SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 2, Issue 10 (August 2012), PP. 18-22


    Microcontroller Based Anti-theft Security System Using GSM
             Networks with Text Message as Feedback
                                   Visa M. Ibrahim1, Asogwa A. Victor2.
        1,2
              Department of Electrical and Electronic Engineering,School Of Engineering and Engineering Technology,
                            ModibboAdamma University of Technology Yola, Adamawa State. Nigeria



Abstract––Antitheft security system utilizes an embedded system design with Dual Tone Multi Frequency (DTMF) and a
GSM to monitor and safeguard a car. It secures the car against theft. Upon activation, it automatically demobilizes the
car by disconnecting the ignition key supply from the car battery. This now makes it impossible for anybody so starts the
car, let alone moving with it. In an attempt of theft through the car doors or boot, the system sends text message to the car
owner and at the same time starts up an alarm.This design popped out due to the increasing rate at which packed cars are
stolen especially in our country, but with this design this packed car is being monitored irrespective of where it is packed,
provided there is GSM network coverage.From the research conducted, it was found out that majority of the existing car
security system uses only alarm, and doesn’t send text message to the car owner let alone of demobilizing the car. But
with the use of GSM network, the owner is guaranteed that the car will send text message to his phone, and at the same
time, have people around alerted of what is happening. Added to this is that the car will not be move because it has been
demobilized.

Keywords––Communication, DTMF, GSM, Networks, Microcontroller, Text message, Feedback.

                                               I.        INTRODUCTION
          In a situation where there is high level of theft, there is need for better security system. It is much safer to have a
system that monitors and communicates to the device owner without putting human life to risk in the name of “Watchman”.
This tends to utilize the availability of GSM network, mobile phone and electronics circuit to achieve an automated system
which is programmed to work as a thinking device to accomplish this purpose.
          By simply dialing the phone number of the mobile phone attached to the circuit and sending a code after the phone
has automatically been answered, puts the system to either “active or inactive” state, and on any attempt of theft the system
sends a text message to the device owner, demobilizes the system (car) and then starts up an alarm. With this, the car is
always protected. The total absence of sufficient security personnel in a packed car is a great discomfort to car owners. This
insecurity has paved way to increasing rate of stealing packed cars – even with security.
          In order to enhance an improved and life risk free security system, the purpose of this study is to aid a better
security system of cars with the use of GSM. This system monitors one’s car against theft, and has a text message sent to the
car owner, telling him that his car is being tampered, and at which part of the car (either doors or boot) is being tampered.
The system will also demobilize the car (that is stopping the car from moving), set up an alarm for the people around to
notice what is happening.




                                                              18
Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message…

1.1 System Description




                                   Figure 1: Functional Block Diagram of the System.

          The diagram in figure 1. Describe the overall system. The system comprises of a GSM which serves as an
intermediate between the outside world (car owner) and the entire system. It is responsible for both receiving of calls for
system activation and deactivation, and sending of text message to the car owner. Its output in the form of frequency is feed
into Dual Tone Multi-Frequency (DTMF) decoder IC, which converts these frequencies into digital voltage levels of zeros
and ones. The digital voltage levels received from the DTMF decoder [9] is now fed into microcontroller Integrated circuit.
The micro controller which is the brain and control circuit behind the entire design is controlled with a written program
stored into its Read Only Memory (ROM). The controller with the direction of the written program co-ordinate the system’s
operation as follows:
     i. If the system is active, it monitors both the car doors and boot to check if anyone is opened.
     ii. Demobilizes the car by disconnecting the ignition line from the battery supply via the actuator [1].
     iii. Sends text message to the car owner signifying where the attempt is made from, and finally
     iv. Starts up an alarm for alert purpose.
     v. But, if the system is inactive, the microcontroller disables all outputs and sensor inputs.

          In this paper, the design utilized locally assembled microcontroller and few other basic electronics components to
achieve both the control and the controlled. Evidently, microcontrollers have been used to perform such simple security task
in which human performance might degrade over time. The reliability of this design makes it durable and capable for
offering guarantee security at all time.
          The power supply provides the voltage and current required for effective performance of the system. This supply is
tapped from the car battery and then regulated before being fed to the system.

                                        II.       DESIGN FRAME WORK
2.2         System Design
The design process is divided into two: Hardware and Software designs.

2.2.1 Hardware Design
2.2.1.1 The microcontroller.
          This microcontroller system is designed around the Intel’s AT89C51 microcontroller [1]. The Intel AT89C51
microcontroller is a complete computer on a single chip. This is because it has Read Only Memory (ROM), Random Access
Memory (RAM) and Central Processing Unit (CPU) embedded in it. The AT89C51 is a low-power, high performance
CMOS 8-bit microcomputer with 8K bytes of memory. The device is manufactured using Atmel’s high-density non-volatile

                                                            19
Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message…

memory technology and is compatible with the industry standard 80C5l and 80C52 instruction set and pin out. The on-chip
flash allows the program memory to be reprogrammed in-system or by a conventional non-volatile memory programmer. It
also provides programmable timer, programmable I/O ports together with 256 × 8-bit RAM for use as “scratch book” and
also for stack purposes. The alarm was implemented using a 12V/15W siren.
           The Dual Tone Multi-Frequency (DTMF) IC – MT8870/CM8870 is an IC which detects frequency in the form of
tone and then encodes it into different digital voltage levels [12]. It principle is on combining two carrier frequencies of
upper level and lower level which produces a unique tone. The DTMF is made to produce different voltage level for every
key pressed on the connected phone.
           Opto transistor CNY-17 is serving as a tap button contactor [9], which is used for initiating a keypad pressing
command on the connected phone. FET (IRF3205) is a power mosfet [13]. It functions as an actuator to the demobilization
unit. Relay is the demobilizer in the system. Voltage regulation is achieved by the use of LM7805 [13]. The fig. 2 below
gives clearer view of thesehardware.




                                           Figure 2: Complete circuit diagram.



                                                            20
Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message…

2.2.1.2 Interfacing the microcontroller to coordinate the entire system.
Port zero (P0) of the microcontroller is used for collecting DTMF converted data for programming analysis. Port three bit
zero (P3.0) is used as DTMF valid tone signaling. Port zero bit zero (P0.0) and Port zero bit one (P0.1) respectively are used
as input for doors sensor and boot sensor. Port two bit zero through Port two bit three (P2.0 – P2.3) are used as output pins
for text message(feedback) control. Port two bit four (P2.4) of the microcontroller is used for controlling the alarming unit
and finally the actuator which demobilizes the car is controlled through Port two bit five (P2.5).

2.2 Software Design
         The program was written in assembly language using the 8051 instruction set. The flowchart for the program is
shown in Figure 3.




                                           Figure 3: Controlled Program Flowchart.

                         III.      PERFORMANCE EVALUATION ANDTESTING
           Various test was carried out before, during and after the construction has been completed. The multi-meter was
extensively used for carrying out most of these tests. Each subunit was tested and confirmed efficient.
After the construction of the entire system, the program was written and burned into the microcontroller chip. On interfacing
it to the car, it tested ok as it performed the objective of the design. Satisfaction was gotten from the moment the system was
activated and the car opened, the system automatically disconnected the ignition, sent a text message to a programmed
recipient and then started up an alarm. The mission of the design was accomplished.
The entire system has three inputs, which are: - the output of the DTMF decoder, the output from the phone ear piece jack
and the sensors from the car doors and boot. The system outputs are the text message controller, alarming system and
demobilization unit. The system is battery powered and was tapped from car battery and for this reason it made it easier for
dc use. With these a system that sends text message to car owner is designed and implemented.

                                                IV.        CONCLUSION
          It is always better to start every design with a good proposal, which will stand as a reference point to the work as it
proceeds. The result of any design gives joy if aims and objectives are gotten. Since the project performed its proposal, it
indeed satisfactory. Now from the input to the output of each stage was a success. The major input is like an interrupt and
upon reception by microcontroller it goes through the iteration of demobilizing the car, sending text message and starting up
an alarm. The design is thus a huge success.


                                                              21
Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message…

                                                    BIBLIOGRAPHY
[1].    Muhammad Ali Mazidi and Janice GillispieMazadi (www.asadali.tk)” the 8051 microcontroller and embedded systems” ;
        Department of Computer Science and Information Engineering, National Cheng Kung University of Taiwan.
[2].    Paul Horowtz and Winfield Hill (2002) The Art of Electronics, 2nd Edition, Cambridge University press.
[3].    Ronald J. (Monroe Community College) and Neal S.Widmer (Purdue University) (2005) Digital Systems Principles and
        Application, 8th Edition, Prentice- Hall India.
[4].    Robert R. (1998) Modern Control System,8th Edition, New York.
[5].    Donal Heffernan (2002) 8051 Tutorial, University of Limerick.
[6].    Theraja B. L. and Theraja A. K. (2003) A Text of Electrical Technology, 23 th Edition, Schand and Company Ltd. New Delhi.
[7].    Mazidi M. (1987) 8051 Assembly Language Programming and Interfacing, Prentice Hall, USA.
[8].    Hall F. and Lister P.F (1980), Microprocessor Fundamentals, Pitman, London.
[9].    Horowitz P. and Hill W. (1989), The Art of Electronics, 2nd Edition, Cambridge University press.
[10].   http//www.gogle/Ebedtroniccs.
[11].   Muhammed Ali Mazidi (2nd edition) The 8051 Microcontroller and Embedded System Using Assembly and C
[12].   Zarlink Semiconductor (1993) Application Note on MT8870 Integrated DTMF Receiver.
[13].   Rashid R. (1998) Power Electronics, Circuit Device and Application, 2th Edition, Prentice hall.




                                                               22

Más contenido relacionado

La actualidad más candente

Project report on embedded system using 8051 microcontroller
Project  report on embedded system using 8051 microcontrollerProject  report on embedded system using 8051 microcontroller
Project report on embedded system using 8051 microcontroller
Vandna Sambyal
 
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sdCn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
kissingerman
 
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
slmnsvn
 

La actualidad más candente (18)

Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance
 
819 data sheet
819 data sheet819 data sheet
819 data sheet
 
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEMINTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME & ATTENDANCE SYSTEM
 
R034301240136
R034301240136R034301240136
R034301240136
 
A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...A Computer Based Artificial Neural Network Controller with Interactive Audito...
A Computer Based Artificial Neural Network Controller with Interactive Audito...
 
Embedded system ppt
Embedded system pptEmbedded system ppt
Embedded system ppt
 
Embedded Tsunami Warning System
Embedded Tsunami Warning System Embedded Tsunami Warning System
Embedded Tsunami Warning System
 
Smart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A ReviewSmart anti-theft system for the security of vehicles- A Review
Smart anti-theft system for the security of vehicles- A Review
 
Project report on embedded system using 8051 microcontroller
Project  report on embedded system using 8051 microcontrollerProject  report on embedded system using 8051 microcontroller
Project report on embedded system using 8051 microcontroller
 
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sdCn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
Cn wip604 mw h.264-ipcam-hd-wifi+pt+ir-cut+sd
 
Design of Management Application
Design of Management ApplicationDesign of Management Application
Design of Management Application
 
Embedded system
Embedded  systemEmbedded  system
Embedded system
 
IRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent LiftIRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent Lift
 
Voice recognition based advance patients room automation
Voice recognition based advance patients room automationVoice recognition based advance patients room automation
Voice recognition based advance patients room automation
 
GSM BASED e-NOTICE BOARD SRS
GSM BASED e-NOTICE BOARD SRSGSM BASED e-NOTICE BOARD SRS
GSM BASED e-NOTICE BOARD SRS
 
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
Monitoring and controlling_system_in_a_chicken_farm(eee499.blogspot.com)
 
Project Report On Micro-controller Embedded System
Project Report On Micro-controller Embedded SystemProject Report On Micro-controller Embedded System
Project Report On Micro-controller Embedded System
 
Intro to micro controller (Atmega16)
Intro to micro controller (Atmega16)Intro to micro controller (Atmega16)
Intro to micro controller (Atmega16)
 

Destacado

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 

Destacado (8)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 

Similar a IJERD (www.ijerd.com) International Journal of Engineering Research and Development

Gsm anti theft
Gsm anti theftGsm anti theft
Gsm anti theft
Ashu0711
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
Ashu0711
 
Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...
Iaetsd Iaetsd
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft system
Kshitij Rokde
 
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsm
Iaetsd Iaetsd
 
Gsm based emergency calling system
Gsm based emergency calling systemGsm based emergency calling system
Gsm based emergency calling system
IAEME Publication
 

Similar a IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 upload
 
D017651519
D017651519D017651519
D017651519
 
Project ppt
Project pptProject ppt
Project ppt
 
F0463842
F0463842F0463842
F0463842
 
Gsm anti theft
Gsm anti theftGsm anti theft
Gsm anti theft
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 final
 
F04123137
F04123137F04123137
F04123137
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
 
Home Security System Using Gsm Modem
Home Security System Using Gsm ModemHome Security System Using Gsm Modem
Home Security System Using Gsm Modem
 
home autimation using GSM
home autimation using GSMhome autimation using GSM
home autimation using GSM
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm Technology
 
Vehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPSVehicle tracking and locking system based on GSM and GPS
Vehicle tracking and locking system based on GSM and GPS
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
 
Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...Iirdem implementation of smart homes and industrial automation system with se...
Iirdem implementation of smart homes and industrial automation system with se...
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
GSM Based Anti theft system
GSM Based Anti theft systemGSM Based Anti theft system
GSM Based Anti theft system
 
Iaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsmIaetsd wireless electronic notice board using gsm
Iaetsd wireless electronic notice board using gsm
 
G3602050055
G3602050055G3602050055
G3602050055
 
Gsm based emergency calling system
Gsm based emergency calling systemGsm based emergency calling system
Gsm based emergency calling system
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 2, Issue 10 (August 2012), PP. 18-22 Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message as Feedback Visa M. Ibrahim1, Asogwa A. Victor2. 1,2 Department of Electrical and Electronic Engineering,School Of Engineering and Engineering Technology, ModibboAdamma University of Technology Yola, Adamawa State. Nigeria Abstract––Antitheft security system utilizes an embedded system design with Dual Tone Multi Frequency (DTMF) and a GSM to monitor and safeguard a car. It secures the car against theft. Upon activation, it automatically demobilizes the car by disconnecting the ignition key supply from the car battery. This now makes it impossible for anybody so starts the car, let alone moving with it. In an attempt of theft through the car doors or boot, the system sends text message to the car owner and at the same time starts up an alarm.This design popped out due to the increasing rate at which packed cars are stolen especially in our country, but with this design this packed car is being monitored irrespective of where it is packed, provided there is GSM network coverage.From the research conducted, it was found out that majority of the existing car security system uses only alarm, and doesn’t send text message to the car owner let alone of demobilizing the car. But with the use of GSM network, the owner is guaranteed that the car will send text message to his phone, and at the same time, have people around alerted of what is happening. Added to this is that the car will not be move because it has been demobilized. Keywords––Communication, DTMF, GSM, Networks, Microcontroller, Text message, Feedback. I. INTRODUCTION In a situation where there is high level of theft, there is need for better security system. It is much safer to have a system that monitors and communicates to the device owner without putting human life to risk in the name of “Watchman”. This tends to utilize the availability of GSM network, mobile phone and electronics circuit to achieve an automated system which is programmed to work as a thinking device to accomplish this purpose. By simply dialing the phone number of the mobile phone attached to the circuit and sending a code after the phone has automatically been answered, puts the system to either “active or inactive” state, and on any attempt of theft the system sends a text message to the device owner, demobilizes the system (car) and then starts up an alarm. With this, the car is always protected. The total absence of sufficient security personnel in a packed car is a great discomfort to car owners. This insecurity has paved way to increasing rate of stealing packed cars – even with security. In order to enhance an improved and life risk free security system, the purpose of this study is to aid a better security system of cars with the use of GSM. This system monitors one’s car against theft, and has a text message sent to the car owner, telling him that his car is being tampered, and at which part of the car (either doors or boot) is being tampered. The system will also demobilize the car (that is stopping the car from moving), set up an alarm for the people around to notice what is happening. 18
  • 2. Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message… 1.1 System Description Figure 1: Functional Block Diagram of the System. The diagram in figure 1. Describe the overall system. The system comprises of a GSM which serves as an intermediate between the outside world (car owner) and the entire system. It is responsible for both receiving of calls for system activation and deactivation, and sending of text message to the car owner. Its output in the form of frequency is feed into Dual Tone Multi-Frequency (DTMF) decoder IC, which converts these frequencies into digital voltage levels of zeros and ones. The digital voltage levels received from the DTMF decoder [9] is now fed into microcontroller Integrated circuit. The micro controller which is the brain and control circuit behind the entire design is controlled with a written program stored into its Read Only Memory (ROM). The controller with the direction of the written program co-ordinate the system’s operation as follows: i. If the system is active, it monitors both the car doors and boot to check if anyone is opened. ii. Demobilizes the car by disconnecting the ignition line from the battery supply via the actuator [1]. iii. Sends text message to the car owner signifying where the attempt is made from, and finally iv. Starts up an alarm for alert purpose. v. But, if the system is inactive, the microcontroller disables all outputs and sensor inputs. In this paper, the design utilized locally assembled microcontroller and few other basic electronics components to achieve both the control and the controlled. Evidently, microcontrollers have been used to perform such simple security task in which human performance might degrade over time. The reliability of this design makes it durable and capable for offering guarantee security at all time. The power supply provides the voltage and current required for effective performance of the system. This supply is tapped from the car battery and then regulated before being fed to the system. II. DESIGN FRAME WORK 2.2 System Design The design process is divided into two: Hardware and Software designs. 2.2.1 Hardware Design 2.2.1.1 The microcontroller. This microcontroller system is designed around the Intel’s AT89C51 microcontroller [1]. The Intel AT89C51 microcontroller is a complete computer on a single chip. This is because it has Read Only Memory (ROM), Random Access Memory (RAM) and Central Processing Unit (CPU) embedded in it. The AT89C51 is a low-power, high performance CMOS 8-bit microcomputer with 8K bytes of memory. The device is manufactured using Atmel’s high-density non-volatile 19
  • 3. Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message… memory technology and is compatible with the industry standard 80C5l and 80C52 instruction set and pin out. The on-chip flash allows the program memory to be reprogrammed in-system or by a conventional non-volatile memory programmer. It also provides programmable timer, programmable I/O ports together with 256 × 8-bit RAM for use as “scratch book” and also for stack purposes. The alarm was implemented using a 12V/15W siren. The Dual Tone Multi-Frequency (DTMF) IC – MT8870/CM8870 is an IC which detects frequency in the form of tone and then encodes it into different digital voltage levels [12]. It principle is on combining two carrier frequencies of upper level and lower level which produces a unique tone. The DTMF is made to produce different voltage level for every key pressed on the connected phone. Opto transistor CNY-17 is serving as a tap button contactor [9], which is used for initiating a keypad pressing command on the connected phone. FET (IRF3205) is a power mosfet [13]. It functions as an actuator to the demobilization unit. Relay is the demobilizer in the system. Voltage regulation is achieved by the use of LM7805 [13]. The fig. 2 below gives clearer view of thesehardware. Figure 2: Complete circuit diagram. 20
  • 4. Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message… 2.2.1.2 Interfacing the microcontroller to coordinate the entire system. Port zero (P0) of the microcontroller is used for collecting DTMF converted data for programming analysis. Port three bit zero (P3.0) is used as DTMF valid tone signaling. Port zero bit zero (P0.0) and Port zero bit one (P0.1) respectively are used as input for doors sensor and boot sensor. Port two bit zero through Port two bit three (P2.0 – P2.3) are used as output pins for text message(feedback) control. Port two bit four (P2.4) of the microcontroller is used for controlling the alarming unit and finally the actuator which demobilizes the car is controlled through Port two bit five (P2.5). 2.2 Software Design The program was written in assembly language using the 8051 instruction set. The flowchart for the program is shown in Figure 3. Figure 3: Controlled Program Flowchart. III. PERFORMANCE EVALUATION ANDTESTING Various test was carried out before, during and after the construction has been completed. The multi-meter was extensively used for carrying out most of these tests. Each subunit was tested and confirmed efficient. After the construction of the entire system, the program was written and burned into the microcontroller chip. On interfacing it to the car, it tested ok as it performed the objective of the design. Satisfaction was gotten from the moment the system was activated and the car opened, the system automatically disconnected the ignition, sent a text message to a programmed recipient and then started up an alarm. The mission of the design was accomplished. The entire system has three inputs, which are: - the output of the DTMF decoder, the output from the phone ear piece jack and the sensors from the car doors and boot. The system outputs are the text message controller, alarming system and demobilization unit. The system is battery powered and was tapped from car battery and for this reason it made it easier for dc use. With these a system that sends text message to car owner is designed and implemented. IV. CONCLUSION It is always better to start every design with a good proposal, which will stand as a reference point to the work as it proceeds. The result of any design gives joy if aims and objectives are gotten. Since the project performed its proposal, it indeed satisfactory. Now from the input to the output of each stage was a success. The major input is like an interrupt and upon reception by microcontroller it goes through the iteration of demobilizing the car, sending text message and starting up an alarm. The design is thus a huge success. 21
  • 5. Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message… BIBLIOGRAPHY [1]. Muhammad Ali Mazidi and Janice GillispieMazadi (www.asadali.tk)” the 8051 microcontroller and embedded systems” ; Department of Computer Science and Information Engineering, National Cheng Kung University of Taiwan. [2]. Paul Horowtz and Winfield Hill (2002) The Art of Electronics, 2nd Edition, Cambridge University press. [3]. Ronald J. (Monroe Community College) and Neal S.Widmer (Purdue University) (2005) Digital Systems Principles and Application, 8th Edition, Prentice- Hall India. [4]. Robert R. (1998) Modern Control System,8th Edition, New York. [5]. Donal Heffernan (2002) 8051 Tutorial, University of Limerick. [6]. Theraja B. L. and Theraja A. K. (2003) A Text of Electrical Technology, 23 th Edition, Schand and Company Ltd. New Delhi. [7]. Mazidi M. (1987) 8051 Assembly Language Programming and Interfacing, Prentice Hall, USA. [8]. Hall F. and Lister P.F (1980), Microprocessor Fundamentals, Pitman, London. [9]. Horowitz P. and Hill W. (1989), The Art of Electronics, 2nd Edition, Cambridge University press. [10]. http//www.gogle/Ebedtroniccs. [11]. Muhammed Ali Mazidi (2nd edition) The 8051 Microcontroller and Embedded System Using Assembly and C [12]. Zarlink Semiconductor (1993) Application Note on MT8870 Integrated DTMF Receiver. [13]. Rashid R. (1998) Power Electronics, Circuit Device and Application, 2th Edition, Prentice hall. 22