Iot Car Fingerprint
Iot Car Fingerprint
INTRODUCTION
In recent years, the security of life and property has been a serious concern to humanity. It is
one of the most significant concerns confronting governments, institutions, and individuals. In
conventional authentication, common security mechanisms such as the use of keys, passwords,
and cards are employed in home environments and hotels. However, a single authenticated
access mechanism that is not trustworthy and dependable compromises these security measures,
The crime that is potentially growing the fastest in Nigeria is vehicle robbery. Open space
car theft: Typically, the majority of automobiles are taken when they are in motion (65%) or
from the owner's residence (15 percent). "Clean" vehicle robbery is the term used to describe this
kind of auto theft. Better health precautions are needed because of the population growth and
heavy vehicle use. This problem might be solved by sending anti-robbery systems on board, but
doing so will cost more money for car owners. Some people install anti-burglary devices in their
cars to deter theft, such as LoJack, ProScout, and TravelEyes. The majority of the devices
IoT refers to a system's ability to create information over another system without human
intervention. The Internet of Things (IoT) refers to the billions of physical objects connected to
the Internet worldwide, the majority of which gather and even contribute information. Because
virtual devices are so common, everything from a little medication to something as large as a jet
can be converted into an IoT component. The IoT is coordinating the programmable and
physiological worlds to make our physical environment more perceptive and open in the long
run. IoT was first primarily suited to business and manufacturing, where its implementation is
1
usually referred to as machine-to-machine. The focus is now on putting smart gadgets in our
homes and workplaces to make them more useful all the time. Changes in several segments
would result from the innovation's blending and opening up new opportunities. IoT
advancements in the upcoming years appear promising. IoT innovations will likely be combined
with other specialized innovations like artificial intelligence (AI) and self-governing systems to
produce coordinated, brilliant solutions [9]. IoT innovations will typically prepare billions of
common objects with communication and understanding. It has recently been widely
communities, smart home applications, wearable technology, and social insurance. IoT Sensors,
IoT Data Analytics, IoT Monitoring and Control System, IoT Connected Plant, Smart Supply
Chain Management, Smart Barcode Readers, Smart Grids, Connected Healthcare System, and
This proposed system would help find the person trying to access the car by sending his or
her fingerprint to the email of the car owner, and with this fingerprint, the person can be gotten.
This would involve the use of fingerprint sensor as well as the Arduino device. These two
devices will help get any user's fingerprint once he or she touches or holds the car handle. A
fingerprint is usually unique for each human, and this would make it easy to trace any user that
tries to steal a car. The proposed system is meant to achieve the bridging of insecurity issues that
arise when cars are stolen or hijacked. Some major components (hardware and software) needed
to achieve the aim of this project are ESP32 (Microcontroller) , FPM10A Fingerprint Sensor,
MIFI/ Wireless device Internet Enabled Device Cloud, TP4056 Charging Module , MT3608 DC-
2
1.2 Statement of the problem
One of the most difficult things to discover is a stolen car. If at all a stolen car was found, it
must have gone through tedious process in locating the car or the person who stole the car. This
difficulty has made most car owners who lose their car to give up easily without even making
any effort in finding the car. Due to the alarming increase in auto thefts in the twenty-first
century, which has seen fast industrialization and modernization at its technological pinnacle,
automotive security has emerged as one of the most pressing issues. Car thefts are on the
upswing right now, especially in lower-end vehicles with keyless entry that lack sophisticated
security measures. The alarm system has numerous vulnerabilities that enable thieves to break
into cars and make it difficult to find them once they have been stolen. We introduce a
revolutionary fingerprint-based security system in an effort to find a solution to this issue and
i. Develop a fingerprint capture system for car doors using arduino board
1.4 Methodology
The system would be built using ESP32 module which has wifi capability, it is interfaced with a
fingerprint sensor which is responsible for capturing fingerprint images and storing the image file on its
buffer memory and the image file will be transferred into the microcontroller memory in the program for
further processing. The ESP32 is connected to the MIFI/ wireless device and this makes it possible for
3
the ESP32 to be internet enabled to send the email message using SMTP protocol. Both the ESP32 and
fingerprint sensor will be powered by a 3.7V lithium ion battery through a DC-DC converter which
regulates the battery voltage to 5V and the battery will be charged using the TP4056 charging module.
The system works by capturing any fingerprint it detects by the fingerprint sensor, the
detected fingerprint image is converted to its binary representation which is processed and stored
in the microcontroller file storage system as a binary (.bin) file, the binary file is then sent over
the mail to a dedicated user email address automatically which takes nothing less than 10
seconds, the intruder, in this case, has no idea that his or her fingerprint has been detected and
sent to an email. The car owner is notified of this attempt or intrusion on the car and the resultant
binary file which contains the binary representation of the fingerprint is converted to a bitmap
image using a python script running on a system. The fingerprint is saved for future purposes or
in the case of theft, the fingerprint can be used for tracking the individual. The system can
capture as many fingerprints as possible and send it to the mail. The flow diagram for the system
4
Start Module
No
Is Fingerprint
detected
YES
Capture Fingerprint
END
5
Figure 1.1: Flow diagram for the system
Biometric and Vehicle monitoring are the main areas to improve vehicle security, this
project incorporates a method of capturing fingerprint of any intruder and send the resulting
fingerprint over the internet to the user email which notifies the user of a possible car theft and
the assists car owners to detect whoever made an attempt to hijack a car or steals a car. It further
reduces the time and effort put into process of attempting to find a stolen car.
6
CHAPTER TWO
LITERATURE REVIEW
2.0 Introduction
This chapter contains reviews of different journals, papers and research works that has been done
by others in relation to the proposed system “development of an IOT car handle with fingerprint
capture sensor”.
2.1.1 Introduction
It was highlighted in this paper that people feels it hard to unlock the key of the vehicle
which are under perfect working condition as well as security for the vehicles is growing in risk
manner such as theft and vehicle detection. So in order to bring a solution for this problem, a
system such as this can be implemented. This system helps to monitor vehicles by using a
fingerprint device with a user database accessing the adopted wireless fidelity module. Using this
wireless fidelity module, it can access the location of the vehicle when being loss. An LCD
display is used in order to display the commands which can be accessed by user under the
influence of fingerprint module. The vehicle is being controlled using an android app in mobile
INTERNET OF THINGS and it can also unlock the vehicle using fingerprint sensor manually
7
even without having a key. So these improve security parameters and it is user friendly which
2.1.2 Methodology
This paper is to design a system which is user friendly that helps vehicle users to maintain their
vehicles in a secured manner. In wireless vehicle controlling system to monitor the vehicles
information and compared with user biometric information when these two are matched vehicle
will be ON without using any key, whenever the vehicle is ON condition information will be
displayed.
Fingerprint includes two parts, fingerprint enrollment and fingerprint matching. In enrolling, user
needs to enter the finger two minutes. The system will process the two minutes finger images,
generates a templates of the finger based on processing results and store the templates. When
8
matching, user enters the finger through optical sensor and system will generate a template of the
The IC number for this arduni uno is ATMEGA328. It requires power supply for this ARDUINO
UNO is 3.3v to 5v.The UNO is the one of the best board in order to start with any electronic
equipment as well as coding, the UNO is the most used and documented board of the whole
ARDUINO family. The ARDUINO is micro controller board. The usage of bridge rectifier is to
convert ac voltage to dc voltage. Code dumper is used to dump program to your hardware kit.
Crystal oscillator is used to maintain the constant frequency levels and also required capacitor is
connected in between that is used to remove if power contain small amount of ac, the capacitor
can be removed that ac power and also required 7805 voltage regulator, the usage of that is to
convert the 12 volts of dc voltage to 5 volts of dc power and also protect the board from the high
voltages, at last one capacitor is required for elimination of ac power to get pure dc power at last
This paper provides a model of controlling vehicles theft and detection using
User won’t be notified if he/she is far away from the system as it uses only buzzer sound
Exclusions: - the limitation to this system is that some certain people will be excluded
from using the system for example, older people with a history of manual work may
9
struggle to register worn prints into a system or people who have suffered the loss of
fingers.
2.2 Fingerprint Authentication and Mobile App Based Monitoring of Vehicles Using
2.2.1 Introduction
Biometric and Vehicle Monitoring are main aspects to improve the Car Security. The paper
incorporates a method of using finger impression sensor for unique mark validation, ringer
sensor for flagging sound, GSM module for correspondence between a registering gadget or cell
phone, GPS module for finding the area of vehicle, Wi-Fi module that can establish a connection
between any microcontroller and Wi-Fi network, the vehicle security can be monitored through
Blynk application So that Car Theft and Real Time monitoring Can be done.
2.2.2 METHODOLOGY
In the proposed framework, it gives a simple security to the vehicles by utilizing Fingerprint
verification yet also, an observing framework to the vehicle proprietors with the assistance of a
cloud-based application which is the Blynk App is included. The working procedure of the total
10
The proprietor of the vehicle must get enlisted in the Blynk application giving the proprietor's
subtleties like the name, telephone number, and the fingerprints to the Blynk Cloud. At that
point, the proprietor can go about as an administrator to the Blynk application introduced on the
portable.
As we have introduced the unique mark sensor on the entryway handle of the vehicle, one needs
to embed their finger impression on the sensor to get passage to the vehicle. The enlisted
individuals can get to the vehicle. If at all an unapproved individual attempts to get to the
vehicle, effectively set bell gets enacted and sounds the caution to alarm the proprietor.
Furthermore, since, we have set a GSM module, the proprietor gets an alarm message.
In case if the vehicle has been robbed by using any unethical events, still the owner can catch the
location of the vehicle because of the GPS placed in the vehicle. By using a special feature of the
proposed system the engine of the vehicle can be shut down with the help of EUC.
1. Arduino IDE: Arduino IDE is open-source software that is primarily used for coding and
compiling programming to the Arduino machine. It's an approved Arduino program, rendering it
so simple to compile an application so even an average citizen with little previous technological
experience will get their feet wet in the learning method. It is comfortably, accessible to
operational systems such as a MAC, Windows, Linux, and runs on the Java Platform.
2. Fingerprint Sensor: R307 Fingerprint Module comprises of optical unique finger impression
sensor, fast DSP processor, superior unique mark arrangement calculation, high-limit FLASH
chips and other equipment and programming creation, stable execution, straightforward
structure, with finger impression section, picture preparing, finger impression coordinating,
11
3. GSM Module: GSM device is a modified system that utilizes a SIM card and works with a
network provider connection, much like a cell phone. GSM (Global Network System) requires a
mechanism called a circuit swap. This form of contact enables a route to be formed between two
machines. When the two computers are linked, a continuous stream of digital data is transmitted.
GSM networks are of the central Switching Service (SS), Base Station (BSS), and Mobile
4. NODE MCU: ESP-MODULE 8266, which transfers the data from an Arduino to an IOT
platform from which the user can access it. The Wi-Fi module is equipped with the TCP / IP
protocol and has SOC in its own right. When connected to an Arduino board, ESP-8266 can
easily provide Wi-Fi, as it has its own software sense. It acts fundamentally as a scaffold
12
Figure 2.4: Circuit diagram of the project
Improved security to shield the vehicles from being gotten to by unapproved people with ease
2.3 Car Security System using Fingerprint Scanner and IOT (Sayantam et al., 2017)
2.3.1 Introduction
This paper presents a noble system to detect vehicle thefts. If an unauthorized person tries to
steal the vehicle, user and police station will be notified with GPS location. Methods:
Fingerprints stored in the memory of the system. If the fingerprint and RFID matches with the
stored ones then the controller triggers the powering circuit of the ECM else if the burglar tries to
start the car in any other ways it sends the alert messages of the interventions as well as the car’s
location to the owner’s mobile app via cloud. Findings: The system is implemented using Intel
Galileo gen2 board. The GPS, GSM, Wi-Fi module as well as an SD Card is also connected to
the board. Installing this smart system is helpful because this system won’t let the ECM to power
on the engine as designed. The system also incorporates certain other sensors to stop the car
13
burglary. If the burglar tries to turn on the battery by using paperclips in the fuses then the owner
will be notified about the past proceedings along with GPS location of the car. Application: The
system works well with low-price range car employed with keyless entry and self-start button
and is unique because it uses IoT to protect the low price cars.
The components include an Intel Galileo gen 2 kit, RFID3 sensor, fingerprint sensor, a 7408 IC,
a 7404 IC, SD card, GPS1 and GSM2 module and an Intel Centrino 7260 Wi-Fi module. The
main circuit shown in Figure 1 and 2 demonstrates the method which includes the sensor and a
FOB which is manufactured by the car manufacturer. The FOB and RFID3 sensor are
electrically coded with the radio frequency range. When the correct radio frequency matches
between the sensor and FOB as programmed, then the user needs to scan their fingerprint using
the fingerprint sensor which validates only when the present fingerprint matches with the stored
fingerprint. The device has an option of setting one authorized user and 4 other guest users who
will be allowed to use the car. These guest user fingerprints can be updated even from the mobile
app of the user. Now once the RFID3 receives a radio frequency from the FOB and a fingerprint
input is detected by the sensor, then the output of the two sensors is given to the 7408 IC as an
input to perform a logical AND operation. As the truth table of AND gate is known when both
the inputs’ are 1 the output is also 1. Similarly when both the correct values of the RFID3 sensor
and fingerprint sensor are given as input to the 7408 IC then the output is high which is given to
the processor at the receiving end at pin no. 0. Then the processor transmits high values to the
powering circuit of the ECM5 from pin no 1. The system also incorporates a Mobile app which
is explicitly programmed for the Owner’s Smartphone. The app is customized to preprogram the
system which generally includes storing the fingerprint of the authorized users as well as
changing the pre-stored data when needed. The very next possible way of burglary is by putting
paperclips in the fuses and thereby starting the car through the battery-starter circuit connection.
14
This can also be stopped by using certain digital sensor (namely LED module) which glows
when the power is given and vice -versa. This module’s output can be given to the 7404 IC
(NOT gate) which inverts the value and is then sent to the Galileo at pin no.2 (the receiving end)
and correspondingly the pin no. 3 transmits the necessary details to the GPS1 and GSM2 module
The simple operation of the proposed architecture can be easily understood by the flow diagram
shown below.
15
Figure 2.7: Flow diagram of system operation.
The system has been implemented on Intel Galileo gen2 board along with other modules and
tested for its reliability. Even if owner loses his key-fob or someone copies the radio frequency
of a key fob, he is not able to start the car engine. The alarm sounds as soon as three wrong
entries are detected by the fingerprint sensor. A notification is received in the mobile application
with the location of the vehicle as soon as wrong entry detected by the fingerprint sensor. The
GSM SIM 900 notifies the owner of the vehicle (though a notification mode on the
Only fingerprints in the database can access the vehicle in the proposed system.
The proposed system did not cater for emergency situations where a fingerprint ready to
2.4.1 Introduction
This paper is about building a prototype of vehicle ignition using fingerprint sensor. This
system can prevent the vehicles from being stolen. It is developed to control the ignition of the
vehicle through the fingerprint scanner. This system consists of GSM SIM 900 that connects to
the Arduino which is the micro controller of the project. To make sure the system is secure, only
authorized fingerprint is paired with the Arduino to start the ignition. Vehicles ignite when the
enrolled fingerprint is matched against the fingerprints in the database while users with no match
16
in the database are prevent from igniting the vehicle. A theft alarm from buzzer, a notification to
the owner’s mobile phone via GSM SIM 900 and status display in the LCD are the appropriate
signal to the owner. This article describes briefly in detail about the design and implementation
First the individual must register themselves in the biometric system database. This begins as the
fingerprint of an individual is acquired by a scanner. Followed by the verification task that will
identify the individuals. The biometric reader will take note on the individual’s fingerprint so
that could be determined and converts it to a digital format. Final task is identification which the
system differentiates the input of the biometric in the system database. The result is either
17
Figure 2.8: HARDWARE SETUP
Hardware circuit connection: Connection of all the hardware’s are done accordingly. LCD pins
are connected to A0, A1, A2, A3, A4, A5, fingerprint scanner connected to pin 2 and 3, GSM to
pin 10 and 11 (RX, TX), push button pin 4, 5,6 and 7, relay to pin 12 and buzzer to pin 13.
For verification on the functionality correctness of the developed product, a series of testing
operation took place as the final step of the project work. The tests showed successful results for
the different appliances when switched ON and OFF using the apps that has been developed.
Some of the functionality testing details are given in pictures by next paragraphs.
18
Figure 2.10: The yellow LED will turn ON when the ignition starts.
This void Enroll functions to add in fingerprints in a specific location or a specific Id. The enroll
process works when the fingerprints are first placed on the scanner to be read, remove and the
place it for the second time for confirmation of the fingerprints. Once the fingerprints are read, it
will store in Arduino and displays as “Stored” while if no fingerprints detected it displays as “No
Finger”.
19
Figure 2.12: Enroll Finger for the first time.
Figure 2.13: Enroll Finger for the second time for confirmation.
20
Figure 2.14: Fingerprints stored.
Analysis of this project is done by scanning the fingerprint of registered users. The project’s
result is obtained after making sure all the components in the project functions fine. Five
registered users attempt to run the ignition has been recorded. All the five fingerprints have
21
Figure 2.16: Final output when the authorized user is detected.
Successful output of the ignition system is shown in the LCD as per figure above. When the
authorized user is detected, LCD user displays the status, along with LED yellow ON and motor
starts ignition. The reading of the fingerprint sensor will not be always the same since it depends
on the fingerprint’s condition as well as the scanner. Somehow, the fingerprint scanner will
detect the authorized user’s fingerprints detail and allow the vehicle to start.
The project’s objectives for development of vehicle ignition using fingerprint have been
successfully developed. In a nutshell, this prototype of vehicle ignition using fingerprint scanner
is successfully developed. This system operates fine in regard of enrolling new user and deleting
registered user. Appropriate steps to notify the authorized user via SMS using GSM is
successfully done in this project. SMS’s are sent to the owner when the vehicle is turned on and
when an unauthorized user is detected. Besides that, the status of the user is displayed in LCD.
LCD displays the status of the vehicle when the vehicle is on, ready to start and fingerprint’s
condition. Output of this system is revealed through LED and motor for a successful user
attempt. LED will light on and the dc motor will start running saying the ignition is successful
while the buzzer sounds showing the attempt of unauthorized user is failure. This fingerprint
technology focuses on automobile and is only possible for the authorized user to use. In the case
22
of implementing this system on locally manufactured vehicles will make the car security system
GPS and RFID are used to trigger an alarm when an unauthorized person uses the car
The car security system proposed in this paper is specific to some cars
2.5 Development of an Anti-Theft Vehicle Security System using GPS and GSM
2.5.1 Introduction
Akinwole created an effective anti-theft vehicle security system which integrates Global
Positioning System (GPS), Global System for Mobile Communication (GSM) and Biometrics
technologies (i.e. fingerprint) for user identification and authentication. They further explained
that theft security of vehicles in common parking places has become a matter of great concern
Thus, a system capable of identifying and tracking the geographical location of a remote vehicle,
which requires constant surveillance of the vehicle is needed. The system consists of GPS
module, GSM modem, fingerprint scanner sensor, Espress if ESP32 development board, 4WD
Double Layer Smart Car Chassis and Immobilizer Anti-theft relay. GPS and GSM modules were
utilized to prevent theft and to determine the exact location of vehicle and a fingerprint reader
module to identify authorized persons and thus start the engines. The GSM modem enables a
two-way communication between the user and the system. The micro controller was
23
programmed using embedded C/C++. The fingerprint readings and also SMS commands were
used to immobilize and demobilize the vehicle via relay, thus protecting the cars from theft and
unauthorized users.
The antitheft system is divided into two main sections which consists of the system hardware and
system software.
Express if ESP32 microcontroller is a low cost and low-power system on a chip (SoC)
microcontroller with Wi-Fi and dual-mode Bluetooth capabilities. It is used and programmed
using computer running on Windows, Linux and macOS. It incorporates a single 2.4 GHz Wi-Fi
andBluetooth combo chip designed with the TSMC ultra-lowpower 40 nm technology. The
integration of Bluetooth, Bluetooth LE and Wi-Fi ensures that a wide range of applications can
be targeted, and that the module is future proof: using Wi-Fi allows a large physical range and
direct connection to the internet through a Wi-Fi router, while using Bluetooth allows the user to
conveniently connect to the phone or broadcast low energy beacons for its detection.
24
Dual Antenna Interface GPS Mini NE0-7N EEPROM Satellite Positioning Module
The NEO-7 series is a high sensitivity, low power GPS module that has 56 channels and outputs
precise position updates at 10Hz. It is built on an exceptional performance of the U blox 7 GNSS
(GPS, GLONASS, QZSS and SBAS) engine. The NEO-7N provides best performance and easy
capability with flexible connectivity options in a small package. This makes it perfectly suited
for industrial applications with strict size and cost requirements. The I2C compatible DDC
interface provides connectivity and enables synergies with u-blox SARA, LEON and LISA
cellular modules. For the purposeof the research work, the UART (Universal Asynchronous
Receiver/Transmitter) interface will be used. The figure below shows the U-blox NEO-7 GPS
module.
This is serial GSM / GPS core development board based on A7 and it supports GSM/GPRS
Quad-Band ( 850/900/1800/1900 ) network, voice calls, SMS, GPRS data service and
incorporates an embedded GPS function. The board features compact size and low current
consumption. With power saving technique, the current consumption is as low as 3mA in sleep
mode. T9his communicates with microcontroller via UART port, supports command including
25
GSM 07.07, GSM 07.05 and Ai-Thinker enhanced AT Commands and supports 3.3V and 4.2V
logical level. Figure 3 below illustrates the A7 GSM, GPS and GPRS Module.
The optical fingerprint scanner module is a fingerprint processing module for integrating the
light path and fingerprint processing part. CAMA-SM25 is an ideal OEM embedded optical
fingerprint module designed for biometric security solution. It is a small size, low power
consumption, simple ports, high reliability, small fingerprint template (496bytes), large
fingerprint capacity module which incorporates a fingerprint sensor and processor chip. The
CAMA-SM25 embedded optical fingerprint module has outstanding features like self learning
function. During fingerprint authentication processing, the fingerprint module will update the
latest fingerprint features to the fingerprint database automatically, so that the users will feel it
obtains better and better fingerprint verification performance. The image depicts the Optical
Fingerprint scanner.
26
Figure 2.20: Optical Fingerprint Sensor
This 4WD double layer smart car chassis consists of two pairs of Geared Motors and Wheels.
The chassis used in this kit is transparent acrylic board so as to create dynamic handling of the
components mounted on the robotic vehicle. The Smart Car Chassis 4WD is made of imported
acrylic material with high-precision laser cutting. It is featured with a double rotary encoder disk
27
The GPIO pins of the microcontroller do not give the amount of current required by the geared
motor, thus a motor driver is required. The NodeMcu Motor Shield is a driver module for motors
that is used to control the working speed and direction of the motor.
Relays are switching devices that open and close circuits electromechanically or electronically.
Relays control one electrical circuit by opening and closing contacts in another circuit. Figure 7
Power supply: NCR18650B 3.7 V12000mah 18650 Lithium Rechargeable Battery, 18650
Battery Charger for Li-ion Ni-MH Ni-Cd Ni-md, Capacitors, Resistors, AMS1117 3.3V and
28
Figure 2.24: Block Diagram of the System
The ESP32S microcontroller is programmed using embedded C/C++, HTML and CSS for future
Development Environment (IDE) for Google's Android operating system. The Android
applications are written in Java. However, they run on Dalvik Virtual Machine (DVM), an
android own Java Virtual Machine which is optimized to support only lightweight mobile
operating system. The Android Studio and SDK tool are downloaded and installed from the
Android platform. The basics of the environment was studied from the Android Studio
Documentation, thus understanding its architecture and features. On running Android Studio on
the OS, it automatically detects Java and it downloads some of the build tools. The Graphical
User Interface (GUI) that enables the user to interact with the application, controls the vehicle
chassis for test purposes and registers new users to the system is designed using Java
programming language after the complete build-up of the application and setup.
29
Figure 2.25: Android Studio Integrated Development Environment
The algorithm of the Anti-Theft Vehicle Security System consists of the overall system design
algorithm which segments into GSM Control Subroutine. The algorithm is generated using C+
+programming language and are graphically represented using flowcharts. The main purpose of
the flowchart is to analyze the different processes of the program. The Anti-theft Vehicle
Security System algorithm includes the following steps: algorithm is generated using C+
+programming language
30
Figure 2.26: Anti-theft Vehicle Security System Algorithm
The test carried out on the system proved that the user of the device can remotely demobilize the
vehicle in real time using SMS commands and Mobile application through cellular network and
internet respectively. In cases of hijacking, the vehicle user can leave the car safely, and then
he/she could use any phone to send out some commands and remotely cut off power supply, so
as to stop the vehicle from moving and thus get it back. The location of the vehicle could be
found out accurately when the latitude and longitude values obtained and passed into Google
Map Fragment in the C-Secure Application interface developed for the system, the location of
the vehicle could be found out accurately. With the integration of the fingerprint authentication
unit, the vehicle security was improved due to the fact that only authorized users can start the
31
vehicle. The ability to be able to reduce the random occurrence of vehicle theft in our society is
One of the improvements done to previous works was the integration of an authentication system
and the use of the real time cloud database for data storage. The incorporation of this protection
system alerts the user by sending a text message and can use GPS for parsing the strings,
Latitude and Longitudinal information of the vehicle for the purpose of tracking it and send a
text message for the purpose of stopping it will enhance safety and security. Also, the integration
of fingerprint authentication unit and server-less control mechanism helps to regulate the access
of intruder, thus there is difficulty in starting the car. This will prevent the car from theft and
The smart anti-theft security system can be made more efficient and secured by incorporating
other biometric identification systems like Face Recognition alongside the fingerprint
authentication feature for more secureness. Additional technology like Radio Frequency (RF),
Camera and some touch screen-based application can also be adopted. The system is not only
limited to vehicle security, it can find real time application in shipment or courier service
companies for cargo monitoring, transportation companies and petroleum distribution truck. The
web based android application tracking fragment can be modified for individual tracking, thus
32
Figure 2.25: Circuit diagram
Combination of GPS, fingerprint authentication and GSM techniques increases the theft security
of vehicles
2.6 Development of Vehicle Door Security using Smart Tag and Fingerprint System
2.6.1 Introduction
Research and development advancements in the area of Vehicle Door Security using Smart
Tag and Fingerprint System. This research implemented for security purpose to protect the safety
of vehicle from vehicle theft or burglary. It is very useful and important for alert the people who
have vehicle to protect it from theft. This is a very important system to be implemented at the
main handle of vehicle. The system started to work when the user access either than one system
fingerprint or smart tag to lock and unlock the door. The fingerprint system only user can access
33
their fingerprint whereas the smart tag system can access by user or user’s intimate relative when
they borrow the vehicle for emergency. The vehicle door cannot be opened when unmatched
fingerprint is access or incorrect smart tag is access. Once the incorrect smart tag is access by
unauthorized person, the buzzer will be activated and produce a high level of alarm sound to
alert the user. The Arduino Uno microcontroller is controlled by the entire system of the project.
Hence, it is easy to implement and available to use because it has a simple function, so this
system can be enhancing with modern technology so it can be applying into vehicle part for
2.6.2 METHODOLOGY
There are eight important elements are plays to execute this project successfully which are RFID
sensor, fingerprint sensor, Arduino Uno, LCD, Stepper motor, power supply, LED and buzzer.
RFID sensor, fingerprint sensor and LCD act as input as well as Stepper motor, LED and buzzer
act as output of this project. When user accessing, the microcontroller will receive information
from inputs and it will interpret the information. Then, the information will be transmitted to
output. For example, when user access the RFID tag, the security code will receive by Arduino
Uno to interpret whether it is correct tag or not. Once, the information is conveying to lit up the
34
LED and the stepper motor acts to lock or unlock the door as an output. The buzzer will activate
35
Figure 2.28: Circuit diagram
This implement easy to be tracking the vehicle exact location after theft the vehicle and
2.7 A Study of Biometric Approach for Vehicle Security System Using Fingerprint
2.7.1 Introduction
Kiruthiga explained that the use of vehicle is a must for everyone. In the same way,
safeguarding the vehicle against theft is also very essential. Impediment of vehicle theft can be
used in all the areas. A competent automotive security system is implemented using embedded
system along with Global System for Mobile (GSM) and Fingerprint Recognition. This paper
gives a literature survey on the vehicle security system using person identification techniques.
The survey mainly emphasizes on major approaches for automatic person identification, namely
fingerprint recognition and various existing vehicle security system. The security system can be
37
Figure 2.29: Flow chart for the security system
This project is aimed at improving the security level. As the fingerprint is a promising biometric
pattern for personal identification in terms of both security and ease of use. This is a unique
method of designing and assembling a low-cost, compact theft control system for an automobile.
The work presented demonstrates the initial phase of an embedded car that will be visible in near
future. Customized vehicles will not only provide a more interesting drive but also safer one.
This paper presented the performance analysis for fingerprint biometric. It presents apparent
advantages over password and token-based security. The survey represented the issues associated
to uni-modal biometric systems. It can be concluded that automatic Fingerprint recognition is the
biometric technology that can be used for security in terms of usability, size, privacy and
operational temperature range. The proposed security system can be used to reduce the increased
vehicle theft and allows the owner to identify the intruder thereby having the vehicle under
38
his/her control. It is applicable to car, truck, armored vehicle, yacht, boat or heavy equipment
vehicle. The system is also reliable to be used in other authorization applications involving
This paper proposes a unique method of designing and assembling a low-cost, compact theft
An Info-Security Circuit Board which communicates with Engine Control Unit (ECU) and
sensors inside the vehicle Bus, Flex Ray and most of the bus communicates with other vehicles,
road-side infrastructure and cellular phones with wireless interfaces. The shortcoming with this
system is that the data timeliness and network delays to realize reliable secure car
communications
2.8.1 Introduction
The primary objective of this paper is to shield the vehicle from any unapproved get to,
utilizing quick, simple to-utilize, clear, dependable and efficient unique finger impression
acknowledgement strategy. With this system, when someone is trying to steal the bike, it alerts
the owner when he is at nearest distance as well as when he is far away from the bike. But with
this alarm it is not possible to alert the owner who is unable to hear that alarm. So, in that case,
we can use IOT web server network to send the text message to the owner at his phone. This
vehicle security framework insinuates the status of the vehicle to the legitimate individual
39
utilizing the internet of things correspondence innovation. The concept of the wireless vehicle
security system (WVSS) using IOT we are used in this project. This is a framework that uses
PC’s, mobiles and smart phones to control vehicles smartly, intelligent and automatically
through internet from anyplace around the globe to enhance security systems in vehicles. Among
many IOT applications smart security system play an important role in realizing vehicles across
the globe.
The circuitry of this Arduino fingerprint security system is very simple; it includes the Arduino
which controls the entire process, the push button, the buzzer and the LCD. Arduino controls the
entire process. The push button is connected directly to the ground with the Arduino's pin D14
(ENROLL), D15 (DEL), D16 (UP) and D17 (DOWN). The Arduino's digital pin is connected to
the D7 for ground through the yellow LED 1K resistor and the green LED is connected to the
Arduino's D6 with the same method. The Rx and Tx of the fingerprint module is directly
connected to the software serial or digital pin D2 and the Arduino's D3. The 5v supply is used to
power the fingerprint module taken from the Arduino board, and the servo motor is connected to
the Arduino's PWM pin D5. In the design of this fingerprint-based vehicle startup system,
signals are generated by the arduino for the appropriate volume circuit. The whole system aims
to be built into a plastic envelope which improves the heat discharge and the work efficiency of
the system. The arduino reads the position of the input buttons to be 1 or 0. The signal from the
input button tells the arduino what to do at the time. This project aims to replace the push-button
on the vehicle ignition and create a more reliable and safer way to start the ignition only with the
fingerprint pattern. The Arduino environment is designed to be easy to use for beginners with no
software or electronic experience. With Arduino, you can create objects that are responsive and /
or control light, sound, touch and movement. Arduino has been used to create an amazing variety
of things, including musical instruments, robots, light sculptures, games, interactive furniture and
40
interactive clothing. Arduino is used in many educational projects around the globe, especially
by designers and artists who needed to easily create prototypes, but do not need a deep
understanding of the technical details behind their works. Since it is designed for use by non-
technical people, the software has plenty of example code to demonstrate how to use the various
features of the Arduino board. When registering, the user must enter the finger twice. The system
will process two-time finger images, create a finger template based on the processing results and
save the template. When applicable, the user enters the finger through the optical sensor and
computes a template of the computer's finger and compares it to the templates of the finger
library. For a 1: 1 fit, the computer will match the direct finger of the specified template in the
module; for 1: N matching or searching, the system searches the entire finger library for the
applicable finger. In both cases, the system will provide an applicable result, success or failure.
41
Figure 2.30: Circuit Diagram
2.9 Smart Security for an Organization based on IoT (Mohd et al., 2017)
2.9.1 Introduction
This research describes a low cost and flexible security system which is basically based on
Arduino with necessary interface to enable Internet and the control of power through Global
System for Mobile Communication (GSM) & Bluetooth module (HC-05). This paper consumed
more real life interactions along with embedded software solutions. In this project a password is
set for the access of all sensors, for this we use LCD Display and Keypad. Motion sensor, gas
module, reed sensor, laser sensor, all the sensors are used to detect theft and unwanted
occurrences. Control Panel Interface of Web Server and android voice control both are created to
control of all lights of the organization and for the purpose of power savings. The proposed
system requires minimum human intervention to control the system. This research ensures the
safety of organization from unwanted occurrence and theft. The main contribution of this paper
is that it not only helps to ensure the security of an organization but also energy efficient and
time saving.
42
2.9.2 Methodology of the study
To demonstrate the feasibility and effectiveness of this system, devices such as GSM, Bluetooth
module, PIR motion reed sensor, gas sensor and laser sensors have been integrated with the
proposed Security system for an Organization. This integration is basically done for the purpose
of higher security to maintain an organization in a proper and secure way. This system has two
main modules: the hardware interface module (Arduino, GSM, Bluetooth and Sensors) and also
the software communication module (Web application & Android application). The core
component of the system is Arduino Mega 2560 microcontroller that is additionally capable of
functioning as a micro web server and also the interface for all the hardware modules. All
communication and controls during this system go through the microcontroller. As we have
already said that our project is the integration of several mini projects to make more efficient,
flexible, low cost and reliable security system. So the objectives of proposed system are divided
into two parts. The first one is controlling the appliances of the organization and second is
HARDWARE DESCRIPTION
I. Arduino (Mega2560)
43
In the image below the Arduino Mega is the driver behind our entire project, not only does it
receive and interpret signals from our sensor devices, but it also allowed us to run the program
entirely on it (lacking the benefits of the GUI and inexpensive cameras of course). Our reasoning
for picking the Mega was that we knew for our prototype it would supply ample configurability
and we would not have to be concerned with running out of connectors. This microcontroller
uses 3.3V and 5V to power its related devices and is itself powered either by USB 500mA or can
be powered via an external source up to 12V. We decided to power using USB partially due to
convenience and also the added benefit of limiting harm done to the system by any mistakes we
could potentially make in connections. The Mega is affordable at roughly sixty dollars.
This sensor is our typical passive infrared device. It detects motion at a distance of about 20 feet.
This unit is relatively simple and has two output modes to choose from. We chose to use the high
signal when motion was present. These have a retail cost of about ten dollars.
44
In the image below the MQ-2 Gas Sensor module is useful for gas leakage detecting in home and
industry. It can detect LPG, butane, propane, methane, alcohol, hydrogen and smoke.
The laser is set as pointer in such a way that the ray will be fall on to the photo resistor. If any
intruder passes through the ray and when the ray doesn't fall on the photo resistor then the buzzer
PIEZO buzzer
In the image below the buzzer or beeper is an audio signaling device which may be
electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm devices,
In the image below the SIM800 series modules support Hyper Text Transfer Protocol
application. Which provides a mode to alternate of HTTP server. The basic application contains
GET, POST, HEAD methods. SIM800 series modules support File Transfer Protocol
application.
45
IV. Four frequency: EGSM900, DCS1800, GSM850, PCS1900, can automatically search the
four frequency bands. You can also set the frequency band through the AT command.
In the image below the following Bluetooth is one of the popular wireless communication
technologies because of its low power consumption, low cost and a light stack but compensates
on range. The remote unit can be powered from 3.3V up to 6V for easy battery attachment. All
signal pins on the remote unit are 3V-6V tolerant. No level shifting is required
This system has been accessed by secure password through keypad. Display will help to see the
output. As following image shows how the system will work by password access.
46
As the following figures 11(a) (b) (c), all show that live demo of proposed system. Here, (a)
when movement detect around motion sensor (b) when door is unlocked by unauthorized people
(c) someone passes through the laser, the system notifies through LED display and it makes a
security alarm. After that, through GSM, it sends an SMS “Motion detected/Door
Unlocked/Theft detected!!! Take Necessary Steps” to the authority as well as the police station.
After that, the following image below shows when fire or gas detect around gas sensor, the
system notifies through LED and make a security alarm after that through GSM, it sends a SMS
“Fire Fire!!! Take Necessary Steps” to the authority as well as the fire station.
I. Online server
This research ensures the safety of organization from unwanted occurrence and theft, and
The connection of the wire is looks pretty much challenging and sometimes the sensors
The maintenance of the voltage for every sensor is pretty looks difficult because all the
sensors don’t need exact volt. In requirement base every sensors demands different
voltage
47
2.10 A Prototype Model of an IoT-based Door System using Double-access Fingerprint
2.10.1 Introduction
Akanbi explained that Security of lives and properties remains a trending issue of optimal
concern in the recent times. It is one of the major issues posing challenges to governments,
establishments and individuals. Common security techniques such as the use of keys, passwords
and cards are used in home environments and hotels for traditional authentication. Others include
lock codes, mechanical doors or electronics RFID Card Door. However, compromise of these
security techniques such as property theft and unauthorized entry by visitors and hotel staff is
due to a single authenticated access method which is not trustworthy and reliable. This calls for
an improved technique. An IoT-based Smart Door System Model that provide double access
authentication through fingerprint modules is presented for hotel and guest houses in this paper.
The proposed system architecture design specifies all the modules involved and the circuit
diagram designed specifies various modules inter connectivity. The prototype implementation
software developed in C programming language was tested with several series of captured
templates. The prototype test conducted showed that the Smart door system developed responded
only to fingerprint signature and unlocks the door when it matches with signatures captured
during booking.
Software engineering approach adopted for the design and implementation in this work is
prototyping. This is due to the high cost of real-life implementation in an hotel environment. So,
a small casing (box) with a front door was constructed to depict a door which has solenoid lock
48
and fingerprint sensor. The schematic diagram for the proposed architecture is shown below. The
hotel reception has fingerprint module, an Arduino with Ethernet Shield and a computer. Also, at
the entrance of the door, there is a fingerprint module. The prototype door is opened only when
the fingerprint frames captured during the booking at the hotel reception or during online
registration matches with the one captured at the entrance of the door.
The system architecture resent how different components exchange data through IOT. The
Circuit Diagram for the system was designed to specify various modules inter-connectivity. The
design implementation presented allows customer fingerprint templates captured while booking
for rooms physically or remotely and fingerprint template captured at the entrance of each room
to be stored on the web server. Finally prototype system unlocks the door only when both
captured fingerprints templates matches. Authors intend to integrate iOS touch ID with the
fingerprint sensor of the door lock to share a common fingerprint database so that users can
enroll their fingerprints directly from their phones. Furthermore, the door system availability can
be extended to android platforms, a speaking voice alarm to indicate the unauthorized person
accessing the Door and the proposed system can be made to communicate with modems or
mobile phones to alert the authentic user an the hotel management during his tenancy period on
The system allows fingerprints to be stored, composed, retrieve images (prints), delete
The proposed system is expensive and may not be easily accessed by majority
49
2.11 Real Time Smart Door System for Home Security (Burak et al., 2015)
2.11.1 Introduction
This paper presents a real time smart door system for home security. Most of the proposed
smart home systems try to bring solutions for this security problem, but many of those systems
use numerous sensor devices. With the increasing security issues, it is necessary to use new
technologies. Video based smart home security systems have recently become an efficient
approach with the development of video technology and Raspberry Pi is a strong and reliable
embedded system device for the complex and challenging tasks. Using these technologies in the
proposed system will bring several advantages in providing safety and security in terms of
visualizing and identifying people who visit the home. In the overall proposed system, there will
be two different significant techniques to provide home security. One is to use video technology
to see the front door in real time even if the home is empty and another is to provide
communication between the door system and smart phone device. By connecting the smart door
system with the mobile phone through the cellular network, the owner of the house may have
several opportunities such as controlling the house, getting instant video streaming, receiving and
sending message, talking to the visitor and starting the alarm system.
The experimental results indicate that the proposed system may provide a consistent support and
The algorithm uses the input images from a camera for communication. The image of home
visitor is delivered to the owner of the house via wireless communication. Figure 2 shows the
diagram of the video and sound communication system which will be pro- vided between the
50
Raspberry PI and Mobile device. The client may also send voice data to the smart door system to
talk to the visitor. Thus, there will be a communication between visitor and client. As a result,
client may know the visitor and inform the visitor for her/his current location. On the other hand,
the client may call the security if the visitor is unknown. Besides this, obtained images via a
The system is based on video technology which is a very popular technology for providing
security and safety in urban areas. The authors used Raspberry Pi because it is a strong and
reliable embedded system device for solving complex and challenging tasks. Using both
technologies in the system provide various benefits to increase the efficiency in terms of
communication between visitor and owner of the house and providing safety of home. In the
proposed system, two different important techniques have been used for home security. First is
the use of video technology to watch the outdoor and the second is to offer communication
between the visitor and owner of the house via door system.
communication between visitor and owner of the house and providing safety of home.
The limitation to this system it is possible to give hackers much information through
connected network.
Technological problem
2.12 IoT Security Applied on a Smart Door Lock Application (DJUPSJO et al., 2018)
2.12.1 Introduction
51
This describes the development of an IOT application based upon digitizing a smart door
lock for making it connected to the internet and able to recognize employees that work in the
office. This concentrates primarily on the security aspects by listing the typical security
challenges in IOT systems in general and summing these challenges up to develop a functional
and secure product from scratch. A microcontroller is chosen for this project and a test
environment is built to experiment and develop the security breaches. Architectural designs are
chosen for the API being developed and even for the Android Application. A detailed description
is made of the multi-master database represented by Azure active directory and its importance to
achieving the security of an essential security breach. A new technique called Eddy stone is
introduced in the project to serve the transmission protocol with Bluetooth beacons. The final
stage of this project is completing the development of the Android application and making sure
that all the subsystems developed do communicate with each other, to deliver a functional and
52
2.12.2 Strength of the study
The purpose of this paper is to study and evaluate a suitable set to develop a smart door lock
2.12.3 Limitation
A key challenge that is faced in this project is the security and privacy of the IoT systems. It’s
possible for IOT devices to be hacked and operating maliciously without you even knowing
2.13.1 Introduction
In this paper a fingerprint based car ignition system with a view to reducing car theft and to
ward off unauthorized users was designed and developed. Recently, car hijack has been on the
increase as armed robbers focus on stealing cars especially the brand new ones. Hence the need
to protect the cars from hijackers is considered to be essential. In this paper, nobody can ignite
the vehicle except authorized by designed system already captures its fingerprints pattern
features through enrolment into the system. This is achieved with the use of fingerprint module,
PIC18F4620 microcontroller and Liquid Crystal Display (LCD) module. More so, after testing
of the overall designed project, the results obtained were satisfactory. Hence, the approach
adopted in this study can be applied to various systems and fields such as banks,
53
2.13.2 Strength of the study
This paper executed fingerprint based car ignition system with the view of reducing car theft and
No proposed limitation
54
CHAPTER THREE
This chapter looks to analyze and propose a methodology for creation of an IOT vehicle
handle with a fingerprint capture sensor. It explains the proposed system in depth, including how
it works, the components that make up the system, and how they interact.
In recent years, the security of life and property has been a serious concern to humanity. It is
one of the most significant concerns confronting governments, institutions, and individuals. In
conventional authentication, common security mechanisms such as the use of keys, passwords,
and cards are employed in home environments and hotels. However, a single authenticated
access mechanism that is not trustworthy and dependable compromises these security measures,
This proposed system would help find the person trying to access the car by sending his or her
fingerprint to the email of the car owner, and with this fingerprint, the person can be gotten. This
would involve the use of fingerprint sensor as well as the Arduino device. These two devices will
help get any user's fingerprint once he or she touches or holds the car handle. A fingerprint is
usually unique for each human, and this would make it easy to trace any user that tries to steal a
car. The proposed system is meant to achieve the bridging of insecurity issues that arise when
55
3.2 Existing System Analysis
The existing system by (Puppala et al., (2019), helps to monitor vehicles by using
a fingerprint device with a user database accessing the adopted wireless fidelity module. Using
this wireless fidelity module, it can access the location of the vehicle when being loss. The
vehicle can be controlled using an android application in mobile INTERNET OF THINGS and it
can also unlock the vehicle using fingerprint sensor manually even without having a key.
ESP8266 wireless module by using a fingerprint module was adopted as the methodology. It
collects biometric information and compared with user biometric information when these two are
matched vehicle will be ON without using any key, whenever the vehicle is ON condition
User won’t be notified if he/she is far away from the system as it uses only buzzer sound
Exclusions: - some certain people were excluded from using the system, for example,
older people with a history of manual work may struggle to register worn prints into a
56
This proposed system will improve the performance and add more security to the existing
system, in which the system only validates fingerprints to ignite the system. This proposed
system would help find the person trying to access the car by sending his or her fingerprint to the
email of the car owner, and with this fingerprint, the person can be gotten. A fingerprint is
usually unique for each human, and this would make it easy to trace any user that tries to steal a
car.
Below are the definitions of the principles and hardware devices to be used in achieving this
system:
• ESP32 (Microcontroller)
• Cloud
• Status Indicator
• ESP32 Microcontroller
57
The ESP32 is a low-cost, low-power system on a chip (SoC) with Wi-Fi and Bluetooth
capabilities. It supports a wide variety of peripherals such as: capacitive touch, ADC, DAC, I2C, SPI,
UART, I2S, PWM and much more. It is one of the best solutions for DIY Internet of Things Projects and
FPM10A is a fingerprint scanner and reader module but does more than that like fingerprint enrollment,
image processing, print matching and many more. It processes the data and sends processed data to the
microcontroller through serial. The device uses a DSP chip that does image rendering, feature finding,
calculation and searching. It has an in-built flash memory that stores the data of fingerprint and enrolls
new – up to 162 fingerprints can be stored. It interfaces with the controller or any other system with TTL
serial and sends packets of data to take photos, detects print, hash, and search. The device has a red and
green LED light indication for the wrong and right prints.
58
Figure 3.2: FPM10A fingerprint sensor
TP4056 module is a linear charger lithium-ion batteries. This module can charge batteries consists of
single cells. Most importantly, it supports constant current and constant voltage modes of charging
operations. Users can select both modes. This module offers a 1-ampere charging current. Almost all the
electronic devices run with batteries. And these batteries can get discharged. Therefore, chargers are used
to charge them by putting energy into them. TP4056 is also a battery charger that has a fixed charge
59
Figure 3.3: TP4056 Charging module
MT3608 step up booster converter module is a small sized highly efficient and low cost module
is built for converting or boosting the voltage as low as 2V to max 28V DC with the maximum
output current of 2 ampere. The output voltage can be adjusted with the variable resistor used in
the module.
The module is using very less amount of components and the main component of the module is
MT3608 IC. MT3608 is a highly efficient voltage booster IC with many built in features like
over heat protection, low quiescent current, soft start function, low external components,
overheat shutdown etc. Other components used in this module are two ceramic capacitors, one
variable resistor, one resistor and one schottky diod and a 22uH inductor which is an important
60
Figure 3.4: MT3608
The 18650 battery is a lithium-ion cell classified by its 18mm x 65mm size, which is slightly larger than
a AA battery. They’re often used in flashlights, laptops, and high-drain devices due to their superior
capacity and discharge rates. 18650s come in both flat and button top styles, and usually boast 300-500
charge cycles.
61
• Push Button Switch
The push button switch is usually used to turn on and off the control circuit, and it is a kind of control
switch appliance that is widely used. It is used in electrical automatic control circuits to manually send
control signals to control contactors, relays, electromagnetic starters, etc. Its characteristic is that it is
installed in the machine and instrument in the process of work, most of the time is in the initial free state
position, and only when needed, it is converted to the second state (position) under the action of external
force. Once the external force is removed, due to with the action of the spring, the switch returns to the
initial position
62
• Reset Switch
The figure 3.8 Belows shows the architecture of the system, the system which is fixed to
the car handle, and operates off the power supply from the car, a charging module is also
incorporated in the system to charge the lithium battery using a 5V supply which is readily
available in any modern vehicle. In order to ensure that all-time security is provided in the
system, and the system must be kept charged at all times. The system also uses an internet
connection to able to send the captured fingerprint to the registereduser’sr email. Some modern
cars have provision for internet connection, but this system makes use of a pocket router which
ensures that the system is readily connected to the internet. On initialization, the system connects
to the wifi connection first, once the connection to the internet is set up and active, the system is
ready to take fingerprints. The following steps highlight the operation of the devices
63
2. Connection to the Internet: the device connects to the WIFI connection to which it
has been configured, to ensure that any captured fingerprint is sent to the user’s
email successfully.
4. Once the fingerprint is detected, the fingerprint sensor captures the fingerprint and
converts the captured fingerprint to a streams of byte, which is transferred into the
microcontroller memory.
5. The microcontroller saves the streams of byte in a binary file in the SPIFFS file
storage system.
6. The binary file (.bin) is sent to the registered user’s email or recipient email
7. The car owner is notified and receives the email containing the binary file.
8. The email account serves the purpose of keeping the generated .bin file and
9. The generated binary file is then processed and converted to a bitmap image
64
Figure 3.8: System Architecture
The project circuit diagram was designed using fritzing software and it is as shown below in figure 3.9
All the component implemented in the circuit diagram have been discussed in section 3.4
65
This project makes use of an ESP32 module which serves as the central processing unit of the
project. ESP32 is a low-powered, low-cost microcontroller (MCU) board, with both Wi-Fi and
ESP32 module used for this project was programmed using the Arduino C in the Arduino
In order to run a program on the ESP32 Development Board, we will need to write our
program into the flash memory of the development board. Since it is easy to write code
and flash programs with Arduino IDE, it is a good tool to use with the ESP32
A big advantage of ESP32 is that it is readily supported by Arduino IDE as a “shield” which can
be accessed from Board Manager. One can easily use functions from the FreeRTOS libraries
Arduino software uses Arduino Programming language which is C based to write the code. Since
the programming language is C based, the difficulty of writing the program in assembly
language is removed. As the software coverts the C based program into assembly code internally
and then uploads it to the board. Along with the code editor, the software also consists of a
In order to obtain the bitmap image of the captured fingerprint, this project makes use of python
programming language to convert the binary image file sent over the internet to the email to a
Python provides many useful features which make it popular and valuable from the other
approaches and provides dynamic memory allocation. Listed below are a few essential features
to support the use of python for the binary file conversion to bitmap
66
1) Easy to Learn and Use
straightforward and much the same as the English language. There is no use of the semicolon or
curly-bracket, the indentation defines the code block. It is the recommended programming
2) Expressive Language
Python can perform complex tasks using a few lines of code. A simple example, the hello world
program you simply type print("Hello World"). It will take only one line to execute, while Java
3) Interpreted Language
Python is an interpreted language; it means the Python program is executed one line at a time.
The advantage of being interpreted language, it makes debugging easy and portable.
4) Cross-platform Language
Python can run equally on different platforms such as Windows, Linux, UNIX, and Macintosh,
etc. So, we can say that Python is a portable language. It enables programmers to develop the
website www.python.org. It has a large community across the world that is dedicatedly working
towards make new python modules and functions. Anyone can contribute to the Python
67
community. The open-source means, "Anyone can download its source code without paying any
penny."
6) Object-Oriented Language
Python supports object-oriented language and concepts of classes and objects come into
procedure helps to programmer to write reusable code and develop applications in less code.
7) Extensible
It implies that other languages such as C/C++ can be used to compile the code and thus it can be
used further in our Python code. It converts the program into byte code, and any platform can use
It provides a vast range of libraries for the various fields such as machine learning, web
developer, and also for the scripting. There are various machine learning libraries, such as
Tensor flow, Pandas, Numpy, Keras, and Pytorch, etc. Django, flask, pyramids are the popular
68
CHAPTER FOUR
The fingerprint capturing system has a power supply section that is designed to operate
on a 3.7V battery. The system operates with a 5V supply. The fingerprint sensor and the esp32
module have an operating voltage of 5V. The power supply section has the following output
1. Output Voltage- 5V
2. Output Current- 2A
The power supply section is designed to operate on a 3.7V supply voltage from the battery, this
battery voltage is boosted to 5V to meet the voltage requirement of the microcontroller and
fingerprint module using the MT3608 boost DC-DC converter. The MT3608 DC-DC boost
converter is a user adjustable step up DC-DC converter module and it input voltage can vary
between 2V to 24VDC, while it output voltage is adjustable between 5VDC to 28VDC. In this
project the output voltage has been set to 5VDC with the input voltage of 3.7V which is the
battery voltage
The MT3608 module is using very less amount of components and the main component of the
module is MT3608 IC. MT3608 is a highly efficient voltage booster IC with many built in
features like over heat protection, low quiescent current, soft start function, low external
components, overheat shutdown etc. Other components used in this module are two ceramic
capacitors, one variable resistor, one resistor and one schottky diode and a 22uH inductor which
69
The fingerprint capturing system has also incorporate a charging section to charge the battery to
prevent a failure or shutdown of the system due to low battery voltage. The charging of the
battery is achieved using a charging module namely TP4056. The TP4056 is 1A Standalone
Linear Li-lon Battery Charger with Thermal Regulation and two LED Indication in case SOIC-
single cell lithium-ion (Li-Ion) batteries. It has the following output specifications
2. Output current – 1A
The fingerprint Capturing system incorporates a fingerprint module that captures the fingerprint
image when a finger is placed on it, the fingerprint image is captured and converted to a binary
file containing a stream of 1’s and 0’s which is sent over the internet to an email. The resultant
binary file is converted to a bitmap image using a python script. Figure 4.1 and 4.2 respectively
shows the fingerprint capturing process when a fingerprint image is placed on the sensor and the
70
Figure 4.1: Image capturing Process
The fingerprint capturing system incorporates a power supply section which has a battery and a
DC-DC boost converter module. The specification of the battery used are given below
The DC-DC boost converter module MT3608 has the following input specification
71
The system incorporates a battery charging module to keep the battery charged so as to ensure
that the system does not shutdown. The battery charging module used is TP4056 which has the
The system can be charged using a regular phone battery charger. It has a LED indicator to
indicate state of charge of the battery; when the battery is charging, a red LED is lit and when the
battery is fully charged, a green led is lit which indicates that the battery is fully charged. The
Lithium-ion battery charging and discharging module which supports a constant current –
Over-discharge protection feature which prevents the battery from being discharged
below 2.4V by cutting off output power until the battery is recharged above 3V.
The 5V input voltage is applied through micro USB or solder pads IN+ and IN-.
It can protect the battery from overcurrents and short circuits by cutting off the output
from the battery. This happens in a case when the discharge rate becomes greater than
3A.
72
The TP4056 charging module as shown in the figure below has six terminals which are as
described below:
Pin#1 OUT+
This is the output pin which supplies the positive voltage of a battery. It is connected to the
circuit which needs power from a battery, in this case, it is connected to the MT3608 positive
input terminal.
Pin#2 B+
Connect the Positive terminal of lithium battery with this pin using a battery connector.
Pin#3 B-
Connect the Negative terminal of lithium battery with this pin using a battery connector.
Pin#4 OUT-
This the output pin which supplies the negative voltage of the battery. It is connected to the
circuit which needs power from a battery, in this case it is connected to MT3608 negative input.
These pins are used to charge the battery by providing +5V at IN+ and -5V at IN- terminals
when you don’t have a USB cable. Otherwise, you can directly charge from USB supply by
73
Figure 4.3: TP4056 Charging module
The fingerprint module FPM10A used for this project has the following technical specifications:
13. The communication baud rate (UART): (9600 x N) BPS where N=1 ~ 12 (the default
The project file contains all the necessary file needed for the device operation and the
Fingerprint Project
ESP32
Image_2_buffer.ino
Getimage
Getimage.py
Image.bin
Image.bmp
75
1. The Charging Section
The charging section design is achieved using a TP4056 charging module which provides the
The power supply section is achieved using a DC-DC step up converter module namely MT3608
which converts the batter voltage of 3.7V- 4.2VDC to a sufficiently high voltage of 5VDC for
The fingerprint module is connected to the ESP32 module through the UART interface at a baud
rate of 57600 and a voltage level of 3.3V- 3.7V. The RX of the fingerprint module FPM10A is
connected to the TX pin of the ESP32 and the TX pin of the fingerprint module is connected to
the RX pin of the ESP32 module and the connection is as shown in the figure 3.
If the pins are not properly connected, communication between the two modules will not be
possible.
The code for the Arduino program is written in the C-based Arduino Programming language.
The challenge of writing the program in assembly code is eliminated because the programming
language is C-based. The C-based application is internally converted to assembly code by the
software before being sent to the board. The software also includes a compiler, an uploader, and
libraries for the peripheral devices in addition to the code editor. This project uses the Python
programming language to transform the binary image file provided via the internet to the email
into a bitmap image of the collected fingerprint in order to acquire it. Python differs from other
programming languages in terms of popularity and value since it offers a number of practical
76
features. It offers dynamic memory allocation, allows procedural programming, and is object-
oriented.
The minimum system requirements to run the project software are given below:
1. Windows 7 or higher
2. 4gb Ram
3. 1.6ghz speed
CHAPTER FIVE
5.1 SUMMARY
In today's life use of the vehicle is an important part of life and along with its safety concerns are
also very important. To increase the safety of vehicle different type of security systems are
available in the market out of which the most common are beepers, fire alarms, security cameras,
and personal safety products, but, the issue with this is that automobiles loaded with all the above
facilities comes with a high price. To overcome this problem in this work Biometric system is
used as security for vehicles. Biometric System is the combination of two different technologies
77
which are Embedded systems and biometrics. Fingerprint proves one of the best recognition
systems. The security system implemented using ESP32 and fingerprint module is presented in
this project and this can be incorporated in any vehicle irrespective of model. The project
provides the user or car owner with real-time information on intruders trying to access the
vehicle irrespective of the user’s location by capturing the intruder’s fingerprint and sending it
over email. All records of the captured fingerprint can be retrieved from the user’s email and in
the event of a car. The fingerprint captured can be used by security agencies to locate the
possible suspects since the fingerprint is unique to each person. The advantage of this system
over the other existing system, is that the captured fingerprint can be accessed anytime and any
either a possible thief or not has their fingerprint captured and sent to the user email and it takes
no not than 20 seconds to complete the whole process. The system doesn’t sound an alarm that
can call for attention but rather does the capturing of the fingerprint without the user being
aware.
2. The fingerprint sensor should cleaned with a neat and dust free fabric
3. The device should be handled with care to avoid damage to the internal circuitry
4. The device should be switched off when not in use to avoid draining of the battery.
This project has proposed a security system for vehicles using fingerprint capturing
system, which captures and send the fingerprint of any intruder to the user’s email and the
78
fingerprint image can further be used for security reasons in the case of a car theft. This system
1. GSM Module to also alert the user by SMS whenever a fingerprint is detected, for
additional safety so that if an unauthorized person tries to access the vehicle, SMS is sent
2. The present module can be extended to include a GPS module for additional safety so
that if a vehicle is stolen, by GPS module we can track the location of the vehicle
3. A camera module can also be used with this security device to take a picture of the
The user should take note of the following in order to use the device:
1. Set Up the dedicated on your phone or your handheld device with following details
Password: Fingerprint22
When the device is switched on, the green led comes on after 5 seconds
After the fingerprint is successfully captured, the green LED goes off.
If the fingerprint is not successfully captured, the green LED flickers five times
79
While the green LED is off, the device is running.
The green LED comes on again after about 5 seconds indicating the image is
Once the image is sent to the mail successfully, the green LED goes off.
REFREENCE
80
Akanbi C.O., Ogundoyin I.K., Akintola J.O., Ameenah K., (2020). A prototype model of an
Akinwole B., (2020). Development of an anti-theft vehicle security system using gps and gsm
Burak S., Tolga K., Huseyin K., (2015). Real time smart door system for home security,
Djupsjo K., Masar A., (2018). IOT security applied on a smart door lock application. Stockholm.
Folorunso C., Lateef A.A., (2015). Design and development of fingerprint based car starting
Nigeria.
Jamil A.J.A., Adam W.Y.K., Win A.I., J. Pusppanathan, Vadym S., AKM Zakir H., Saravanan
S/O S., (2019). Development of vehicle door security using smart tag and fingerprint system,
International journal of engineering and advance technology, Volume 9 (Issue 1, Page 3108-
3114). Malaysia.
Jamil A.J.A., Win A.I., Adam W.Y.K., Vadym S., Dhanigaletchmi A.P.P.J., (2019).
Development of vehicle ignition using fingerprint, ARPN Journal of engineering and applied
Mohd. S., Ashraf H.K., Nazmun N., Fernaz N.N., (2017). Smart Security for an organization
based on IOT, International journal of computer application, Volume 165 (Issue 10, Page 33-38).
Bangladesh.
81
N. Kiruthiga, L. Latha (2014). A study of biometric approach for vehicle security system using
Pranav PS, Hariharan G., Rajkamal J., Veeramani V., (2020). Fingerprint based vehicle security
and location tracking system using IOT, International research journal of engineering and
Puppala S., Kotlar P., Perumalla R., Racharla S., Chakkera S., CH MALLA R., (2019). IOT
based vehicle controlling by using fingerprint sensor, Journal of engineering science, Volume 10
Sayantam S., Aritra A., Rajendra P., (2017). Car security system using fingerprint scanner and
IOT, India journal of science and technology, Volume 10 (Issue 40 Page 1-4). India.
Venkata S.K., Gunti S., B. Chakri, Dinesh B., (2020). Fingerprint authentication and mobile app
based monitoring of vehicles using IOT, International Journal of emerging trends in engineering
82
APPENDIX
//#include "Arduino.h"
#include <HardwareSerial.h>
#include <FPM.h>
#include "ESP32_MailClient.h"
#include <FS.h>
#include <SPIFFS.h>
#include <WiFi.h>
//#include <ESP_Mail_Client.h>
/* select UART1 */
/*
* Insert your network credentials in the following variables:
*/
int LED = 4;
const char* ssid = "MTN_4G_0A77A4";
const char* password = "75818080";
/*
* Type the email sender account on the emailSenderAccount variable and
* its password on the emailSenderPassword variable.
*/
83
#define emailSenderAccount "[email protected]"
#define emailSenderPassword "dfcepkzyvhcwhjho"
/*
* wfikbgxqlhcysfnp
* Insert the recipient’s email. This is the email that will receive the emails sent by the ESP32:
*/
HardwareSerial fserial(1);
FPM finger(&fserial);
FPM_System_Params params;
84
void setup(void) {
// Connect to Wi-Fi
Serial.begin(57600);
WiFi.mode(WIFI_STA);
WiFi.begin(ssid, password);
Serial.print("Connecting to WiFi...");
while (WiFi.status() != WL_CONNECTED) {
delay(500);
Serial.print(".");
}
Serial.println();
/*
* Initialize SPIFFS (SPI Flash File System) to save the file
*/
if (!SPIFFS.begin(true)) {
Serial.println("An Error has occurred while mounting SPIFFS");
ESP.restart();
}
else {
delay(500);
Serial.println("SPIFFS mounted successfully");
}
void loop() {
stream_image();
yield();
}
86
void stream_image(void) {
if (!set_packet_len_128()) {
Serial.println("Could not set packet length");
return;
}
delay(100);
int16_t p = -1;
Serial.println("Waiting for a finger...");
digitalWrite(LED,HIGH);
while (p != FPM_OK) {
p = finger.getImage();
switch (p) {
case FPM_OK:
Serial.println("Image taken");
digitalWrite (LED, LOW);
break;
case FPM_NOFINGER:
break;
case FPM_PACKETRECIEVEERR:
Serial.println("Communication error");
break;
case FPM_IMAGEFAIL:
Serial.println("Imaging error");
break;
default:
Serial.println("Unknown error");
break;
}
yield();
87
}
p = finger.downImage();
switch (p) {
case FPM_OK:
Serial.println("Starting image stream...");
break;
case FPM_PACKETRECIEVEERR:
Serial.println("Communication error");
return;
case FPM_UPLOADFAIL:
Serial.println("Cannot transfer the image");
return;
}
/* flag to know when we're done */
bool read_finished;
/* indicate the max size to read, and also returns how much was actually read */
uint16_t readlen = IMAGE_SZ;
uint16_t pos = 0;
int16_t count = 0;
while (true) {
bool ret = finger.readRaw(FPM_OUTPUT_TO_BUFFER, image_buffer + pos, &read_finished,
&readlen);
if (ret) {
count++;
pos += readlen;
readlen = IMAGE_SZ - pos;
if (read_finished){
digitalWrite(LED, HIGH);
storeInSPIFFS(image_buffer, IMAGE_SZ);
88
sendemail();
delay(1000);
digitalWrite (LED, LOW);
delay(1000);
break;
}
}
else {
Serial.print("\r\nError receiving packet ");
Serial.println(count);
return;
}
yield();
}
Serial.println();
Serial.print(count * FPM::packet_lengths[params.packet_len]); Serial.println(" bytes read.");
Serial.println("Image stream complete.");
}
return (p == FPM_OK);
}
//Check if the file was successfully created. If not, print an error message.
if (!file) {
Serial.println("Failed to open file in writing mode");
}
else{
Serial.println("file opened");
Serial.printf("Start Position = %u \n", file.position()); // Prints what position in the file we're in
Serial.print(F("SizePayload: "));
Serial.println(length);
}
// for (int i = 0; i < length; i++) { // for debug purposes check the content of the payload
90
// Serial.print((byte)payload[i]); // DEBUG
// Serial.print(":"); // DEBUG
// } // DEBUG
Serial.println(""); // DEBUG
file.write(payload, length);
file.close();
}
smtpData.setSender("ESP32", emailSenderAccount);
smtpData.setPriority("High");
smtpData.setSubject(emailSubject);
//set the recipient email. This is the email that will receive the messages from the ESP32.
91
smtpData.addRecipient(emailRecipient);
//Then, to attach a file, you just need to call the addAtatachFile() on the smtpData object and pass as argument
the file path.
smtpData.addAttachFile(FILE_IMAGE, "image/bin");
//Finally, you need to set where your files are saved (SPIFFS or SD card). We’re using SPIFFS:
smtpData.setFileStorageType(MailClientStorageType::SPIFFS);
smtpData.setSendCallback(sendCallback);
//The sendCallback() function returns whether the email was successfully sent or not.
if (!MailClient.sendMail(smtpData))
Serial.println("Error sending Email, " + MailClient.smtpErrorReason());
//clear all the data from the smtpData object.
smtpData.empty();
}
void sendCallback(SendStatus msg) {
Serial.println(msg.info());
92
if (msg.success()) {
Serial.println("----------------");
SPIFFS.remove(FILE_IMAGE);
}
}
void ledBLINK(void)
{
digitalWrite(LED, HIGH);
delay(1000);
digitalWrite(LED,LOW);
delay(1000);
}
A python Script was written to convert the binary file to a bitmap image showing the fingerprint image in black
and white
WIDTH = 256
HEIGHT = 288
READ_LEN = int(WIDTH * HEIGHT / 2)
DEPTH = 8
HEADER_SZ = 54
93
header[0:2] = b'BM' # bmp signature
byte_width = int((depth*width + 31) / 32) * 4
if cTable:
header[2:6] = ((byte_width * height) + (2**depth)*4 + HEADER_SZ).to_bytes(4, byteorder='little') #file
size
else:
header[2:6] = ((byte_width * height) + HEADER_SZ).to_bytes(4, byteorder='little') #file size
#header[6:10] = (0).to_bytes(4, byteorder='little')
if cTable:
header[10:14] = ((2**depth) * 4 + HEADER_SZ).to_bytes(4, byteorder='little') #offset
else:
header[10:14] = (HEADER_SZ).to_bytes(4, byteorder='little') #offset
def options():
print("Options:")
print("\tPress 1 to extract and save the fingerprint image as bmp file")
print("\tPress 2 to view help")
print("\tPress 3 to exit")
94
print()
choice = input(">> ")
print()
return choice
def getPrint():
'''
enter the filename of the image with menu option 2:
>>> Enter filename/path of output file (without extension): myprints
.
.
.
.
.
.
Extracting image...saved as <filename>.bmp
'''
out = open(input("Enter filename/path of output file (without extension): ")+'.bmp', 'wb')
# assemble and write the BMP header to the file
out.write(assembleHeader(WIDTH, HEIGHT, DEPTH, True))
for i in range(256):
# write the colour palette
out.write(i.to_bytes(1,byteorder='little') * 4)
while True:
byte= file.read(1)
if not byte:
95
#print("Timeout!")
break
# make each nibble a high nibble
out.write((byte[0] & 0xf0).to_bytes(1, byteorder='little'))
out.write(((byte[0] & 0x0f) << 4).to_bytes(1, byteorder='little'))
while True:
chose = options()
if chose == "3":
break
elif chose == "1":
getPrint()
elif chose == "2":
print('================= HELP ==================')
print(getPrint.__doc__)
print('=========================================')
96
97