[ieee 2012 4th international conference on computational intelligence, communication systems and...
Post on 27-Jan-2017
221 Views
Preview:
TRANSCRIPT
An Embedded Interface f
Vivek Kumar Sehgal1* 1Department of CSE&IT
1Jaypee University of Information TechnologyWaknaghat, Solan, HP (INDIA)
e-mail: vivekseh@ieee.org, vivekseh@acm.org
Abstract— GSM based security system are much more stout then an ordinary security system. The ordinary systems are simply based on the concept of sensors. They sound an alarm on detecting movement. This system of technology has now lost its appeal as it has become a common sighting in metros where these alarms go off unnecessarily. We proposedwith GSM techniques and a better decision making process is built to make our vehicle more secure. It is a unique wireless home/car security device that gives instant alerts on your mobile phone the moment a security breach is detected. It is designed to alert you wirelessly through a callburglar alarm system intercepts an intrusion.proposed an 8 bit embedded controller intermodel. The control mechanism is based on DTMF tones generated by mobile phone when the number keys are pressed.
Keywords- GSM; Microcontroller; Embedded Algorithm; Intelligent Car Security
I. INTRODUCTION
One can look for several products pertaining to security systems India. Big corporate giants and many renowned companies have launched quality security products to safeguard homes and precious belongings. One can find burglar alarm, fire alarm, home security kits, new age doors and windows, security cameras, motion detectors, personal safety products, wire and wireless security products and other such products [4]. These products are available in low end as well as high end range. Depending upon one’s budget, he or she can go for the required security system suitable to the place to be secured[6][7]. One can also find numerous security experts who provide customized suggestions for home security. A car alarm is an electronic device installed in a vehicle in an attempt to discourage theftitself, its contents, or both [5][9]. Car alarms work by emitting high-volume sound (usually a siren,recorded verbal warning, the vehicle's own horn, or a combination thereof) when the conditions necessary for triggering are met, as well as by flashing some of the vehicle's lights, and (optionally) notifying the car's owner via a paging system and interrupting various electrical circuits necessary for the car to start [8].
Car alarms should not be confused withalthough the purpose of both may be to deter car theft, they operate in a dissimilar fashion. An immobilizer generally
An Embedded Interface for GSM Based Car Security System
Jaypee University of Information Technology Waknaghat, Solan, HP (INDIA)
Mudit Singhal2, Bhart Mangla3
and Shivangi Kulshrestha2,3Department of CSE&IT, 4,5Department of 2,3,4,5Jaypee University of Information Technology
Waknaghat, Solan, HP (INDIA)
GSM based security system are much more stout then an ordinary security system. The ordinary systems are simply based on the concept of sensors. They sound an alarm on detecting movement. This system of technology has now lost
has become a common sighting in metros where e proposed a new system
with GSM techniques and a better decision making process is built to make our vehicle more secure. It is a unique wireless
t gives instant alerts on your mobile phone the moment a security breach is detected. It is
a call as soon as your burglar alarm system intercepts an intrusion. This paper
an 8 bit embedded controller interfaced with GSM model. The control mechanism is based on DTMF tones generated by mobile phone when the number keys are pressed.
GSM; Microcontroller; Embedded Algorithm;
taining to security systems India. Big corporate giants and many renowned companies have launched quality security products to safeguard homes and precious belongings. One can find burglar alarm, fire alarm, home security kits, new age doors
ecurity cameras, motion detectors, personal safety products, wire and wireless security products and
. These products are available in low end as well as high end range. Depending upon one’s budget,
security system suitable to . One can also find numerous
security experts who provide customized suggestions for is an electronic device installed
theft of the vehicle alarms work by
siren, klaxon, pre-recorded verbal warning, the vehicle's own horn, or a combination thereof) when the conditions necessary for
ell as by flashing some of the vehicle's lights, and (optionally) notifying the car's owner via a paging system and interrupting various electrical circuits
Car alarms should not be confused with immobilizers; he purpose of both may be to deter car theft, they
operate in a dissimilar fashion. An immobilizer generally
Fig. 1 DTMF Frequencies will not offer any audible or visual theft deterrence, nor require any additional input from the driver than the driver of a non-immobilizer car. Car alarms can be divided into two categories: 1) OEM (built-in to the vehicle at the factory)2) Aftermarket (installed at any time after the car has been
built, such as by the new car dealer, an auto accessories store, or the vehicle's owner)
Alarms come with a mix of features. Remote car alarms typically consist of an additional radio receiver that allows the owner to wirelessly control the alarm from a key fob. Remote car alarms typically come equipped with an array of sensors along with immobilizers and motion detectorsYet another class of security coversthat include 2-way paging controllerhave an LCD icon display that can pinpoint the actual part of the vehicle being threatened, and many alert the user with beeps or silent vibration [1].
How to synergize the latest technologies with our system?
We have included the following technologies in our system as shown in Fig.2:
1. DTMF: Dual Tone Multiple Access2. Microcontroller 3. Programming language 4. GSM unit
Based Car Security System
3, Sudeep Singh4, Shivangi Kulshrestha5
Department of ECE, Jaypee University of Information Technology
Waknaghat, Solan, HP (INDIA)
Fig. 1 DTMF Frequencies
not offer any audible or visual theft deterrence, nor require any additional input from the driver than the driver of
Car alarms can be divided into two
in to the vehicle at the factory) at any time after the car has been
built, such as by the new car dealer, an auto accessories
Alarms come with a mix of features. Remote car alarms typically consist of an additional radio receiver that allows
relessly control the alarm from a key fob. Remote car alarms typically come equipped with an array of sensors along with immobilizers and motion detectors [2]. Yet another class of security covers aftermarket car alarms
way paging controllers. Some 2-way systems icon display that can pinpoint the actual part of
the vehicle being threatened, and many alert the user with
How to synergize the latest technologies with our
lowing technologies in our
DTMF: Dual Tone Multiple Access (Fig.1).
2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks
978-0-7695-4821-0/12 $26.00 © 2012 IEEE
DOI 10.1109/CICSyN.2012.12
9
2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks
978-0-7695-4821-0/12 $26.00 © 2012 IEEE
DOI 10.1109/CICSyN.2012.12
9
Fig. 2 Block Diagram of GSM Based Car Security System
The organization of the paper is as follows: In section 2,discuss the proposed design that also presents module description for our proposed system. Detailed circuit analysis description is provided for each block used in this section. In section 3, we present the software implementation along with algorithm and flow diagram. In section 4, PCB designing, actual circuit implementation on PCB and simulated schematic are shown. Finally, some conclusions are offered in section 5.
II. PROPOSED WORK
The microcontroller AT89s52 is the brain of the car security system. The signal from the car is constantly being sent to the controller which is being sensed. If there is any intrusion or any breakage then the signal breaks and then no signal is coming to the controller. As soon as the signal stops the controller send a signal to the opto-isolator which is attached to the cell phone which makes a call to other cell phone whose number is stored in the emergency dialing of the phone. The LM7805 converts the 9V supply to the 5V so as to drive the controller. The opto-isolator protects the circuit from any sudden high voltage which could damage the circuit. The opto-isolator itself blows out and thus saves the remaining circuit. The following components are usedproposed circuit.
A. Door Switch Door Switch is push-to-on switch. When someone tries to open the door, it signals the controller.
B. Car Battery Provides the battery voltage of 12V to the circuit
C. µC AT89s52 The AT89s52 is a low-power, high performance microcontroller with 4K bytes of In-System(ISP) Flash memory. It is compatible with the industrystandard 80c52 instruction set and pinout. The onallows the program memory to be reprogrammed inor by a conventional nonvolatile memory programmer. It can be both serially and parallely programmed. It is costeffective (may cost just Rs.55).
GSM Based Car Security System
The organization of the paper is as follows: In section 2, we discuss the proposed design that also presents module description for our proposed system. Detailed circuit analysis description is provided for each block used in this section. In section 3, we present the software implementation along with
and flow diagram. In section 4, PCB designing, actual circuit implementation on PCB and simulated schematic are shown. Finally, some conclusions are offered
The microcontroller AT89s52 is the brain of the car security system. The signal from the car is constantly being sent to the controller which is being sensed. If there is any intrusion or any breakage then the signal breaks and then no signal is
the controller. As soon as the signal stops the isolator which is attached
to the cell phone which makes a call to other cell phone whose number is stored in the emergency dialing of the
V supply to the 5V so as isolator protects the circuit
from any sudden high voltage which could damage the isolator itself blows out and thus saves the The following components are used in the
on switch. When someone tries to
Provides the battery voltage of 12V to the circuit.
power, high performance CMOS 8-bit System Programmable
(ISP) Flash memory. It is compatible with the industry-standard 80c52 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system
al nonvolatile memory programmer. It can be both serially and parallely programmed. It is cost-
D. Opto-Isolator There are many situations where signals and data need to be transferred from one subsystem to another within electronics equipment, or from one piece of equipment to another, without making a direct ‘ohmic’ electrical connection. Often this is because the source and destination are (or may be at times) at very different voltage levels, like a microprocessor which is operating from 5V DC but being used to control a triac which is switching 240V AC. In such situations the link between the two must be an isolated one, to protect the microprocessor/microcontroller from over voltage damage. These use a beam signals or data across an electrical barrier, and achieve excellent isolation. Optocoupler typically come in a small 6pin or 8-pin IC package, but are essentially a combination of two distinct devices: an optical transmitter, typigallium arsenide LED (light-emitting diode) and an optical receiver such as a phototransistor or lighttwo are separated by a transparent barrier which blocks any electrical current flow between the two, but does allow the passage of light as shown in Fig. 3.
Fig. 3 Internal Circuit of Opto
III. SOFTWARE IMPLEMENTATION
The software platform used for the programming of the microcontroller 89s51 of the 8051 family is KEIL. With this software, assembly language programming actualized.
A. Microcontroller Operation The Before programming the AT89C52, the address, data, and control signals should be set up according to the “Flash Programming Modes [3].” To program the AT89C52,take the following steps:
1) Input the desired memory location on the address lines.
2) Input the appropriate data byte on the data lines.3) Activate the correct combination of control signals.4) Raise EA/VPP to 12V. 5) Pulse ALE/PROG once to program a byte in theFlash array or the lock bits. The
timed and typically takes no more than 50 µs. Repeat steps 1 through 5, changing the address and data for the entire array or until the end of the object file is reached. Programming is done on Keil software. Various steps toprogram 8051:
There are many situations where signals and data need to be transferred from one subsystem to another within a piece of electronics equipment, or from one piece of equipment to another, without making a direct ‘ohmic’ electrical connection. Often this is because the source and destination are (or may be at times) at very different voltage levels, like
essor which is operating from 5V DC but being used to control a triac which is switching 240V AC. In such situations the link between the two must be an isolated one, to protect the microprocessor/microcontroller from over voltage damage. These use a beam of light to transmit the signals or data across an electrical barrier, and achieve excellent isolation. Optocoupler typically come in a small 6-
pin IC package, but are essentially a combination of two distinct devices: an optical transmitter, typically a
emitting diode) and an optical receiver such as a phototransistor or light-triggered diac. The two are separated by a transparent barrier which blocks any electrical current flow between the two, but does allow the
of Opto- Isolator
MPLEMENTATION
The software platform used for the programming of the microcontroller 89s51 of the 8051 family is KEIL. With this software, assembly language programming can be
The Before programming the AT89C52, the address, data, and control signals should be set up according to the “Flash
].” To program the AT89C52,take
memory location on the address
2) Input the appropriate data byte on the data lines. 3) Activate the correct combination of control signals.
5) Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The byte write cycle is self-
timed and typically takes no more than 50 µs. Repeat steps 1 through 5, changing the address and data for the entire array or until the end of the object file is reached. Programming is done on Keil software. Various steps to
1010
1) Write the code in a notepad file. 2) *.hex file is generated using Keil software3) *.hex file is burnt into the micro-
burner(Fig. 5).
Fig.4 Conversion of assembly language into HEX file
Fig.5 Burning of Code in to Microcontroller Memory
B. Source Code ORG 00H
CLR P2.0 MOV P0,#0FFH MOV P1,#0FFH MOV R0,#096H START: MOV R1,#003H VSG: JNB P1.0,VSG2 JMP CALLING VSG2: JNB P1.1,VSG3 JMP CALLING VSG3: JB P1.2,VSG4 JMP CALLING
*.hex file is generated using Keil software(Fig.4). -controller using
Conversion of assembly language into HEX file
ontroller Memory
VSG4: JB P1.3,VSG5 JMP CALLING
VSG5: JMP VSG CALLING: SETB P2.0
CALL DELAY CALL DELAY CLR P0.0 CALL DELAY SETB P0.0 CALL DELAY CLR P0.0 CALL DELAY SETB P0.0 CALL DELAY XXX1: DJNZ R0,XXX JMP XX XXX: CALL DELAY
JMP XXX1 XX: DJNZ R1,CALLING
JMP START
DELAY: H1: MOV R4,#10 H2: MOV R3, #100 H3: DJNZ R3, H3 DJNZ R4, H2 DJNZ R5, H1 RET
END
IV. HARDWARE IMPLEMENTATION AND
DESCRIPTION
With reference to Fig. 6. Vital role of Micro controllerAT89C52 in ‘Remote billing of energy meter using GSM module’ is as follows [10].
1) It will transmit the consumption amount to GSM2) It will act as a master to communicate with memory3) Whenever a command is sent to reset the
,controller resets the memory4) Controller takes the pulses from the 5) Microcontroller also switches
The circuit diagram shows in the Figcomponents used in the sequence in they should have been.
H2: MOV R3, #100 H3: DJNZ R3, H3
MPLEMENTATION AND SCHEMATIC
ESCRIPTION
6. Vital role of Micro controller-AT89C52 in ‘Remote billing of energy meter using GSM
It will transmit the consumption amount to GSM It will act as a master to communicate with memory Whenever a command is sent to reset the memory ,controller resets the memory Controller takes the pulses from the DTMF Microcontroller also switches on the alarm.
Fig. 6-7. It shows all the components used in the sequence in they should have been.
1111
Fig. 6 . 6 Schematic of Port wise Hardware Implementation
Fig. 7 Actual Hardware Implementation
1212
V. CONCLUSION AND FUTURE SCOPES
Through our initial research it was evident that the automobile sector is way behind in blending the latest information and communication technologies in their security system. Hence in this paper, we have presented an advanced security system for cars. We have used the current technology of GSM. The reason being the present highly developed infrastructure for systems supporting GSM. Our final designed system is advantageous over other similar systems because: 1) The system moves a step ahead of other current
security systems available in the market such as AUTOCOP etc. Our security system has real time application; i.e. the security system doesn’t merely create noise but informs the owner wherever the person may be.
2) Cost effective. 3) It is sellable. Any product designed must be lucrative
for consumers to buy. Such a smart system has the potential to be sold and attract customers.
The proposed work has various future applications and can still be modified with certain new features which can be cost effective when manufactured at large scale. Also, our designed system is flexible and can accommodate new technologies such as CDMA and other code encrypted highly sophisticated techniques to further enhance the efficacy.
REFERENCES [1] Jian Xiao; Haidong Feng; , "A low-cost extendable framework for
embedded smart car security system," Networking, Sensing and Control, 2009. ICNSC '09. International Conference on , vol., no., pp.829-833, 26-29 March 2009.
[2] www.8051projects.net/downloads134.html [3] http://www.atmel.com/atmel/acrobat/doc0313.pdf [4] Thong, S.T.S.; Chua Tien Han; Rahman, T.A.; , "Intelligent Fleet
Management System with Concurrent GPS & GSM Real-Time Positioning Technology,"Telecommunications, 2007. ITST '07. 7th International Conference on ITS , vol., no., pp.1-6, 6-8 June 2007.
[5] http://arshad-umar.blogspot.in/2009/09/gsm-vehicle-control-and-security-using.html .
[6] Sehgal, V.K.; Nitin; Chauhan, D.S.; Sharma, R.; , "Smart wireless temperature data logger using IEEE 802.15.4/ZigBee protocol," TENCON 2008 - 2008 IEEE Region 10 Conference , vol., no., pp.1-6, 19-21 Nov. 2008.
[7] Sehgal, V.K.; Panda, N.; Handa, N.R.; Naval, S.; Goel, V.; , "Electronic Energy Meter with Instant Billing," Computer Modeling and Simulation (EMS), 2010 Fourth UKSim European Symposium on , vol., no., pp.27-31, 17-19 Nov. 2010.
[8] Sehgal, V.K.; Dhope, S.; Goel, P.; Chaudhry, J.S.; Sood, P.; , "An Embedded Platform for Intelligent Traffic Control," Computer Modeling and Simulation (EMS), 2010 Fourth UKSim European Symposium on , vol., no., pp.541-545, 17-19 Nov. 2010.
[9] http://ece-projects.blogspot.in/2011/06/gsm-based-vehicle-monitoring-security.html .
[10] Hayan Lee; Hsin-Mu Tsai; Tonguz, O.K.; , "On the Security of Intra-Car Wireless Sensor Networks," Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th , vol., no., pp.1-5, 20-23 Sept. 2009
1313
top related