Auto Car Lock Using Cell Phone

download Auto Car Lock Using Cell Phone

of 25

Transcript of Auto Car Lock Using Cell Phone

SEMINAR PRESENTATION ON AUTO CAR LOCK USING CELL PHONE BY (TELECOMMUNICATION OPTION)

A FINAL YEAR SEMINAR PRESENTED TO THE SCHOOL OF ENGINEERING TECHNOLOGY (SEES) DEPARTMENT OF ELECTRICAL ELECTRONICS ENGINEERING TECHNOLOGY FEDERAL POLYTECHNIC NEKEDE P.M.B. 1036, OWERRI, IMO STATE IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF HIGHER NATIONAL DIPLOMA (HND) IN ELECTRICAL/ELECTRONICS ENGINEERING. SUPERVISED BY ENGR I.N. ONYEJE MARCH 2011.

1

CERTIFICATION

This is to certify that this seminar has been supervised and approved, having met one of the requirement for the award of Higher National Diploma (HND) from the department of Electrical Electronics Engineering, school of Engineering Technology, Federal Polytechnic Nekede, Owerri. Under the supervision of; ______________ I.N. Onyeje (Seminar Supervisor) ____________ Date

_______________ LADY (ENGR) MARVIS ARIRIGUZO (Seminar Coordinator)

____________ Date

________________ ENGR Ben C. Agwah (Head of Department)

____________ Date

2

DEDICATION

This piece of seminar work is dedicated to the memory of my late Mother Mrs. Odoh Caroline, Almighty God, my helper in this perverse world.

3

ACKNOWLEDGEMENT

My sincere and heart felt thanks go to all and sundry who in one way or the other have contributed to the successful completion of this seminar.

Special thanks to my seminar supervisor, I.N. Onyeje, for his impeccable support throughout the time frame of the implementation of this work. Without reservation I also wish to express my profound gratitude to ENGR Ben C. Agwah, the H.O.D, and the entire staff of the department of Electrical/Electronics Engineering.

I will not fail to appreciate my parents, Mr. & Mrs. Odoh Elijah, who tirelessly have been providing moral and financial support towards the actualization of this seminar. I want to let them know that their unflinching love, affection and belief on me have kept me through these years.

4

TABLE OF CONTENTS Title page Certification page Dedication Acknowledgement Table of Contents CHAPTER ONE Introduction CHAPTER TWO Literature Review CHAPTER THREE Auto car Lock Using cell Phone CHAPTER FOUR Conclusion & Recommendation References 16 9 5 1 i ii iii iv v

5

ABSTRACT

The objective of this seminar is to propose a design which will enable users to remotely control their car using a cell phone-based interface. To access the car, the user should send an authentication code along with the required /desired function/action to his/her control system via GSM. Upon being properly authenticated, the cell phone-based interphase (control unit) would relay the commands to a micro controller that would perform the required function / action. Example enables or disables the vehicle par adventure it has been tampered with. To this end, this seminar is tagged auto Car Lock Using G.S.M.

6

CHAPTER ONE INTRODUCTION The efficacy of our security system has been in equation over the last few years owing to the wide spread global crime that has caused huge losses to man in generality. Despite all the efforts that have been expended to this bizarre situation, little or no result has been realized.

Security, as used in this context, describes measures that prevent or defer unsolicited intrusion from accessing a vehicle by disabling the ignition or gasoline supply with the use of mobile phone. Motor vehicle theft has been a problem since the start of the automobile age. The 1900 Leach automobile featured a removable steering wheel that the driver could carry away to prevent unauthorized vehicle use. More recently,

sophisticated electronic alarms, some of which incorporate radio beacons, and more tamper-resistant wiring and

electronic locks have been produced. Through the use of

7

wireless

technology,

vehicles

equipped

with

global

positioning system (GPS) satellite navigation systems may be tracked and recovered when stolen.

Automobiles as we know them today are the product of Centuries of tinkering and innovation. Automobile production has grown from small companies making simple so-called horseless carriages to international corporations that massproduce advanced, reliable automobiles for consumers. Automobile theft has become a $3billion year business, with over 1 million cars stolen annually. In the past, most cars were stolen by joyriders and later abandoned, more than 90% of all stolen autos were recovered. Today, the typical thief works for a chop shop, which dismantles the car and sells the parts (these are much more valuable than the whole car itself), a much smaller proportion of automobiles are recovered.

8

Some insurance companies are fighting losses from auto theft by giving premium credits for use of antitheft devices. Others now charge a substantial deductible in cases where the insured leaves the keys in the ignition or is otherwise negligent. PROBLEM STATEMENT The objective of this seminar is to develop a device that allows for a user to remotely control their vehicles electrical functions. This system will be a powerful and flexible tool that will offer this service at anytime, and from anywhere with the constraints of the technologies being applied. Possible target appliances include (but are not limited to) climate control systems, security systems and anything with an electrical interface. The proposed approach for designing this system is to implement an auto car lock using GSM control module that receives its instructions and commands from a mobile phone over the GSM network. The microcontroller then will carry

9

out the issued commands. For security purposes, a means of identification and user authentication will be implemented and will combine caller identification with a password authorization. OPERATING ENVIRONMENT The control system will include two separate units: the mobile phone, and the control unit. There will therefore be two operating environments. The mobile phone will operate indoors and outdoors where as the control unit will operate indoors because it resides in the vehicle. ASSUMPTIONS The following is a list of assumptions: - The user and control unit will establish communication via GSM. - All service charges from service provider apply. - The controlled vehicle will have an electrical connection via its battery in order for it to be controlled by the controller.

10

CHAPTER TWO

LITERATURE REVIEW Drexel engineering professor on his research reviewed that using cell phones to remotely lock a car was not possible. (Bruce, 1825). Head of product marketing and European sales for Nokia, fields a list of common cell phones myths for the international herald tribune, of the claim that cell phones can be used to lock cars, the article says: that is surely another trick the phone makers should have invented except that the remote opening systems for cars work on radio waves, which cannot be transmitted over a cell phone (Marcus, 1827). Myths Busters tried and failed to lock and unlock a car with a remote signal transmitted via a cell phone in a video posted online. (Dacombe 1962, ) A German scientist developed a cell phone remote control system for car control but its limitation was its

11

inability to control or operate more than two sections using the same communication network. (Heinrich, 1998). But later a German technologist went into research to upgrade the effort of Heinrich Wilhelm Dove and came up with a result using the same communication network to control more than two sections of a car (Alexander, 2005). But most of the times a landline phone is being used. If a landline phone is used then a separate ring detector circuit is required for detecting the number of rings and then picking up the phone. This evolution has taken us to auto car lock using cell phone. It uses an extra relay and we have to enter inside the mechanism of phone, in this report I have used the auto answer facility which is represented in many of he cell phones today. The aim of the proposed system is to develop a cost effective solution that will provide controlling of vehicles remotely and to enable it against intrusion in the absence of owner. The system is highly feasible due to development of

12

a low cost system. THis control system with an affordable cost was thought to be built that should be able to provide seamless remote access via mobile phones in other to automate the conventional key lock system thus allowing for a seamless security. In this system, I am going to develop a cellular phone based security system that will meet todays need. In the 15th century, Italian inventor Leonardo da Vinci envisioned possibilities for power-driven vehicles. In this seminar, a new concept is brought to the awareness of individuals; this scheme uses a technology called DTMF Dual Tone Multi Frequency, in its signaling technique to control the action of vehicles against unauthorized user in other to dictate its actions. Example engaged/ disable the door, engaged/disable the brain box or a combination of different electrical action thus making its application a very vast and important one. The DTMF was originally developed to allow sending or control information (dialed number) across the telephone

13

network.

The

telephone 300 to

network has a bandwidth of 3400Hz, suitable for voice

approximately

communications. Any control tones would also need to be in this range and had to work regardless of whether voice was present or not. A single tone or frequency could have been used. However, if voice was present, it would interfere with the control tones making them useless. To overcome this, a scheme was developed whereby two tones or frequencies were combined to represent each control code or number. A total of seven tones were needed to represent the digits normally found on a telephone keypad, namely 0 -9, *, #. An eight tone was added so that some extra digits were available for use. These are commonly labeled ABCD. These eight tones were divided into two groups of four tones each, a low frequency group and a high frequency group.

14

CHAPTER THREE AUTO CAR LOCK USING CELL PHONE An authenticated user can control his/her vehicle from any remote place having mobile phone network. The system requires two phones out of which the one present at the control unit has to be a mobile phone with auto answer facility. BLOCK DIAGRAM WIRELESS NETWORK VIA (MTN, GLO ETC). BETWEEN THE TRANSMITTER AND RECEIVER

TRANSMITTER MOBILE PHONE

RECEIVER MOBILE PHONE

VEHICLE

TUNE DECODER DTMF AND MICROCONTROLLER RELAY CIRCUIT

15

BLOCK DIAGRAM DESCRIPTION PHONE ON THE TRANSMITTING SIDE The person who wants to switch control his/her vehicle that is interfaced with the controller side calls from a phone and, once the call gets picked up, enters the password for the corresponding device. Every key has to be pressed for a minimum amount of time to get it encoded the decoder IC.

MOBILE PHONE ON THE RECEIVING END/SIDE: The mobile phone on the receiver side picks up the phone call automatically after 5 seconds, and then makes the tones available to the DTMF tone decoder IC through the

headphone jack of the phone.

16

TABLE OF FREQUENCY COMBINATIONS High Group Frequencies (H2) 1209LOW GROUP FREQUENCIES (Hz)

1336 2 5 8 0 3 6 9 #

1477 A B C D

1633 (ROW 1) (ROW 2) (ROW 3) (ROW 4)

1

6974

7707

852

*

(COLUMN 1 COLUMN 2

COLUMN 3

COLUMN 4

941Dual-Tone multi Frequency (DTMF) Here a DTMF receiver chip, a (M8870) from California micro devices will be used for general signaling control. It will be responsible for all the processing described above. DESCRIPTION: The MT8870D/MT8870-1 is a complete DTMF receiver integrating both the band split filter and digital decoder functions. The filter section uses switched capacitor

techniques for high and low group filters, the decoder uses digital counting techniques to detect and decode all 16 DTMF17

tone-pairs into a 4-bit code. External component count is minimized by on chip provision of a differential input amplifier, interface. DTMF TONE DECODER IC: The DTMF tone decoder IC converts the received tones to their respective binary values and then gives them as an input to the microcontroller. clock oscillator and latched three-state bus

The DTMF tone decoder ICs internal architecture consists of a band split filter section which separates the low and the high tone of the received tone pair, followed by a digital decode (counting) section which verifies both the frequency and duration of the received tones before passing resultant 4-bit code to the output bus. These 4-bits along with a bit which validates a received tone are given as an input to the port of microcontroller.

18

THE MICROCONTROLLER The five output bits of the decoder IC serve as an input to port of the microcontroller. Then each tone is verified by the programmed microcontroller and once a correct sequence of code is received, output corresponding to the tones sent by the user is made available at the port, which is connected to the brain box of the vehicle for the proper action depicted by the user i.e. enable/disable security systems, doors, ignition, steering, dash boards, and heating/ventilation/air

conditioning system. The output from the port of the microcontroller is given to the relay driver IC which drives the corresponding relay, to which the security connection is made. Once the relay is energized, the output is set the appropriate action that is needed.

19

IMPLEMENTATION OF SYSTEM SYSTEM ALGORITHM 1. Person who wants to lock his car calls on the phone at the receiver side which resides in the car. 2. The call gets answered automatically if it is not picked up manually before 5 seconds. 3. Once the call gets answered the password is entered for authentication (in our case it is our four digit code). 4. If authenticated, the controller takes the right action i.e. locks the car. NOTE: On the transmitter side the user controlling the security features of the car has to press each digit for a minimum duration of time, which is 40Ms.

20

PERFORMANCE AND EVALUATION OF THE SYSTEM 1. The receiver must reside in a location where a signal with sufficient strength can be received from a mobile phone network. 2. The only person who can communicate with the control module is the person who will be successfully

authenticated. 3. Only devices with electrical controlling input ports will be possible targets for control. 4. The receiver must have a power source attached at all times.

21

CHAPTER FOUR CONCLUSION AND RECOMMENDATION

CONCLUSION Auto car lock using cell phone is of paramount important to remotely control, prevent unauthorized users from our cars for security reasons. The distance is no longer a barrier to our remote control system this time, because of the introduction of communication network. The technology of remote control system has advanced in controlling security features of cars over a GSM communication network and is also flexible.

22

RECOMMENDATION

I recommended that GSM remote control system should be used in domestic and industrial terrain, to remotely control security conscious devices especially in the offices where delicate informations can be easily leaked hence the need for a security stronghold and also in the industries were no body can move close to the machines and some moveable parts of the heavy machines, because of the distance and communication network used in this seminar work. I recommended users of remote control system to go for GSM remote control system because it is more versatile.

23

REFERENCES

1. Ankara (2003): M. C. Term Project, Gazi University. 2. A Remote Controller for Home and Offices Appliances by Telephone, November (1998), IEEE Trans. Consumer Electron, vol. 44, no. 4, pp 1291 1297.

3. Dalda N. (2002). Microcontroller Based Security and Control System. 4. Mazidi (8051) Microcontroller Dip Trace Help Datasheet of the ICs 5. Microcontroller Technology, page 32, (2002), Prentice Hall, 7th edition. 6. A Phone-Based Remote Controller for Home and Office, Automation (1995), Wong E., IEEE Trans Consumer Electron, vol. 40, no. 1 pp 28 33. 7. Push Button Calling with a Two Group Voice Frequency Code. The Bell System Technical Journal pp. 235 255, (1960), Chenker, L, (IN0005 8580). Vol. 39155:1 8. www.8051 Projects.net.

24

9. Bruce D. E. (1825): http://www.ntmel.com.

10. 11.

Marcus D. (1827) http://www.maxim.com http://www.quasarelectronics.com /jpq/31531.jpg

12. 13.

Dacombe A. M. (1962): http://www.infocom.com Henrich W. D. (1998), http://www.ee.duke/cec/final/node.48.html.

14. 15. 16. 17.

http://www.quasarelectronics.com/zip/dtmf.zip Alexander G. B. (2005) http://www.atmel.com http://www.myke.com/icd.htm interfacing ICs Relay information, http://en.wikipedia.org/wiki

/relay.

25