[ieee 2012 4th international conference on computational intelligence, communication systems and...

5
An Embedded Int Vivek Kumar Sehgal 1* 1 Department of CSE&IT 1 Jaypee University of Information Tech Waknaghat, Solan, HP (INDIA) e-mail: [email protected] , [email protected] AbstractGSM based security system are m then an ordinary security system. The ordin simply based on the concept of sensors. They on detecting movement. This system of techno its appeal as it has become a common sighting these alarms go off unnecessarily. We propos with GSM techniques and a better decision m built to make our vehicle more secure. It is a home/car security device that gives instant mobile phone the moment a security breach designed to alert you wirelessly through a cal burglar alarm system intercepts an intrus proposed an 8 bit embedded controller inter model. The control mechanism is based o generated by mobile phone when the number k Keywords- GSM; Microcontroller; Embed Intelligent Car Security I. INTRODUCTION One can look for several products perta systems India. Big corporate giants and companies have launched quality securi safeguard homes and precious belongings burglar alarm, fire alarm, home security kits and windows, security cameras, motion de safety products, wire and wireless securi other such products [4]. These products are end as well as high end range. Depending up he or she can go for the required security sy the place to be secured[6][7]. One can also security experts who provide customized home security. A car alarm is an electronic in a vehicle in an attempt to discourage the itself, its contents, or both [5][9]. Car a emitting high-volume sound (usually a sire recorded verbal warning, the vehicle's o combination thereof) when the condition triggering are met, as well as by flashin vehicle's lights, and (optionally) notifying th a paging system and interrupting various e necessary for the car to start [8]. Car alarms should not be confused wi although the purpose of both may be to det operate in a dissimilar fashion. An immobiliz terface for GSM Based Car Security Sy hnology ) Mudit Singhal 2 , Bhart Mangla 3 and Shivangi Kulshr 2,3 Department of CSE&IT, 4,5 Dep 2,3,4,5 Jaypee University of Inform Waknaghat, Solan, HP ( much more stout nary systems are y sound an alarm ology has now lost g in metros where sed a new system making process is a unique wireless t alerts on your h is detected. It is ll as soon as your sion. This paper rfaced with GSM on DTMF tones keys are pressed. dded Algorithm; aining to security many renowned ity products to s. One can find s, new age doors etectors, personal ity products and available in low pon one’s budget, ystem suitable to o find numerous suggestions for c device installed eft of the vehicle alarms work by ren, klaxon, pre- own horn, or a ns necessary for ng some of the he car's owner via electrical circuits ith immobilizers; ter car theft, they zer generally Fig. 1 DTMF Freque will not offer any audible or visu require any additional input from the a non-immobilizer car. Car alarms categories: 1) OEM (built-in to the vehicle at 2) Aftermarket (installed at any ti built, such as by the new car de store, or the vehicle's owner) Alarms come with a mix of featu typically consist of an additional ra the owner to wirelessly control the Remote car alarms typically come e sensors along with immobilizers and Yet another class of security cover that include 2-way paging controlle have an LCD icon display that can p the vehicle being threatened, and m beeps or silent vibration [1]. How to synergize the latest system? We have included the followi system as shown in Fig.2: 1. DTMF: Dual Tone Multiple 2. Microcontroller 3. Programming language 4. GSM unit ystem 3 , Sudeep Singh 4 , restha 5 partment of ECE, mation Technology (INDIA) encies ual theft deterrence, nor e driver than the driver of can be divided into two t the factory) ime after the car has been ealer, an auto accessories ures. Remote car alarms adio receiver that allows e alarm from a key fob. equipped with an array of d motion detectors [2]. rs aftermarket car alarms ers. Some 2-way systems pinpoint the actual part of many alert the user with technologies with our ing technologies in our Access (Fig.1). 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks 978-0-7695-4821-0/12 $26.00 © 2012 IEEE DOI 10.1109/CICSyN.2012.12 9 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks 978-0-7695-4821-0/12 $26.00 © 2012 IEEE DOI 10.1109/CICSyN.2012.12 9

Upload: shivangi

Post on 27-Jan-2017

220 views

Category:

Documents


3 download

TRANSCRIPT

An Embedded Interface f

Vivek Kumar Sehgal1* 1Department of CSE&IT

1Jaypee University of Information TechnologyWaknaghat, Solan, HP (INDIA)

e-mail: [email protected], [email protected]

Abstract— GSM based security system are much more stout then an ordinary security system. The ordinary systems are simply based on the concept of sensors. They sound an alarm on detecting movement. This system of technology has now lost its appeal as it has become a common sighting in metros where these alarms go off unnecessarily. We proposedwith GSM techniques and a better decision making process is built to make our vehicle more secure. It is a unique wireless home/car security device that gives instant alerts on your mobile phone the moment a security breach is detected. It is designed to alert you wirelessly through a callburglar alarm system intercepts an intrusion.proposed an 8 bit embedded controller intermodel. The control mechanism is based on DTMF tones generated by mobile phone when the number keys are pressed.

Keywords- GSM; Microcontroller; Embedded Algorithm; Intelligent Car Security

I. INTRODUCTION

One can look for several products pertaining to security systems India. Big corporate giants and many renowned companies have launched quality security products to safeguard homes and precious belongings. One can find burglar alarm, fire alarm, home security kits, new age doors and windows, security cameras, motion detectors, personal safety products, wire and wireless security products and other such products [4]. These products are available in low end as well as high end range. Depending upon one’s budget, he or she can go for the required security system suitable to the place to be secured[6][7]. One can also find numerous security experts who provide customized suggestions for home security. A car alarm is an electronic device installed in a vehicle in an attempt to discourage theftitself, its contents, or both [5][9]. Car alarms work by emitting high-volume sound (usually a siren,recorded verbal warning, the vehicle's own horn, or a combination thereof) when the conditions necessary for triggering are met, as well as by flashing some of the vehicle's lights, and (optionally) notifying the car's owner via a paging system and interrupting various electrical circuits necessary for the car to start [8].

Car alarms should not be confused withalthough the purpose of both may be to deter car theft, they operate in a dissimilar fashion. An immobilizer generally

An Embedded Interface for GSM Based Car Security System

Jaypee University of Information Technology Waknaghat, Solan, HP (INDIA)

Mudit Singhal2, Bhart Mangla3

and Shivangi Kulshrestha2,3Department of CSE&IT, 4,5Department of 2,3,4,5Jaypee University of Information Technology

Waknaghat, Solan, HP (INDIA)

GSM based security system are much more stout then an ordinary security system. The ordinary systems are simply based on the concept of sensors. They sound an alarm on detecting movement. This system of technology has now lost

has become a common sighting in metros where e proposed a new system

with GSM techniques and a better decision making process is built to make our vehicle more secure. It is a unique wireless

t gives instant alerts on your mobile phone the moment a security breach is detected. It is

a call as soon as your burglar alarm system intercepts an intrusion. This paper

an 8 bit embedded controller interfaced with GSM model. The control mechanism is based on DTMF tones generated by mobile phone when the number keys are pressed.

GSM; Microcontroller; Embedded Algorithm;

taining to security systems India. Big corporate giants and many renowned companies have launched quality security products to safeguard homes and precious belongings. One can find burglar alarm, fire alarm, home security kits, new age doors

ecurity cameras, motion detectors, personal safety products, wire and wireless security products and

. These products are available in low end as well as high end range. Depending upon one’s budget,

security system suitable to . One can also find numerous

security experts who provide customized suggestions for is an electronic device installed

theft of the vehicle alarms work by

siren, klaxon, pre-recorded verbal warning, the vehicle's own horn, or a combination thereof) when the conditions necessary for

ell as by flashing some of the vehicle's lights, and (optionally) notifying the car's owner via a paging system and interrupting various electrical circuits

Car alarms should not be confused with immobilizers; he purpose of both may be to deter car theft, they

operate in a dissimilar fashion. An immobilizer generally

Fig. 1 DTMF Frequencies will not offer any audible or visual theft deterrence, nor require any additional input from the driver than the driver of a non-immobilizer car. Car alarms can be divided into two categories: 1) OEM (built-in to the vehicle at the factory)2) Aftermarket (installed at any time after the car has been

built, such as by the new car dealer, an auto accessories store, or the vehicle's owner)

Alarms come with a mix of features. Remote car alarms typically consist of an additional radio receiver that allows the owner to wirelessly control the alarm from a key fob. Remote car alarms typically come equipped with an array of sensors along with immobilizers and motion detectorsYet another class of security coversthat include 2-way paging controllerhave an LCD icon display that can pinpoint the actual part of the vehicle being threatened, and many alert the user with beeps or silent vibration [1].

How to synergize the latest technologies with our system?

We have included the following technologies in our system as shown in Fig.2:

1. DTMF: Dual Tone Multiple Access2. Microcontroller 3. Programming language 4. GSM unit

Based Car Security System

3, Sudeep Singh4, Shivangi Kulshrestha5

Department of ECE, Jaypee University of Information Technology

Waknaghat, Solan, HP (INDIA)

Fig. 1 DTMF Frequencies

not offer any audible or visual theft deterrence, nor require any additional input from the driver than the driver of

Car alarms can be divided into two

in to the vehicle at the factory) at any time after the car has been

built, such as by the new car dealer, an auto accessories

Alarms come with a mix of features. Remote car alarms typically consist of an additional radio receiver that allows

relessly control the alarm from a key fob. Remote car alarms typically come equipped with an array of sensors along with immobilizers and motion detectors [2]. Yet another class of security covers aftermarket car alarms

way paging controllers. Some 2-way systems icon display that can pinpoint the actual part of

the vehicle being threatened, and many alert the user with

How to synergize the latest technologies with our

lowing technologies in our

DTMF: Dual Tone Multiple Access (Fig.1).

2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks

978-0-7695-4821-0/12 $26.00 © 2012 IEEE

DOI 10.1109/CICSyN.2012.12

9

2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks

978-0-7695-4821-0/12 $26.00 © 2012 IEEE

DOI 10.1109/CICSyN.2012.12

9

Fig. 2 Block Diagram of GSM Based Car Security System

The organization of the paper is as follows: In section 2,discuss the proposed design that also presents module description for our proposed system. Detailed circuit analysis description is provided for each block used in this section. In section 3, we present the software implementation along with algorithm and flow diagram. In section 4, PCB designing, actual circuit implementation on PCB and simulated schematic are shown. Finally, some conclusions are offered in section 5.

II. PROPOSED WORK

The microcontroller AT89s52 is the brain of the car security system. The signal from the car is constantly being sent to the controller which is being sensed. If there is any intrusion or any breakage then the signal breaks and then no signal is coming to the controller. As soon as the signal stops the controller send a signal to the opto-isolator which is attached to the cell phone which makes a call to other cell phone whose number is stored in the emergency dialing of the phone. The LM7805 converts the 9V supply to the 5V so as to drive the controller. The opto-isolator protects the circuit from any sudden high voltage which could damage the circuit. The opto-isolator itself blows out and thus saves the remaining circuit. The following components are usedproposed circuit.

A. Door Switch Door Switch is push-to-on switch. When someone tries to open the door, it signals the controller.

B. Car Battery Provides the battery voltage of 12V to the circuit

C. µC AT89s52 The AT89s52 is a low-power, high performance microcontroller with 4K bytes of In-System(ISP) Flash memory. It is compatible with the industrystandard 80c52 instruction set and pinout. The onallows the program memory to be reprogrammed inor by a conventional nonvolatile memory programmer. It can be both serially and parallely programmed. It is costeffective (may cost just Rs.55).

GSM Based Car Security System

The organization of the paper is as follows: In section 2, we discuss the proposed design that also presents module description for our proposed system. Detailed circuit analysis description is provided for each block used in this section. In section 3, we present the software implementation along with

and flow diagram. In section 4, PCB designing, actual circuit implementation on PCB and simulated schematic are shown. Finally, some conclusions are offered

The microcontroller AT89s52 is the brain of the car security system. The signal from the car is constantly being sent to the controller which is being sensed. If there is any intrusion or any breakage then the signal breaks and then no signal is

the controller. As soon as the signal stops the isolator which is attached

to the cell phone which makes a call to other cell phone whose number is stored in the emergency dialing of the

V supply to the 5V so as isolator protects the circuit

from any sudden high voltage which could damage the isolator itself blows out and thus saves the The following components are used in the

on switch. When someone tries to

Provides the battery voltage of 12V to the circuit.

power, high performance CMOS 8-bit System Programmable

(ISP) Flash memory. It is compatible with the industry-standard 80c52 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system

al nonvolatile memory programmer. It can be both serially and parallely programmed. It is cost-

D. Opto-Isolator There are many situations where signals and data need to be transferred from one subsystem to another within electronics equipment, or from one piece of equipment to another, without making a direct ‘ohmic’ electrical connection. Often this is because the source and destination are (or may be at times) at very different voltage levels, like a microprocessor which is operating from 5V DC but being used to control a triac which is switching 240V AC. In such situations the link between the two must be an isolated one, to protect the microprocessor/microcontroller from over voltage damage. These use a beam signals or data across an electrical barrier, and achieve excellent isolation. Optocoupler typically come in a small 6pin or 8-pin IC package, but are essentially a combination of two distinct devices: an optical transmitter, typigallium arsenide LED (light-emitting diode) and an optical receiver such as a phototransistor or lighttwo are separated by a transparent barrier which blocks any electrical current flow between the two, but does allow the passage of light as shown in Fig. 3.

Fig. 3 Internal Circuit of Opto

III. SOFTWARE IMPLEMENTATION

The software platform used for the programming of the microcontroller 89s51 of the 8051 family is KEIL. With this software, assembly language programming actualized.

A. Microcontroller Operation The Before programming the AT89C52, the address, data, and control signals should be set up according to the “Flash Programming Modes [3].” To program the AT89C52,take the following steps:

1) Input the desired memory location on the address lines.

2) Input the appropriate data byte on the data lines.3) Activate the correct combination of control signals.4) Raise EA/VPP to 12V. 5) Pulse ALE/PROG once to program a byte in theFlash array or the lock bits. The

timed and typically takes no more than 50 µs. Repeat steps 1 through 5, changing the address and data for the entire array or until the end of the object file is reached. Programming is done on Keil software. Various steps toprogram 8051:

There are many situations where signals and data need to be transferred from one subsystem to another within a piece of electronics equipment, or from one piece of equipment to another, without making a direct ‘ohmic’ electrical connection. Often this is because the source and destination are (or may be at times) at very different voltage levels, like

essor which is operating from 5V DC but being used to control a triac which is switching 240V AC. In such situations the link between the two must be an isolated one, to protect the microprocessor/microcontroller from over voltage damage. These use a beam of light to transmit the signals or data across an electrical barrier, and achieve excellent isolation. Optocoupler typically come in a small 6-

pin IC package, but are essentially a combination of two distinct devices: an optical transmitter, typically a

emitting diode) and an optical receiver such as a phototransistor or light-triggered diac. The two are separated by a transparent barrier which blocks any electrical current flow between the two, but does allow the

of Opto- Isolator

MPLEMENTATION

The software platform used for the programming of the microcontroller 89s51 of the 8051 family is KEIL. With this software, assembly language programming can be

The Before programming the AT89C52, the address, data, and control signals should be set up according to the “Flash

].” To program the AT89C52,take

memory location on the address

2) Input the appropriate data byte on the data lines. 3) Activate the correct combination of control signals.

5) Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The byte write cycle is self-

timed and typically takes no more than 50 µs. Repeat steps 1 through 5, changing the address and data for the entire array or until the end of the object file is reached. Programming is done on Keil software. Various steps to

1010

1) Write the code in a notepad file. 2) *.hex file is generated using Keil software3) *.hex file is burnt into the micro-

burner(Fig. 5).

Fig.4 Conversion of assembly language into HEX file

Fig.5 Burning of Code in to Microcontroller Memory

B. Source Code ORG 00H

CLR P2.0 MOV P0,#0FFH MOV P1,#0FFH MOV R0,#096H START: MOV R1,#003H VSG: JNB P1.0,VSG2 JMP CALLING VSG2: JNB P1.1,VSG3 JMP CALLING VSG3: JB P1.2,VSG4 JMP CALLING

*.hex file is generated using Keil software(Fig.4). -controller using

Conversion of assembly language into HEX file

ontroller Memory

VSG4: JB P1.3,VSG5 JMP CALLING

VSG5: JMP VSG CALLING: SETB P2.0

CALL DELAY CALL DELAY CLR P0.0 CALL DELAY SETB P0.0 CALL DELAY CLR P0.0 CALL DELAY SETB P0.0 CALL DELAY XXX1: DJNZ R0,XXX JMP XX XXX: CALL DELAY

JMP XXX1 XX: DJNZ R1,CALLING

JMP START

DELAY: H1: MOV R4,#10 H2: MOV R3, #100 H3: DJNZ R3, H3 DJNZ R4, H2 DJNZ R5, H1 RET

END

IV. HARDWARE IMPLEMENTATION AND

DESCRIPTION

With reference to Fig. 6. Vital role of Micro controllerAT89C52 in ‘Remote billing of energy meter using GSM module’ is as follows [10].

1) It will transmit the consumption amount to GSM2) It will act as a master to communicate with memory3) Whenever a command is sent to reset the

,controller resets the memory4) Controller takes the pulses from the 5) Microcontroller also switches

The circuit diagram shows in the Figcomponents used in the sequence in they should have been.

H2: MOV R3, #100 H3: DJNZ R3, H3

MPLEMENTATION AND SCHEMATIC

ESCRIPTION

6. Vital role of Micro controller-AT89C52 in ‘Remote billing of energy meter using GSM

It will transmit the consumption amount to GSM It will act as a master to communicate with memory Whenever a command is sent to reset the memory ,controller resets the memory Controller takes the pulses from the DTMF Microcontroller also switches on the alarm.

Fig. 6-7. It shows all the components used in the sequence in they should have been.

1111

Fig. 6 . 6 Schematic of Port wise Hardware Implementation

Fig. 7 Actual Hardware Implementation

1212

V. CONCLUSION AND FUTURE SCOPES

Through our initial research it was evident that the automobile sector is way behind in blending the latest information and communication technologies in their security system. Hence in this paper, we have presented an advanced security system for cars. We have used the current technology of GSM. The reason being the present highly developed infrastructure for systems supporting GSM. Our final designed system is advantageous over other similar systems because: 1) The system moves a step ahead of other current

security systems available in the market such as AUTOCOP etc. Our security system has real time application; i.e. the security system doesn’t merely create noise but informs the owner wherever the person may be.

2) Cost effective. 3) It is sellable. Any product designed must be lucrative

for consumers to buy. Such a smart system has the potential to be sold and attract customers.

The proposed work has various future applications and can still be modified with certain new features which can be cost effective when manufactured at large scale. Also, our designed system is flexible and can accommodate new technologies such as CDMA and other code encrypted highly sophisticated techniques to further enhance the efficacy.

REFERENCES [1] Jian Xiao; Haidong Feng; , "A low-cost extendable framework for

embedded smart car security system," Networking, Sensing and Control, 2009. ICNSC '09. International Conference on , vol., no., pp.829-833, 26-29 March 2009.

[2] www.8051projects.net/downloads134.html [3] http://www.atmel.com/atmel/acrobat/doc0313.pdf [4] Thong, S.T.S.; Chua Tien Han; Rahman, T.A.; , "Intelligent Fleet

Management System with Concurrent GPS & GSM Real-Time Positioning Technology,"Telecommunications, 2007. ITST '07. 7th International Conference on ITS , vol., no., pp.1-6, 6-8 June 2007.

[5] http://arshad-umar.blogspot.in/2009/09/gsm-vehicle-control-and-security-using.html .

[6] Sehgal, V.K.; Nitin; Chauhan, D.S.; Sharma, R.; , "Smart wireless temperature data logger using IEEE 802.15.4/ZigBee protocol," TENCON 2008 - 2008 IEEE Region 10 Conference , vol., no., pp.1-6, 19-21 Nov. 2008.

[7] Sehgal, V.K.; Panda, N.; Handa, N.R.; Naval, S.; Goel, V.; , "Electronic Energy Meter with Instant Billing," Computer Modeling and Simulation (EMS), 2010 Fourth UKSim European Symposium on , vol., no., pp.27-31, 17-19 Nov. 2010.

[8] Sehgal, V.K.; Dhope, S.; Goel, P.; Chaudhry, J.S.; Sood, P.; , "An Embedded Platform for Intelligent Traffic Control," Computer Modeling and Simulation (EMS), 2010 Fourth UKSim European Symposium on , vol., no., pp.541-545, 17-19 Nov. 2010.

[9] http://ece-projects.blogspot.in/2011/06/gsm-based-vehicle-monitoring-security.html .

[10] Hayan Lee; Hsin-Mu Tsai; Tonguz, O.K.; , "On the Security of Intra-Car Wireless Sensor Networks," Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th , vol., no., pp.1-5, 20-23 Sept. 2009

1313