of the accuracy r...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project prepaid electricity bil...
Ieeepro techno solutions   2013 ieee embedded project prepaid electricity bil...Ieeepro techno solutions   2013 ieee embedded project prepaid electricity bil...
Ieeepro techno solutions 2013 ieee embedded project prepaid electricity bil...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project relative positioning en...
Ieeepro techno solutions   2013 ieee embedded project relative positioning en...Ieeepro techno solutions   2013 ieee embedded project relative positioning en...
Ieeepro techno solutions 2013 ieee embedded project relative positioning en...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project modeling and analysis o...
Ieeepro techno solutions   2013 ieee embedded project modeling and analysis o...Ieeepro techno solutions   2013 ieee embedded project modeling and analysis o...
Ieeepro techno solutions 2013 ieee embedded project modeling and analysis o...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project person-based traffic re...
Ieeepro techno solutions   2013 ieee embedded project person-based traffic re...Ieeepro techno solutions   2013 ieee embedded project person-based traffic re...
Ieeepro techno solutions 2013 ieee embedded project person-based traffic re...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project model predictive contro...
Ieeepro techno solutions   2013 ieee embedded project model predictive contro...Ieeepro techno solutions   2013 ieee embedded project model predictive contro...
Ieeepro techno solutions 2013 ieee embedded project model predictive contro...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project microcontroller-based r...
Ieeepro techno solutions   2013 ieee embedded project microcontroller-based r...Ieeepro techno solutions   2013 ieee embedded project microcontroller-based r...
Ieeepro techno solutions 2013 ieee embedded project microcontroller-based r...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project greatest invehicular ac...
Ieeepro techno solutions   2013 ieee embedded project greatest invehicular ac...Ieeepro techno solutions   2013 ieee embedded project greatest invehicular ac...
Ieeepro techno solutions 2013 ieee embedded project greatest invehicular ac...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project integrated lane and veh...
Ieeepro techno solutions   2013 ieee embedded project integrated lane and veh...Ieeepro techno solutions   2013 ieee embedded project integrated lane and veh...
Ieeepro techno solutions 2013 ieee embedded project integrated lane and veh...srinivasanece7
 
Ieeepro techno solutions 2013 ieee embedded project dynamic traffic control...
Ieeepro techno solutions   2013 ieee embedded project dynamic traffic control...Ieeepro techno solutions   2013 ieee embedded project dynamic traffic control...
Ieeepro techno solutions 2013 ieee embedded project dynamic traffic control...srinivasanece7
 

More from srinivasanece7 (20)

Ieeepro techno solutions ieee embedded project zigbee wsn - train
Ieeepro techno solutions  ieee embedded project zigbee wsn - trainIeeepro techno solutions  ieee embedded project zigbee wsn - train
Ieeepro techno solutions ieee embedded project zigbee wsn - train
 
Ieeepro techno solutions ieee embedded project intelligent wireless street l...
Ieeepro techno solutions  ieee embedded project intelligent wireless street l...Ieeepro techno solutions  ieee embedded project intelligent wireless street l...
Ieeepro techno solutions ieee embedded project intelligent wireless street l...
 
Ieeepro techno solutions ieee embedded project solar powering
Ieeepro techno solutions  ieee embedded project solar poweringIeeepro techno solutions  ieee embedded project solar powering
Ieeepro techno solutions ieee embedded project solar powering
 
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
Ieeepro techno solutions   ieee embedded project secure and robust iris recog...Ieeepro techno solutions   ieee embedded project secure and robust iris recog...
Ieeepro techno solutions ieee embedded project secure and robust iris recog...
 
Ieeepro techno solutions ieee embedded project - multi channel remote contr...
Ieeepro techno solutions   ieee embedded project - multi channel remote contr...Ieeepro techno solutions   ieee embedded project - multi channel remote contr...
Ieeepro techno solutions ieee embedded project - multi channel remote contr...
 
Ieeepro techno solutions ieee embedded project a micromachined refreshable ...
Ieeepro techno solutions   ieee embedded project a micromachined refreshable ...Ieeepro techno solutions   ieee embedded project a micromachined refreshable ...
Ieeepro techno solutions ieee embedded project a micromachined refreshable ...
 
Ieeepro techno solutions ieee embedded project - low power wireless sensor...
Ieeepro techno solutions   ieee embedded project  - low power wireless sensor...Ieeepro techno solutions   ieee embedded project  - low power wireless sensor...
Ieeepro techno solutions ieee embedded project - low power wireless sensor...
 
Ieeepro techno solutions ieee embedded project - multi channel remote contr...
Ieeepro techno solutions   ieee embedded project - multi channel remote contr...Ieeepro techno solutions   ieee embedded project - multi channel remote contr...
Ieeepro techno solutions ieee embedded project - multi channel remote contr...
 
Ieeepro techno solutions 2013 ieee embedded project zigbee based intelligen...
Ieeepro techno solutions   2013 ieee embedded project zigbee based intelligen...Ieeepro techno solutions   2013 ieee embedded project zigbee based intelligen...
Ieeepro techno solutions 2013 ieee embedded project zigbee based intelligen...
 
Ieeepro techno solutions 2014 ieee embedded project - power outlet system f...
Ieeepro techno solutions   2014 ieee embedded project - power outlet system f...Ieeepro techno solutions   2014 ieee embedded project - power outlet system f...
Ieeepro techno solutions 2014 ieee embedded project - power outlet system f...
 
Ieeepro techno solutions 2013 ieee embedded project study of the accuracy r...
Ieeepro techno solutions   2013 ieee embedded project study of the accuracy r...Ieeepro techno solutions   2013 ieee embedded project study of the accuracy r...
Ieeepro techno solutions 2013 ieee embedded project study of the accuracy r...
 
Ieeepro techno solutions 2013 ieee embedded project prepaid electricity bil...
Ieeepro techno solutions   2013 ieee embedded project prepaid electricity bil...Ieeepro techno solutions   2013 ieee embedded project prepaid electricity bil...
Ieeepro techno solutions 2013 ieee embedded project prepaid electricity bil...
 
Ieeepro techno solutions 2013 ieee embedded project relative positioning en...
Ieeepro techno solutions   2013 ieee embedded project relative positioning en...Ieeepro techno solutions   2013 ieee embedded project relative positioning en...
Ieeepro techno solutions 2013 ieee embedded project relative positioning en...
 
Ieeepro techno solutions 2013 ieee embedded project modeling and analysis o...
Ieeepro techno solutions   2013 ieee embedded project modeling and analysis o...Ieeepro techno solutions   2013 ieee embedded project modeling and analysis o...
Ieeepro techno solutions 2013 ieee embedded project modeling and analysis o...
 
Ieeepro techno solutions 2013 ieee embedded project person-based traffic re...
Ieeepro techno solutions   2013 ieee embedded project person-based traffic re...Ieeepro techno solutions   2013 ieee embedded project person-based traffic re...
Ieeepro techno solutions 2013 ieee embedded project person-based traffic re...
 
Ieeepro techno solutions 2013 ieee embedded project model predictive contro...
Ieeepro techno solutions   2013 ieee embedded project model predictive contro...Ieeepro techno solutions   2013 ieee embedded project model predictive contro...
Ieeepro techno solutions 2013 ieee embedded project model predictive contro...
 
Ieeepro techno solutions 2013 ieee embedded project microcontroller-based r...
Ieeepro techno solutions   2013 ieee embedded project microcontroller-based r...Ieeepro techno solutions   2013 ieee embedded project microcontroller-based r...
Ieeepro techno solutions 2013 ieee embedded project microcontroller-based r...
 
Ieeepro techno solutions 2013 ieee embedded project greatest invehicular ac...
Ieeepro techno solutions   2013 ieee embedded project greatest invehicular ac...Ieeepro techno solutions   2013 ieee embedded project greatest invehicular ac...
Ieeepro techno solutions 2013 ieee embedded project greatest invehicular ac...
 
Ieeepro techno solutions 2013 ieee embedded project integrated lane and veh...
Ieeepro techno solutions   2013 ieee embedded project integrated lane and veh...Ieeepro techno solutions   2013 ieee embedded project integrated lane and veh...
Ieeepro techno solutions 2013 ieee embedded project integrated lane and veh...
 
Ieeepro techno solutions 2013 ieee embedded project dynamic traffic control...
Ieeepro techno solutions   2013 ieee embedded project dynamic traffic control...Ieeepro techno solutions   2013 ieee embedded project dynamic traffic control...
Ieeepro techno solutions 2013 ieee embedded project dynamic traffic control...
 

Recently uploaded

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Ieeepro techno solutions ieee 2013 embedded project vehicle monitoring and theft prevention system using arm cortex

  • 1. ISSN: 2278 – 7798 International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 4, April 2013 All Rights Reserved © 2013 IJSETR 992 Vehicle Monitoring and Theft Prevention System Using ARM Cortex Nurul Hutha.S1 and ArunKumar.B2 1 M.E-Embedded System Technologies 2 Assistant professor Dept. of EEE V.R.S.College of Engineering and Technology, Arasur,Villupuram, Tamilnadu, India. Abstract-Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. A modern vehicle utilizes remote keyless entry system and immobilizer system as the main weaponry against vehicle theft. But these systems prevent unauthorized access of the vehicle to a certain extent. Smart gravitational lock is used to prevent the theft by providing the air gesture key from key fob to the vehicle which provides high security to the vehicle. When there is no usage of key fob, then the vehicle is secured by touch screen ignition where the software key gesture is given to the touch screen. GPS and GSM technologies enable the vehicle owners to track and monitor the vehicle at anytime from anywhere. During GPS outage environment, inertial navigation sensor is used that contains 3-axis MEMS magnetometer and accelerometer which inform the vehicle positions to the owner by use of dead reckoning method. To restrict the vehicle movement within a particular area, GPS fencing is used in which fence radius can be programmed in the touch screen display. The integrated motions sensing subsystem is used which measures the vehicles 3-D position and detects if vehicle is moved or tilted, when the threshold level is exceeded. In case of auto theft, fuel supply will be made to cut off slowly by sending the message thereby disabling the vehicle. Keyword-MEMS Accelerometer, fuel cutoff, GPS fencing, Keyfob, Smart Gravity Lock. I INTRODUCTION The automobiles have been stolen for different reasons viz. For using the vehicles for transport, commission of crimes and for reusing or reselling parts dismantled from the vehicles or resale of the vehicle itself. In this paper, an automotive security system to disable an automobile and its key auto systems through remote control when it is stolen is designed. It hence deters thieves from committing the theft. Italso effectively prevents stealing of key auto systems for re- selling by introducing air gesture security key. The details of system design and implementation are described in the paper. To reduce the theft rate of the car and meet the intellectualized auto-guard demand of people, the vehicle is provided with the accelerometer for secret key gesture. GSM Modem Company finished setting and dismissing the prevention of message or call and controlled the car’s states remotely. To improve the security and reliability of the vehicle, it has achieved the unity between intellectualized safeguard and remote control. Various technologies have been introduced in recent years to deter car thefts, for example, Immobilizers to remotely disable the lost vehicles, Microdot Identification to identify auto parts using unique microdots, Electronic Vehicle Identification (EVI) to identify the vehicle against a registration database, lojack System to use in-built transponders for tracking down vehicle, GPS to locate the position of the lost vehicles using global positioning system, and so on. There are still some security gaps which these technologies do not address. For example, while the immobilizer can prevent a thief from starting a car engine and driving away, it is unable to stop professional thieves from towing the car away. The professional thieves can then dismantle the stolen vehicle and re-sell the components. The thieves will also have the luxury of time to remove the immobilizer and re-sell the car using another identity the EVI approach is efficient when it comes to identification and verification of vehicles since this is done electronically. However, EVI is less effective against the chop shop scenario where stolen vehicles are dismantled and their parts are re-sold into the market. In addition, the EVI approach is ineffective against thieves who export the stolen vehicles or the chopped car parts to countries which do not implement the EVI system; while lojack Systems may be good at tracking the lost vehicles, it may take a few hours/days/months or even cannot find the stolen vehicle. In addition, they cannot disable an automobile and its key auto systems. Thus, if their radio transponders are removed, the stolen automobiles still function well and the thieves can drive them or sell them. The thieves can also dismantle the auto systems and re-sell auto parts; finally, GPS cannot penetrate forest cover, parking garages, or other obstructions. GPS relying on a short visible antenna can easily be broken off by a thief. Thus, greater challenge comes from professional thieves because they are capable of removing the immobilizers, lojackor GPS parts from the automobile and re- sell the vehicles or auto parts. In short the existing systems are designed to give intimation to the owner only after the car is thefted. The project proposed here aims to design a next generation auto theft prevention system by adding significant enhancements and modernizing the existing system and thus
  • 2. ISSN: 2278 – 7798 International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 4, April 2013 All Rights Reserved © 2013 IJSETR 993 try to overcome the above drawbacks. By implementing this techniques, the possibility of a car Theft is very less or no theft. The following modules are implemented in this project. First a new Innovative car key is designed, the car key transfers a random data by providing the air gesture each and every time the car is unlocked. The transaction of password from key to car is known only to these devices and any intermittent unit cannot diagnose the transaction as each and every time the data is changing. The cryptographic technique is used which provides encrypted data transmission and reception. A dual layer keying approach is followed during vehicle ignition process. This consists of software and hardware keys. A unique touch gesture is made on the 65K Color Touchscreen TFT Display that acts as the software key. The system verifies this and then accepts the hardware key which is the actual key fob normally used. This feature can be temporarily disabled and enabled via SMS sent by the owner. This is useful in situations such as when someone (like a mechanic) other than the owner wants to handle the vehicle and the owner does not want the other person to know the secret onscreen password. A serial EEPROM memory is used to store the password The vehicle unit constantly monitors the vehicle motion after being armed (locked). The integrated motion sensing subsystem measures the vehicles three dimensional position and detects any unauthorized motion if the vehicles is moved or tilted that exceeds a threshold level. The sensitivity of this function can be adjusted on the touchscreen display GUI to effectively avoid any false warnings that are common with existing vehicle security systems. When someone tries to break into the vehicle forcibly, the alarm triggers the siren and head lamps and sends an SMS to the owner. GPS and GSM technologies enable the vehicle owners to track and monitor the vehicle with cellphone at anytime from anywhere. The important enhancement in this feature is its ability to inform the vehicle position even during a GPS outage using dead reckoning method. This is achieved with the help of Inertial Navigation Sensors that consists of a 3- axis MEMSMagnetometer and a 3-axis MEMS Accelerometer which will act as a tilt compensated compass module. When the owner approaches the vehicle, the system automatically verifies the code from remote key and the vehicle emits a head light flash and horn beep to show its presence. This feature is known as car finder and it assists the owner to locate the vehicle in a parking lot where several vehicles are parked. GPS Fencing is used to restrict the vehicle movement within a particular area. For example, if the owner wants the car to move only within a particular city, once it moves out of city borders the owner would immediately receive an SMS alert as to the current location of the vehicle. The interesting feature here is the fence radius can be programmed by the user in the touchscreen display. This flexibility allows the user to set a virtual fence that can be at building level, street level, city level or state level. Remote Fuel Cut-off is very useful especially in case of auto theft. If the vehicle is somehow hacked into and taken, you can send message that will slowly cut-off the fuel supply, thereby disabling the vehicle. A Servo Motor controlled valve is used to cut the fuel supply. II BLOCK DIAGRAM Fig.1. Keyfob unit block diagram Fig.2.Vehicle Unit block diagram
  • 3. ISSN: 2278 – 7798 International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 4, April 2013 All Rights Reserved © 2013 IJSETR 994 III GESTURE RECOGNITION The MEMS Accelerometer MMA7660 IC is used shown in fig 3. This gives the three dimensions (x, y, and z) readings of a particular object. It is a low power, low profile capacitive 3-axis accelerometer commonly called as free fall detection sensor. Because of a sleep mode pin on the accelerometer makes it ideal for the handheld battery powered electronics. The program memory of the Arm controller is coded in such a way that it recognizes the values in the tilt register of the accelerometer connected through I2C bus. So if we move the key fob in any direction then the corresponding values are noted by the accelerometer. Through embedding the MEMS Accelerometer the vehicle can be armed by gesture performance in the air. Fig.3. MEMS accelerometer The application of this three axis accelerometer is interfaced with the ARM Cortex-M3 micro controller which could recognize the hyper terminal input instructions can perform functions controlled by gesture. We need to move the accelerometer in a particular set of directions then it will recognize one of the directions and the vehicle is locked/ unlocked by performing the secret gesture. The accelerometer consists of a tilt register which give the orientation logic of the gesture. First the values are defined for the gesture performance. The Arm controller is processed in such a way that depending up on the orientation logic performed by the accelerometer the tilt values keep on changing. These values are read through the SCL, SDA and the INT lines which are interfaced to one of the port in Arm controller LPC 1300. Apart from sending the gesture key, they are also displayed on the LCD interfaced to the Arm 7 micro controller. The gesture key is transmitted to the vehicle through the IEEE 802.15.4 wireless transreceiver. The vehicle recognizes this key with the already stored key and verifies it. If these key matches then it allows the vehicle door to open to prevent the wireless key transmission from theft persons. The cryptographic keyless entry scheme is used. Here RC4 algorithm is used to encrypt and decrypt the sending data during transmission. A. IEEE 802.15.4 The Microchip MiWi™ P2P Wireless Protocol is a variation of IEEE 802.15.4, using Microchip’s MRF24J40 2.4 GHz transceiver and any Microchip 8, 16 or 32-bit microcontroller with a Serial Peripheral Interface (SPI). The protocol provides reliable direct wireless communication via an easy-to-use programming interface. The MiWi P2P protocol is a variation of IEEE 802.15.4 and supports both peer-to-peer and star topologies. It has no routing mechanism, so the wireless communication coverage is defined by the radio range. The MiWi P2P stack uses only a portion of the IEEE 802.15.4 specification’s rich PHY and MAC layers’ definitions as shown in fig 3. The specification defines three PHY layers, operating on a spectrum of 868 MHz, 915 MHz and 2.4 GHz. The MRF24J40 radio operates on the 2.4 GHz, ISM band – freely available worldwide. The total bandwidth for the IEEE 802.15.4, 2.4 GHz ISM band is, theoretically, 250 kbps. In reality, for reliable communication, the bandwidth is 20-30 kbps. There are two ways to transmit a message: BROADCAST AND UNICAST. Uncast transmissions have only one destination and use the long address as the destination address. The MiWi P2P stack requires Acknowledgement for all unicast messages. If the transmitting device has at least one device that turns off its radio when Idle, the transmitting device will save the message in RAM and wait for the sleeping device to wake-up and request the message. This kind of data transmitting is called indirect messaging. In the MiWi P2P stack, only the messaged device will be notified by the radio. If the messaged device turns off its radio when Idle, it can only receive a message from the device to which it is connected. IEEE 802.15.4 deals with only PHY layer and portion of Data link layer. The higher- layer protocols are left to industry and the individual applications. IV CRYPTOGRAPHIC KEYLESS ENTRY RC4 is a stream cipher, symmetric key algorithm. The same algorithm is used for both encryption and decryption as the data stream is simply XORed with the generated key sequence. The key stream is completely independent of the plaintext used. It uses a variable length key from 1 to 256 bit to initialize a 256-bit state table. The state table is used for subsequent generation of pseudo-random bits and then to generate a pseudo-random stream which is XORed with the plaintext to give the cipher text. The algorithm can be broken into two stages: initialization, and operation. In the initialization stage the 256-bit state table, S is populated, using the key, K as a seed. Once the state table is setup, it continues to be modified in a regular pattern as data is encrypted. This algorithm produces a stream of pseudo-random values.
  • 4. ISSN: 2278 – 7798 International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 4, April 2013 All Rights Reserved © 2013 IJSETR 995 The input stream is XORed with these values, bit by bit. The encryption and decryption process is the same as the data stream is simply XORed with the generated key sequence. If it is fed in an encrypted message, it will produce the decrypted message output, and if it is fed in plaintext message, it will produce the encrypted version [6]. V VEHICLE SECURITY SYSTEM A vehicle security system combines the installation of an electronic device in a vehicle, or fleet of vehicles, with purpose designed computer software at least at one operational base to enable the owner or a third party to track the vehicle’s location, collecting data in the process from the field and deliver it to the base of operation. Modern vehicle tracking systems commonly use GPS technology for locating the vehicle, but other types of automatic vehicle location technology such as MEMS accelerometer and magnetometer, adjustable alarming system, fuel cut-off can also be used. The GPS and GSM technologies enable the vehicle owners to track and monitor the vehicle with cellphone at anytime from anywhere. The block diagram for vehicle unit security system is shown in fig 5. The protocols such as I2C, SPI, UART are used to interface the security devices to the ARM processor. A. GPS The Global Positioning System (GPS) is a space-based global navigation satellite system (GNSS) that provides reliable location and time information in all weather and at all times and anywhere on or near the Earth when and where there is an unobstructed line of sight to four or more GPS satellites. It is maintained by the United States government and is freely accessible by anyone with a GPS receiver. GPS satellites are orbited high enough to avoid the problems associated with land based systems, yet can provide accurate positioning 24 hours a day, anywhere in the world. Uncorrected positions determined from GPS satellite signals produce accuracies in the range of 50 to 100 meters. When using a technique called differential correction, users can get positions accurate to within 5 meters or less. GPS receiver will automatically collect this information and store it for future reference. B. GPS Fencing GPS fencing notifies the system when a vehicle is equipped with the tracking device crosses a virtual boundary. The notification can be sent to the owner’s cell phone . It usually includes the time, date and location that the virtual boundary was crossed, allowing for an immediate investigation or response to the situation. GPS fencing is suitable for keeping vehicles out of prohibited areas e.g. Sacred Sites, blast zones, environmentally sensitive areas, construction zones. Automatically speed limiting vehicles in designated areas. This feature restricts the vehicle movement within a particular area. For example, if the owner wants the car to move only within a particular city, once it moves out of city borders the owner would immediately receive an SMS alert as to the current location of the vehicle. The interesting feature here is the fence radius can be programmed by the user in the touchscreen display. This flexibility allows the user to set a virtual fence that can be at building level, street level, city level or state level. C. GSM Modem Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization group mobile cellular radio system operating at 900 MHz.A GSM modem as shown in fig 4 is a wireless modem that works with a GSM wireless network. A wireless modem behaves like a dial-up modem. The main difference between them is that a dial-up modem while a wireless modem sends and receives data through radio waves. Fig.4.GSM modem The working of GSM modem is based on commands, the commands always start with AT (which means Attentions) and finish with a <CR> character. For example, the dialing command is ATD<number>; ATD3314629080; here the dialing command ends with semicolon. The AT commands are given to the GSM modem with the help of PC or controller. The GSM modem is serially interfaced with the controller with the help of UART. D. MEMS Magnetometer & Accelerometer The important enhancement in this feature is its ability to inform the vehicle position even during a GPS outage using dead reckoning method. This is achieved with the help of Inertial Navigation Sensors that consists of a 3-axis MEMS Magnetometer and a 3-axis MEMS Accelerometer which will act as a tilt compensated compass module. It is interfaced with ARM using I2C protocol. E. Servo Motor If the vehicle is made theft or misused by the driver or vehicle is taken to the places without the knowledge of the owned, then the owner can be able to control their car through GSM. This feature is very useful especially in case of auto theft. The control message is send to the processor by the owner. Now the processor intimates the servo motor that
  • 5. ISSN: 2278 – 7798 International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 4, April 2013 All Rights Reserved © 2013 IJSETR 996 wills slowly cut-off the fuel supply, thereby disabling the vehicle. It uses the PWM technique to control the value. The servo motor is shown in fig 5. Fig.5. Servo motor rotation diagram VI CONCLUSION This paper describes a air gesture recognition system by using MEMS accelerometer. The innovative vehicle key is designed in which gesture key from key fob is compared with the stored key to secure opening of the vehicle door. This provides more protection to the vehicle even when the key fob is stolen. Secondly a navigation device for land vehicle involves the MEMS accelerometer and magnetometer integrated with the GPS, so during GPS outage the vehicle is navigated using navigation sensor. The adjustable motion alarm is used which helpful to intimate the vehicle owner about the intentional touch given by the thief. When there is no usage of key fob, the touch screen is used to ignite the vehicle through software key that is given to the screen.GPS fencing is implemented to restrict the vehicle within the particular area by the owner. Remote fuel cutoff is used to reduce or cut the fuel when the vehicle is hacked by thief or misused by the other persons. Thus the techniques presented in this paper provide high security and reliability to the vehicle. REFERENCES [1] Jacques Georgy, Member, IEEE, AboelmagdNoureldin, Senior Member, IEEE, and Chris Goodall “ Vehicle Navigator using a Mixture Particle Filter for Inertial Sensors/Odometer/Map Data/GPS Integration “IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, May 2012. [2] RuizeXu, Shengli Zhou, and Wen J.L.MEMS Accelerometer Based Nonspecific-User Hand Gesture Recognition”ieee sensors journal, vol. 12, no. 5, may 2012. [3] Kichun Jo, Student Member, IEEE, Keounyup Chu, Student Member, IEEE, and MyounghoSunwoo, Member, IEEE Interacting Multiple Model Filter-Based Sensor Fusion of GPS With In-Vehicle Sensors for Real- Time Vehicle Positioning, IEEE transactions on intelligent transportation systems, vol. 13, no. 1, march 2012. [4] M.M. Atia, J. Georgy, M.J. Korenberg, A. Noureldin, “Real-time implementation of mixture particle filter for 3D RISS/GPS integrated navigation solution”, Electron. Lett., vol.46, no.15, July 2010. [5] S. Zhou, Q. Shan, F. Fei, W. J. Li, C. P. Kwong, and C. K. Wu et al., “Gesture recognition for interactive controllers using MEMS motion sensors,” in Proc. IEEE Int. Conf. Nano/Micro Engineered and Molecular Systems, Jan. 2009. [6] N. Ndjeng, S. Glaser, and D. Gruyer, “A multiple model localization system for outdoor vehicles,” in Proc. IEEE Intell. Vehicles Symp., Istanbul, Turkey, 2007. IEEE Int. Conf. Nano/Micro Engineered and Molecular Systems, Jan. 2009. [7] Mohammed Abuzalata,MuntaserMomani, Sayel Fayyad and Suleiman Abu-EinDepartments of Mechatronics and Mechanical Engineering,Faculty of Engineering, Al- Balqa’ Applied University, Technology, Amman, Jordan “A Practical Design of Anti-Theft Car Protection System Based on Microcontroller” 2012 Science Publications [8] Alaqeeli, A., J. Starzyk and F.V. Graas, 2003. Realtime acquisition and tracking for GPS receivers. Proceedings of the 2003 International Symposium on Circuits and Systems, May 25-28, IEEE Xplore Press, pp:IV-500-IV- 503DOI:10.1109/ISCAS.2003.1205933 [9] R. Toledo-Moreo and M. A. Zamora-Izquierdo, “IMM- based lane-change prediction in highways with low-cost GPS/INS,” IEEE Trans. Intell.Transp. Syst., vol. 10, no. 1, pp. 180–185, Mar. 2009. [10]M. S. Grewal, L. R. Weill, and A. P. Andrews, Global Positioning Systems, Inertialavigation,andIntegration, 2nd ed., New Jersey:Wiley-Interscience, 2007. [11]T. Schlomer, B. Poppinga, N. Henze, and S. Boll, “Gesture recognition with a Wii controller,” in Proc. 2nd Int. Conf. Tangible and EmbeddedInteraction (TEI’08), Bonn, Germany, 2008, pp. 11–14. [12]N. Popoviciu and M. Boncut, “On the Hopfield algorithm.Foundations and examples,” Gen. Math., vol. 13, no. 2, pp. 35–50, 2005. [13] A. H. F. Lam, W. J. Li, Y. Liu, and N. Xi, “MIDS: Micro input devices system using MEMS sensors,” presented at the IEEE/RSJ Int. Conf. Intelligent Robots and Systems (IROS), Oct. 2002.
  • 6. ISSN: 2278 – 7798 International Journal of Science, Engineering and Technology Research (IJSETR) Volume 2, Issue 4, April 2013 All Rights Reserved © 2013 IJSETR 997 BIBLIOGRAPHY Mrs. NURUL HUTHA.S, Completed B.E(ECE) degree in V.R.S College of Engineering and Technology, Villupuram in April 2009, and currently pursuing M.E (Embedded System Technologies) in V.R.S College of Engineering and Technology, Villupuram. Mr.ARUNKUMAR.B, Completed B.E(ECE) degree in Pallavan College of Engineering, Kancheepuram in April 2009, M.E (Embedded & Real time System) in PSG College of Technology, Coimbatore, in 2011. Now he is working as an Assistant Professor in the Department of EEE in V.R.S. College of Engineering and Technology, has a teaching experience of 2 Years