0% found this document useful (0 votes)
179 views97 pages

Iot Car Fingerprint

This document provides an introduction to a study on developing a fingerprint capture system for car doors using an Arduino board. It discusses the increasing problem of vehicle theft and the need for improved vehicle security. The objectives of the study are to develop a fingerprint capture system for car doors using Arduino and to evaluate the performance of the system. The methodology describes how the system will work, using components like an ESP32 microcontroller, fingerprint sensor, battery and other hardware to capture fingerprints when the car door is touched, convert it to a binary file, send it over WiFi to the owner's email, and allow conversion of the file to an image for identification purposes.

Uploaded by

Peace Emmanuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
179 views97 pages

Iot Car Fingerprint

This document provides an introduction to a study on developing a fingerprint capture system for car doors using an Arduino board. It discusses the increasing problem of vehicle theft and the need for improved vehicle security. The objectives of the study are to develop a fingerprint capture system for car doors using Arduino and to evaluate the performance of the system. The methodology describes how the system will work, using components like an ESP32 microcontroller, fingerprint sensor, battery and other hardware to capture fingerprints when the car door is touched, convert it to a binary file, send it over WiFi to the owner's email, and allow conversion of the file to an image for identification purposes.

Uploaded by

Peace Emmanuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 97

CHAPTER 1

INTRODUCTION

1.1 Background of the study

In recent years, the security of life and property has been a serious concern to humanity. It is

one of the most significant concerns confronting governments, institutions, and individuals. In

conventional authentication, common security mechanisms such as the use of keys, passwords,

and cards are employed in home environments and hotels. However, a single authenticated

access mechanism that is not trustworthy and dependable compromises these security measures,

resulting in unauthorized access.(Puppala et al., 2019)

The crime that is potentially growing the fastest in Nigeria is vehicle robbery. Open space

car theft: Typically, the majority of automobiles are taken when they are in motion (65%) or

from the owner's residence (15 percent). "Clean" vehicle robbery is the term used to describe this

kind of auto theft. Better health precautions are needed because of the population growth and

heavy vehicle use. This problem might be solved by sending anti-robbery systems on board, but

doing so will cost more money for car owners. Some people install anti-burglary devices in their

cars to deter theft, such as LoJack, ProScout, and TravelEyes. The majority of the devices

integrate GPS restriction techniques and remote availability [1].

IoT refers to a system's ability to create information over another system without human

intervention. The Internet of Things (IoT) refers to the billions of physical objects connected to

the Internet worldwide, the majority of which gather and even contribute information. Because

virtual devices are so common, everything from a little medication to something as large as a jet

can be converted into an IoT component. The IoT is coordinating the programmable and

physiological worlds to make our physical environment more perceptive and open in the long

run. IoT was first primarily suited to business and manufacturing, where its implementation is
1
usually referred to as machine-to-machine. The focus is now on putting smart gadgets in our

homes and workplaces to make them more useful all the time. Changes in several segments

would result from the innovation's blending and opening up new opportunities. IoT

advancements in the upcoming years appear promising. IoT innovations will likely be combined

with other specialized innovations like artificial intelligence (AI) and self-governing systems to

produce coordinated, brilliant solutions [9]. IoT innovations will typically prepare billions of

common objects with communication and understanding. It has recently been widely

implemented in a variety of industries, including farming, modern mechanization, smart urban

communities, smart home applications, wearable technology, and social insurance. IoT Sensors,

IoT Data Analytics, IoT Monitoring and Control System, IoT Connected Plant, Smart Supply

Chain Management, Smart Barcode Readers, Smart Grids, Connected Healthcare System, and

Smart Farming are examples of models that can be certified [8].

This proposed system would help find the person trying to access the car by sending his or

her fingerprint to the email of the car owner, and with this fingerprint, the person can be gotten.

This would involve the use of fingerprint sensor as well as the Arduino device. These two

devices will help get any user's fingerprint once he or she touches or holds the car handle. A

fingerprint is usually unique for each human, and this would make it easy to trace any user that

tries to steal a car. The proposed system is meant to achieve the bridging of insecurity issues that

arise when cars are stolen or hijacked. Some major components (hardware and software) needed

to achieve the aim of this project are ESP32 (Microcontroller) , FPM10A Fingerprint Sensor,

MIFI/ Wireless device Internet Enabled Device Cloud, TP4056 Charging Module , MT3608 DC-

DC Converter , 3.7V Lithium Ion Battery , Status Indicator.

2
1.2 Statement of the problem

One of the most difficult things to discover is a stolen car. If at all a stolen car was found, it

must have gone through tedious process in locating the car or the person who stole the car. This

difficulty has made most car owners who lose their car to give up easily without even making

any effort in finding the car. Due to the alarming increase in auto thefts in the twenty-first

century, which has seen fast industrialization and modernization at its technological pinnacle,

automotive security has emerged as one of the most pressing issues. Car thefts are on the

upswing right now, especially in lower-end vehicles with keyless entry that lack sophisticated

security measures. The alarm system has numerous vulnerabilities that enable thieves to break

into cars and make it difficult to find them once they have been stolen. We introduce a

revolutionary fingerprint-based security system in an effort to find a solution to this issue and

stop car thefts.

1.3 Objective of the study

The specific objectives of the project are to:

i. Develop a fingerprint capture system for car doors using arduino board

ii. Evaluate the performance of (i) above

1.4 Methodology

The system would be built using ESP32 module which has wifi capability, it is interfaced with a

fingerprint sensor which is responsible for capturing fingerprint images and storing the image file on its

buffer memory and the image file will be transferred into the microcontroller memory in the program for

further processing. The ESP32 is connected to the MIFI/ wireless device and this makes it possible for

3
the ESP32 to be internet enabled to send the email message using SMTP protocol. Both the ESP32 and

fingerprint sensor will be powered by a 3.7V lithium ion battery through a DC-DC converter which

regulates the battery voltage to 5V and the battery will be charged using the TP4056 charging module.

The system works by capturing any fingerprint it detects by the fingerprint sensor, the

detected fingerprint image is converted to its binary representation which is processed and stored

in the microcontroller file storage system as a binary (.bin) file, the binary file is then sent over

the mail to a dedicated user email address automatically which takes nothing less than 10

seconds, the intruder, in this case, has no idea that his or her fingerprint has been detected and

sent to an email. The car owner is notified of this attempt or intrusion on the car and the resultant

binary file which contains the binary representation of the fingerprint is converted to a bitmap

image using a python script running on a system. The fingerprint is saved for future purposes or

in the case of theft, the fingerprint can be used for tracking the individual. The system can

capture as many fingerprints as possible and send it to the mail. The flow diagram for the system

is shown below in figure 1.1

4
Start Module

Connect to the Internet

No

Is Fingerprint
detected

YES

Capture Fingerprint

Convert image to binary


file

Save Binary file in SPIFFS

Send .bin file to user email


and notify user

Convert Binary File to


bitmap image

END

5
Figure 1.1: Flow diagram for the system

1.5 Significance of the study

Biometric and Vehicle monitoring are the main areas to improve vehicle security, this

project incorporates a method of capturing fingerprint of any intruder and send the resulting

fingerprint over the internet to the user email which notifies the user of a possible car theft and

the assists car owners to detect whoever made an attempt to hijack a car or steals a car. It further

reduces the time and effort put into process of attempting to find a stolen car.

6
CHAPTER TWO

LITERATURE REVIEW

2.0 Introduction

This chapter contains reviews of different journals, papers and research works that has been done

by others in relation to the proposed system “development of an IOT car handle with fingerprint

capture sensor”.

2.1 IOT BASED VEHICLE CONTROLLING BY USING FINGERPRINT SENSOR

(Puppala et al., 2019)

2.1.1 Introduction

It was highlighted in this paper that people feels it hard to unlock the key of the vehicle

which are under perfect working condition as well as security for the vehicles is growing in risk

manner such as theft and vehicle detection. So in order to bring a solution for this problem, a

system such as this can be implemented. This system helps to monitor vehicles by using a

fingerprint device with a user database accessing the adopted wireless fidelity module. Using this

wireless fidelity module, it can access the location of the vehicle when being loss. An LCD

display is used in order to display the commands which can be accessed by user under the

influence of fingerprint module. The vehicle is being controlled using an android app in mobile

INTERNET OF THINGS and it can also unlock the vehicle using fingerprint sensor manually

7
even without having a key. So these improve security parameters and it is user friendly which

can be easily accessed.

2.1.2 Methodology

This paper is to design a system which is user friendly that helps vehicle users to maintain their

vehicles in a secured manner. In wireless vehicle controlling system to monitor the vehicles

using ESP8266 wireless module by using a fingerprint module, collecting a biometric

information and compared with user biometric information when these two are matched vehicle

will be ON without using any key, whenever the vehicle is ON condition information will be

displayed.

Figure 2.1: BLOCK DIAGRAM REPRESENTATION

2.1.3 WORKING PRINCIPLE:

Fingerprint includes two parts, fingerprint enrollment and fingerprint matching. In enrolling, user

needs to enter the finger two minutes. The system will process the two minutes finger images,

generates a templates of the finger based on processing results and store the templates. When

8
matching, user enters the finger through optical sensor and system will generate a template of the

finger and compare it with already stored fingerprint image.

Figure 2.2: CIRCUIT DIAGRAM OF THE SYSTEM

The IC number for this arduni uno is ATMEGA328. It requires power supply for this ARDUINO

UNO is 3.3v to 5v.The UNO is the one of the best board in order to start with any electronic

equipment as well as coding, the UNO is the most used and documented board of the whole

ARDUINO family. The ARDUINO is micro controller board. The usage of bridge rectifier is to

convert ac voltage to dc voltage. Code dumper is used to dump program to your hardware kit.

Crystal oscillator is used to maintain the constant frequency levels and also required capacitor is

connected in between that is used to remove if power contain small amount of ac, the capacitor

can be removed that ac power and also required 7805 voltage regulator, the usage of that is to

convert the 12 volts of dc voltage to 5 volts of dc power and also protect the board from the high

voltages, at last one capacitor is required for elimination of ac power to get pure dc power at last

output of that power supply circuit.

2.1.4 STRENGHT OF THE STUDY

 This paper provides a model of controlling vehicles theft and detection using

ATMEGA328 fingerprint module

2.1.5 LIMITATION OF THE STUDY

 User won’t be notified if he/she is far away from the system as it uses only buzzer sound

if an authorized person tries to access the car.

 Exclusions: - the limitation to this system is that some certain people will be excluded

from using the system for example, older people with a history of manual work may

9
struggle to register worn prints into a system or people who have suffered the loss of

fingers.

2.2 Fingerprint Authentication and Mobile App Based Monitoring of Vehicles Using

IOT (Venkata et al., 2020)

2.2.1 Introduction

Biometric and Vehicle Monitoring are main aspects to improve the Car Security. The paper

incorporates a method of using finger impression sensor for unique mark validation, ringer

sensor for flagging sound, GSM module for correspondence between a registering gadget or cell

phone, GPS module for finding the area of vehicle, Wi-Fi module that can establish a connection

between any microcontroller and Wi-Fi network, the vehicle security can be monitored through

Blynk application So that Car Theft and Real Time monitoring Can be done.

2.2.2 METHODOLOGY

In the proposed framework, it gives a simple security to the vehicles by utilizing Fingerprint

verification yet also, an observing framework to the vehicle proprietors with the assistance of a

cloud-based application which is the Blynk App is included. The working procedure of the total

framework is detailed clarified underneath.

10
The proprietor of the vehicle must get enlisted in the Blynk application giving the proprietor's

subtleties like the name, telephone number, and the fingerprints to the Blynk Cloud. At that

point, the proprietor can go about as an administrator to the Blynk application introduced on the

portable.

As we have introduced the unique mark sensor on the entryway handle of the vehicle, one needs

to embed their finger impression on the sensor to get passage to the vehicle. The enlisted

individuals can get to the vehicle. If at all an unapproved individual attempts to get to the

vehicle, effectively set bell gets enacted and sounds the caution to alarm the proprietor.

Furthermore, since, we have set a GSM module, the proprietor gets an alarm message.

In case if the vehicle has been robbed by using any unethical events, still the owner can catch the

location of the vehicle because of the GPS placed in the vehicle. By using a special feature of the

proposed system the engine of the vehicle can be shut down with the help of EUC.

2.2.3 EXPERIMENTAL SETUP

1. Arduino IDE: Arduino IDE is open-source software that is primarily used for coding and

compiling programming to the Arduino machine. It's an approved Arduino program, rendering it

so simple to compile an application so even an average citizen with little previous technological

experience will get their feet wet in the learning method. It is comfortably, accessible to

operational systems such as a MAC, Windows, Linux, and runs on the Java Platform.

2. Fingerprint Sensor: R307 Fingerprint Module comprises of optical unique finger impression

sensor, fast DSP processor, superior unique mark arrangement calculation, high-limit FLASH

chips and other equipment and programming creation, stable execution, straightforward

structure, with finger impression section, picture preparing, finger impression coordinating,

search and format stockpiling and different capacities.

11
3. GSM Module: GSM device is a modified system that utilizes a SIM card and works with a

network provider connection, much like a cell phone. GSM (Global Network System) requires a

mechanism called a circuit swap. This form of contact enables a route to be formed between two

machines. When the two computers are linked, a continuous stream of digital data is transmitted.

GSM networks are of the central Switching Service (SS), Base Station (BSS), and Mobile

Station (MS) services.

4. NODE MCU: ESP-MODULE 8266, which transfers the data from an Arduino to an IOT

platform from which the user can access it. The Wi-Fi module is equipped with the TCP / IP

protocol and has SOC in its own right. When connected to an Arduino board, ESP-8266 can

easily provide Wi-Fi, as it has its own software sense. It acts fundamentally as a scaffold

between Wi-Fi and existing microcontroller.

Figure 2.3: Block diagram of the vehicle system

12
Figure 2.4: Circuit diagram of the project

Figure 2.5: Display Led

2. 2.4 STRENGHT OF THE STUDY

Improved security to shield the vehicles from being gotten to by unapproved people with ease

than different innovations.

2.2.5 LIMITATION OF THE STUDY

The system cannot detect oily or muddy fingers

2.3 Car Security System using Fingerprint Scanner and IOT (Sayantam et al., 2017)

2.3.1 Introduction

This paper presents a noble system to detect vehicle thefts. If an unauthorized person tries to

steal the vehicle, user and police station will be notified with GPS location. Methods:

Fingerprints stored in the memory of the system. If the fingerprint and RFID matches with the

stored ones then the controller triggers the powering circuit of the ECM else if the burglar tries to

start the car in any other ways it sends the alert messages of the interventions as well as the car’s

location to the owner’s mobile app via cloud. Findings: The system is implemented using Intel

Galileo gen2 board. The GPS, GSM, Wi-Fi module as well as an SD Card is also connected to

the board. Installing this smart system is helpful because this system won’t let the ECM to power

on the engine as designed. The system also incorporates certain other sensors to stop the car

13
burglary. If the burglar tries to turn on the battery by using paperclips in the fuses then the owner

will be notified about the past proceedings along with GPS location of the car. Application: The

system works well with low-price range car employed with keyless entry and self-start button

and is unique because it uses IoT to protect the low price cars.

2.3.2 Methodology of the study

The components include an Intel Galileo gen 2 kit, RFID3 sensor, fingerprint sensor, a 7408 IC,

a 7404 IC, SD card, GPS1 and GSM2 module and an Intel Centrino 7260 Wi-Fi module. The

main circuit shown in Figure 1 and 2 demonstrates the method which includes the sensor and a

FOB which is manufactured by the car manufacturer. The FOB and RFID3 sensor are

electrically coded with the radio frequency range. When the correct radio frequency matches

between the sensor and FOB as programmed, then the user needs to scan their fingerprint using

the fingerprint sensor which validates only when the present fingerprint matches with the stored

fingerprint. The device has an option of setting one authorized user and 4 other guest users who

will be allowed to use the car. These guest user fingerprints can be updated even from the mobile

app of the user. Now once the RFID3 receives a radio frequency from the FOB and a fingerprint

input is detected by the sensor, then the output of the two sensors is given to the 7408 IC as an

input to perform a logical AND operation. As the truth table of AND gate is known when both

the inputs’ are 1 the output is also 1. Similarly when both the correct values of the RFID3 sensor

and fingerprint sensor are given as input to the 7408 IC then the output is high which is given to

the processor at the receiving end at pin no. 0. Then the processor transmits high values to the

powering circuit of the ECM5 from pin no 1. The system also incorporates a Mobile app which

is explicitly programmed for the Owner’s Smartphone. The app is customized to preprogram the

system which generally includes storing the fingerprint of the authorized users as well as

changing the pre-stored data when needed. The very next possible way of burglary is by putting

paperclips in the fuses and thereby starting the car through the battery-starter circuit connection.

14
This can also be stopped by using certain digital sensor (namely LED module) which glows

when the power is given and vice -versa. This module’s output can be given to the 7404 IC

(NOT gate) which inverts the value and is then sent to the Galileo at pin no.2 (the receiving end)

and correspondingly the pin no. 3 transmits the necessary details to the GPS1 and GSM2 module

depending on the value given at pin no.

Figure 2.6: Circuit diagram

The simple operation of the proposed architecture can be easily understood by the flow diagram

shown below.

15
Figure 2.7: Flow diagram of system operation.

The system has been implemented on Intel Galileo gen2 board along with other modules and

tested for its reliability. Even if owner loses his key-fob or someone copies the radio frequency

of a key fob, he is not able to start the car engine. The alarm sounds as soon as three wrong

entries are detected by the fingerprint sensor. A notification is received in the mobile application

with the location of the vehicle as soon as wrong entry detected by the fingerprint sensor. The

movement of the vehicle is tracked on the GPS module.

2.3.3 Strength of the study

 GSM SIM 900 notifies the owner of the vehicle (though a notification mode on the

phone) when theft is about to occur

2.3.4 Limitation of the study

 Only fingerprints in the database can access the vehicle in the proposed system.

 The proposed system did not cater for emergency situations where a fingerprint ready to

access the car is not in the data base

2.4 Development of Vehicle ignition using fingerprint (Jamil et al., 2019)

2.4.1 Introduction

This paper is about building a prototype of vehicle ignition using fingerprint sensor. This

system can prevent the vehicles from being stolen. It is developed to control the ignition of the

vehicle through the fingerprint scanner. This system consists of GSM SIM 900 that connects to

the Arduino which is the micro controller of the project. To make sure the system is secure, only

authorized fingerprint is paired with the Arduino to start the ignition. Vehicles ignite when the

enrolled fingerprint is matched against the fingerprints in the database while users with no match
16
in the database are prevent from igniting the vehicle. A theft alarm from buzzer, a notification to

the owner’s mobile phone via GSM SIM 900 and status display in the LCD are the appropriate

signal to the owner. This article describes briefly in detail about the design and implementation

of the ignition system.

2.4.2 Methodology of the study

First the individual must register themselves in the biometric system database. This begins as the

fingerprint of an individual is acquired by a scanner. Followed by the verification task that will

identify the individuals. The biometric reader will take note on the individual’s fingerprint so

that could be determined and converts it to a digital format. Final task is identification which the

system differentiates the input of the biometric in the system database. The result is either

identified of an authorized user or alert as an unauthorized user.

17
Figure 2.8: HARDWARE SETUP

Hardware circuit connection: Connection of all the hardware’s are done accordingly. LCD pins

are connected to A0, A1, A2, A3, A4, A5, fingerprint scanner connected to pin 2 and 3, GSM to

pin 10 and 11 (RX, TX), push button pin 4, 5,6 and 7, relay to pin 12 and buzzer to pin 13.

Figure 2.9: Performance analysis

For verification on the functionality correctness of the developed product, a series of testing

operation took place as the final step of the project work. The tests showed successful results for

the different appliances when switched ON and OFF using the apps that has been developed.

Some of the functionality testing details are given in pictures by next paragraphs.

18
Figure 2.10: The yellow LED will turn ON when the ignition starts.

Figure 2.11: Result of initializing system.

This void Enroll functions to add in fingerprints in a specific location or a specific Id. The enroll

process works when the fingerprints are first placed on the scanner to be read, remove and the

place it for the second time for confirmation of the fingerprints. Once the fingerprints are read, it

will store in Arduino and displays as “Stored” while if no fingerprints detected it displays as “No

Finger”.

19
Figure 2.12: Enroll Finger for the first time.

Figure 2.13: Enroll Finger for the second time for confirmation.

20
Figure 2.14: Fingerprints stored.

Figure 2.15: If no fingerprint detected.

Analysis of this project is done by scanning the fingerprint of registered users. The project’s

result is obtained after making sure all the components in the project functions fine. Five

registered users attempt to run the ignition has been recorded. All the five fingerprints have

different confidence level. Higher confidence is the better match.

21
Figure 2.16: Final output when the authorized user is detected.

Successful output of the ignition system is shown in the LCD as per figure above. When the

authorized user is detected, LCD user displays the status, along with LED yellow ON and motor

starts ignition. The reading of the fingerprint sensor will not be always the same since it depends

on the fingerprint’s condition as well as the scanner. Somehow, the fingerprint scanner will

detect the authorized user’s fingerprints detail and allow the vehicle to start.

The project’s objectives for development of vehicle ignition using fingerprint have been

successfully developed. In a nutshell, this prototype of vehicle ignition using fingerprint scanner

is successfully developed. This system operates fine in regard of enrolling new user and deleting

registered user. Appropriate steps to notify the authorized user via SMS using GSM is

successfully done in this project. SMS’s are sent to the owner when the vehicle is turned on and

when an unauthorized user is detected. Besides that, the status of the user is displayed in LCD.

LCD displays the status of the vehicle when the vehicle is on, ready to start and fingerprint’s

condition. Output of this system is revealed through LED and motor for a successful user

attempt. LED will light on and the dc motor will start running saying the ignition is successful

while the buzzer sounds showing the attempt of unauthorized user is failure. This fingerprint

technology focuses on automobile and is only possible for the authorized user to use. In the case

22
of implementing this system on locally manufactured vehicles will make the car security system

tight which will be also cheap.

2.4.3 Strength of the study

GPS and RFID are used to trigger an alarm when an unauthorized person uses the car

2.4.4 Limitation of the study

 The car security system proposed in this paper is specific to some cars

 High price cars may not be secured with this system

2.5 Development of an Anti-Theft Vehicle Security System using GPS and GSM

Technology with Biometric Authentication (Akinwole.B,2020)

2.5.1 Introduction

Akinwole created an effective anti-theft vehicle security system which integrates Global

Positioning System (GPS), Global System for Mobile Communication (GSM) and Biometrics

technologies (i.e. fingerprint) for user identification and authentication. They further explained

that theft security of vehicles in common parking places has become a matter of great concern

Thus, a system capable of identifying and tracking the geographical location of a remote vehicle,

which requires constant surveillance of the vehicle is needed. The system consists of GPS

module, GSM modem, fingerprint scanner sensor, Espress if ESP32 development board, 4WD

Double Layer Smart Car Chassis and Immobilizer Anti-theft relay. GPS and GSM modules were

utilized to prevent theft and to determine the exact location of vehicle and a fingerprint reader

module to identify authorized persons and thus start the engines. The GSM modem enables a

two-way communication between the user and the system. The micro controller was
23
programmed using embedded C/C++. The fingerprint readings and also SMS commands were

used to immobilize and demobilize the vehicle via relay, thus protecting the cars from theft and

unauthorized users.

2.5.2 Methodology of the system

The antitheft system is divided into two main sections which consists of the system hardware and

system software.

Hardware System Components:

Express if ESP32S Microcontroller

Express if ESP32 microcontroller is a low cost and low-power system on a chip (SoC)

microcontroller with Wi-Fi and dual-mode Bluetooth capabilities. It is used and programmed

using computer running on Windows, Linux and macOS. It incorporates a single 2.4 GHz Wi-Fi

andBluetooth combo chip designed with the TSMC ultra-lowpower 40 nm technology. The

integration of Bluetooth, Bluetooth LE and Wi-Fi ensures that a wide range of applications can

be targeted, and that the module is future proof: using Wi-Fi allows a large physical range and

direct connection to the internet through a Wi-Fi router, while using Bluetooth allows the user to

conveniently connect to the phone or broadcast low energy beacons for its detection.

Figure 2.17: Express if ESP32S Microcontroller

24
Dual Antenna Interface GPS Mini NE0-7N EEPROM Satellite Positioning Module

The NEO-7 series is a high sensitivity, low power GPS module that has 56 channels and outputs

precise position updates at 10Hz. It is built on an exceptional performance of the U blox 7 GNSS

(GPS, GLONASS, QZSS and SBAS) engine. The NEO-7N provides best performance and easy

RF integration. Sophisticated RF architecture and interference suppression ensure maximum

performance even in GNSS hostile environments. It incorporates a high level of integration

capability with flexible connectivity options in a small package. This makes it perfectly suited

for industrial applications with strict size and cost requirements. The I2C compatible DDC

interface provides connectivity and enables synergies with u-blox SARA, LEON and LISA

cellular modules. For the purposeof the research work, the UART (Universal Asynchronous

Receiver/Transmitter) interface will be used. The figure below shows the U-blox NEO-7 GPS

module.

Figure 2.18: U-blox NEO-7 GPS Module

A7 GSM, GPS and GPRS Module

This is serial GSM / GPS core development board based on A7 and it supports GSM/GPRS

Quad-Band ( 850/900/1800/1900 ) network, voice calls, SMS, GPRS data service and

incorporates an embedded GPS function. The board features compact size and low current

consumption. With power saving technique, the current consumption is as low as 3mA in sleep

mode. T9his communicates with microcontroller via UART port, supports command including

25
GSM 07.07, GSM 07.05 and Ai-Thinker enhanced AT Commands and supports 3.3V and 4.2V

logical level. Figure 3 below illustrates the A7 GSM, GPS and GPRS Module.

Figure 2.19: A7 GSM, GPS and GPRS Module

Optical Fingerprint Reader Module (CAMA-SM25)

The optical fingerprint scanner module is a fingerprint processing module for integrating the

light path and fingerprint processing part. CAMA-SM25 is an ideal OEM embedded optical

fingerprint module designed for biometric security solution. It is a small size, low power

consumption, simple ports, high reliability, small fingerprint template (496bytes), large

fingerprint capacity module which incorporates a fingerprint sensor and processor chip. The

CAMA-SM25 embedded optical fingerprint module has outstanding features like self learning

function. During fingerprint authentication processing, the fingerprint module will update the

latest fingerprint features to the fingerprint database automatically, so that the users will feel it

obtains better and better fingerprint verification performance. The image depicts the Optical

Fingerprint scanner.

26
Figure 2.20: Optical Fingerprint Sensor

4WD Double Layer Smart Car Chassis

This 4WD double layer smart car chassis consists of two pairs of Geared Motors and Wheels.

The chassis used in this kit is transparent acrylic board so as to create dynamic handling of the

components mounted on the robotic vehicle. The Smart Car Chassis 4WD is made of imported

acrylic material with high-precision laser cutting. It is featured with a double rotary encoder disk

which can be used for speed.

Figure 2.21: 4WD Double Layer Vehicle Chassis

2-Channel High Power H-Bridge L293D NodeMcu Motor Shield Board

27
The GPIO pins of the microcontroller do not give the amount of current required by the geared

motor, thus a motor driver is required. The NodeMcu Motor Shield is a driver module for motors

that is used to control the working speed and direction of the motor.

Figure 2.22: NodeMcu Motor Shield Board

Immobilizer Anti-Theft Relay

Relays are switching devices that open and close circuits electromechanically or electronically.

Relays control one electrical circuit by opening and closing contacts in another circuit. Figure 7

illustrates the immobilizer relay.

Figure 2.23: Immobilizer Relay and Symbol

Power supply: NCR18650B 3.7 V12000mah 18650 Lithium Rechargeable Battery, 18650

Battery Charger for Li-ion Ni-MH Ni-Cd Ni-md, Capacitors, Resistors, AMS1117 3.3V and

LM7805 Voltage Regulators.

28
Figure 2.24: Block Diagram of the System

Software System Component

The ESP32S microcontroller is programmed using embedded C/C++, HTML and CSS for future

improvements on the device.

Android Mobile Application development

A Mobile Based Android Application is developed using Android Studio Integrated

Development Environment (IDE) for Google's Android operating system. The Android

applications are written in Java. However, they run on Dalvik Virtual Machine (DVM), an

android own Java Virtual Machine which is optimized to support only lightweight mobile

operating system. The Android Studio and SDK tool are downloaded and installed from the

Android platform. The basics of the environment was studied from the Android Studio

Documentation, thus understanding its architecture and features. On running Android Studio on

the OS, it automatically detects Java and it downloads some of the build tools. The Graphical

User Interface (GUI) that enables the user to interact with the application, controls the vehicle

chassis for test purposes and registers new users to the system is designed using Java

programming language after the complete build-up of the application and setup.

29
Figure 2.25: Android Studio Integrated Development Environment

Algorithm and Flow chart of the system

The algorithm of the Anti-Theft Vehicle Security System consists of the overall system design

algorithm which segments into GSM Control Subroutine. The algorithm is generated using C+

+programming language and are graphically represented using flowcharts. The main purpose of

the flowchart is to analyze the different processes of the program. The Anti-theft Vehicle

Security System algorithm includes the following steps: algorithm is generated using C+

+programming language

30
Figure 2.26: Anti-theft Vehicle Security System Algorithm

The test carried out on the system proved that the user of the device can remotely demobilize the

vehicle in real time using SMS commands and Mobile application through cellular network and

internet respectively. In cases of hijacking, the vehicle user can leave the car safely, and then

he/she could use any phone to send out some commands and remotely cut off power supply, so

as to stop the vehicle from moving and thus get it back. The location of the vehicle could be

found out accurately when the latitude and longitude values obtained and passed into Google

Map Fragment in the C-Secure Application interface developed for the system, the location of

the vehicle could be found out accurately. With the integration of the fingerprint authentication

unit, the vehicle security was improved due to the fact that only authorized users can start the

31
vehicle. The ability to be able to reduce the random occurrence of vehicle theft in our society is

of utmost importance for protection of vehicles in our society.

One of the improvements done to previous works was the integration of an authentication system

and the use of the real time cloud database for data storage. The incorporation of this protection

system alerts the user by sending a text message and can use GPS for parsing the strings,

Latitude and Longitudinal information of the vehicle for the purpose of tracking it and send a

text message for the purpose of stopping it will enhance safety and security. Also, the integration

of fingerprint authentication unit and server-less control mechanism helps to regulate the access

of intruder, thus there is difficulty in starting the car. This will prevent the car from theft and

time wastage due to tracking of stolen vehicles.

The smart anti-theft security system can be made more efficient and secured by incorporating

other biometric identification systems like Face Recognition alongside the fingerprint

authentication feature for more secureness. Additional technology like Radio Frequency (RF),

Camera and some touch screen-based application can also be adopted. The system is not only

limited to vehicle security, it can find real time application in shipment or courier service

companies for cargo monitoring, transportation companies and petroleum distribution truck. The

web based android application tracking fragment can be modified for individual tracking, thus

people can keep track of their loved ones.

32
Figure 2.25: Circuit diagram

2.5.3 Strength of the study

Combination of GPS, fingerprint authentication and GSM techniques increases the theft security

of vehicles

2.5.4 Limitation of the study

The proposed system can be relatively expensive

2.6 Development of Vehicle Door Security using Smart Tag and Fingerprint System

(Jamil et al., 2019)

2.6.1 Introduction

Research and development advancements in the area of Vehicle Door Security using Smart

Tag and Fingerprint System. This research implemented for security purpose to protect the safety

of vehicle from vehicle theft or burglary. It is very useful and important for alert the people who

have vehicle to protect it from theft. This is a very important system to be implemented at the

main handle of vehicle. The system started to work when the user access either than one system

fingerprint or smart tag to lock and unlock the door. The fingerprint system only user can access
33
their fingerprint whereas the smart tag system can access by user or user’s intimate relative when

they borrow the vehicle for emergency. The vehicle door cannot be opened when unmatched

fingerprint is access or incorrect smart tag is access. Once the incorrect smart tag is access by

unauthorized person, the buzzer will be activated and produce a high level of alarm sound to

alert the user. The Arduino Uno microcontroller is controlled by the entire system of the project.

Hence, it is easy to implement and available to use because it has a simple function, so this

system can be enhancing with modern technology so it can be applying into vehicle part for

secure the vehicle.

2.6.2 METHODOLOGY

Figure 2.26: Block Diagram

There are eight important elements are plays to execute this project successfully which are RFID

sensor, fingerprint sensor, Arduino Uno, LCD, Stepper motor, power supply, LED and buzzer.

RFID sensor, fingerprint sensor and LCD act as input as well as Stepper motor, LED and buzzer

act as output of this project. When user accessing, the microcontroller will receive information

from inputs and it will interpret the information. Then, the information will be transmitted to

output. For example, when user access the RFID tag, the security code will receive by Arduino

Uno to interpret whether it is correct tag or not. Once, the information is conveying to lit up the

34
LED and the stepper motor acts to lock or unlock the door as an output. The buzzer will activate

when wrong input is accessing.

Figure 2.27: Flow Chart of Fingerprint System

35
Figure 2.28: Circuit diagram

2.6.3 STRENGHT OF THE STUDY

 This implement easy to be tracking the vehicle exact location after theft the vehicle and

the location sending to the owner’s phone.

 It is easy to implement and available to use because it has a simple function


36
2.6.4 LIMITATION OF THE STUDY

No proposed limitation for this study

2.7 A Study of Biometric Approach for Vehicle Security System Using Fingerprint

Recognition (Kiruthiga et al., 2014)

2.7.1 Introduction

Kiruthiga explained that the use of vehicle is a must for everyone. In the same way,

safeguarding the vehicle against theft is also very essential. Impediment of vehicle theft can be

done remotely by an authorized person. Embedded computing technology is an emergent field

used in all the areas. A competent automotive security system is implemented using embedded

system along with Global System for Mobile (GSM) and Fingerprint Recognition. This paper

gives a literature survey on the vehicle security system using person identification techniques.

The survey mainly emphasizes on major approaches for automatic person identification, namely

fingerprint recognition and various existing vehicle security system. The security system can be

implemented using Microcontroller

37
Figure 2.29: Flow chart for the security system

This project is aimed at improving the security level. As the fingerprint is a promising biometric

pattern for personal identification in terms of both security and ease of use. This is a unique

method of designing and assembling a low-cost, compact theft control system for an automobile.

The work presented demonstrates the initial phase of an embedded car that will be visible in near

future. Customized vehicles will not only provide a more interesting drive but also safer one.

This paper presented the performance analysis for fingerprint biometric. It presents apparent

advantages over password and token-based security. The survey represented the issues associated

to uni-modal biometric systems. It can be concluded that automatic Fingerprint recognition is the

biometric technology that can be used for security in terms of usability, size, privacy and

operational temperature range. The proposed security system can be used to reduce the increased

vehicle theft and allows the owner to identify the intruder thereby having the vehicle under

38
his/her control. It is applicable to car, truck, armored vehicle, yacht, boat or heavy equipment

vehicle. The system is also reliable to be used in other authorization applications involving

robotics, border management, banking security involving ATMs etc.

2.7.2 Strength of the study

This paper proposes a unique method of designing and assembling a low-cost, compact theft

control system for an automobile.

2.7.3 Limitation of the Study

An Info-Security Circuit Board which communicates with Engine Control Unit (ECU) and

sensors inside the vehicle Bus, Flex Ray and most of the bus communicates with other vehicles,

road-side infrastructure and cellular phones with wireless interfaces. The shortcoming with this

system is that the data timeliness and network delays to realize reliable secure car

communications

2.8 FINGERPRINT BASED VEHICLE SECURITY AND LOCATION TRACKING

SYSTEM USING IOT (Pranav et al., 2020)

2.8.1 Introduction

The primary objective of this paper is to shield the vehicle from any unapproved get to,

utilizing quick, simple to-utilize, clear, dependable and efficient unique finger impression

acknowledgement strategy. With this system, when someone is trying to steal the bike, it alerts

the owner when he is at nearest distance as well as when he is far away from the bike. But with

this alarm it is not possible to alert the owner who is unable to hear that alarm. So, in that case,

we can use IOT web server network to send the text message to the owner at his phone. This

vehicle security framework insinuates the status of the vehicle to the legitimate individual
39
utilizing the internet of things correspondence innovation. The concept of the wireless vehicle

security system (WVSS) using IOT we are used in this project. This is a framework that uses

PC’s, mobiles and smart phones to control vehicles smartly, intelligent and automatically

through internet from anyplace around the globe to enhance security systems in vehicles. Among

many IOT applications smart security system play an important role in realizing vehicles across

the globe.

2.8.2 Circuit Explanation

The circuitry of this Arduino fingerprint security system is very simple; it includes the Arduino

which controls the entire process, the push button, the buzzer and the LCD. Arduino controls the

entire process. The push button is connected directly to the ground with the Arduino's pin D14

(ENROLL), D15 (DEL), D16 (UP) and D17 (DOWN). The Arduino's digital pin is connected to

the D7 for ground through the yellow LED 1K resistor and the green LED is connected to the

Arduino's D6 with the same method. The Rx and Tx of the fingerprint module is directly

connected to the software serial or digital pin D2 and the Arduino's D3. The 5v supply is used to

power the fingerprint module taken from the Arduino board, and the servo motor is connected to

the Arduino's PWM pin D5. In the design of this fingerprint-based vehicle startup system,

signals are generated by the arduino for the appropriate volume circuit. The whole system aims

to be built into a plastic envelope which improves the heat discharge and the work efficiency of

the system. The arduino reads the position of the input buttons to be 1 or 0. The signal from the

input button tells the arduino what to do at the time. This project aims to replace the push-button

on the vehicle ignition and create a more reliable and safer way to start the ignition only with the

fingerprint pattern. The Arduino environment is designed to be easy to use for beginners with no

software or electronic experience. With Arduino, you can create objects that are responsive and /

or control light, sound, touch and movement. Arduino has been used to create an amazing variety

of things, including musical instruments, robots, light sculptures, games, interactive furniture and

40
interactive clothing. Arduino is used in many educational projects around the globe, especially

by designers and artists who needed to easily create prototypes, but do not need a deep

understanding of the technical details behind their works. Since it is designed for use by non-

technical people, the software has plenty of example code to demonstrate how to use the various

features of the Arduino board. When registering, the user must enter the finger twice. The system

will process two-time finger images, create a finger template based on the processing results and

save the template. When applicable, the user enters the finger through the optical sensor and

computes a template of the computer's finger and compares it to the templates of the finger

library. For a 1: 1 fit, the computer will match the direct finger of the specified template in the

module; for 1: N matching or searching, the system searches the entire finger library for the

applicable finger. In both cases, the system will provide an applicable result, success or failure.

All that data is updated with the server side.

41
Figure 2.30: Circuit Diagram

2.8.3 STRENGHT OF THE STUDY

1. The system specification with its corresponding function limits

2. The vehicle situation monitoring easily.

3. Able to prevent the future investigation using data analysis

2 .8.4 LIMITATION OF THE STUDY

1. Using the GSM module is not very reliable.

2. Authentication systems are restricted to applications only.

2.9 Smart Security for an Organization based on IoT (Mohd et al., 2017)

2.9.1 Introduction

This research describes a low cost and flexible security system which is basically based on

Arduino with necessary interface to enable Internet and the control of power through Global

System for Mobile Communication (GSM) & Bluetooth module (HC-05). This paper consumed

more real life interactions along with embedded software solutions. In this project a password is

set for the access of all sensors, for this we use LCD Display and Keypad. Motion sensor, gas

module, reed sensor, laser sensor, all the sensors are used to detect theft and unwanted

occurrences. Control Panel Interface of Web Server and android voice control both are created to

control of all lights of the organization and for the purpose of power savings. The proposed

system requires minimum human intervention to control the system. This research ensures the

safety of organization from unwanted occurrence and theft. The main contribution of this paper

is that it not only helps to ensure the security of an organization but also energy efficient and

time saving.

42
2.9.2 Methodology of the study

To demonstrate the feasibility and effectiveness of this system, devices such as GSM, Bluetooth

module, PIR motion reed sensor, gas sensor and laser sensors have been integrated with the

proposed Security system for an Organization. This integration is basically done for the purpose

of higher security to maintain an organization in a proper and secure way. This system has two

main modules: the hardware interface module (Arduino, GSM, Bluetooth and Sensors) and also

the software communication module (Web application & Android application). The core

component of the system is Arduino Mega 2560 microcontroller that is additionally capable of

functioning as a micro web server and also the interface for all the hardware modules. All

communication and controls during this system go through the microcontroller. As we have

already said that our project is the integration of several mini projects to make more efficient,

flexible, low cost and reliable security system. So the objectives of proposed system are divided

into two parts. The first one is controlling the appliances of the organization and second is

controlling the security of the organization.

Figure 2.31: Project Overview

HARDWARE DESCRIPTION

I. Arduino (Mega2560)
43
In the image below the Arduino Mega is the driver behind our entire project, not only does it

receive and interpret signals from our sensor devices, but it also allowed us to run the program

entirely on it (lacking the benefits of the GUI and inexpensive cameras of course). Our reasoning

for picking the Mega was that we knew for our prototype it would supply ample configurability

and we would not have to be concerned with running out of connectors. This microcontroller

uses 3.3V and 5V to power its related devices and is itself powered either by USB 500mA or can

be powered via an external source up to 12V. We decided to power using USB partially due to

convenience and also the added benefit of limiting harm done to the system by any mistakes we

could potentially make in connections. The Mega is affordable at roughly sixty dollars.

Figure 31: Arduino mega

PIR Motion sensor

This sensor is our typical passive infrared device. It detects motion at a distance of about 20 feet.

This unit is relatively simple and has two output modes to choose from. We chose to use the high

signal when motion was present. These have a retail cost of about ten dollars.

44
In the image below the MQ-2 Gas Sensor module is useful for gas leakage detecting in home and

industry. It can detect LPG, butane, propane, methane, alcohol, hydrogen and smoke.

Laser pointer & photo Resister

The laser is set as pointer in such a way that the ray will be fall on to the photo resistor. If any

intruder passes through the ray and when the ray doesn't fall on the photo resistor then the buzzer

will active and make a sound.

PIEZO buzzer

In the image below the buzzer or beeper is an audio signaling device which may be

electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm devices,

timers, and confirmation of user input such as a mouse click or keystroke.

SIM 800L core board

In the image below the SIM800 series modules support Hyper Text Transfer Protocol

application. Which provides a mode to alternate of HTTP server. The basic application contains

GET, POST, HEAD methods. SIM800 series modules support File Transfer Protocol

application.

The Features are:

I. Power supply: voltage range: 3.4V`4.4V

II. Power saving: SLEEP mode is 0.7mA (BS-PAMFEMS=9).

III. Band: GSM type: small mobile station

45
IV. Four frequency: EGSM900, DCS1800, GSM850, PCS1900, can automatically search the

four frequency bands. You can also set the frequency band through the AT command.

V. Accord GSM Phase 2/2+

HC-05 serial port Bluetooth

In the image below the following Bluetooth is one of the popular wireless communication

technologies because of its low power consumption, low cost and a light stack but compensates

on range. The remote unit can be powered from 3.3V up to 6V for easy battery attachment. All

signal pins on the remote unit are 3V-6V tolerant. No level shifting is required

The specifications are:

I. Bluetooth protocol: Bluetooth Specification v2.0+EDR

II. Frequency: 2.4GHz ISM band

III. Security: Authentication and encryption

IV. Profiles: Bluetooth serial port

V. Power supply: +3.3VDC 50mA

VI. Power supply: +3.3VDC 50mA

VII. Working temperature: -20 ~ +75 Centigrade

VIII. Dimensions: 15.2x35.7x5.6mm

This system has been accessed by secure password through keypad. Display will help to see the

output. As following image shows how the system will work by password access.

46
As the following figures 11(a) (b) (c), all show that live demo of proposed system. Here, (a)

when movement detect around motion sensor (b) when door is unlocked by unauthorized people

(c) someone passes through the laser, the system notifies through LED display and it makes a

security alarm. After that, through GSM, it sends an SMS “Motion detected/Door

Unlocked/Theft detected!!! Take Necessary Steps” to the authority as well as the police station.

After that, the following image below shows when fire or gas detect around gas sensor, the

system notifies through LED and make a security alarm after that through GSM, it sends a SMS

“Fire Fire!!! Take Necessary Steps” to the authority as well as the fire station.

The proposed system can be enhanced via:

I. Online server

II. GSM (Call, GPRS)

III. Video recording/ surveillance.

IV. Implement a temperature sensor to maintain organization temperature and so on.

2.9.3 Strenght of the study

 This research ensures the safety of organization from unwanted occurrence and theft, and

also efficient and time saving

2.9.4 Limitation of the Study

 The connection of the wire is looks pretty much challenging and sometimes the sensors

may not work properly due to its less ability

 The maintenance of the voltage for every sensor is pretty looks difficult because all the

sensors don’t need exact volt. In requirement base every sensors demands different

voltage

47
2.10 A Prototype Model of an IoT-based Door System using Double-access Fingerprint

Technique (Akanbi et al., 2020)

2.10.1 Introduction

Akanbi explained that Security of lives and properties remains a trending issue of optimal

concern in the recent times. It is one of the major issues posing challenges to governments,

establishments and individuals. Common security techniques such as the use of keys, passwords

and cards are used in home environments and hotels for traditional authentication. Others include

lock codes, mechanical doors or electronics RFID Card Door. However, compromise of these

security techniques such as property theft and unauthorized entry by visitors and hotel staff is

due to a single authenticated access method which is not trustworthy and reliable. This calls for

an improved technique. An IoT-based Smart Door System Model that provide double access

authentication through fingerprint modules is presented for hotel and guest houses in this paper.

The proposed system architecture design specifies all the modules involved and the circuit

diagram designed specifies various modules inter connectivity. The prototype implementation

software developed in C programming language was tested with several series of captured

templates. The prototype test conducted showed that the Smart door system developed responded

only to fingerprint signature and unlocks the door when it matches with signatures captured

during booking.

2.10.2 Methodology of the study

Software engineering approach adopted for the design and implementation in this work is

prototyping. This is due to the high cost of real-life implementation in an hotel environment. So,

a small casing (box) with a front door was constructed to depict a door which has solenoid lock
48
and fingerprint sensor. The schematic diagram for the proposed architecture is shown below. The

hotel reception has fingerprint module, an Arduino with Ethernet Shield and a computer. Also, at

the entrance of the door, there is a fingerprint module. The prototype door is opened only when

the fingerprint frames captured during the booking at the hotel reception or during online

registration matches with the one captured at the entrance of the door.

The system architecture resent how different components exchange data through IOT. The

Circuit Diagram for the system was designed to specify various modules inter-connectivity. The

design implementation presented allows customer fingerprint templates captured while booking

for rooms physically or remotely and fingerprint template captured at the entrance of each room

to be stored on the web server. Finally prototype system unlocks the door only when both

captured fingerprints templates matches. Authors intend to integrate iOS touch ID with the

fingerprint sensor of the door lock to share a common fingerprint database so that users can

enroll their fingerprints directly from their phones. Furthermore, the door system availability can

be extended to android platforms, a speaking voice alarm to indicate the unauthorized person

accessing the Door and the proposed system can be made to communicate with modems or

mobile phones to alert the authentic user an the hotel management during his tenancy period on

every false attempt on the door.

2.10.3 Strength of the study

 The system allows fingerprints to be stored, composed, retrieve images (prints), delete

print and performs memory check

2.10.4 Limitation of the study

 The proposed system is expensive and may not be easily accessed by majority

 The system cannot detect oily or muddy fingers

49
2.11 Real Time Smart Door System for Home Security (Burak et al., 2015)

2.11.1 Introduction

This paper presents a real time smart door system for home security. Most of the proposed

smart home systems try to bring solutions for this security problem, but many of those systems

use numerous sensor devices. With the increasing security issues, it is necessary to use new

technologies. Video based smart home security systems have recently become an efficient

approach with the development of video technology and Raspberry Pi is a strong and reliable

embedded system device for the complex and challenging tasks. Using these technologies in the

proposed system will bring several advantages in providing safety and security in terms of

visualizing and identifying people who visit the home. In the overall proposed system, there will

be two different significant techniques to provide home security. One is to use video technology

to see the front door in real time even if the home is empty and another is to provide

communication between the door system and smart phone device. By connecting the smart door

system with the mobile phone through the cellular network, the owner of the house may have

several opportunities such as controlling the house, getting instant video streaming, receiving and

sending message, talking to the visitor and starting the alarm system.

2.11.2 Methodology of the study

The experimental results indicate that the proposed system may provide a consistent support and

assistance for safe and secure.

The algorithm uses the input images from a camera for communication. The image of home

visitor is delivered to the owner of the house via wireless communication. Figure 2 shows the

diagram of the video and sound communication system which will be pro- vided between the
50
Raspberry PI and Mobile device. The client may also send voice data to the smart door system to

talk to the visitor. Thus, there will be a communication between visitor and client. As a result,

client may know the visitor and inform the visitor for her/his current location. On the other hand,

the client may call the security if the visitor is unknown. Besides this, obtained images via a

camera is stored in the cloud for important issue in the future.

The system is based on video technology which is a very popular technology for providing

security and safety in urban areas. The authors used Raspberry Pi because it is a strong and

reliable embedded system device for solving complex and challenging tasks. Using both

technologies in the system provide various benefits to increase the efficiency in terms of

communication between visitor and owner of the house and providing safety of home. In the

proposed system, two different important techniques have been used for home security. First is

the use of video technology to watch the outdoor and the second is to offer communication

between the visitor and owner of the house via door system.

2.11.3 Strength of the study

 The system provides various benefits to increase the efficiency in terms of

communication between visitor and owner of the house and providing safety of home.

2.11.4 Limitation of the Study

 The limitation to this system it is possible to give hackers much information through

connected network.

 Technological problem

 Significant installation cost

2.12 IoT Security Applied on a Smart Door Lock Application (DJUPSJO et al., 2018)

2.12.1 Introduction

51
This describes the development of an IOT application based upon digitizing a smart door

lock for making it connected to the internet and able to recognize employees that work in the

office. This concentrates primarily on the security aspects by listing the typical security

challenges in IOT systems in general and summing these challenges up to develop a functional

and secure product from scratch. A microcontroller is chosen for this project and a test

environment is built to experiment and develop the security breaches. Architectural designs are

chosen for the API being developed and even for the Android Application. A detailed description

is made of the multi-master database represented by Azure active directory and its importance to

achieving the security of an essential security breach. A new technique called Eddy stone is

introduced in the project to serve the transmission protocol with Bluetooth beacons. The final

stage of this project is completing the development of the Android application and making sure

that all the subsystems developed do communicate with each other, to deliver a functional and

secure flow of the IoT system.

Figure 2.32: Circuit diagram

52
2.12.2 Strength of the study

The purpose of this paper is to study and evaluate a suitable set to develop a smart door lock

which is intended to offer high security, easy access, and control.

2.12.3 Limitation

A key challenge that is faced in this project is the security and privacy of the IoT systems. It’s

possible for IOT devices to be hacked and operating maliciously without you even knowing

2.13 DESIGN AND DEVELOPMENT OF FINGERPRINT BASED CAR STARTING

SYSTEM (Folorunso et al., 2015)

2.13.1 Introduction

In this paper a fingerprint based car ignition system with a view to reducing car theft and to

ward off unauthorized users was designed and developed. Recently, car hijack has been on the

increase as armed robbers focus on stealing cars especially the brand new ones. Hence the need

to protect the cars from hijackers is considered to be essential. In this paper, nobody can ignite

the vehicle except authorized by designed system already captures its fingerprints pattern

features through enrolment into the system. This is achieved with the use of fingerprint module,

PIC18F4620 microcontroller and Liquid Crystal Display (LCD) module. More so, after testing

of the overall designed project, the results obtained were satisfactory. Hence, the approach

adopted in this study can be applied to various systems and fields such as banks,

53
2.13.2 Strength of the study

This paper executed fingerprint based car ignition system with the view of reducing car theft and

to ward off unauthorized

2. 13.3 Limitation of the Study

No proposed limitation

54
CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN METHODOOGY

3.1 Description of existing system

This chapter looks to analyze and propose a methodology for creation of an IOT vehicle

handle with a fingerprint capture sensor. It explains the proposed system in depth, including how

it works, the components that make up the system, and how they interact.

In recent years, the security of life and property has been a serious concern to humanity. It is

one of the most significant concerns confronting governments, institutions, and individuals. In

conventional authentication, common security mechanisms such as the use of keys, passwords,

and cards are employed in home environments and hotels. However, a single authenticated

access mechanism that is not trustworthy and dependable compromises these security measures,

resulting in unauthorized access. (Puppala et al., 2019)

This proposed system would help find the person trying to access the car by sending his or her

fingerprint to the email of the car owner, and with this fingerprint, the person can be gotten. This

would involve the use of fingerprint sensor as well as the Arduino device. These two devices will

help get any user's fingerprint once he or she touches or holds the car handle. A fingerprint is

usually unique for each human, and this would make it easy to trace any user that tries to steal a

car. The proposed system is meant to achieve the bridging of insecurity issues that arise when

cars are stolen or hijacked.

55
3.2 Existing System Analysis

The existing system by (Puppala et al., (2019), helps to monitor vehicles by using

a fingerprint device with a user database accessing the adopted wireless fidelity module. Using

this wireless fidelity module, it can access the location of the vehicle when being loss. The

vehicle can be controlled using an android application in mobile INTERNET OF THINGS and it

can also unlock the vehicle using fingerprint sensor manually even without having a key.

ESP8266 wireless module by using a fingerprint module was adopted as the methodology. It

collects biometric information and compared with user biometric information when these two are

matched vehicle will be ON without using any key, whenever the vehicle is ON condition

information will be displayed.

3.3 Problem of the Existing System

The old system provides the disadvantages below:

 User won’t be notified if he/she is far away from the system as it uses only buzzer sound

if an authorized person tries to access the car

 Exclusions: - some certain people were excluded from using the system, for example,

older people with a history of manual work may struggle to register worn prints into a

system or people who have suffered the loss of fingers.

3.4 System Design

56
This proposed system will improve the performance and add more security to the existing

system, in which the system only validates fingerprints to ignite the system. This proposed

system would help find the person trying to access the car by sending his or her fingerprint to the

email of the car owner, and with this fingerprint, the person can be gotten. A fingerprint is

usually unique for each human, and this would make it easy to trace any user that tries to steal a

car.

Below are the definitions of the principles and hardware devices to be used in achieving this

system:

• ESP32 (Microcontroller)

• FPM10A/DY50 Fingerprint sensor

• MIFI/ Wireless device

• Internet Enabled Device

• Cloud

• TP4056 Charging Module

• MT3608 DC-DC Converter

• 3.7V Lithium Ion Battery

• Status Indicator

• ESP32 Microcontroller

57
The ESP32 is a low-cost, low-power system on a chip (SoC) with Wi-Fi and Bluetooth

capabilities. It supports a wide variety of peripherals such as: capacitive touch, ADC, DAC, I2C, SPI,

UART, I2S, PWM and much more. It is one of the best solutions for DIY Internet of Things Projects and

Smart Home Projects.

Figure 3.1: ESP32 Module

• FPM10A Fingerprint Sensor

FPM10A is a fingerprint scanner and reader module but does more than that like fingerprint enrollment,

image processing, print matching and many more. It processes the data and sends processed data to the

microcontroller through serial. The device uses a DSP chip that does image rendering, feature finding,

calculation and searching. It has an in-built flash memory that stores the data of fingerprint and enrolls

new – up to 162 fingerprints can be stored. It interfaces with the controller or any other system with TTL

serial and sends packets of data to take photos, detects print, hash, and search. The device has a red and

green LED light indication for the wrong and right prints.

58
Figure 3.2: FPM10A fingerprint sensor

• TP4056 Charging Module

TP4056 module is a linear charger lithium-ion batteries. This module can charge batteries consists of

single cells. Most importantly, it supports constant current and constant voltage modes of charging

operations. Users can select both modes. This module offers a 1-ampere charging current. Almost all the

electronic devices run with batteries. And these batteries can get discharged. Therefore, chargers are used

to charge them by putting energy into them. TP4056 is also a battery charger that has a fixed charge

voltage of 4.2 volts.

59
Figure 3.3: TP4056 Charging module

• MT3608 DC-DC converter

MT3608 step up booster converter module is a small sized highly efficient and low cost module

is built for converting or boosting the voltage as low as 2V to max 28V DC with the maximum

output current of 2 ampere. The output voltage can be adjusted with the variable resistor used in

the module.

The module is using very less amount of components and the main component of the module is

MT3608 IC. MT3608 is a highly efficient voltage booster IC with many built in features like

over heat protection, low quiescent current, soft start function, low external components,

overheat shutdown etc. Other components used in this module are two ceramic capacitors, one

variable resistor, one resistor and one schottky diod and a 22uH inductor which is an important

part of all voltage booster circuits.

60
Figure 3.4: MT3608

• 18650 3.7V lithium battery

The 18650 battery is a lithium-ion cell classified by its 18mm x 65mm size, which is slightly larger than

a AA battery. They’re often used in flashlights, laptops, and high-drain devices due to their superior

capacity and discharge rates. 18650s come in both flat and button top styles, and usually boast 300-500

charge cycles.

Figure 3.5: 18650 battery

61
• Push Button Switch

The push button switch is usually used to turn on and off the control circuit, and it is a kind of control

switch appliance that is widely used. It is used in electrical automatic control circuits to manually send

control signals to control contactors, relays, electromagnetic starters, etc. Its characteristic is that it is

installed in the machine and instrument in the process of work, most of the time is in the initial free state

position, and only when needed, it is converted to the second state (position) under the action of external

force. Once the external force is removed, due to with the action of the spring, the switch returns to the

initial position

Figure 3.6: Push Button switch

62
• Reset Switch

Figure 3.7: Reset Switch

3.5 SYSTEM ARCHITECTURE

The figure 3.8 Belows shows the architecture of the system, the system which is fixed to

the car handle, and operates off the power supply from the car, a charging module is also

incorporated in the system to charge the lithium battery using a 5V supply which is readily

available in any modern vehicle. In order to ensure that all-time security is provided in the

system, and the system must be kept charged at all times. The system also uses an internet

connection to able to send the captured fingerprint to the registereduser’sr email. Some modern

cars have provision for internet connection, but this system makes use of a pocket router which

ensures that the system is readily connected to the internet. On initialization, the system connects

to the wifi connection first, once the connection to the internet is set up and active, the system is

ready to take fingerprints. The following steps highlight the operation of the devices

1. Initialization of the device

63
2. Connection to the Internet: the device connects to the WIFI connection to which it

has been configured, to ensure that any captured fingerprint is sent to the user’s

email successfully.

3. The fingerprint sensor is initialized and ready to capture any fingerprints it

detects, it remains in the waiting state until a fingerprint is detected.

4. Once the fingerprint is detected, the fingerprint sensor captures the fingerprint and

converts the captured fingerprint to a streams of byte, which is transferred into the

microcontroller memory.

5. The microcontroller saves the streams of byte in a binary file in the SPIFFS file

storage system.

6. The binary file (.bin) is sent to the registered user’s email or recipient email

through a sender email specifically created for this purpose.

7. The car owner is notified and receives the email containing the binary file.

8. The email account serves the purpose of keeping the generated .bin file and

notifying the user.

9. The generated binary file is then processed and converted to a bitmap image

which is the graphical representation of the detected fingerprint.

64
Figure 3.8: System Architecture

The project circuit diagram was designed using fritzing software and it is as shown below in figure 3.9

All the component implemented in the circuit diagram have been discussed in section 3.4

Figure 3.9: Circuit Diagram

65
This project makes use of an ESP32 module which serves as the central processing unit of the

project. ESP32 is a low-powered, low-cost microcontroller (MCU) board, with both Wi-Fi and

Bluetooth built in, and is based on a dual-core processor mechanism.

ESP32 module used for this project was programmed using the Arduino C in the Arduino

integrated development environment (IDE)

In order to run a program on the ESP32 Development Board, we will need to write our

program into the flash memory of the development board. Since it is easy to write code

and flash programs with Arduino IDE, it is a good tool to use with the ESP32

Development Board. It runs on FreeRTOS, a leading operating system supported by Arduino.

A big advantage of ESP32 is that it is readily supported by Arduino IDE as a “shield” which can

be accessed from Board Manager. One can easily use functions from the FreeRTOS libraries

when coding for the ESP32 within the Arduino IDE.

Arduino software uses Arduino Programming language which is C based to write the code. Since

the programming language is C based, the difficulty of writing the program in assembly

language is removed. As the software coverts the C based program into assembly code internally

and then uploads it to the board. Along with the code editor, the software also consists of a

compiler, an uploader, libraries for the peripheral devices.

In order to obtain the bitmap image of the captured fingerprint, this project makes use of python

programming language to convert the binary image file sent over the internet to the email to a

bitmap image of the captured fingerprint.

Python provides many useful features which make it popular and valuable from the other

programming languages. It supports object-oriented programming, procedural programming

approaches and provides dynamic memory allocation. Listed below are a few essential features

to support the use of python for the binary file conversion to bitmap
66
1) Easy to Learn and Use

Python is easy to learn as compared to other programming languages. Its syntax is

straightforward and much the same as the English language. There is no use of the semicolon or

curly-bracket, the indentation defines the code block. It is the recommended programming

language for beginners.

2) Expressive Language

Python can perform complex tasks using a few lines of code. A simple example, the hello world

program you simply type print("Hello World"). It will take only one line to execute, while Java

or C takes multiple lines.

3) Interpreted Language

Python is an interpreted language; it means the Python program is executed one line at a time.

The advantage of being interpreted language, it makes debugging easy and portable.

4) Cross-platform Language

Python can run equally on different platforms such as Windows, Linux, UNIX, and Macintosh,

etc. So, we can say that Python is a portable language. It enables programmers to develop the

software for several competing platforms by writing a program only once.

5) Free and Open Source

Python is freely available for everyone. It is freely available on its official

website www.python.org. It has a large community across the world that is dedicatedly working

towards make new python modules and functions. Anyone can contribute to the Python

67
community. The open-source means, "Anyone can download its source code without paying any

penny."

6) Object-Oriented Language

Python supports object-oriented language and concepts of classes and objects come into

existence. It supports inheritance, polymorphism, and encapsulation, etc. The object-oriented

procedure helps to programmer to write reusable code and develop applications in less code.

7) Extensible

It implies that other languages such as C/C++ can be used to compile the code and thus it can be

used further in our Python code. It converts the program into byte code, and any platform can use

that byte code.

8) Large Standard Library

It provides a vast range of libraries for the various fields such as machine learning, web

developer, and also for the scripting. There are various machine learning libraries, such as

Tensor flow, Pandas, Numpy, Keras, and Pytorch, etc. Django, flask, pyramids are the popular

framework for Python web development.

68
CHAPTER FOUR

4.1 OUTPUT SPECIFICATION AND DESIGN

The fingerprint capturing system has a power supply section that is designed to operate

on a 3.7V battery. The system operates with a 5V supply. The fingerprint sensor and the esp32

module have an operating voltage of 5V. The power supply section has the following output

specification for the circuit operation:

1. Output Voltage- 5V

2. Output Current- 2A

The power supply section is designed to operate on a 3.7V supply voltage from the battery, this

battery voltage is boosted to 5V to meet the voltage requirement of the microcontroller and

fingerprint module using the MT3608 boost DC-DC converter. The MT3608 DC-DC boost

converter is a user adjustable step up DC-DC converter module and it input voltage can vary

between 2V to 24VDC, while it output voltage is adjustable between 5VDC to 28VDC. In this

project the output voltage has been set to 5VDC with the input voltage of 3.7V which is the

battery voltage

The MT3608 module is using very less amount of components and the main component of the

module is MT3608 IC. MT3608 is a highly efficient voltage booster IC with many built in

features like over heat protection, low quiescent current, soft start function, low external

components, overheat shutdown etc. Other components used in this module are two ceramic

capacitors, one variable resistor, one resistor and one schottky diode and a 22uH inductor which

is an important part of all voltage booster circuits.

69
The fingerprint capturing system has also incorporate a charging section to charge the battery to

prevent a failure or shutdown of the system due to low battery voltage. The charging of the

battery is achieved using a charging module namely TP4056. The TP4056 is 1A Standalone

Linear Li-lon Battery Charger with Thermal Regulation and two LED Indication in case SOIC-

8/SO-8/SOP-8. The TP4056 is a complete constant-current/constant-voltage linear charger for

single cell lithium-ion (Li-Ion) batteries. It has the following output specifications

1. Output Voltage- 4.2V

2. Output current – 1A

The fingerprint Capturing system incorporates a fingerprint module that captures the fingerprint

image when a finger is placed on it, the fingerprint image is captured and converted to a binary

file containing a stream of 1’s and 0’s which is sent over the internet to an email. The resultant

binary file is converted to a bitmap image using a python script. Figure 4.1 and 4.2 respectively

shows the fingerprint capturing process when a fingerprint image is placed on the sensor and the

resultant bitmap image after python conversion

70
Figure 4.1: Image capturing Process

Figure 4.2: Bitmap Image of Captured Fingerprint

4.2 INPUT SPECIFICATION AND DESIGN

The fingerprint capturing system incorporates a power supply section which has a battery and a

DC-DC boost converter module. The specification of the battery used are given below

1. Battery Voltage- 3.7V

2. Battery type- Lithium Ion

3. Battery capacity- 18,500mAh

The DC-DC boost converter module MT3608 has the following input specification

1. Input Voltage- 2VDC- 24VDC

71
The system incorporates a battery charging module to keep the battery charged so as to ensure

that the system does not shutdown. The battery charging module used is TP4056 which has the

following input specifications

1. Input Voltage range- 4VDC – 8VDC

2. Recommended input voltage – 5VDC(USB)

The system can be charged using a regular phone battery charger. It has a LED indicator to

indicate state of charge of the battery; when the battery is charging, a red LED is lit and when the

battery is fully charged, a green led is lit which indicates that the battery is fully charged. The

maximum charged voltage of the battery is 4.2V.

The TP4056 has the following features

 Lithium-ion battery charging and discharging module which supports a constant current –

constant voltage charging mechanism.

 Full charge voltage of 4.2 V.

 Over-discharge protection feature which prevents the battery from being discharged

below 2.4V by cutting off output power until the battery is recharged above 3V.

 The 5V input voltage is applied through micro USB or solder pads IN+ and IN-.

 The charging current is 1A and it is adjustable. You can change it by connecting a

resistor of 1kΩ at IN- pad.

 It can protect the battery from overcharging.

 Soft start protection is provided to limit the inrush currents.

 It can protect the battery from overcurrents and short circuits by cutting off the output

from the battery. This happens in a case when the discharge rate becomes greater than

3A.

72
The TP4056 charging module as shown in the figure below has six terminals which are as

described below:

Pin#1 OUT+

This is the output pin which supplies the positive voltage of a battery. It is connected to the

circuit which needs power from a battery, in this case, it is connected to the MT3608 positive

input terminal.

Pin#2 B+

Connect the Positive terminal of lithium battery with this pin using a battery connector.

Pin#3 B-

Connect the Negative terminal of lithium battery with this pin using a battery connector.

Pin#4 OUT-

This the output pin which supplies the negative voltage of the battery. It is connected to the

circuit which needs power from a battery, in this case it is connected to MT3608 negative input.

Pin#5 IN+ and Pin#6 IN-

These pins are used to charge the battery by providing +5V at IN+ and -5V at IN- terminals

when you don’t have a USB cable. Otherwise, you can directly charge from USB supply by

using a USB cable.

The figure 4.3 below shows the pin labelling of TP4056

73
Figure 4.3: TP4056 Charging module

The fingerprint module FPM10A used for this project has the following technical specifications:

1. Power supply voltage: 3.3-6V

2. Supply current: working current: <120mA

3. Peak current: <140mA

4. The time of fingerprint image input: < 1 second

5. The window size: 14 x 18 mm

6. Profile: 256 bytes

7. Template file: 512 bytes

8. Storage capacity: 300

9. False accept rate (FAR): < 0.001% (safety grade 3)

10. FRR (FRR): < 1% (safety grade 3)

11. The search time: < 1 seconds (1:500, mean)

12. Computer interface: UART (TTL logic level)

13. The communication baud rate (UART): (9600 x N) BPS where N=1 ~ 12 (the default

value of N=6, namely 57600bps)

14. Working environment: temperature: -20°C to +50°C

15. Relative humidity: 40%RH to 85%RH (no treatment)

16. Storage conditions: temperature: -40°C to +85°C


74
17. Relative humidity: < 85%H (no treatment)

18. Dimensions (L * W * H): 46.25 x 20.4 x 18.1mm

4.3 FILE DESIGN

The project file contains all the necessary file needed for the device operation and the

structure is as given below

Fingerprint Project

ESP32

Image_2_buffer.ino

Getimage

Getimage.py

Image.bin

Image.bmp

4.4 INPUT DESIGN

The fingerprint capturing system has different section namely:

75
1. The Charging Section

2. The power supply section

3. The Fingerprint capturing section

The charging section design is achieved using a TP4056 charging module which provides the

charging current for the battery from a 5V USB source.

The power supply section is achieved using a DC-DC step up converter module namely MT3608

which converts the batter voltage of 3.7V- 4.2VDC to a sufficiently high voltage of 5VDC for

powering the fingerprint module and the ESP32 module.

The fingerprint module is connected to the ESP32 module through the UART interface at a baud

rate of 57600 and a voltage level of 3.3V- 3.7V. The RX of the fingerprint module FPM10A is

connected to the TX pin of the ESP32 and the TX pin of the fingerprint module is connected to

the RX pin of the ESP32 module and the connection is as shown in the figure 3.

If the pins are not properly connected, communication between the two modules will not be

possible.

4.5 JUSTIFICATION OF PROGRAMMING LANGUAGE USED

The code for the Arduino program is written in the C-based Arduino Programming language.

The challenge of writing the program in assembly code is eliminated because the programming

language is C-based. The C-based application is internally converted to assembly code by the

software before being sent to the board. The software also includes a compiler, an uploader, and

libraries for the peripheral devices in addition to the code editor. This project uses the Python

programming language to transform the binary image file provided via the internet to the email

into a bitmap image of the collected fingerprint in order to acquire it. Python differs from other

programming languages in terms of popularity and value since it offers a number of practical

76
features. It offers dynamic memory allocation, allows procedural programming, and is object-

oriented.

4.6 SYSTEM REQUIREMENTS

The minimum system requirements to run the project software are given below:

1. Windows 7 or higher

2. 4gb Ram

3. 1.6ghz speed

4. 100gb hard disk space

5. Python 3.0 or higher installed on the system

6. Arduino IDE installed on the system

CHAPTER FIVE

5.1 SUMMARY

In today's life use of the vehicle is an important part of life and along with its safety concerns are

also very important. To increase the safety of vehicle different type of security systems are

available in the market out of which the most common are beepers, fire alarms, security cameras,

and personal safety products, but, the issue with this is that automobiles loaded with all the above

facilities comes with a high price. To overcome this problem in this work Biometric system is

used as security for vehicles. Biometric System is the combination of two different technologies
77
which are Embedded systems and biometrics. Fingerprint proves one of the best recognition

systems. The security system implemented using ESP32 and fingerprint module is presented in

this project and this can be incorporated in any vehicle irrespective of model. The project

provides the user or car owner with real-time information on intruders trying to access the

vehicle irrespective of the user’s location by capturing the intruder’s fingerprint and sending it

over email. All records of the captured fingerprint can be retrieved from the user’s email and in

the event of a car. The fingerprint captured can be used by security agencies to locate the

possible suspects since the fingerprint is unique to each person. The advantage of this system

over the other existing system, is that the captured fingerprint can be accessed anytime and any

either a possible thief or not has their fingerprint captured and sent to the user email and it takes

no not than 20 seconds to complete the whole process. The system doesn’t sound an alarm that

can call for attention but rather does the capturing of the fingerprint without the user being

aware.

5.2 SYSTEM MAINTENANCE

The system can be maintained as highlighted below

1. The system should be charged using the recommended 5V USB charger.

2. The fingerprint sensor should cleaned with a neat and dust free fabric

3. The device should be handled with care to avoid damage to the internal circuitry

4. The device should be switched off when not in use to avoid draining of the battery.

5.3 SUGGESTED AREAS FOR FURTHER STUDIES

This project has proposed a security system for vehicles using fingerprint capturing

system, which captures and send the fingerprint of any intruder to the user’s email and the
78
fingerprint image can further be used for security reasons in the case of a car theft. This system

can further be improved by incorporating the following:

1. GSM Module to also alert the user by SMS whenever a fingerprint is detected, for

additional safety so that if an unauthorized person tries to access the vehicle, SMS is sent

automatically to the owner.

2. The present module can be extended to include a GPS module for additional safety so

that if a vehicle is stolen, by GPS module we can track the location of the vehicle

3. A camera module can also be used with this security device to take a picture of the

intruder and send it alongside the fingerprint to the user’s email.

5.4 USER’S MANUAL

The user should take note of the following in order to use the device:

1. Set Up the dedicated on your phone or your handheld device with following details

[email protected]

 Password: Fingerprint22

2. Turn on notifications for the mail

3. Set up the device as desired

4. The device is switched on by pushing the green push button

5. The device can be reset by pushing the yellow push button

6. The green LED indicates the state of the device as follows

 When the device is switched on, the green led comes on after 5 seconds

approximately indicating that device is ready to capture a fingerprint

 After the fingerprint is successfully captured, the green LED goes off.

 If the fingerprint is not successfully captured, the green LED flickers five times

and the whole process start all over.

79
 While the green LED is off, the device is running.

 The green LED comes on again after about 5 seconds indicating the image is

ready to be sent to the mail.

 Once the image is sent to the mail successfully, the green LED goes off.

 The whole process is repeated over again

REFREENCE

80
Akanbi C.O., Ogundoyin I.K., Akintola J.O., Ameenah K., (2020). A prototype model of an

IOT-based door system using double-access fingerprint technique, Nigeria journal of

technological development, Volume 17 (Issue 2, Page 143-147). Nigeria.

Akinwole B., (2020). Development of an anti-theft vehicle security system using gps and gsm

technology with biometric authentication, International journal of innovative science and

research technology, Volume 5 (Issue 2, Page 1250-1260). Nigeria.

Burak S., Tolga K., Huseyin K., (2015). Real time smart door system for home security,

International journal of scientific research in information systems and engineering, Volume 1

(Issue 2). Turkey.

Djupsjo K., Masar A., (2018). IOT security applied on a smart door lock application. Stockholm.

Folorunso C., Lateef A.A., (2015). Design and development of fingerprint based car starting

system, NIEEE International conference on exhibition on power and telecommunication.

Nigeria.

Jamil A.J.A., Adam W.Y.K., Win A.I., J. Pusppanathan, Vadym S., AKM Zakir H., Saravanan

S/O S., (2019). Development of vehicle door security using smart tag and fingerprint system,

International journal of engineering and advance technology, Volume 9 (Issue 1, Page 3108-

3114). Malaysia.

Jamil A.J.A., Win A.I., Adam W.Y.K., Vadym S., Dhanigaletchmi A.P.P.J., (2019).

Development of vehicle ignition using fingerprint, ARPN Journal of engineering and applied

science, Volume 14 (Issue 23, Page 4045-4053). Ukraine.

Mohd. S., Ashraf H.K., Nazmun N., Fernaz N.N., (2017). Smart Security for an organization

based on IOT, International journal of computer application, Volume 165 (Issue 10, Page 33-38).

Bangladesh.

81
N. Kiruthiga, L. Latha (2014). A study of biometric approach for vehicle security system using

fingerprint recognition, International of advance research trends in engineering and technology,

Volume 1 (Issue 2, Page 10-16). India.

Pranav PS, Hariharan G., Rajkamal J., Veeramani V., (2020). Fingerprint based vehicle security

and location tracking system using IOT, International research journal of engineering and

technology, Volume 7 (Issue 5, Page 3385-3391). India.

Puppala S., Kotlar P., Perumalla R., Racharla S., Chakkera S., CH MALLA R., (2019). IOT

based vehicle controlling by using fingerprint sensor, Journal of engineering science, Volume 10

(Issue 12, Page 951-956). Markapur.

Sayantam S., Aritra A., Rajendra P., (2017). Car security system using fingerprint scanner and

IOT, India journal of science and technology, Volume 10 (Issue 40 Page 1-4). India.

Venkata S.K., Gunti S., B. Chakri, Dinesh B., (2020). Fingerprint authentication and mobile app

based monitoring of vehicles using IOT, International Journal of emerging trends in engineering

research, Volume 8 (Issue 5, Page 1785-1789). India.

82
APPENDIX

//#include "Arduino.h"
#include <HardwareSerial.h>
#include <FPM.h>
#include "ESP32_MailClient.h"
#include <FS.h>
#include <SPIFFS.h>
#include <WiFi.h>
//#include <ESP_Mail_Client.h>

/* Save a fingerprint image to a RAM buffer/array.


* THIS WON'T COMPILE UNLESS YOU HAVE AN MCU WITH AT LEAST ~37K RAM
* LIKE THE ESP32.
*/

/* pin #2 is IN from sensor (GREEN wire)


pin #3 is OUT from arduino (WHITE/YELLOW wire)
*/

/* select UART1 */
/*
* Insert your network credentials in the following variables:
*/
int LED = 4;
const char* ssid = "MTN_4G_0A77A4";
const char* password = "75818080";
/*
* Type the email sender account on the emailSenderAccount variable and
* its password on the emailSenderPassword variable.
*/

83
#define emailSenderAccount "[email protected]"
#define emailSenderPassword "dfcepkzyvhcwhjho"
/*
* wfikbgxqlhcysfnp
* Insert the recipient’s email. This is the email that will receive the emails sent by the ESP32:
*/

#define emailRecipient "[email protected]"


/*
* Insert your email provider SMTP settings on the following lines.
* We’re using the settings for a Gmail account.
*/

#define smtpServer "smtp.mail.yahoo.com"


#define smtpServerPort 465

#define emailSubject "Fingerprint Detected"


/*
* Create an STMPData object called smtpData that contains the
* data to send via email and all the other configurations.
*/
SMTPData smtpData;
//The file will be temporarily saved in SPIFFS under the name image.bn

#define FILE_IMAGE "/image.bin"

HardwareSerial fserial(1);

FPM finger(&fserial);
FPM_System_Params params;

84
void setup(void) {
// Connect to Wi-Fi
Serial.begin(57600);
WiFi.mode(WIFI_STA);
WiFi.begin(ssid, password);
Serial.print("Connecting to WiFi...");
while (WiFi.status() != WL_CONNECTED) {
delay(500);
Serial.print(".");
}
Serial.println();

/*
* Initialize SPIFFS (SPI Flash File System) to save the file
*/
if (!SPIFFS.begin(true)) {
Serial.println("An Error has occurred while mounting SPIFFS");
ESP.restart();
}
else {
delay(500);
Serial.println("SPIFFS mounted successfully");
}

// Print ESP32 Local IP Address


Serial.print("IP Address: http://");
Serial.println(WiFi.localIP());
pinMode(LED, OUTPUT);
//Configure and initialize fingerprint sensor

Serial.println("SAVE IMAGE TO BUFFER test");


85
fserial.begin(57600, SERIAL_8N1, 16, 17);
if (finger.begin()) {
finger.readParams(&params);
Serial.println("Found fingerprint sensor!");
digitalWrite(LED, HIGH);
Serial.print("Capacity: "); Serial.println(params.capacity);
Serial.print("Packet length: "); Serial.println(FPM::packet_lengths[params.packet_len]);
delay(2000);
digitalWrite(LED, LOW);
}
else {
Serial.println("Did not find fingerprint sensor :(");
for (int k=0;k<=5;k++)
{
ledBLINK();
}
while (1) yield();
}

void loop() {

stream_image();
yield();
}

#define IMAGE_SZ 36864UL


uint8_t image_buffer[IMAGE_SZ];

86
void stream_image(void) {
if (!set_packet_len_128()) {
Serial.println("Could not set packet length");
return;
}

delay(100);

int16_t p = -1;
Serial.println("Waiting for a finger...");
digitalWrite(LED,HIGH);
while (p != FPM_OK) {
p = finger.getImage();
switch (p) {
case FPM_OK:
Serial.println("Image taken");
digitalWrite (LED, LOW);
break;
case FPM_NOFINGER:
break;
case FPM_PACKETRECIEVEERR:
Serial.println("Communication error");
break;
case FPM_IMAGEFAIL:
Serial.println("Imaging error");
break;
default:
Serial.println("Unknown error");
break;
}
yield();
87
}

p = finger.downImage();
switch (p) {
case FPM_OK:
Serial.println("Starting image stream...");
break;
case FPM_PACKETRECIEVEERR:
Serial.println("Communication error");
return;
case FPM_UPLOADFAIL:
Serial.println("Cannot transfer the image");
return;
}
/* flag to know when we're done */
bool read_finished;
/* indicate the max size to read, and also returns how much was actually read */
uint16_t readlen = IMAGE_SZ;
uint16_t pos = 0;
int16_t count = 0;

while (true) {
bool ret = finger.readRaw(FPM_OUTPUT_TO_BUFFER, image_buffer + pos, &read_finished,
&readlen);
if (ret) {
count++;
pos += readlen;
readlen = IMAGE_SZ - pos;
if (read_finished){
digitalWrite(LED, HIGH);
storeInSPIFFS(image_buffer, IMAGE_SZ);

88
sendemail();
delay(1000);
digitalWrite (LED, LOW);
delay(1000);
break;
}

}
else {
Serial.print("\r\nError receiving packet ");
Serial.println(count);
return;
}
yield();
}

Serial.println();
Serial.print(count * FPM::packet_lengths[params.packet_len]); Serial.println(" bytes read.");
Serial.println("Image stream complete.");
}

/* no need to call this for R308 */


bool set_packet_len_128(void) {
uint8_t param = FPM_SETPARAM_PACKET_LEN; // Example
uint8_t value = FPM_PLEN_128;
int16_t p = finger.setParam(param, value);
switch (p) {
case FPM_OK:
Serial.println("Packet length set to 128 bytes");
break;
89
case FPM_PACKETRECIEVEERR:
Serial.println("Comms error");
break;
case FPM_INVALIDREG:
Serial.println("Invalid settings!");
break;
default:
Serial.println("Unknown error");
}

return (p == FPM_OK);
}

void storeInSPIFFS(byte* payload, unsigned long length){


//create a new file in SPIFFS where the photo will be saved.

Serial.printf("Picture file name: %s\n", FILE_IMAGE);


File file = SPIFFS.open(FILE_IMAGE, "wb");

//Check if the file was successfully created. If not, print an error message.
if (!file) {
Serial.println("Failed to open file in writing mode");
}
else{
Serial.println("file opened");
Serial.printf("Start Position = %u \n", file.position()); // Prints what position in the file we're in
Serial.print(F("SizePayload: "));
Serial.println(length);
}

// for (int i = 0; i < length; i++) { // for debug purposes check the content of the payload
90
// Serial.print((byte)payload[i]); // DEBUG
// Serial.print(":"); // DEBUG
// } // DEBUG
Serial.println(""); // DEBUG
file.write(payload, length);
file.close();
}

void sendemail (void){


//The following line sets the SMTP Server host, SMTP port,
//account email address and password used to login:

smtpData.setLogin(smtpServer, smtpServerPort, emailSenderAccount, emailSenderPassword);

//Set the sender name and sender email

smtpData.setSender("ESP32", emailSenderAccount);

//Set the email priority.

smtpData.setPriority("High");

//Set the email subject.

smtpData.setSubject(emailSubject);

//The following line sets the message.

smtpData.setMessage("<h2>Fingerprint detected and binary file attached to this mail<h2>", true);

//set the recipient email. This is the email that will receive the messages from the ESP32.
91
smtpData.addRecipient(emailRecipient);

//Then, to attach a file, you just need to call the addAtatachFile() on the smtpData object and pass as argument
the file path.

smtpData.addAttachFile(FILE_IMAGE, "image/bin");

//Finally, you need to set where your files are saved (SPIFFS or SD card). We’re using SPIFFS:

smtpData.setFileStorageType(MailClientStorageType::SPIFFS);

//Set a callback function that will be called upon sending an email.

smtpData.setSendCallback(sendCallback);

//The sendCallback() function returns whether the email was successfully sent or not.

if (!MailClient.sendMail(smtpData))
Serial.println("Error sending Email, " + MailClient.smtpErrorReason());
//clear all the data from the smtpData object.

smtpData.empty();

}
void sendCallback(SendStatus msg) {

Serial.println(msg.info());

92
if (msg.success()) {
Serial.println("----------------");
SPIFFS.remove(FILE_IMAGE);
}
}

void ledBLINK(void)
{
digitalWrite(LED, HIGH);
delay(1000);
digitalWrite(LED,LOW);
delay(1000);
}

A python Script was written to convert the binary file to a bitmap image showing the fingerprint image in black
and white

WIDTH = 256
HEIGHT = 288
READ_LEN = int(WIDTH * HEIGHT / 2)

DEPTH = 8
HEADER_SZ = 54

print("----------Extract Fingerprint Image------------")


print()

# assemble bmp header for a grayscale image


def assembleHeader(width, height, depth, cTable=False):
header = bytearray(HEADER_SZ)

93
header[0:2] = b'BM' # bmp signature
byte_width = int((depth*width + 31) / 32) * 4
if cTable:
header[2:6] = ((byte_width * height) + (2**depth)*4 + HEADER_SZ).to_bytes(4, byteorder='little') #file
size
else:
header[2:6] = ((byte_width * height) + HEADER_SZ).to_bytes(4, byteorder='little') #file size
#header[6:10] = (0).to_bytes(4, byteorder='little')
if cTable:
header[10:14] = ((2**depth) * 4 + HEADER_SZ).to_bytes(4, byteorder='little') #offset
else:
header[10:14] = (HEADER_SZ).to_bytes(4, byteorder='little') #offset

header[14:18] = (40).to_bytes(4, byteorder='little') #file header size


header[18:22] = width.to_bytes(4, byteorder='little') #width
header[22:26] = (-height).to_bytes(4, byteorder='little', signed=True) #height
header[26:28] = (1).to_bytes(2, byteorder='little') #no of planes
header[28:30] = depth.to_bytes(2, byteorder='little') #depth
#header[30:34] = (0).to_bytes(4, byteorder='little')
header[34:38] = (byte_width * height).to_bytes(4, byteorder='little') #image size
header[38:42] = (1).to_bytes(4, byteorder='little') #resolution
header[42:46] = (1).to_bytes(4, byteorder='little')
#header[46:50] = (0).to_bytes(4, byteorder='little')
#header[50:54] = (0).to_bytes(4, byteorder='little')
return header

def options():
print("Options:")
print("\tPress 1 to extract and save the fingerprint image as bmp file")
print("\tPress 2 to view help")
print("\tPress 3 to exit")

94
print()
choice = input(">> ")
print()
return choice

def getPrint():
'''
enter the filename of the image with menu option 2:
>>> Enter filename/path of output file (without extension): myprints

.
.
.
.
.
.
Extracting image...saved as <filename>.bmp

'''
out = open(input("Enter filename/path of output file (without extension): ")+'.bmp', 'wb')
# assemble and write the BMP header to the file
out.write(assembleHeader(WIDTH, HEIGHT, DEPTH, True))
for i in range(256):
# write the colour palette
out.write(i.to_bytes(1,byteorder='little') * 4)

with open("image.bin", "rb") as file:

while True:
byte= file.read(1)
if not byte:
95
#print("Timeout!")
break
# make each nibble a high nibble
out.write((byte[0] & 0xf0).to_bytes(1, byteorder='little'))
out.write(((byte[0] & 0x0f) << 4).to_bytes(1, byteorder='little'))

out.close() # close file


print('Image saved as', out.name)

while True:
chose = options()
if chose == "3":
break
elif chose == "1":
getPrint()
elif chose == "2":
print('================= HELP ==================')
print(getPrint.__doc__)
print('=========================================')

96
97

You might also like