An Embedded Interface ffor GSM Based Car Security System Vivek Kumar Sehgal1* 1 Department of CSE&IT Jaypee University of Information Technology Waknaghat, Solan, HP (INDIA) e-mail: vivekseh@ieee.org, vivekseh@acm.org Mudit Singhal2, Bhart Mangla3, Sudeep Singh4, and Shivangi Kulshrestha5 2,3 Department of CSE&IT, 4,5Department of ECE, Jaypee University of Information Technology Waknaghat, Solan, HP (INDIA) 2,3,4,5 Abstract— GSM based security system are much more stout then an ordinary security system The ordinary systems are simply based on the concept of sensors They sound an alarm on detecting movement This system of technology has now lost its appeal as it has become a common sighting in metros where these alarms go off unnecessarily Wee proposed a new system with GSM techniques and a better decision making process is built to make our vehicle more secure It is a unique wireless home/car security device thatt gives instant alerts on your mobile phone the moment a security breach is detected It is designed to alert you wirelessly through a call as soon as your burglar alarm system intercepts an intrusion This paper proposed an bit embedded controller inter interfaced with GSM model The control mechanism is based on DTMF tones generated by mobile phone when the number keys are pressed Keywords- GSM; Microcontroller; Intelligent Car Security I Embedded Algorithm; INTRODUCTION taining to security One can look for several products pertaining systems India Big corporate giants and many renowned companies have launched quality security products to safeguard homes and precious belongings One can find burglar alarm, fire alarm, home security kits, new age doors and windows, security ecurity cameras, motion detectors, personal safety products, wire and wireless security products and other such products [4] These products are available in low end as well as high end range Depending upon one’s budget, he or she can go for the required security system suitable to the place to be secured[6][7] One can also find numerous security experts who provide customized suggestions for home security A car alarm is an electronic device installed in a vehicle in an attempt to discourage theft of the vehicle itself, its contents, or both [5][9] Car alarms work by emitting high-volume sound (usually a siren, klaxon, prerecorded verbal warning, the vehicle's own horn, or a combination thereof) when the conditions necessary for triggering are met, as well ell as by flashing some of the vehicle's lights, and (optionally) notifying the car's owner via a paging system and interrupting various electrical circuits necessary for the car to start [8] Car alarms should not be confused with immobilizers; although the he purpose of both may be to deter car theft, they operate in a dissimilar fashion An immobilizer generally Fig DTMF Frequencies will not offer any audible or visual theft deterrence, nor require any additional input from the driver than the driver of a non-immobilizer car Car alarms can be divided into two categories: in to the vehicle at the factory) 1) OEM (built-in 2) Aftermarket (installed at any time after the car has been built, such as by the new car dealer, an auto accessories store, or the vehicle's owner) Alarms come with a mix of features Remote car alarms typically consist of an additional radio receiver that allows the owner to wirelessly relessly control the alarm from a key fob Remote car alarms typically come equipped with an array of sensors along with immobilizers and motion detectors [2] Yet another class of security covers aftermarket car alarms that include 2-way way paging controllers controller Some 2-way systems have an LCD icon display that can pinpoint the actual part of the vehicle being threatened, and many alert the user with beeps or silent vibration [1] How to synergize the latest technologies with our system? lowing technologies in our We have included the following system as shown in Fig.2: DTMF: Dual Tone Multiple Access (Fig.1) Microcontroller Programming language GSM unit Fig Block Diagram of GSM Based Car Security System The organization of the paper is as follows: In section 2, we discuss the proposed design that also presents module description for our proposed system Detailed circuit analysis description is provided for each block used in this section In section 3, we present the software implementation along with algorithm and flow diagram In section 4, PCB designing, actual circuit implementation on PCB and simulated schematic are shown Finally, some conclusions are offered in section II D Opto-Isolator There are many situations where signals and data need to be transferred from one subsystem to another within a piece of electronics equipment, or from one piece of equipment to another, without making a direct ‘ohmic’ electrical connection Often this is because the source and destination are (or may be at times) at very different voltage levels, like a microprocessor essor which is operating from 5V DC but being used to control a triac which is switching 240V AC In such situations the link between the two must be an isolated one, to protect the microprocessor/microcontroller from over voltage damage These use a beam of light to transmit the signals or data across an electrical barrier, and achieve excellent isolation Optocoupler typically come in a small 66 pin or 8-pin pin IC package, but are essentially a combination of two distinct devices: an optical transmitter, typically typi a gallium arsenide LED (light-emitting emitting diode) and an optical receiver such as a phototransistor or light-triggered light diac The two are separated by a transparent barrier which blocks any electrical current flow between the two, but does allow the passage of light as shown in Fig PROPOSED WORK The microcontroller AT89s52 is the brain of the car security system The signal from the car is constantly being sent to the controller which is being sensed If there is any intrusion or any breakage then the signal breaks and then no signal is coming to the controller As soon as the signal stops the controller send a signal to the opto-isolator isolator which is attached to the cell phone which makes a call to other cell phone whose number is stored in the emergency dialing of the phone The LM7805 converts the 9V V supply to the 5V so as to drive the controller The opto-isolator isolator protects the circuit from any sudden high voltage which could damage the circuit The opto-isolator isolator itself blows out and thus saves the remaining circuit The following components are used in the proposed circuit A Door Switch on switch When someone tries to Door Switch is push-to-on open the door, it signals the controller B Car Battery Provides the battery voltage of 12V to the circuit circuit C µC AT89s52 power, high performance CMOS 8-bit The AT89s52 is a low-power, microcontroller with 4K bytes of In-System System Programmable (ISP) Flash memory It is compatible with the industry industrystandard 80c52 instruction set and pinout The on on-chip Flash allows the program memory to be reprogrammed in in-system or by a conventional al nonvolatile memory programmer It can be both serially and parallely programmed It is cost costeffective (may cost just Rs.55) Fig Internal Circuit of OptoOpto Isolator III SOFTWARE IMPLEMENTATION The software platform used for the programming of the microcontroller 89s51 of the 8051 family is KEIL With this software, assembly language programming can be actualized A Microcontroller Operation The Before programming the AT89C52, the address, data, and control signals should be set up according to the “Flash Programming Modes [3].” ].” To program the AT89C52,take the following steps: 1) Input the desired memory location on the address lines 2) Input the appropriate data byte on the data lines 3) Activate the correct combination of control signals 4) Raise EA/VPP to 12V 5) Pulse ALE/PROG once to program a byte in the Flash array or the lock bits The byte write cycle is selftimed and typically takes no more than 50 µs Repeat steps through 5, changing the address and data for the entire array or until the end of the object file is reached Programming is done on Keil software Various steps to program 8051: 1) 2) 3) Write the code in a notepad file *.hex file is generated using Keil software software(Fig.4) *.hex file is burnt into the micro controller using burner(Fig 5) VSG4: JB P1.3,VSG5 JMP CALLING VSG5: JMP VSG CALLING: SETB P2.0 CALL DELAY CALL DELAY CLR P0.0 CALL DELAY SETB P0.0 CALL DELAY CLR P0.0 CALL DELAY SETB P0.0 CALL DELAY Fig.4 Conversion of assembly language into HEX file XXX1: DJNZ R0,XXX JMP XX XXX: CALL DELAY JMP XXX1 XX: DJNZ R1,CALLING JMP START DELAY: H1: MOV R4,#10 H2: MOV R3, #100 H3: DJNZ R3, H3 DJNZ R4, H2 DJNZ R5, H1 Fig.5 Burning of Code in to Microcontroller ontroller Memory RET B Source Code START: END ORG 00H CLR P2.0 MOV P0,#0FFH MOV P1,#0FFH MOV R0,#096H MOV R1,#003H VSG: JNB P1.0,VSG2 JMP CALLING VSG2: JNB P1.1,VSG3 JMP CALLING VSG3: JB P1.2,VSG4 JMP CALLING IV HARDWARE IMPLEMENTATION AND SCHEMATIC DESCRIPTION With reference to Fig Vital role of Micro controllercontroller AT89C52 in ‘Remote billing of energy meter using GSM module’ is as follows [10] 1) It will transmit the consumption amount to GSM 2) It will act as a master to communicate with memory 3) Whenever a command is sent to reset the memory ,controller resets the memory 4) Controller takes the pulses from the DTMF 5) Microcontroller also switches on the alarm The circuit diagram shows in the Fig Fig 6-7 It shows all the components used in the sequence in they should have been Fig Schematic of Port wise Hardware Implementation Fig Actual Hardware Implementation V REFERENCES CONCLUSION AND FUTURE SCOPES Through our initial research it was evident that the automobile sector is way behind in blending the latest information and communication technologies in their security system Hence in this paper, we have presented an advanced security system for cars We have used the current technology of GSM The reason being the present highly developed infrastructure for systems supporting GSM Our final designed system is advantageous over other similar systems because: 1) The system moves a step ahead of other current security systems available in the market such as AUTOCOP etc Our security system has real time application; i.e the security system doesn’t merely create noise but informs the owner wherever the person may be 2) Cost effective 3) It is sellable Any product designed must be lucrative for consumers to buy Such a smart system has the potential to be sold and attract customers The proposed work has various future applications and can still be modified with certain new features which can be cost effective when manufactured at large scale Also, our designed system is flexible and can accommodate new technologies such as CDMA and other code encrypted highly sophisticated techniques to further enhance the efficacy [1] Jian Xiao; Haidong Feng; , "A low-cost extendable framework for embedded smart car security system," Networking, Sensing and Control, 2009 ICNSC '09 International Conference on , vol., no., pp.829-833, 26-29 March 2009 [2] www.8051projects.net/downloads134.html [3] http://www.atmel.com/atmel/acrobat/doc0313.pdf [4] Thong, S.T.S.; Chua Tien Han; Rahman, T.A.; , "Intelligent Fleet Management System with Concurrent GPS & GSM Real-Time Positioning Technology,"Telecommunications, 2007 ITST '07 7th International Conference on ITS , vol., no., pp.1-6, 6-8 June 2007 [5] http://arshad-umar.blogspot.in/2009/09/gsm-vehicle-control-andsecurity-using.html [6] Sehgal, V.K.; Nitin; Chauhan, D.S.; Sharma, R.; , "Smart wireless temperature data logger using IEEE 802.15.4/ZigBee protocol," TENCON 2008 - 2008 IEEE Region 10 Conference , vol., no., pp.1-6, 19-21 Nov 2008 [7] Sehgal, V.K.; Panda, N.; Handa, N.R.; Naval, S.; Goel, V.; , "Electronic Energy Meter with Instant Billing," Computer Modeling and Simulation (EMS), 2010 Fourth UKSim European Symposium on , vol., no., pp.27-31, 17-19 Nov 2010 [8] Sehgal, V.K.; Dhope, S.; Goel, P.; Chaudhry, J.S.; Sood, P.; , "An Embedded Platform for Intelligent Traffic Control," Computer Modeling and Simulation (EMS), 2010 Fourth UKSim European Symposium on , vol., no., pp.541-545, 17-19 Nov 2010 [9] http://ece-projects.blogspot.in/2011/06/gsm-based-vehiclemonitoring-security.html [10] Hayan Lee; Hsin-Mu Tsai; Tonguz, O.K.; , "On the Security of IntraCar Wireless Sensor Networks," Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th , vol., no., pp.1-5, 20-23 Sept 2009