You are on page 1of 14

Currently almost of the public having an own vehicle, theft is happening on parking and sometimes driving insecurity places.

The safe of vehicles is extremely essential for public vehicles. Vehicle tracking and locking system installed in the vehicle, to track the place and locking engine motor. The place of the vehicle identified using Global Positioning system (GPS) and Global system mobile communication (GSM). These systems constantly watch a moving Vehicle and report the status on demand. When the theft identified, the responsible person send SMS to the microcontroller, then microcontroller issue the control signals to stop the engine motor. Authorized person need to send the password to controller to restart the vehicle and open the door. This is more secured, reliable and low cost

An overview of the complete system is described in this section before detailing the specifications and the necessity for each module in the system. The general view of operation of the proposed security system is shown in fig. 1. The conventional handle locking system is replaced by a handle lock operated by servo motor and controlled by the Remote Keyless System (RKS) [20]. RKS has a transmitter and a receiver module. The receiver module is installed on the vehicle and the owner of the vehicle has the remote (transmitter module). The RKS remote could be used to lock/unlock the locking system (handle lock, fuel lock and rear wheel lock), switch ON/OFF the engine and to turn off the alarm. Fuel lock replaces the knob at the nozzle of fuel tank. Rear wheel lock is used to jam the sprocket of the wheel.

The vehicle owners cell phone with the registered Subscriber Identity Module (SIM) number acts as the master key of the security system. It is given higher priority over RKS and hence it can override the instructions from RKS. A Short Message Service (SMS) is sent to the registered SIM via the Global System for Mobile communication (GSM) module whenever the vehicle is unlocked using the RKS remote. Owner can in turn send a SMS to initiate the locking sequence, if he/she feels an unauthorized person has unlocked the vehicle [13]. Global Positioning System (GPS) module is used to track the location and monitor the speed of the vehicle. Piezoelectric sensors are used as vibration sensors to detect any tampering with the vehicle. Two sensitivity levels are chosen so as to nullify the chance of false alerting [20]. The owner is alerted by an SMS and loud alarm is activated, if there is any physical tampering with the vehicle or if the vehicle has been moved from the place where it was parked (>15m). The owner can, anytime, request the security system of the vehicle for its status by sending an SMS. The status message sent in response to request includes the lock status, location coordinates and the speed of the vehicle. Infra Red (IR) sensors are used as side stand indicators, until and unless the side stand is not pulled up engine cannot be started.

two-wheelers are stolen right off streets or apartment parking lots. By the time the police are alerted (which could be a few hours since the theft), the vehicles are made underground leaving almost no traces. Later the vehicles are either dismantled or sold in neighboring states/districts at throw-away prices, leaving the owner and police helpless in bringing the thief to book. The story remains same for rest of the world. The only possible way out of this problem is implementation of security system in the vehicle. The security system should be capable of performing reasonably well even in unfavorable conditions to meet the desired level of security [2], [3]. The price of the security system should be reasonably low or else the automobile manufacturers cannot implement such a system, as it will increase the overall cost of the vehicle by a big margin. If the design of the security system is such that it is compatible with most of the brands and classes of vehicles then it helps reducing the NRE cost. The overall power consumption should be less as the source of supply for the security system is the 12V battery of the vehicle. Keeping these requirements and constraints in mind we propose this new design of Two Wheeler Vehicle Security System

In this system the GSM module fixed in a vehicle. When the SMS sent to vehicle the GSM module was receiving the SMS .the GSM module connected to the microcontroller via RS232 interface. DTMF Decoder: DTMF Decoder is a very easy to use program to decode DTMF dial tones found on telephone lines with touch tone phones. DTMF Decoder is also used for receiving data transmissions over the air in amateur radio frequency bands.

The MAX232 IC is used to convert the TTL/CMOS logic levels to RS232 logic levels during serial communication of microcontrollers with PC. The controller operates at TTL logic level (0-5V) whereas the serial communication in PC works on RS232 standards (-25 V to + 25V). This makes it difficult to establish a direct link between them to communicate with each other. The intermediate link is provided through MAX232. It is a dual driver/receiver that includes a capacitive voltage generator to supply RS232 voltage levels from a single 5V supply. Each receiver converts RS232 inputs to 5V TTL/CMOS levels. These receivers (R1 & R2) can accept 30V inputs. The drivers (T1 & T2), also called transmitters, convert the TTL/CMOS input level into RS232 level.

The transmitters take input from controllers serial transmission pin and send the output to RS232s receiver. The receivers, on the other hand, take input from transmission pin of RS232 serial port and give serial output to microcontrollers receiver pin. MAX232 needs four external capacitors whose value ranges from 1F to 22F.

Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna (the chip and the antenna together are called an RFID transponder or an RFID tag). The antenna enables the chip to transmit the identification information to a reader. The reader converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can make use of it.

GSM/GPRS module is used to establish communication between a computer and a GSM-GPRS system. Global System for Mobile communication (GSM) is an architecture used for mobile communication in most of the countries. Global Packet Radio Service (GPRS) is an extension of GSM that enables higher data transmission rate. GSM/GPRS module consists of a GSM/GPRS modem assembled together with power supply circuit and communication interfaces (like RS-232, USB, etc) for computer.

A relay is an electrically operated switch. Many relays use an electromagnet to operate a switching mechanism mechanically, but other operating principles are also used. Relays are used where it is necessary to control a circuit by a low-power signal (with complete electrical isolation between control and controlled circuits), or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Relays were used extensively in telephone exchanges and early computers to perform logical operations.

User-programmable plain text message control, Communicate from any other mobile, Password protected, Can be controlled from anywhere, anytime, In-system programmable i.e. we can modify the code of the Controller at anytime depending upon our requirement without taking out the controller from the board.

Stolen vehicle recovery. Field service management. It is used for food delivery and car rental Companies.

You might also like