18

Click here to load reader

Introduction

  • Upload
    syeda

  • View
    10

  • Download
    2

Embed Size (px)

DESCRIPTION

Autoguard mechanism using RFID

Citation preview

Page 1: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 1

CHAPTER 1

INTRODUCTION

With the rapid development of national economy, automobiles have increased greatly as the

human's important vehicles. In today’s world owing a car is not a big deal but safeguarding

the owned car has become a great deal. Even though the modern automobiles are

heterogeneously combined by the combination of latest digital components it had also created

the opportunity for new attacks. However, it is the development of modern technology that

makes the commit means of crimes become smarter and the automobiles stolen events more

frequent.

Several security and tracking systems are designed to assist corporations with large

number of vehicles and several usage purposes. A fleet management system can minimize the

cost and effort of employees to finish road assignments within a minimal time. Besides,

assignments can be scheduled in advanced based on current vehicles location. Therefore,

central fleet management is essential to large enterprises to meet the varying requirements of

customers and to improve the productivity. However, there are still some security gaps where

these technologies don’t prevent a vehicle from theft, don’t assist to recover it and don’t

allow the users to know the status of their vehicles. They can’t permit the owner to

communicate with the vehicle online, even if the owner is certain that the vehicle was stolen.

Compounding this issue, in order to resolve the attack over the automotives many

security systems such as car alarm, radar communication system and immobilizer perceptions

are in existence. The current prevailing security system has certain disadvantages by itself.

Hence it has become evident to develop a security system to make an identity and monitor the

security of an automotive.

Electronics anti-theft is the most widely used among all the appliances at the moment.

But the chip one and the network one are the developing directions of the auto-guard

technology.

Radio Frequency Identification (RFID) technology is a method of identifying unique

items using radio waves that communicates between RFID tags and readers without Line-of-

sight readability. Radio frequency identification (RFID) is a rapidly growing technology that

Page 2: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 2

has the potential to make great economic impacts on many industries. While RFID is a

relatively old technology, more recent advancements in chip manufacturing technology are

making RFID practical for new applications and settings. RFID (Radio Frequency

Identification) technology which is passive, contactless, secure and convenient identifies

objectives automatically and gets the data through the radio frequency signals. It meets the

need of the intellectualized guarding perfectly.

GSM (Global System for Mobile communications) is the technology that underpins

most of the world's mobile phone networks. The GSM platform is a hugely successful

wireless technology and an unprecedented story of global achievement and cooperation.

GSM has become the world's fastest growing communications technology of all time and the

leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular

technology used for transmitting mobile voice and data services. GSM operates in the

900MHz and 1.8GHz bands GSM supports data transfer speeds of up to 9.6 kbps, allowing

the transmission of basic data services such as SMS.

1.1 System principle of design of auto-guard system based on RFID and

network

Figure 1.1 Auto-guard system based on RFID and network

The system mainly includes three parts controller, RFID and mobile communication, as

shown in figure1.1.

Page 3: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 3

Controller

The core of this system is microcontroller which includes monitoring circuit (checking the

state), matrix keyboard, actuator, sound-light alarm devices (loudspeaker and car light),CAN

communication and power management. This system will send sound-light alarm as soon as

the damage is checked by the sensor to warn the thieves and send the information to ECU

(Electronic Control Unit).In that case, ECU can control the delay to cut off the electric circuit

and oil circuit. In the meanwhile, the ECU also sends message to hosts for help. So it is

convenient to control the auto for hosts. And users can also select the priority of auto control

casually, such as MCU, ECU or hosts.

RFID

RFID system consists of three parts. They are antenna, tag and reader. The principle of RFID

system is that the reader puts the signals to be sent into a carrier signal with a certain

frequency after encoding. And then the signals will be sent out by antenna. When the pulse

signals are received by tag which works within the scope of the reader, the circuit in the chip

will do some work like modulating, decrypting and decoding. And then it will distinguish

between the command request, passwords or permission. If it is the read command, the

control logical circuit will get the message from the memory.

After encrypting, encoding and modulating, the message will be sent to reader by the

antenna in the chip. And then after demodulating, decoding and decrypting, the reader is

going to send the message out to the center of message system to manipulate data. If it is the

write command of message modification, the inner charge pump originated by control logical

circuit will pull the working voltage up, so that the content in the E2PROM will be modified.

Only when the key with right identification code is inserted into ignition switch, the

auto can start up in a right way. When the ignition switch is turned off, the reader will send

a13.56MHz charge pulse out to the tag. It will charge the capacitor as soon as the pulses are

received. So the responder is able to give a specific code to reader. As a result, the signals are

transmitted between the antenna of reader and the antenna of tag. The control part of the

reader will encode signals and compare them with the codes in microcomputer. If they are in

the same, the control process of engine and ignition switch will start up immediately by the

control part. As soon as there is one bit different from each other, the system will send the

alarm information out.

Page 4: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 4

Mobile communication

GSM is a module with isolated operation system, RF process, baseband process and the

function module providing standard interfaces which integrated RF chips of GSM, baseband

chips, memory and amplifier on the same circuit board. Designers make the microcomputer

communicate with GSM module by RS232 serial port and also use the standard AT

instructions to control GSM module to realize all kinds of communication, for example,

sending message and making telephone and GPRS dial internet. But the function of sending

message is usually adopted to realize the long-range control just because of the low cost and

well real-time.

Page 5: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 5

CHAPTER 2

LITERATURE SURVEY

Security systems nowadays have become a need for vehicles available with many modern

features. This includes car security system with extra access and intelligent alarming. This

system will be accessed and configured by owner using bluetooth module communication via

mobile phone to turn in on or off. The system suggests that GSM based security system are

more stout than an ordinary security system. Due to the insecure environment the ratio of the

vehicle theft increases rapidly. Because of this the manufactures of the automotive are taking

some serious steps for the protection of their valuable vehicles which includes activating

alarms, steering wheel lock systems. They ensure authorization for the owners and also

inbuilt these anti-theft system to prevent car from theft.

2.1 Alarm system

If a user wants to think about a car alarm in its simplest form, it is nothing but one or more

sensors connected to some sort of siren. The very simplest alarm would have a switch on the

driver's door, and it would be wired so that if someone opened the door the siren would start

wailing. User could implement this car alarm with a switch, a couple of pieces of wire and a

siren. The ordinary systems are simply based on the concept of sensors. They sound an alarm

on detecting movement. Alarm system notifies people when the theft occurs. If someone

attempts to steal a vehicle, audio equipment, other automotive equipment or personal

belongings in a vehicle, the system detects this attempt and issues an alarm to avert it. This

system of technology has now lost its appeal as it became a common sighting in meteors

where these alarms go of unnecessarily.

Most modern car alarm systems are much more sophisticated than this. They consist

of an array of sensors that can include switches, pressure sensors and motion detectors. A

siren often is able to create a variety of sounds so that user can pick a distinct sound for the

car. A radio receiver allows wireless control from a key fob. An auxiliary battery is also

provided so that the alarm can operate even if the main battery gets disconnected. A computer

control unit monitors everything and also sounds the alarm. It also known as the "brain" of

the system.

Page 6: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 6

Figure 2.1 Car alarm system

2.2 Immobilizer system

To prevent the theft of a vehicle itself, an immobilizer system disables engine startup or

prevents its being moved. The system immobilizes the system either electronically by

restricting the operation of electric automotive equipment or mechanically by locking the

steering wheels, pedals, or gearshift lever.

Figure 2.2 Immobilizer system

The system shown in figure2.2 is activated when the ignition key is removed. Every

time there is an attempt to start the car, the system transmits a new code. Only when the ECU

Page 7: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 7

authorizes this code, the immobilizer deactivates and the engine can be started. In order for

the computer to start, all immobilizer components must be coordinated and encoded with the

same code. New encryption technology protects the system from duplications of electronic

keys However; no system can provide 100% protection from theft.

2.3 Intelligent anti-theft and tracking system for automobiles

As shown in figure2.3, when the car starts running, the client receives a confirmation SMS

that it is running now. If this is illegal operation or any intruders try to run the car, the owner

can send SMS to switch off the car. Afterwards, the system will check the mobile number for

received message, to confirm that the phone number could access the security system; if the

phone number is legal the system will turn off the car. If the owner needs to track the vehicle,

the owner will have to send SMS containing special code, after that the owner will receive an

SMS containing the GPS coordinates of the car, the SMS updating its content every

predetermined period. Also the car owner can connect another GSM modem with laptop to

track the vehicle immediately using Google Earth.

Figure 2.3 Intelligent anti-theft and tracking system for automobiles

Page 8: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 8

2.4 Design of auto-guard system based on RFID and network

In order to overcome the disadvantages of the techniques applied above a new system

involving advantages of keyless entry and keyless startup was developed. The system

provides a satisfactory performance and meets the anti-theft demands of people. The system

not only makes it impossible for anybody to start the car, let alone moving with it.

Page 9: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 9

CHAPTER 3

DESIGN METHODOLOGY

3.1 Proposed method

Antitheft security system using AT instructions utilizes a system design with GSM to monitor

and safeguard a car. It secures the car against theft. Upon activation, it automatically

demobilizes the car by disconnecting the ignition key supply from the car battery. This now

makes it impossible for anybody to start the car, let alone moving with it.

3.2 Goal

The main intention of this system is to reduce the theft rate of the car and meet the

Intellectualized auto-guard demand of people.

3.3 Hardware design

Control circuit

The STM8AF51AA made in ST Company is selected as the microcontroller. It is an 8-bit

chip which is very reliable, highly robust and with low cost. And it is designed for

automobile especially. Inside of the chips are E2PROM with real data and varieties of

communication interfaces, such as CAN2.0B, USARTL, INUART LIN2.1, SPI and I2C. Its

operation speed reaches 10 MIPS (16 MHz).

The monitoring circuit is made up of infrared sensors, which is finished product

component in the type of CS9803GP and vibration sensors, CHT-ZD01. The relay is chosen

as the actuator. The PCA82C250 is adopted as the drive interface of CAN bus. The LM7805

and ASM1117 are the power transfer modules. Since three kinds of voltage are needed, 12V,

5V and 3.3V, the system pulls the voltage down to 5V by the regulator LM7805 and then

pulls it down to3.3V through ASM1117 to supply MF RC522.The MAX708 is selected as the

power management chip. When the power is down, it will save the message with the previous

state into E2PROM immediately, so that it is convenient to read when the power is on.

Moreover, when the power voltage becomes low, it produces a reset pulse to avoid program

flying.

Page 10: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 10

RF interface circuit

Mifare card of NXP Company is the general trend of the market recently. MF RC522 is a

read–write based chip with low power consumption and contactless character which is

applied for “three instruments” especially. It is a highly integrated reader for contactless

communication and protocol at 13.56MHz.It supports all the levels of ISO14443A and three

kinds of interfaces, the SPI, I2C and serial UART. It can communicate with any MCU and

associate with PC directly in the way of RS232 and RS485. In that case, it makes terminal

design more flexible than ever. Due to the MF RC522 supporting a variety of digital

interfaces, the connection of external pins can be checked at the moment of reset. MF RC522

requires two extra pins I2Cand EA to connect with low level and high level, besides the four

universal SPI signal wires (clock wire SCK, input data wire MOSI, output data wire MISO

and strobe wire NSS). The two pins won’t take part in the transmission of SPI bus, but only

set the digital interface of MF RC522 in SPI way. In addition, CS signal keeps low level

when the data flow in; otherwise it will be at high level.

GSM interface circuit

In this system, the GSM 900/1800 MHz network double band module made in Simcom

Company is selected as GSM module. This module is able to analyze baud rate automatically

and improve the performance of electronic public service. This module with energy save

function, embedded TCP/IP and transparent mode belongs to the series of GPRS in three

frequencies (900/1800/1900).The peripheral circuit of SIM300DZ mainly consists of the

communication interfaces of SIM cassette and module, such as SIM-CLK and SIM I/O,

which are the communication wires of module clock and data, SIM-RST and VCC, which are

the reset and the power supply. What’s more, the RXD and TXD are included in the

peripheral circuit of SIM300DZ which are connected with the serial port of MCU.

It is the AT instructions that transported between the MCU and GSM through the very

two channels. In addition, the GSM module includes voice system channel and MIC channel.

These channels are switched by MCU because of the AT instructions which are mainly

applied to the switching between the voice and microphone in the monitor system. When the

user communicates with the phone equipped in the car, if the button is pressed, it will

produce DTMF signal which is sent out to the multi Frequency decode chip to analyze and

produce Q signal through IN+ and IN-.At this moment, the MCU decides how to operate

according to the Q signal.

Page 11: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 11

3.4 Software design

The process of main program

This module is the core of the system including the calling and setting of initialized function

of related equipment. In addition, in its main function, the related function of other modules

can be called to complete the program. The basic idea is using the way of polling. A small

loop of every function module can be called in a big loop. And the watchdog is set in each

key position in case of the system’s crash. Main process is shown in Figure.3.1.

Figure 3.1 Flowchart of main program

Page 12: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 12

Personal identification process

Firstly, MF RC522 will be initialized by STM8AF51AA. After setting the registers, MF

RC522 can receive the commands of MCU and implement the operation to achieve the

communication with Mifare card. So the appropriate operation will be done by Mifare card

according to the commands received. However, the IC card is accessed by STM8AF51AA

not only through several simple codes but also a series of operation. They mainly includes:

(1) asking for making up; (2) preventing overlap (preventing the data error caused by

overlapping); (3) selecting card; (4) password identification; (5) read-write. These procedures

of Mifare card must be done in a certain order by STM8AF51AA.When there is Mifare card

into the available range of the antenna, the reading program will perform the operations

above to read the unique 64 bit ID from the card and compare it to the one in E2PROM to

identify the user.

GSM operation process

In this issue, GSM part is the most important and difficult point. When a new message to the

SIM is detected by serial port, it will be activated. The flow chart of the task is shown in

Figure3.2. First, the PDU of message will be read by a special array and command will be

sent out to module. So the message which in the SIM card’s memory will be sent out in the

form of OK. It is convenient to read PDU in the way of looking for by pointer. Second, the

telephone number of sender and password and content of UD will be picked up from PDU.

So the operation type will be chosen according to the key words, such as “password setting”,

“user number”, “oil and power supply” and “oil and power stop”. The PDU (Protocol Data

Unit) codes of these key words are saved in a fixed array and will be compared with the

received codes by “strncmp” function to get the appropriate operation type.

Page 13: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 13

Figure 3.2 Flow chart of GSM operation

Page 14: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 14

CHAPTER 4

ADVANTAGES, DISADVANTAGES AND

APPLICATIONS

4.1 Advantages

1. The key of the automobile is a RFID card which is contactless, secure and convenient.

2. The microcontroller for vehicle was adopted, which enhanced the reliability and the

capability of antiinterference.

3. It is a low-cost vehicle tracking and monitoring system.

4. It is easy to extend functions and also if the function of position tracking is needed,

the GPS.

5. If the Internet of Things is to be entered, user only needs to rewrite the software

design.

4.2 Disadvantages

1. The use of RFID can cause interference; overloaded reading (fail to read), increase

cost and also some materials may create signal problem.

2. Theft cannot be avoided fully due to few disadvantages in the components used.

3. The RFID card must be carefully kept.

4.3 Applications

1. Preventing theft of automobiles.

2. Many more auto-guards with additional features such as GPS, embedded systems and

computer control were used solely for the anti-theft system in cars for maintaining the

safety of cars from evasion.

3. The software design of the auto-guard system can be implemented using LABVIEW.

4. Auto Guard Anti-Theft is implemented in all Cadillac, Chevrolet, GM and Ford cars.

Page 15: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 15

CHAPTER 5

CONCLUSION AND FUTURE ENHANCEMENT

5.1 Conclusion

The auto-guard system combines the advantages of RFID and GSM together. The key of the

automobile is a RFID card which is contactless, security and convenient. The long-range

monitor and grading responses could be realized by the mobile phones of users, which made

the alarm cover a broad rage. The microcontroller for vehicle was adopted, which enhanced

the reliability and the capability of antiinterference.

The advantages mentioned above meet the requirements of auto-guard system, so that

a better effect was made in practice. In addition, it is easy to extend functions. If the function

of position tracking is needed, the GPS module can be added. If the Internet of Things is to be

entered, user only needs to rewrite the software. As a result, the radio technology at present

can be replaced completely. So the practical value and the market prospect are considerable.

5.2 Future enhancement

Vehicle theft alarm and tracking the location using RFID and GPS

GPS is the most important technology for tracking the location of the vehicle. By using this,

user can easily identify the location in which it is available. Security is the most important

thing that everyone is expecting in their basic needs which is to be fulfilled. To achieve that,

vehicle theft alarm and tracking the location using GPS and RFID is implemented. In this

technique, both security and tracking the vehicle is done. ATMEGA 162v is the low-power

CMOS 8-bit microcontroller based on the AVR enhanced RISC architecture. The chip is

ATMEGA162V and the network one is the developing directions of the auto-guard

technology. A buzzer is used to indicate the vehicle and give the alert to the authenticated

user. GSM is used for mobile communication and also for the alert message. Today GPS

fitted cars, ambulances, fleets and police vehicles.

Page 16: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 16

Figure 5.1 GPS based vehicle tracking system

Brahmastra solution

GPS cannot penetrate forest cover, parking garages or other obstructions. It relays on a short

visible antenna that can be easily broken by a thief. The operations are similar to that of a

GSM or GPS based system with a difference that the SMS is sent to the single board

computer. The single board computer gives the appropriate command to the master ECU

which disables the mechanical parts. Impact sensors are also incorporated to ensure if there is

a break into the car by breaking a glass the siren shall go off and cause an electric shock to

the thief by programming the sensor with PIC microcontroller, when this happens the thief

shall flee out of the car. With areas of less coverage the satellite technology shall come into

effect which shall in turn help with above tasks. The main advantage is that it can be afforded

by the general public and could also be added with additional features as required by the

customer.

Multilevel security system for automotives using RFID and biometric techniques in Lab

VIEW

The system aims at securing the automotive using the technologies like Radio Frequency

Identification (RFID) technology, thumb registration system and face recognition which is

efficient by nature. Initially the RFID system gets authenticated. The proposed system

possesses three modes of operations namely training mode, automatic mode and the manual

Page 17: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 17

mode. The importance of this system is that it gets its verification from the Road

Transportation Office (RTO).This authentication leads to the thumb registration module by

which the efficiency of the thumb is enhanced using Pattern Matching Algorithm (PMA).

Face recognition system is used after the thumb registration. Then the system allows the user

to drive the car. For emergency, a key insertion slot will be placed in the system with the help

of which the user can insert the key. During this emergency mode of operation the camera

captures the driver’s image and sends it to the owner’s mobile as Multimedia Messaging

Service (MMS). The owner provides the password then the system allows the user to drive

the vehicle. Global Positioning System (GPS) module is also kept inbuilt for tracking

purpose. The software testing in this system is done using Lab VIEW. The timing and

efficiency will be analyzed for both hardware and software based on which the

implementation will be done in future.

Figure 5.2 Multilevel security system for automotives using RFID and biometric techniques in

LabVIEW

Page 18: Introduction

Design of auto-guard system based on RFID and network

Dept. of TE, GSSSIETW, Mysore Page 18

REFERENCES

Journals

[1] HuaqunGuo,ChengH.S.,Wu Y.D.,AngJ.J.,TaoF.,etal.,“An automotive security system

for anti-theft,” Proceedings of the Eighth International Conference on Digital Object

Identifier,pp.421-426, Mar. 2009.

[2] Hui Song,Sencun Zhu,Guohong Cao,“SVATS:a sensor-network-based vehicle anti-

theft system,” Proceedings of The 27th Conference on Computer

Communications,pp.2128-2136,May,2008.

[3] Yang Wang,Xian-Jun Gao,ZhangGang,“A study on Mn coding for guarding against

theft and remote control device of an automobile,” Proceedings of International

Conference on Vehicle Electronics,pp.294- 297,1999.

[4] KhanguraK.S.,Middleton N.V.,OllivierM.M.,“Vehicle anti-theft system uses radio

frequency identification,”Proceedings of IEE Colloquium on Vehicle Security

Systems,pp.1-7,Oct. 1993.

[5] Hirano M.,Takeuchi M.,TomodaT.,Nakano K.-I.,“Keyless entry system with radio

card transponder [automobiles],”Proceedings of IEEE Transactions on Industrial

Electronics,vol.35,no.2,pp.208-216, May 1988.

[6] Wan Lili,ChenTiejun,“Automobile anti-theft system design based on

GSM,”Proceedings of International Conference on Advanced Computer

Control,pp.551-554,Jan. 2009.

[7] Jayendra G.,Kumarawadu S.,Meegahapola L.,“RFID-based anti-theft auto security

system with an immobilizer,” Proceedings of International Conference on Industrial

and Information Systems,pp.441-446, Aug. 2007.

[8] GuoHongzhi,ChenHong,JiGuohuang,ZhouXin,“The vehicle passive keyless entry

system based on RFID,”Proceedings of the 7th World Congress on Intelligent

Control and Automation,pp.8612-8617,Jun. 2008.