Abstract The objective of this seminar is to propose a design which will enable users to remotely control their car security feature using a cell phone-based interface. To access the car, the user should send an authentication code along with the required/desired function/action to his/her control system via GSM. Upon being properly authenticated, the cell phone-based interface (control unit) would relay the commands to a microcontroller that would perform the required function/action e.g. enables or disables the vehicle par adventure it has been tampered with. To this end, this seminar is tagged “mobile phone based car security system”.
1
CHAPTER ONE INTRODUCTION The efficacy of our security system has been in question over the last few years owing to the wide spread global crime that has caused huge loses to man in generality. Despite all the efforts that have been expended to this bizarre situation little or no result has been realized. Security, as used in this context, describes measures that prevent or defer unsolicited intrusion from accessing a vehicle by disabling the ignition or gasoline supply with the use of mobile phone. Motor vehicle theft has been a problem since the start of the automobile age. The 1900 Leach automobile featured a removable steering wheel that the driver could carry away to prevent unauthorized vehicle use. More recently, sophisticated electronic alarms, some of which incorporate radio beacons, and more tamper-resistant wiring and electronic locks have been produced. Through the use of wireless technology, vehicles equipped with Global Positioning System (GPS) satellite navigation systems may be tracked and recovered when stolen. Automobiles as we know them today are the product of centuries of tinkering and innovation. Automobile production has grown from small companies making simple so-called horseless carriages to international corporations that mass-produce advanced, reliable automobiles for consumers. Automobile theft has become a $3 billion-a-year business, with over 1 million 2
cars stolen annually. In the past, most cars were stolen by joyriders and later abandoned; more than 90 percent of all stolen autos were recovered. Today, the typical thief works for a “chop shop,” which dismantles the car and sells the parts (these are much more valuable than the whole car itself); a much smaller proportion of automobiles are recovered. Some insurance companies are fighting losses from auto theft by giving premium credits for use of antitheft devices. Others now charge a substantial deductible in cases where the insured leaves the keys in the ignition or is otherwise negligent. In the 15th century, Italian inventor Leonardo da Vinci envisioned possibilities for power-driven vehicles. In this seminar a new concept is brought to the awareness of individuals; this scheme uses a technology called DTMF “Dual Tone Multi Frequency” in its signaling technique to control the action of vehicles against unauthorized user in other to dictate its action e.g. engage/disable the door, engage/disable the brain box or and a combination of different electrical action thus making its application a very vast and important one. The DTMF was originally developed to allow sending control information (dialed numbers) across the telephone network. The telephone network has a bandwidth of approx. 300 to 3400 Hz, suitable for voice communications. Any control tones would also need to be in this range and had to work regardless of whether voice was present or not. A single tone or frequency could have been used. However, if voice was present, it would interfere with the control tones, making them useless. To overcome this, a scheme was developed 3
whereby two tones or frequencies were combined to represent each control code or number. A total of seven tones were needed to represent the digits normally found on a telephone keypad, namely 0-9, * and #. An eighth tone was added so that some extra digits were available for use. These are commonly labeled ABCD. These eight tones were divided into two groups of four tones each, a low-frequency group and a high-frequency group.
Here a DTMF receiver chip, a CM8870 from California Micro Devices will be used for general signaling control. It will be responsible for all the processing described above.
4
Description The MT8870D/MT8870D-1 is a complete DTMF receiver integrating both the bandsplit filter and digital decoder functions. The filter section uses switched capacitor techniques for high and low group filters; the decoder uses digital counting techniques to detect and decode all 16 DTMF tone-pairs into a 4-bit code. External component count is minimized by on chip provision of a differential input amplifier, clock oscillator and latched three-state bus interface. Problem Statement The objective of this seminar is to develop a device that allows for a user to remotely control their vehicles electrical functions. This system will be a powerful and flexible tool that will offer this service at any time, and from anywhere with the constraints of the technologies being applied. Possible target appliances include (but are not limited to) climate control systems, security systems and anything with an electrical interface. The proposed approach for designing this system is to implement an “auto car lock using gsm” control module that receives its instructions and commands from a Mobile phone over the GSM network. The microcontroller then will carry out the issued commands. For security purposes, a means of identification and user authentication will be implemented, and will combine caller identification with a password authorization.
5
Operating Environment The control system will include two separate units: the mobile phone, and the control unit. There will therefore be two operating environments. The mobile phone will operate indoors and outdoors whereas the control unit will operate indoors because it resides in the vehicle.
Assumptions The following is a list of assumptions: The user and control unit will establish communication via GSM. All service charges from service provider apply. The controlled vehicle will have to have an electrical connection via its battery in order for it to be controlled by the controller.
6
CHAPTER TWO Review of related literature: A German scientist by name Heinrich Wilhelm Dove in 1826 developed a cell phone remote control system for home
appliance control but, its
limitation was that ability to control or operate more than two home appliance using the same communication network was not successful, but later a German technologist by name Alexander Graham Bell in 1875 went in to research to upgrade the effort of Heinrich Wilhelm Dove and came up with a result, using the same communication network to control more than two appliance. But most of the times a land line phone is being used. If a land line phone is used then a separate ring detector circuit is required for detecting the number of rings and then picking up the phone. It uses an extra relay and we have to enter inside the mechanism of phone. In this report I have used the auto answer facility which is present in many of the cell phones today, so I escaped from designing the ring detector circuit. The aim of the proposed system is to develop a cost effective solution that will provide controlling of vehicles remotely and to enable it against intrusion in the absence of owner. This system is highly feasible due to development of a low cost system. This control system with an affordable cost was thought to be built that should be able to provide seamless remote access via mobile
7
phones in other to automate the conventional key lock system thus allowing for a seamless security. In this system, I am going to develop a cellular phone based security system that will meet today’s need. Present and Future Scope: This product is aimed toward average consumers who wish to control their vehicle security outfit remotely from their mobile phones provided that it is electrically controllable. Example of feasible applications under consideration includes; enable/disable security systems, doors, ignition, steering, dash boards, and heating/ventilation/air conditioning system.
8
CHAPTER THREE System Specifications: 1. An authenticated user can control his/her vehicle from any remote place having mobile phone network. 4. The system requires two phones out of which the one present at the control unit has to be a mobile phone with auto answer facility. Block Diagram
9
BLOCK DIAGRAM DESCRIPTION Phone on the transmitting side: The person who wants to switch control his/her vehicle that is interfaced with the controller side calls from a phone and, once the call gets picked up, enters the password for the corresponding device. Every key has to be pressed for a minimum amount of time to get it encoded in the decoder IC.
Mobile phone on the receiving side: The mobile phone on the receiver side picks up the phone call automatically after 5seconds, and then makes the tones available to the DTMF tone decoder IC through the headphone jack of the phone.
DTMF Tone Decoder IC: The DTMF tone decoder IC converts the received tones to their respective binary values and then gives them as an input to the microcontroller. The DTMF tone decoder IC’s internal architecture consists of a band split filter section which separates the low and the high tone of the received tone pair, followed by a digital decode(counting) section which verifies both the frequency and duration of the received tones before passing resultant 4-bit code to the output bus. These 4-bits along with a bit which validates a 10
received tone are given as an input to the port of microcontroller. The Microcontroller: The five output bits of the decoder IC serve as an input to port of the microcontroller.
Then
each
tone
is
verified
by
the
programmed
microcontroller and once a correct sequence of code is received, output corresponding to the tones sent by the user is made available at the port, which is connected to the brain box of the vehicle for the proper action depicted by the user i.e. enable/disable security systems, doors, ignition, steering, dash boards, and heating/ventilation/air conditioning system. The output from the port of the microcontroller is given to the relay driver IC which drives the corresponding relay, to which the security connection is made. Once the relay is energized, the output is set the appropriate action that is needed.
IMPLEMENTATION OF SYSTEM System Algorithm: 1. Person who wants to lock his car calls on the phone at the receiver side which resides in the car. 2. The call gets answered automatically if it is not picked up manually before 5seconds.
11
3. Once the call gets answered the password is entered for authentication (in our case it is our four digit code). 4. If authenticated, the controller takes the right action i.e. locks the car.
Note: On the transmitter side the user controlling the security features of the car has to press each digit for a minimum duration of time, which is 40ms.
Performance and evaluation of the system 1. The receiver must reside in a location where a signal with sufficient strength can be received from a Mobile phone network. 2. The only person who can communicate with the control module is the person who will be successfully authenticated. 3. Only devices with electrical controlling input ports will be possible targets for control. 4. The receiver must have a power source attached at all times.
12
CHAPTER FOUR CONCLUTION AND RECOMMENDATION Conclusion Since is of paramount important to remotely control prevent our cars from unauthorized for security reasons. The distance is no longer a barrier to our remote control system this time, because of the introduction of communication network. The technology of remote control system has advanced in controlling security features of cars over a GSM communication network and is also flexible.
RECOMMENDATION I recommend the GSM remote control system for use in domestic and industrial terrain, to remotely control security conscious devices especially in the offices where delicate information’s can be easily leaked – hence the need for a security stronghold and also in the industries were no body Can move close to the machines and some moveable parts of the heavy machines. Because of the distance and communication network used in this seminar work, I recommend users of remote control system to go for GSM remote control system because it is more versatile.
13
References: 1. www.8051projects.net 2. www.edaboard.com 3. Mazidi-8051 microcontroller Dip trace Help Datasheets of the IC's 4. http://www.quasarelectronics.com/jpg/3 153_1.jpg 5. http://www.quasarelectronics.com/jpg/3 153_2.jpg 6. http://www.quasarelectronics.com/zip/dtmf.zip 7. http://www.myke.com/lcd.htm interfacing IC’s 8. Chenker, L., “Pushbutton Calling with a Two-Group Voice-Frequency Code” - The Bell system technical journal (IN 0005-8580) vol: 39iss:1 pp: 235255, 1960 9. “Microcontroller Technology: Atmel, at89s52”, prentice hall, 7th edition, page32, 2002 10. Coskun and H. Ardam, “A Remote Controller for Home and Office Appliances by Telephone”, IEEE Trans. Consumer Electron. , vol. 44, no. 4, pp1291- 1297, November 1998 11. Daldal Nihat, Microcontroller Based security and Control system” (In 14
Turkish), 12. M.C. Term Project, Gazi University, Ankara, 2003 13. E. Wong, “A Phone-Based Remote Controller for Home and Office Automation”, IEEE Trans. Consumer Electron. , vol. 40, no. 1, pp. 28-33, February
1995.
13. Relay Information, http://en.wikipedia.org/wiki/Relay
15