Você está na página 1de 15

Abstract

The objective of this seminar is to propose a design which will enable users to
remotely control their car security feature using a cell phone-based interface.
To access the car, the user should send an authentication code along with the
required/desired function/action to his/her control system via GSM. Upon
being properly authenticated, the cell phone-based interface (control unit)
would relay the commands to a microcontroller that would perform the
required function/action e.g. enables or disables the vehicle par adventure it
has been tampered with.
To this end, this seminar is tagged mobile phone based car security
system.

CHAPTER ONE
INTRODUCTION
The efficacy of our security system has been in question over the last few
years owing to the wide spread global crime that has caused huge loses to
man in generality. Despite all the efforts that have been expended to this
bizarre situation little or no result has been realized.
Security, as used in this context, describes measures that prevent or defer
unsolicited intrusion from accessing a vehicle by disabling the ignition or
gasoline supply with the use of mobile phone.
Motor vehicle theft has been a problem since the start of the automobile age.
The 1900 Leach automobile featured a removable steering wheel that the
driver could carry away to prevent unauthorized vehicle use. More recently,
sophisticated electronic alarms, some of which incorporate radio beacons, and
more tamper-resistant wiring and electronic locks have been produced.
Through the use of wireless technology, vehicles equipped with Global
Positioning System (GPS) satellite navigation systems may be tracked and
recovered when stolen.
Automobiles as we know them today are the product of centuries of tinkering
and innovation. Automobile production has grown from small companies
making simple so-called horseless carriages to international corporations that
mass-produce advanced, reliable automobiles for consumers.
Automobile theft has become a $3 billion-a-year business, with over 1 million
2

cars stolen annually. In the past, most cars were stolen by joyriders and later
abandoned; more than 90 percent of all stolen autos were recovered. Today,
the typical thief works for a chop shop, which dismantles the car and sells
the parts (these are much more valuable than the whole car itself); a much
smaller proportion of automobiles are recovered.
Some insurance companies are fighting losses from auto theft by giving
premium credits for use of antitheft devices. Others now charge a substantial
deductible in cases where the insured leaves the keys in the ignition or is
otherwise negligent.
In the 15th century, Italian inventor Leonardo da Vinci envisioned
possibilities for power-driven vehicles.
In this seminar a new concept is brought to the awareness of individuals; this
scheme uses a technology called DTMF Dual Tone Multi Frequency in its
signaling technique to control the action of vehicles against unauthorized user
in other to dictate its action e.g. engage/disable the door, engage/disable the
brain box or and a combination of different electrical action thus making its
application a very vast and important one.
The DTMF was originally developed to allow sending control information
(dialed numbers) across the telephone network. The telephone network has a
bandwidth of approx. 300 to 3400 Hz, suitable for voice communications. Any
control tones would also need to be in this range and had to work regardless
of whether voice was present or not. A single tone or frequency could have
been used. However, if voice was present, it would interfere with the control
tones, making them useless. To overcome this, a scheme was developed
3

whereby two tones or frequencies were combined to represent each control


code or number. A total of seven tones were needed to represent the digits
normally found on a telephone keypad, namely 0-9, * and #. An eighth tone
was added so that some extra digits were available for use. These are
commonly labeled ABCD. These eight tones were divided into two groups of
four tones each, a low-frequency group and a high-frequency group.

Here a DTMF receiver chip, a CM8870 from California Micro Devices will be
used for general signaling control. It will be responsible for all the processing
described above.

Description
The MT8870D/MT8870D-1 is a complete DTMF receiver integrating both the
bandsplit filter and digital decoder functions. The filter section uses switched
capacitor techniques for high and low group filters; the decoder uses digital
counting techniques to detect and decode all 16 DTMF tone-pairs into a 4-bit
code. External component count is minimized by on chip provision of a
differential input amplifier, clock oscillator and latched three-state bus
interface.
Problem Statement
The objective of this seminar is to develop a device that allows for a user to
remotely control their vehicles electrical functions. This system will be a
powerful and flexible tool that will offer this service at any time, and from
anywhere with the constraints of the technologies being applied. Possible
target appliances include (but are not limited to) climate control systems,
security systems and anything with an electrical interface.
The proposed approach for designing this system is to implement an auto car
lock using gsm control module that receives its instructions and commands
from a Mobile phone over the GSM network. The microcontroller then will
carry out the issued commands. For security purposes, a means of
identification and user authentication will be implemented, and will combine
caller identification with a password authorization.

Operating Environment
The control system will include two separate units: the mobile phone, and the
control unit. There will therefore be two operating environments. The mobile
phone will operate indoors and outdoors whereas the control unit will
operate indoors because it resides in the vehicle.

Assumptions
The following is a list of assumptions:
The user and control unit will establish communication via GSM.
All service charges from service provider apply.
The controlled vehicle will have to have an electrical connection via its
battery in order for it to be controlled by the controller.

CHAPTER TWO
Review of related literature:
A German scientist by name Heinrich Wilhelm Dove in 1826 developed a
cell phone remote control system for home

appliance control but, its

limitation was that ability to control or operate more than two home
appliance using the same communication network was not successful, but
later a German technologist by name Alexander Graham Bell in 1875 went
in to research to upgrade the effort of Heinrich Wilhelm Dove and came up
with a result, using the same communication network to control more than
two appliance.
But most of the times a land line phone is being used. If a land line phone is
used then a separate ring detector circuit is required for detecting the number
of rings and then picking up the phone. It uses an extra relay and we have to
enter inside the mechanism of phone.
In this report I have used the auto answer facility which is present in many of
the cell phones today, so I escaped from designing the ring detector circuit.
The aim of the proposed system is to develop a cost effective solution that will
provide controlling of vehicles remotely and to enable it against intrusion in
the absence of owner. This system is highly feasible due to development of a
low cost system. This control system with an affordable cost was thought to
be built that should be able to provide seamless remote access via mobile

phones in other to automate the conventional key lock system thus allowing
for a seamless security.
In this system, I am going to develop a cellular phone based security system
that will meet todays need.
Present and Future Scope:
This product is aimed toward average consumers who wish to control their
vehicle security outfit remotely from their mobile phones provided that it is
electrically controllable. Example of feasible applications under consideration
includes; enable/disable security systems, doors, ignition, steering, dash
boards, and heating/ventilation/air conditioning system.

CHAPTER THREE
System Specifications:
1. An authenticated user can control his/her vehicle from any remote place
having mobile phone network.
4. The system requires two phones out of which the one present at the control
unit has to be a mobile phone with auto answer facility.
Block Diagram

BLOCK DIAGRAM DESCRIPTION


Phone on the transmitting side:
The person who wants to switch control his/her vehicle that is interfaced with
the controller side calls from a phone and, once the call gets picked up, enters
the password for the corresponding device. Every key has to be pressed for a
minimum amount of time to get it encoded in the decoder IC.

Mobile phone on the receiving side:


The mobile phone on the receiver side picks up the phone call automatically
after 5seconds, and then makes the tones available to the DTMF tone decoder
IC through the headphone jack of the phone.

DTMF Tone Decoder IC:


The DTMF tone decoder IC converts the received tones to their respective
binary values and then gives them as an input to the microcontroller.
The DTMF tone decoder ICs internal architecture consists of a band split filter
section which separates the low and the high tone of the received tone pair,
followed by a digital decode(counting) section which verifies both the
frequency and duration of the received tones before passing resultant 4-bit
code to the output bus. These 4-bits along with a bit which validates a
10

received tone are given as an input to the port of microcontroller.


The Microcontroller:
The five output bits of the decoder IC serve as an input to port of the
microcontroller.

Then

each

tone

is

verified

by

the

programmed

microcontroller and once a correct sequence of code is received, output


corresponding to the tones sent by the user is made available at the port,
which is connected to the brain box of the vehicle for the proper action
depicted by the user i.e. enable/disable security systems, doors, ignition,
steering, dash boards, and heating/ventilation/air conditioning system.
The output from the port of the microcontroller is given to the relay driver IC
which drives the corresponding relay, to which the security connection is
made.
Once the relay is energized, the output is set the appropriate action that is
needed.

IMPLEMENTATION OF SYSTEM
System Algorithm:
1. Person who wants to lock his car calls on the phone at the receiver side
which resides in the car.
2. The call gets answered automatically if it is not picked up manually
before 5seconds.

11

3. Once the call gets answered the password is entered for authentication
(in our case it is our four digit code).
4. If authenticated, the controller takes the right action i.e. locks the car.

Note:
On the transmitter side the user controlling the security features of the car has
to press each digit for a minimum duration of time, which is 40ms.

Performance and evaluation of the system


1. The receiver must reside in a location where a signal with sufficient
strength can be received from a Mobile phone network.
2. The only person who can communicate with the control module is the
person who will be successfully authenticated.
3. Only devices with electrical controlling input ports will be possible targets
for control.
4. The receiver must have a power source attached at all times.

12

CHAPTER FOUR
CONCLUTION AND RECOMMENDATION
Conclusion
Since is of paramount important to remotely control prevent our cars from
unauthorized for security reasons. The distance is no longer a barrier to our
remote control system this time, because of the introduction of
communication network. The technology of remote control system has
advanced in controlling security features of cars over a GSM communication
network and is also flexible.

RECOMMENDATION
I recommend the GSM remote control system for use in domestic and
industrial terrain, to remotely control security conscious devices especially in
the offices where delicate informations can be easily leaked hence the need
for a security stronghold and also in the industries were no body Can move
close to the machines and some moveable parts of the heavy machines.
Because of the distance and communication network used in this seminar
work, I recommend users of remote control system to go for GSM remote
control system because it is more versatile.

13

References:
1. www.8051projects.net
2. www.edaboard.com
3. Mazidi-8051 microcontroller Dip trace Help Datasheets of the IC's
4. http://www.quasarelectronics.com/jpg/3 153_1.jpg
5. http://www.quasarelectronics.com/jpg/3 153_2.jpg
6. http://www.quasarelectronics.com/zip/dtmf.zip
7. http://www.myke.com/lcd.htm interfacing ICs
8. Chenker, L., Pushbutton Calling with a Two-Group Voice-Frequency
Code - The Bell system technical journal (IN 0005-8580) vol: 39iss:1 pp: 235255, 1960
9. Microcontroller Technology: Atmel, at89s52, prentice hall, 7th edition,
page32, 2002
10. Coskun and H. Ardam, A Remote Controller for Home and Office
Appliances by Telephone, IEEE Trans. Consumer Electron. , vol. 44, no. 4,
pp1291- 1297, November 1998
11. Daldal Nihat, Microcontroller Based security and Control system (In
14

Turkish),
12. M.C. Term Project, Gazi University, Ankara, 2003
13. E. Wong, A Phone-Based Remote Controller for Home and Office
Automation, IEEE Trans. Consumer Electron. , vol. 40, no. 1, pp. 28-33,
February

1995.

13. Relay Information, http://en.wikipedia.org/wiki/Relay

15