Advanced GSM-based car security system: analyzing similar projects and formulation of the task | Статья в журнале «Молодой ученый»

Отправьте статью сегодня! Журнал выйдет 2 ноября, печатный экземпляр отправим 6 ноября.

Опубликовать статью в журнале

Авторы: , ,

Рубрика: Информационные технологии

Опубликовано в Молодой учёный №2 (240) январь 2019 г.

Дата публикации: 11.01.2019

Статья просмотрена: 37 раз

Библиографическое описание:

Юлдашев, М. Ш. Advanced GSM-based car security system: analyzing similar projects and formulation of the task / М. Ш. Юлдашев, А. П. Хаитбаев, М. А. Артикбаев. — Текст : непосредственный // Молодой ученый. — 2019. — № 2 (240). — С. 9-12. — URL: https://moluch.ru/archive/240/55508/ (дата обращения: 19.10.2024).



In the era of technologies, cyber-attacks are becoming much prevalent. Thus, variable security systems have been proposing and revising in every sphere all around the world. This article`s aim is to analyze, compare three similar projects, detect the disadvantage sides of the best one and, eventually, formulate the main task. Analyzing and comparing the chosen projects will be done taking into account all aspects and features (time, the level of security, efficiency, compatibility, etc.) while looking for disadvantages is performed over the only one that will be considered as the best security system after analyzing and comparing all three projects. The final step is formulating task. It will be conclusion of this article and, this task will be formed in order to propose an optimum GSM-based vehicle security system which can cover the cons that will be detected in the best project.

Keywords: SMS, GSM, GPS, PIC, AVR, Microcontroller

Introduction

Nowadays, vehicle theft is key problem. A wide range of security systems have been designed. However, almost all systems have own cons regarding the level of security, used structure, working distance or cost. Researches usually solve some problems of earlier done projects with other disadvantages. In fact, there several real projects that are really hard to be found as un beneficial with respect to both software and hardware parts, but, the cost set for these type of systems is so high that not everyone can afford it. The three projects which will be analyzed and compared are Orven F. Mendoza “Microcontroller-based Vehicle Security System with tracking Capability using GSM and GPS technologies” (1st Project), Beulah PW Ruby, S. Abinashrajasingh, N. Ganeshprasad, Griffin EJ. “GSM Based Vehicle Theft Control System” (2nd Project), Arslan Haider, Aamer Anwer Hayat Khan, Mouloud Denai “A Smart Wireless Car Ignition System for Vehicle Security” (3rd Project). They all have at least one similar feature: utilizing a microcontroller. Microcontrollers are programmable and have input and output ports that make whole system complicated by adding different devices.

The remaining part of the article demonstrates comparing, analyzing of three stated above projects and revealing unbeneficial sides of the project that will be opted as the best among others. Analyzing and comparing processes will be executed taking into account several features: cost, time, productivity, the level of security and convenience. Disadvantages of the best project will be uncovered so as to craft an optimum GSM-based vehicle security system.

Comparing the chosen projects

The first project, Orven F. Mendoza “Microcontroller-based Vehicle Security System with tracking Capability using GSM and GPS technologies”, makes use of Global System for Mobile (GSM), the Global Positioning System (GPS) and PIC microcontroller. It also utilizes a vibration sensor to notify when movement is caught up. The system has the ability to track vehicles by sending coordinates of the location of the device attached. To control power switching, activate automatically key switch, engine and alarm, authorized person must follow strict SMS rule commands. The combined system has three specific buttons for registration additional cell numbers, button for vibration sensors and button for manual Enabling/Disabling the security system, as well [1].

The second chosen project, Beulah PW Ruby, S. Abinashrajasingh, N. Ganeshprasad, Griffin EJ. “GSM Based Vehicle Theft Control System”, also utilizes GSM, GPS modules and the same PIC microcontroller. However, it additionally takes advantage of keypad and display to switch on and switch off the vehicle. Once password is entered incorrectly, alarm SMS is sent to the owner and vehicle begins to be tracked by GSM module [2]. This security system requires strict SMS format too. But, it has not vibration sensors.

The third one, Arslan Haider, Aamer Anwer Hayat Khan, Mouloud Denai “A Smart Wireless Car Ignition System for Vehicle Security”, is simply differs from the other ones. The system is based on the technology using wireless transmissions to start engine. Car ignition wire is usually connected to the On-Board Diagnostics which works as “the brain” that controls all the functionalities of the cars. That means, thieves just hotwire the old cars and take the car away. To handle such trouble, this security system is proposed. It includes Arduino microcontroller, LCD keypad and Bluetooth module. Wireless connection is established between the switch and engine with the help of Bluetooth module. To start the car, authorized person must enter the password that is asked when the key in car`s switch is moved. In case, he or she fails to enter the correct password then car will be not started.

The first thing aspect that should be compared is the level of security. I can say that this aspect is stronger in the last project while other ones are equal with each other since no thieves are not able to control engine directly by hotwiring when the wireless ignition system exists. Taking into account multi-functionalities, the first project can be found as the best owing to its capability of tracking the location of the car, additional buttons to register more cell phones, vibration sensors compared to the remaining projects that have not many functionalities so far. With respect to microcontrollers used, PIC microcontrollers are very fast and easy to execute a program compared with other microcontrollers. PIC Microcontroller architecture is based on Harvard architecture. AVR (Arduino) is modified Harvard architecture 8-bit RISC single-chip microcontrollers. AVR was one of the first microcontroller families to use on-chip flash memory for program storage, as opposed to one-time programmable ROM, EPROM, or EEPROM used by other microcontrollers at the time [4]. However, the second one has two important featured combined: tracking the location and password features. Password is considered as handy and important in security issues while tracking can be first help if car is stolen. As regards the cost, the third project would be best choice; however, it is not as convenient as the other ones as that project ask authorized people to follow strict actions to start actions and it does benefit users by allowing remote controls. Below The table which compares the three similar projects is provided below (Table 1).

Table 1

Comparison of Projects

Level of security

Convenience

Multi-functionalities

Productivity

Cost

1st Project

Medium

High

High

High

High

2nd Project

Medium

Medium

Medium

High

Medium

3rd Project

High

Low

Low

High

Low

The description of the best project`s technology.

We opted for the 1st project, Orven F. Mendoza “Microcontroller-based Vehicle Security System with tracking Capability using GSM and GPS technologies”, as the best among three systems. It can be seen in the Table 1.1 that this system can overcome the others in terms of more features. As for its capability, it possesses several comfortable aspects like GPS tracking, remote turning on/off the engine, vibration sensors etc.

Authorized person must follow rude format when sending control SMS to the device. If he/she fails to do it then SMS will be neglected or no action by the device. Format of SMS must be four-character password then keyword by space: 1234 Sab1. 1234 is the four character password, Sab1 is the command keyword, in this case, “1” followed by “b” is set to switch ON the key switch. If it is S1, it means activation the vibration sensor. Modifying “1” to “0” means switching OFF what was turned ON. Built-in GPS module allows owner to be aware of the location of their vehicle. Longitude and Latitude coordinated values are provided as a part of SMS which means monitoring the location can actually be done through PC, Smart Phone or a personal device. Example: LAT:13.52.9088 LONG:120.54.5848. This follows the format of degrees’ minute. To get the location, the internet connection is required [4].

The formulation of the task

Besides many conveniences, that project has its own drawbacks. Firstly, strict SMS format is not always comfortable method of controlling the vehicle. One should be careful when writing SMS to manage his/her car, otherwise, it can lead to ignore the specific commands by the system. Secondly, to some extent, SMS notification might not drive a great attention of the owner due to other unimportant daily SMS ads which can lead to the stealing the vehicle. Thirdly, professional car thieves can easily deactivate the system by cutting off the wires in case a thieve is aware of the situation of the main device. There is no alarm notification when wires are cut away.

These drawbacks were analyzed and we intended to construct the new security system that solves mentioned above problems of the best project. First of all, in the new security system, using SMS format should be replaced by user-friendly mobile application which can generate SMS to send data to control the vehicle, meanwhile, will get SMS from device and notify the owner with other sounds that can drive more attention. Moreover, the new system should notify the owner when wires of the device are cut down. Furthermore, the whole system should be upgraded with more sensitive vibration sensors that can differ a human from animal or from other sources. It would raise the quality of the security system much more.

Conclusion

To conclude, all three chosen projects have been analyzed and compared according to their capability taking into account all points. After comparison, we decided to choose the first project as the best among the others because of its several advantages. During analyzing process, we have detected main drawbacks of the best one and based on these cons, the new security system was intended to be designed and created. The primary target of the new security system is to solve problems faced by the first project and propose optimum project.

References:

  1. Orven F. Mendoza “Microcontroller-based Vehicle Security System with tracking Capability using GSM and GPS technologies”: Asia Pacific Journal of Multidisciplinary Research, Vol. 5, No. 2, May 2017.
  2. Beulah PW Ruby, S. Abinashrajasingh, N. Ganeshprasad, Griffin EJ. “GSM Based Vehicle Theft Control System”: International Journal of Science, Engineering and Technology Research (IJSETR) Volume 7, Issue 4, April 2018, ISSN: 2278 -7798.
  3. Arslan Haider, Aamer Anwer Hayat Khan, Mouloud Denai “A Smart Wireless Car Ignition System for Vehicle Security”: Adv Automob Eng 6: 169. doi: 10.4172/2167- 7670.1000169.
  4. https://www.quora.com/What-is-the-difference-between-arduino-and-pic
Основные термины (генерируются автоматически): SMS, GSM, GPS, PIC, AVR, EEPROM, EPROM, IJSETR, ISSN, LCD.


Ключевые слова

AVR, GPS, SMS, GSM, PIC, Microcontroller

Похожие статьи

Logo detection in images with a complex background using the contour information of images

Text detection has gotten a great attention as highly active application-oriented research area in computer vision, artificial intelligence, and image processing. In this article, we implement the algorithm for text logo detection in images with a c...

The mode of integration methods for improving accurate delivery

The methodology is a complex integrated logical and rational order of the business performance that reduces complication and disruption. It represents only the details necessary it should be included. The methodology is successfully widely used to re...

Blockchain technology for through-life asset management in the aviation/space/automobile industry

The article examines Crypto Labels Reader for blockchain technology is poised as the future of digital transactions, infusing trust, efficiency and transparency into supply chains. But blockchains alone cannot ensure the authenticity of physical good...

The effectiveness of mnemonics as a teaching aid for beginner learners’

Mnemonics is generally thought to be a system of various strategies and tactics that can help memorize a lot of information by creating connections and mental pictures. Mnemonics is a collection of strategies that improve memory function and facilita...

Framework for classification of information

The purpose of classification is to divide the items into collections. Consequently, in order to classify a collection of objects, the first step is to define the purpose of this classification, then necessary to highlight the characteristics of grea...

Using effective techniques to enrich students’ productive skills in English classrooms

This paper sheds light on the importance of speaking skills in English classrooms. First of all, this paper discloses the significance of the basic language skills of English. Later, this paper also explains the importance of speaking skills in Engli...

Energy efficiency in architecture

When you consider the global population is set to increase by another 2 billion by 2050 and with 70 % of the world’s population living in cities, there will an unprecedented demand for energy across the planet. The opportunity for architects and stak...

Overview of operating procedures for reducing the risks of the managed pressure drilling method

The article presents a brief description of the controlled pressure method, which is one of the effective approaches for drilling wells in a narrow range of drilling fluid densities. This method has been successfully applied to the exploration and de...

Use of electronic learning in vocational education institutions

Today, in the course of training, along with traditional printed publications, electronic learning are widely used, which are used both for distance education and for independent work in full-time and distance learning. Electronic learning act as tea...

The factors influencing mobile instant messenger (MIM) usage intention

At the present time mobile applications are penetrating current market in a large scale. Having a lot of advantages today they are, to say, one of the life’s modern conveniences, so-called “must have” things in our daily routine. The main purpose of...

Похожие статьи

Logo detection in images with a complex background using the contour information of images

Text detection has gotten a great attention as highly active application-oriented research area in computer vision, artificial intelligence, and image processing. In this article, we implement the algorithm for text logo detection in images with a c...

The mode of integration methods for improving accurate delivery

The methodology is a complex integrated logical and rational order of the business performance that reduces complication and disruption. It represents only the details necessary it should be included. The methodology is successfully widely used to re...

Blockchain technology for through-life asset management in the aviation/space/automobile industry

The article examines Crypto Labels Reader for blockchain technology is poised as the future of digital transactions, infusing trust, efficiency and transparency into supply chains. But blockchains alone cannot ensure the authenticity of physical good...

The effectiveness of mnemonics as a teaching aid for beginner learners’

Mnemonics is generally thought to be a system of various strategies and tactics that can help memorize a lot of information by creating connections and mental pictures. Mnemonics is a collection of strategies that improve memory function and facilita...

Framework for classification of information

The purpose of classification is to divide the items into collections. Consequently, in order to classify a collection of objects, the first step is to define the purpose of this classification, then necessary to highlight the characteristics of grea...

Using effective techniques to enrich students’ productive skills in English classrooms

This paper sheds light on the importance of speaking skills in English classrooms. First of all, this paper discloses the significance of the basic language skills of English. Later, this paper also explains the importance of speaking skills in Engli...

Energy efficiency in architecture

When you consider the global population is set to increase by another 2 billion by 2050 and with 70 % of the world’s population living in cities, there will an unprecedented demand for energy across the planet. The opportunity for architects and stak...

Overview of operating procedures for reducing the risks of the managed pressure drilling method

The article presents a brief description of the controlled pressure method, which is one of the effective approaches for drilling wells in a narrow range of drilling fluid densities. This method has been successfully applied to the exploration and de...

Use of electronic learning in vocational education institutions

Today, in the course of training, along with traditional printed publications, electronic learning are widely used, which are used both for distance education and for independent work in full-time and distance learning. Electronic learning act as tea...

The factors influencing mobile instant messenger (MIM) usage intention

At the present time mobile applications are penetrating current market in a large scale. Having a lot of advantages today they are, to say, one of the life’s modern conveniences, so-called “must have” things in our daily routine. The main purpose of...

Задать вопрос