0% found this document useful (0 votes)
49 views14 pages

Cloud-Based Vehicle Security System

Uploaded by

SHIVAM KUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views14 pages

Cloud-Based Vehicle Security System

Uploaded by

SHIVAM KUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

A

Project Report
on
VEHICLE SECURITY SYSTEM
USING CLOUD SERVICES
Submitted in the fulfilment of the requirement for the award
of the degree of
Bachelor of Technology
in
Electronics & Communication Engineering

Submitted by:
ABHISHEK KUMAR UPADHYAY (2019041006)
ADITYA PRATAP SINGH (2019041009)
DHANANJAY SAROJ (2019041048)
GAURAV SINGH (2019041053)

Under the supervision of:

Dr. Sudhanshu Verma, Assistant professor


Electronics & Communication Engineering

Department of Electronics & Communication


Engineering
Madan Mohan Malaviya University of Technology,
Gorakhpur
(Session: 2022-23)
CONTENT
1.) Abstract 2
2.) Introduction 3
3.) Flow chart of the vehicle security system 4
4.) Components used in vehicle security system 5
4.1) Embedded C for Arduino 6
4.2) Arduino Uno 6
4.3) Arduino Shield 7
4.4) Voltage Regulator 7
4.5) Google Authenticator 7
4.6) Arduino Relay 8
4.7) Google Cloud/AWS server 8
5.) Approach 7
6.) Working of the Security System 7
7.) Coding 10
8.) Conclusion 12
9.) References 13

1
1. Abstract
The vehicle security system using cloud service project aims to design
and develop a cloud-based security system to enhance the security of
vehicles. The system will utilize various sensors, such as GPS, motion
sensors, and door sensors, to detect any unauthorized access or
tampering. The data from the sensors will be processed remotely
using cloud technology, making it easier to manage and monitor
vehicle security. When an alert is triggered, the system will send real-
time notifications to the owner's smartphone or other devices,
enabling them to take appropriate action.

The cloud-based vehicle security system has several benefits,


including increased security, remote monitoring, and real-time
notifications. It is a practical and efficient way to protect vehicles
from theft, vandalism, or other security threats. With the right
hardware and software configuration, such a system can be
customized to meet the specific security needs of different types of
vehicles [1]. The project will focus on developing a prototype system
and testing its functionality under different conditions. The findings of
the project will provide insights into the design and implementation of
cloud-based security systems for vehicles.

2
2. Introduction
Infrastructure, platforms, or software that are hosted by external
providers and made accessible to users online are referred to as cloud
services.

If you own a car in India, it is important to take steps to protect your


vehicle from thieves. It is estimated that around 100,000 cars are
stolen each year in India. This number is only going to continue to
grow as the economy improves and more people are able to afford
cars. If a user owns a car in India, it is important to take steps to
protect your vehicle from thieves. Today's world of comfort and
luxury offers a wide range of expensive, high-priced vehicles. Many
of these vehicles have security features built right into them from the
start. However, despite significant financial investment in areas of
vehicle security, the number of vehicle theft incidents is continually
increasing [1,2].

This condition encourages research into further security measures to


prevent vehicle thefts. We have made the decision to focus our project
on improving vehicle security and safety in order to reduce auto theft.
The user can keep tabs on their vehicle, its routes, and its arrival with
the vehicle tracking system.

There exists another problem. Recent advancement in the automobile


industry has opted many people to use their own vehicle for traveling.
This has increased effect on car ownership. But to park all these cars
in the major metro cities is quite tedious and difficult task. After
wrong parking, problems like towing occurs and hence, there is no
solution as of now. Thus, the project also deals with this problem of
parking and subsequent towing. To tackle all the problems specified
above, the project have features like, ignition control.

This feature should provide better security to the car. [2] To solve this
problem our project has a system which protects your vehicle and is
easy to install in your old vehicles too. This system uses Arduino and
AWS server which is a cloud service open based platform to verify
the driver’s identity and controls the ignition of the engine on basis of
that.

3
3. Flow chart of the vehicle security system

USER

AWS
KEY SWITCH SERVER
SHIELD
ARDUINO
BOARD NO YES
OWNER’s /NO
NO PHONE
RELAY

IGNITION YES/
OFF/ON NO

Fig. 1 Flow chart of the of vehicle security system

The above flow chart shows the signal flow of this project. The user
block is connected to the key switch block and key switch block is
connected to the Arduino board.
Now, as soon as the signal is given by the user by inserting the key in
the vehicle, the spark signal gets activated and reaches the Arduino
UNO board and activates it.
The received signal is thereafter followed by the Arduino shield
which is the source of internet connection between our AWS cloud
server and the Arduino UNO board.
As soon as the data is received by the AWS server it instantly
transmits the signal to the owner’s device asking the owner to verify
whether he/she is the only one who is trying to access the vehicle.
Now, the owner verifies the data by replying the server by pressing
yes or no on his/her device. The response given by the user is being
4
received by the AWS server and it now performs its action according
to the response received from the user.
CASE-1 (NO): If the server received the signal is No from the user it
then transfers the signal to the relay which switch down the Arduino
and the vehicle will not start.
void loop() {
// Prompt the user with an alert message
Serial.println("Alert: Press 'No' to exit.");

// Wait for a response from the user


char key = keypad.getKey();

// Check if the user pressed "No"


if (key == 'N') {
// Exit the program
Serial.println("Exiting...");
exit(0);
}
delay(1000);
}

CASE-2 (YES): If the received signal is YES from the user, then the
AWS server sends the signal directly to the Arduino UNO board and
the verification completes, the signal is then forwarded to the engine
and ignition takes place followed by start of the engine.
void loop() {
// Prompt the user with an alert message
Serial.println("Alert: Press 'Yes' to continue.");

// Wait for a response from the user


char key = keypad.getKey();

// Check if the user pressed "Yes"


if (key == 'Y') {
// Send a true signal back to the Arduino
Serial.println("true");
}
delay(1000);
}

5
4. Components used in the vehicle security system

4.1 Embedded C for Arduino


What is Embedded C used for: -

Embedded C is generally used to develop microcontroller-based


applications. C is a high-level programming language. Embedded C is
just the extension variant of the C language. This programming
language is hardware independent.

4.2 Arduino UNO


Arduino UNO is a low-cost, flexible, and easy-to-use programmable
open-source microcontroller board that can be integrated into a variety
of electronic projects. This board can be interfaced with other Arduino
boards, Arduino shields, Raspberry Pi boards and can control relays,
LEDs, servos, and motors as an output [3].

6
4.3 Arduino GSM Shield
The Arduino GSM shield allows an Arduino board to connect to the
internet, send and receive SMS, and make voice calls using the GSM
library. The shield will work with the Arduino Uno out of the box [4].

4.4 Voltage Regulator


To provide constant voltage supply to our Arduino we are using
voltage regulator which keep the sparking AC supply of the key lock
at constant 12V and keep the device comfortable for operating within
its range [1].

4.5 Google Authenticator


Google Authenticator is a mobile security application based on two-
factor authentication (2FA) that helps to verify user identities before
granting them access to websites and services. Two-factor
authentication makes it less likely that an intruder can masquerade as
an authorized user.

7
4.6 Arduino Relay
The relay module is an electrically operated switch that can be turned
on or off deciding to let current flow through or not. They are
designed to be controlled with low voltages like 3.3V like the ESP32,
ESP8266, etc, or 5V like your Arduino [3].

4.7 Google Cloud / AWS Server


A cloud server is a virtual server that runs on a cloud computing
platform. Unlike traditional physical servers, cloud servers are hosted
and maintained by a third-party service provider, who provides access
to computing resources over the internet.
Cloud servers offer several advantages over traditional servers,
including scalability, reliability, and cost-effectiveness. With cloud
servers, users can quickly and easily scale up or down their computing
resources as needed, without having to purchase and install additional
hardware.

8
5. Approach

5.1) The approach towards implementing this project is to work on


the program and function of Arduino UNO and to send the
notification.

5.2) We are using key lock to activate our Arduino and the program
in the Arduino will transmit a notification interrupt to user’s
mobile device through Arduino module using AWS.

5.3) After verification through device the Arduino transfers the


signal forward and turns the ignition on.

5.4) If the test case becomes “No” then the Arduino board will be
turned off by Arduino relay.

6. Working of the security system

6.1) When the user inserts the key in the key switch, the Arduino
board gets shorted and gets powered on.

6.2) Now, the Arduino board sends the signal to the AWS server
through the internet provided by the Arduino shield module.

6.3) The AWS server is being set-up with the firebase and the
Google Messaging API service to send the notification to the
mobile phone of the owner.

6.4) From there the owner will select “YES” or “NO” from his/her
phone.

6.5) Then if the user selects “YES” then the revert back signal is
being sent to the AWS server and then AWS sends back that
signal to the Arduino board that the user is the owner and now
ignition can be turned on.

6.6) If the owner selects “NO” then the revert back signal is being
send to the AWS server and then the AWS server sends signal to
the Arduino relay and then that relay will send the signal to the
Arduino board to turn off the Arduino.
9
7. Coding
There are the following parts in our code given below which are as
follows:

7.1) Initialise the GPS module and establishing the serial


communication
#include <SoftwareSerial.h>
#include <TinyGPS.h>

SoftwareSerial gpsSerial(3, 4); // RX, TX pins


of GPS module
TinyGPS gps;

void setup() {
Serial.begin(9600);
gpsSerial.begin(9600);
}

7.2) Setup the database connection


#include <MySQL_Connection.h>
#include <MySQL_Cursor.h>

IPAddress server_addr(192, 168, 0, 100); // IP


address of database server
char user[] = "username"; // username for
database login
char password[] = "password"; // password for
database login
char database[] = "databasename"; // name of
database to use

WiFiClient client; // for connecting to


database server
MySQL_Connection conn(&client); // MySQL
connection object
MySQL_Cursor* cursor; // MySQL cursor object

10
7.3) Connect to the database
void connectToDatabase() {
while (!conn.connected()) {
Serial.println("Connecting to
database...");
if (conn.connect(server_addr, 3306, user,
password, database)) {
Serial.println("Database connected.");
} else {
Serial.println("Database connection
failed.");
delay(5000);
}
}
cursor = new MySQL_Cursor(&conn);
}

7.4) Read GPS data and send alert


void loop() {
while (gpsSerial.available() > 0) {
if (gps.encode(gpsSerial.read())) {
gps.get_position(&latitude, &longitude,
&fix_age);
gps.get_datetime(&date, &time, &fix_age);
// check for alerts based on GPS data
here
// if an alert is triggered, insert data
into database
String query = "INSERT INTO gps_data
(latitude, longitude, date, time) VALUES (";
query += String(latitude, 6) + ", ";
query += String(longitude, 6) + ", ";
query += String(date) + ", ";
query += String(time) + ")";
Serial.println(query);
cursor->execute(query);
delay(5000);
}
}
}

11
8. Conclusion
The ongoing research in the field of IoT and its implementation in full
or partial manner will improve the quality of life. Thus, the proposed
project “Vehicle Security System using Cloud Services” would take
the security level a step forward and try to cover many of the
loopholes which are in existing technology [1].

Future technology advancements will allow us to connect this device


to the current GPS system to further strengthen vehicle security. We
can also integrate the Google Maps API with the Arduino Board to
track the whereabouts of the vehicle. For the next level of vehicle
security, we can further improve this project by using biometric
verification.

System is realistic and can control the theft automatically. The


response time delay is also less. The system is ideal for cars, further it
can be used for other vehicles too by using these components and
modules used in this project.
Our vehicle security system using cloud service is an effective way to
enhance the security of vehicles. By leveraging cloud technology, it is
possible to store and process data remotely, making it easier to
manage and monitor vehicle security. The system can be designed to
use a variety of sensors, such as GPS, motion sensors, and door
sensors, to detect any unauthorized access or tampering. When an
alert is triggered, the system can send notifications to the owner's
smartphone or other devices, enabling them to take appropriate action.

In conclusion, a cloud-based vehicle security system has several


benefits, including increased security, remote monitoring, and real-
time notifications. It is a practical and efficient way to protect vehicles
from theft, vandalism, or other security threats. With the right
hardware and software configuration, such a system can be
customized to meet the specific security needs of different types of
vehicles.

12
REFERENCES

1.) Zhigang Liu, Anqi Zhang and Shaojun Li,” Vehicle Anti-Theft
Tracking System Based on Internet of Things”, International
Conference on Computer and Communication Engineering (ICCCE
2010), pp.15, May.2015.

2.) H. Song, S. Zhu, and G. Cao, “Svats: A sensor-network-based vehicle


anti-theft system,” IEEE INFOCOM 2008, pp.2128-2136, April.2018.

3.) Shiqing Liu, “Integration and Application Design of GPS and GSM
System,” Heilongjiang Science and Technology Information, vol.23,
no.12, pp.85, Dec.2010.

4.) SeokJu Lee; Tewolde, G.; Jaerock Kwon, "Design and


implementation of vehicle tracking system using GPS/GSM/GPR
technology and smartphone application," Internet of Things (WFIoT),
2014 IEEE World Forum on, vol., no., pp.353,358, 6-8 March 2015.

13

You might also like