0% found this document useful (0 votes)
184 views15 pages

Remote Vehicle Anti-Theft System

The document describes a vehicle theft prevention system that uses a microcontroller, GSM modem, and relay circuit to remotely stop a vehicle engine. When a vehicle is stolen, a microcontroller detects the theft and sends an SMS notification to the owner's phone via a GSM modem. The owner can then reply with an SMS to activate a relay circuit that disables the vehicle ignition, stopping the engine. The system aims to provide vehicle security and allow owners to remotely stop their vehicles if stolen.

Uploaded by

Venkatram Prabhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
184 views15 pages

Remote Vehicle Anti-Theft System

The document describes a vehicle theft prevention system that uses a microcontroller, GSM modem, and relay circuit to remotely stop a vehicle engine. When a vehicle is stolen, a microcontroller detects the theft and sends an SMS notification to the owner's phone via a GSM modem. The owner can then reply with an SMS to activate a relay circuit that disables the vehicle ignition, stopping the engine. The system aims to provide vehicle security and allow owners to remotely stop their vehicles if stolen.

Uploaded by

Venkatram Prabhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

THEFT INTIMATION OF THE

VEHICLE OVER SMS TO OWNER


WHO CAN STOP THE ENGINE
REMOTELY

1
CONTENTS

CHAPTER NO DESCRIPTION PAGE NO

1 ABSTRACT 4
2 INTRODUCTION 4

3 BLOCK DIAGRAM 5
4 BLOCK DIAGRAM DESCRIPTION
4.1 MICROCONTROLLER 5
4.2 GSM MODEM 6
4.3 DRIVER CIRCUIT & RELAY 6
4.4 MOTOR 6

5 COMPONENTS DETAILED EXPLANATION

5.1 MICROCONTROLLER 6

5.2 RS-232 24

5.3 RELAY 26

5.4 DC MOTOR 26

5.5 GSM MODEM 27

6 PCB DESIGN

6.1 INTRODUCTION 32

6.2 SOFTWARE 32

6.3 MANUFACTURING 32

6.4 PANELISATION 32

6.5 DRILLING 32

2
CHAPTER NO DESCRIPTION PAGE NO

6.6 PLATING 33

6.7 ETCHING 33

6.8 SOLDER MASK 33

6.9 HOT AIR LEVELING 33

SOFTWARE

7 SOFTWARE TOOLS

7.1 KEIL 33

7.2 ASSEMBLING & RUNNING 37


AN 8051

10 ADVANTAGES 38

11 APPLICATIONS 39

12 CONCLUSION 39

13 BIBLIOGRAPHY 39

3
1.Abstract:

The aim of this project is to use wireless technology to intimate the owner of the
vehicle about any unauthorized entry. This is done by sending an auto-generated SMS to the
owner. An added advantage of this project is that the owner can send back the SMS which
will disable the ignition of the vehicle.
As the crime rate is going up, security system for vehicles is extremely essential.
In this proposed system if someone tries to steal the car, the microcontroller gets an interrupt
through a switch mechanism connected to the system and commands the GSM modem to
send an SMS. The owner receives the SMS that his car is stolen. He can then send back an
SMS to the GSM modem to ‘stop the engine’. The GSM modem interfaced to the
microcontroller, receives the message, the output of which activates a mechanism that
disables the ignition of the vehicle resulting in stopping the vehicle. The project uses a lamp
to indicate the engine ON/OFF condition.
Thus, owner of the vehicle from anywhere can switch off ignition of his car. This
project can be further enhanced by integrating a GPS system, which will give exact position
of the vehicle in terms of its latitude and longitude. Further this data can be sent to the owner
via SMS who can enter this value on Google maps to get the exact location of the vehicle.

2.Introduction:

With the rapid development of national economy, automobiles have increased greatly as
the human's important vehicles. However, it is the development of modern technology
that makes the commit means of crimes become smarter and the automobiles stolen
events more frequent. Electronics anti-theft is the most widely used among all the
appliances at the moment. But the chip one and the network one are the developing
directions of the auto-guard technology. GSM(Global System for Mobile
Communication) is a case which is the most mature and widely used in mobile
communication system. It ensures the information transmission so real-time, security
and reliable that realizes the long distance control[1].This paper is about a design of a
new fashion auto-guard which is a smart measurement generalized in the automobile
security area.

4
3.Block Diagram:

5
IMPLEMETATION:

4.Block Explanation:

4.1 Microcontroller:

Microcontroller act as a control system of the circuit.

4.2 GSM Modem:

When anyone break the lock means the controller send the security information to the GSM
modem then the GSM modem send the SMS to the owner's mobile in which mobile no is
already pre-programmed in the controller database.

4.3 Driver circuit & Relay:

The driver circuit s interfaced with the controller to drive the motor through electromagnetic
relay.

4.4 Motor:

The motor will be in OFF condition if the SMS is received as to stop the engine

MODULES
5.1 MICROCONTROLLER

A microcontroller (also MCU or µC) is a functional computer system-on-a-chip. It


contains a processor core, memory, and programmable input/output peripherals.
Microcontrollers include an integrated CPU, memory (a small amount of RAM, program
memory, or both) and peripherals capable of input and output. Microcontrollers are used in
automatically controlled products and devices.

BASICS:

A designer will use a Microcontroller to

6
 Gather input from various sensors
 Process this input into a set of actions
 Use the output mechanisms on the Microcontroller to do something useful.

MEMORY TYPES:

RAM:

 Random access memory.


 Ram is a volatile (change) memory.
 It general purpose memory that can store data or programs.
 Ex: hard disk, USB device.

ROM:

 Read only memory.


 Rom is a non volatile memory.
 This is typically that is programmed at the factory to have certain values it cannot be
changed.
 Ex: cd...

System study

Hardware

 Gsm

 Bluetooth

 Micro controller

 Relay

Software :

KEIL Assembler

7
CIRCUIT DIGRAM

8
Implemetaion:

Modules

Gsm blutooth

A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a
subscription to a mobile operator, just like a mobile phone. ... When a GSM modem is connected to a
computer, this allows the computer to use the GSM modem to communicate over the mobile
network.

Blootth:

Bluetooth development board which can be used to add voice SMS and Data transfer functionality to
embedded system projects. SIM800 support Quad - band MHz, it can transmit Voice, SMS and data
information with low power consumption. Bluetooth is a wireless technology standard used for exchanging
data between fixed and mobile devices over short distances using UHF radio waves in the industrial,
scientific and medical radio bands, from 2.402 GHz to 2.480 GHz, and building perso

Micro controller:

Microcontrollers are embedded inside devices to control the actions and features of a product.
Hence, they can also be referred to as embedded controllers. They run one specific program and are
dedicated to a single task. They are low power devices with dedicated input devices and small LED or
LCD display output

DESCRIPTION

Port 0:

Port 0 is an 8-bit open-drain bi-directional I/O port. As an output port, each pin can
sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high
impedance inputs. Port 0 may also be configured to be the multiplexed low order address/data
bus during accesses to external program and data memory. In this mode P0 has internal pull-

9
ups. Port 0 also receives the code bytes during Flash programming, and outputs the code
bytes during program verification. External pull-ups are required during program verification.

Port 1:

Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1 output
buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled
high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are
externally being pulled low will source current (IIL) because of the internal pull-ups. Port 1
also receives the low-order address bytes during Flash programming and verification.

Port 2:

Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output
buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled
high by the internal pull-ups and can be used as inputs.

Port 2 pins that are externally being pulled low will source current (IIL) because of the
internal pull-ups.

RST:

Reset input a high on this pin for two machine cycles while the oscillator is running
resets the device.

ALE/PROG:

Address Latch Enable output pulse for latching the low byte of the address during
accesses to external memory. This pin is also the program pulse input (PROG) during Flash
programming. In normal operation ALE is emitted at a constant rate of 1/6 the oscillator
frequency, and may be used for external timing or clocking purposes. Note, however, that one
ALE pulse is skipped during each access to external Data Memory.

PSEN:
Program Store Enable is the read strobe to external program memory. When the AT89C51 is
executing code from external program memory, PSEN is activated twice each machine cycle,
except that two PSEN activations are skipped during each access to external data memory.

EA/VPP:
External Access Enable. EA must be strapped to GND in order to enable the device to fetch
code from external program memory locations starting at 0000H up to FFFFH. Note,
however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should
be strapped to VCC for internal program executions. This pin also receives the 12volt

10
programming enable voltage (VPP) during Flash programming, for parts that require 12-volt
VPP.

XTAL1:
Input to the inverting oscillator amplifier and input to the internal clock operating circuit.

XTAL2:
Output from the inverting oscillator amplifier.

Port Pin Alternate Functions

P3.0 RXD (serial input port)

P3.1 TXD (serial output port)

P3.2 INT0 (external interrupt 0)

P3.3 INT1 (external interrupt 1)

P3.4 T0 (timer 0 external input)

P3.5 T1 (timer 1 external input)

P3.6 WR (external data memory write strobe)

P3.7 RD (external data memory read strobe)

of electronic equipment domestic and industrial. Some of the areas where PCBs are
intensively used are computers, process control, telecommunications and instrumentation.

6.2 MANUFATCURING:

The manufacturing process consists of two methods; print and etch, and print, plate and etch.
The single sided PCBs are usually made using the print and etch method. The double sided
plate through – hole (PTH) boards are made by the print plate and etch method.

The production of multi layer boards uses both the methods. The inner layers are printed and
etch while the outer layers are produced by print, plate and etch after pressing the inner
layers.

6.3 SOFTWARE:

The software used in our project to obtain the schematic layout is MICROSIM.

11
6.4 PANELISATION:

Here the schematic transformed in to the working positive/negative films. The circuit is
repeated conveniently to accommodate economically as many circuits as possible in a panel,
which can be operated in every sequence of subsequent steps in the PCB process. This is
called penalization. For the PTH boards, the next operation is drilling.

6.5 DRILLING:

PCB drilling is a state of the art operation. Very small holes are drilled with high speed CNC
drilling machines, giving a wall finish with less or no smear or epoxy, required for void free
through whole plating.

6.6 PLATING:

The heart of the PCB manufacturing process. The holes drilled in the board are treated both
mechanically and chemically before depositing the copper by the electro less copper platting
process.

6.7 ETCHING:

Once a multiplayer board is drilled and electro less copper deposited, the image available in
the form of a film is transferred on to the out side by photo printing using a dry film printing
process. The boards are then electrolytic plated on to the circuit pattern with copper and tin.
The tin-plated deposit serves an etch resist when copper in the unwanted area is removed by
the conveyor’s spray etching machines with chemical etch ants. The etching machines are
attached to an automatic dosing equipment, which analyses and controls etch ants
concentrations

air is blown on both sides of the board through air knives in the machines, leaving the board
soldered and leveled. This is one of the common finishes given to the boards. Thus the double
sided plated through whole printed circuit board is manufactured and is now ready for the
components to be soldered.

7 SOFTWARE TOOLS

7.1 KEIL Assembler:

12
Keil development tools for the 8051 Microcontroller Architecture support every level of
software developer from the professional applications engineer to the student just learning
about embedded software development.

The industry-standard Keil C Compilers, Macro Assemblers, Debuggers, Real-time Kernels,


Single-board Computers, and Emulators support all 8051 derivatives and help you get your
projects completed on schedule.

The Keil 8051 Development Tools are designed to solve the complex problems facing
embedded software developers.

When starting a new project, simply select the microcontroller you use from the Device
Database and the µVision IDE sets all compiler, assembler, linker, and memory options for
you.

Numerous example programs are included to help you get started with the most popular
embedded 8051 devices.

The Keil µVision Debugger accurately simulates on-chip peripherals (I²C, CAN, UART, SPI,
Interrupts, I/O Ports, A/D Converter, D/A Converter, and PWM Modules) of your 8051
device.

Simulation helps you understand hardware configurations and avoids time wasted on setup
problems. Additionally, with simulation, you can write and test applications before target
hardware is available.

When you are ready to begin testing your software application with target hardware, use the
MON51, MON390, MONADI, or FlashMON51 Target Monitors, the ISD51 In-System
Debugger, or the ULINK USB-JTAG Adapter to download and test program code on your
target system.

It's been suggested that there are now as many embedded systems in everyday use as there are
people on planet Earth. Domestic appliances from washing machines to TVs, video recorders
and mobile phones, now include at least one embedded processor. They are also vital
components in a huge variety of automotive, medical, aerospace and military systems. As a
result, there is strong demand for programmers with 'embedded' skills, and many desktop
developers are moving into this area.

We look at the inside of 8051. We demonstrate some of the widely used registers of the 8051
with simple instruction such as MOV and ADD.

13
We discuss about assembly language & machine language programming and define terms
such as mnemonics, op-code, and operand etc.

The process of assembling and creating a ready to run program for the 8051.

Step by step execution of an 8051 program and role of program counter.

Then we look about some widely used assembly language directives, pseudo code and data
types related to the 8051.

We discuss about flag bits and how they are affected by arithmetic instructions.

Inside 8051:

Registers:

D7 D6 D5 D4 D3 D2 D1 D0

In the cpu, registers are used to store information temporarily that information could be a byte
of data to be processed or address pointing to the data to be processed or address pointing to
the data to be fetched.

The majority of 8051 registers are 8 bit register. The 8 bit register are classified into

MSB (Most Significant Bit)

LSB (Lost Significant Bit)

With an 8 bit data type, any data longer than 8 bits must be broken into 8 chunks before it is
processed.

The most widely used registers of the 8051 are AC(Accumulator),


B,R0,R1,R2,R3,R4,R5,R6,R7, DPTR(Data Pointer) and PC(program counter).

All of the above registers are 8 bits except DPTR and PC.

MOV (Instruction):

The MOV instruction copies data from one location to another. It has the following
format.

MOV destination, source, copy source to destination.

Example:

MOV A, #55H; Load value 55H into register A

MOV R0, A; copy contacts of A into R0

14
MOV R1, A; copy contacts of A into R1

11.Applications:

 Used in all types of vehicles

12.Conclusion:

The auto-guard system combines the advantages of vibration sensor and GSM together. The
initial security of the automobile is achieved by alarm the buzzer in case of theft. The long-
rage monitor and grading responses could be realized by the mobile phones of users, which
made the alarm cover a broad range. The microcontroller for vehicle was adoped,which
enhanced the reliability and the capability of anti-interference. These advantages mentioned
above meet the requirements of auto-guard system. So that a better effect was made in
practice. In addition, it is easy to extend functions. If the function of position tracking is
needed, the GPS module can be added. If the Internet of Things is to be entered, we only
need to rewrite the program coding. As a result, the radio technology at present can be
replaced completely. So the practical value and the market prospect are considerable

15

You might also like