You are on page 1of 3

International Journal of Advanced Engineering Technology

E-ISSN 0976-3945

Research Paper

REAL TIME IMPLEMENTATION OF AUTO-GUARD SYSTEM USING RADIO FREQUENCY IDENTIFICATION


Boyina S. Rao, Malathy. V, Vivek. R, Karthikeyan. K

Address for Correspondence


Department of ECE, Kalaignar Karunanidhi Institute of Technology, Coimbatore- 641402 ABSTRACT
The main intention of this project is to reduce the theft rate of the car and meet the Intellectualized auto-guard demand of people which combined the radio frequency identify technology and the global mobile communication network. The purpose of this project is to combine the embedded technology with the RFID (Radio Frequency Identification) and GSM communication technology. KEYWORDS: auto-guard, GSM, RFID.

I. INTRODUCTION: Radio frequency identification (RFID) is a rapidly growing technology that has the potential to make great economic impacts on many industries. While RFID is a relatively old technology, more recent advancements in chip manufacturing technology are making RFID practical for new applications and settings, particularly consumer item level tagging. These advancements have the potential to revolutionize supply-chain management, inventory control, and logistics. At its most basic, RFID systems consist of small transponders, or tags, attached to physical objects. RFID tags may soon become the most pervasive microchip in history. When wirelessly interrogated by RFID transceivers, or readers, tags respond with some identifying information that may be associated with arbitrary data records. Thus, RFID systems are one type of automatic identification system, similar to optical bar codes. There are many kinds of RFID systems used in different applications and settings. These systems have different power sources, operating frequencies, and functionalities. The properties and regulatory restrictions of a particular RFID system will determine its manufacturing costs, physical specifications, and performance. Some of the most familiar RFID applications are item-level tagging with electronic product codes, proximity cards for physical access control, and contact-less payment systems. Many more applications will become economical in the coming years. While RFID adoption yields many efficiency benefits, it still faces several hurdles. Besides the typical implementation challenges faced in any information technology system and economic barriers, there are major concerns over security and privacy in RFID systems. Without proper protection, RFID systems could create new threats to both corporate security and personal privacy. In this section, a brief history of RFID and automatic identification systems. The summarize several major applications of RFID in Section 2. In Section 3, and present a primer on basic RFID principles and discuss the taxonomy of various RFID systems. II. SYSTEM PRINCIPLE The systems model is clearly explained in the following block diagram fig 1. a. Controller The AT89C51 is a low-power, high-performance CMOS 8-bit Microcomputer with 4K bytes of Flash programmable and erasable read only memory IJAET/Vol.III/ Issue II/April-June, 2012/17-19

(PEROM). The device is manufactured using Atmels high-density nonvolatile memory technology and is compatible with the industry-standard MCS-51 instruction set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C51 is a powerful microcomputer which provides a highly-flexible and cost-effective solution to many embedded control applications.

Fig 1. Block diagram of auto-guard system. b. GSM A GSM modem is connected to each Telecontrol unit. The central server calls up each of the Telecontrol units in sample homes to pick up the data stored therein. aMaps technology architecture enables instant data collection from the sample homes as often as desired. It also enables conducting of instant opinion polls about the programs being telecast. The collected data is instantaneously incorporated into the aMap reports. At present the central server calls up all the sample homes between 2:00 AM and 4:00 AM IST (Indian Standard Time) to collect the data. In case the data from some of the homes/ units cannot be collected in the first attempt, the server dials that home again after 5 minutes, and makes the third attempt after 1.30 hours. After 3 trials, the server gives up. If non-collection of data is caused by the problems with cellular connection, the data can be collected later at any time over next seven days. The system generates a list of sample homes from which the data could not be collected. These failures are investigated on the same day. The possible causes of failure in data collection are The Telecontrol power failure The Telecontrol unit disconnection/dys functionality The sample home being locked The problems with cellular connection etc. The Telecontrol system can respond to every possible use of a television screen, including viewing videos, playing TV games and using Teletext. Moreover, the design of the Telecontrol unit and its interactive

International Journal of Advanced Engineering Technology system can be adapted to the psychological requirements of the panel household members, a key reason for its very high degree of acceptance and the widespread willingness to enter information. c. Relay A relay is an electrically operated switch. Many relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power signal, or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Relays found extensive use in telephone exchanges and early computers to perform logical operations. A type of relay that can handle the high power required to directly drive an electric motor is called a contactor. Solid-state relays control power circuits with no moving parts, instead using a semiconductor device triggered by light to perform switching. Relays with calibrated operating characteristics and sometimes multiple operating coils are used to protect electrical circuits from overload or faults; in modern electric power systems these functions are performed by digital instruments still called "protection relays". d. Can protocol With rapidly changing computer and information technology and much of the technology finding way into vehicles, vehicles are undergoing dramatic changes in their capabilities and how they interact with the drivers. Although some vehicles have provisions for deciding to either generate warnings for the human driver or controlling the vehicle autonomously, they usually must make these decisions in real-time with only incomplete information. So, it is important that human drivers still have some control over the vehicle. Advanced in-vehicle information systems provide vehicles with different types and levels of intelligence to assist the driver. Their introduction into the vehicle design has allowed an almost symbiotic relationship between the driver and vehicle by providing a sophisticated & intelligent driver-vehicle interface. Within this interface, vehicle control depends completely on the cooperation between the driver and the in-vehicle information systems by interactive communication through an intelligent information network. This paper discusses the development of such a control framework for the vehicle which is called the digital-driving behavior, which consists of a joint mechanism between the driver and vehicle for perception, decision making and control. III. HARDWARE SUPPORT a. Buzzer When the switch is pressed, the relay will operate via the transformer primary and closed relay contact. As soon as the relay operates the normally closed contact will open, removing power from the relay, the contacts close and the sequence repeats, all very quickly...so fast that the pulse of current causes fluctuations in the transformer primary, and hence secondary. The speakers tone is thus proportional to relay operating frequency. The capacitor C can be used to "tune" the note. The nominal value is IJAET/Vol.III/ Issue II/April-June, 2012/17-19

E-ISSN 0976-3945

0.001uF, increasing capacitance lowers the buzzers tone. b. IR sensor The photo depicts the schematics for an infrared sensor which allows you to detect an object's distance from the robot. The big picture problem is attach this infrared sensor on both wings of the aerial robot. Attaching these sensors on the wing tips will help the robot navigate through the halls of any building.. This tutorial shows you how to construct and test one infrared sensor and takes approximately 3 hours to complete. c. Dc motor

Fig 2. Interfacing of the controller with hard wares. A DC motor may be thought of as a series of electromagnets, radially spaced around a common shaft:N SThis particular motor is of the "permanent magnet" type, with wire windings only on the armature IV. CONCLUSION The auto-guard system combines the advantages of RFID and GSM together. The key of the automobile is a RFID card which is contactless, security and convenient. The long-rage monitor and grading responses could be realized by the mobile phones of users, which made the alarm cover a broad rage. The microcontroller for vehicle was adopted, which enhanced the reliability and the capability of ant interference. These advantages mentioned above meet the requirements of auto-guard system. So that a better effect was made in practice. In addition, it is easy to extend functions. If the function of position tracking is needed, the GPS module can be added. If the Internet of Things is to be entered. As a result, the radio technology at present can be replaced completely. So the practical value and the market prospect are considerable.

International Journal of Advanced Engineering Technology V. REFERENCES


1. Huaqun Guo,Cheng H.S.,Wu Y.D.,Ang J.J.,Tao F.,et al.,An automotive security system for anti-theft, Proceedings of the Eighth International Conference on Digital Object Identifier,pp.421-426, Mar. 2009. Hui Song,Sencun Zhu,Guohong Cao,SVATS:a sensornetwork-based vehicle anti-theft system, Proceedings of The 27th Conference on Computer Communications,pp.2128-2136,May,2008. Yang Wang,Xian-Jun Gao,Zhang Gang,A study on Mn coding for guarding against theft and remote control device of an automobile, Proceedings of International Conference on Vehicle Electronics,pp.294- 297,1999. Khangura K.S.,Middleton N.V.,Ollivier M.M.,Vehicle anti-theft system uses radio frequency identification,Proceedings of IEE Colloquium on Vehicle Security Systems,pp.1-7,Oct. 1993. Hirano M.,Takeuchi M.,Tomoda T.,Nakano K.I.,Keyless entry system with radio card transponder [automobiles],Proceedings of IEEE Transactions on Industrial Electronics,vol.35,no.2,pp.208-216, May 1988. Wan Lili,Chen Tiejun,Automobile anti-theft system design based on GSM,Proceedings of International Conference on Advanced Computer Control,pp.551554,Jan. 2009. Jayendra G.,Kumarawadu S.,Meegahapola L.,RFIDbased anti-theft auto security system with an immobilizer, Proceedings of International Conference on Industrial and Information Systems,pp.441-446, Aug. 2007. Guo Hongzhi,Chen Hong,Ji Guohuang,Zhou Xin,The vehicle passive keyless entry system based on RFID,Proceedings of the 7th World Congress on Intelligent Control and Automation,pp.8612-8617,Jun. 2008. Zhixiong Liu,Guiming He,A vehicle anti-theft and alarm system based on computer vision,Proceedings of IEEE International Conference on Vehicular Electronics and Safety,pp.326-330,Oct. 2005. Karimi H.A.,Krishnamurthy P.,Real-time routing in mobile networks using GPS and GIS techniques, Proceedings of the 34th Annual Hawaii International Conference on,pp.11,Jan. 2001 E. Ilie-Zudor, Z. Kemny, P. Egri, L. Monostori The RFID Technology and Its Current Applications, In Proceedings of the Modern Information Technology in the Innovation Processes of the Industrial Enterprises MITIP 2006 V. Chawla, D.S Ha, An Overview of Passive RFID IEEE Applications & Practise, September 2007 A. Juels RFID Security and Privacy: A Research Survey, IEEE Journal on Selected Areas in Communication (J-SAC), 2006 C. P. Wallace The color of money, Time Europe, September 2011 B. Torres, Q. Pang, G.W. Skelton, S. Bridges, N. Meghanathan Integration of an RFID Reader to a Wireless Sensor Network and its Use to Identify an Individual Carryng RFID Tags, International Journal of Ad hoc, Sensor % Ubiquitous Compting (IJASUC) Col.1, No. 4, December 2010. M. A. Khan, M. Sharma, P.R. Bramanandha A Survey of RFID Tags, International Journal of Recent Trends in Engineering, Vol.1, No.4, May 2009 K. Fishkin and J. Lundell. RFID in healthcare. In S. Garfinkel and B. Rosenberg, editors, RFID: Applications, Security, and Privacy, pages 211228. Addison-Wesley, 2005.

E-ISSN 0976-3945

2.

3.

4.

5.

6.

7.

8.

9.

10.

11.

12. 13.

14. 15.

16.

17.

IJAET/Vol.III/ Issue II/April-June, 2012/17-19

You might also like