Finalising Plagarism Check
Finalising Plagarism Check
CHAPTER-1 INTRODUCTION
In recent years vehicle theft has become a significant issue which should be traced
and detected. The safety and security of the vehicle is essential. Even there are many
existing mechanisms this have some limitations and high cost. So, an efficient
security mechanism is needed. This project detects vehicle theft. Arduino is the main
component which is used to user interface DC motor and GPS, GSM. The place of
the vehicle detected using Global positioning system (GPS) and Global system mobile
communication (GSM) with the help of Wi-Fi module ESP 8266. GPS is a
spacebased navigation system used to track the vehicle and it gives the location of the
stolen device in all weather conditions.
It gives the latitude and longitude co-ordinates of the device using GPS antenna.
GSM is a specialized type of modem it accepts a SIM card, and operates like a mobile
phone. It is used to provide information to the user and alert him with a message
having latitude and longitude of the vehicle. This total system is operated with a
switch which is made on, when we park the vehicles out. Now if the vehicle theft
happened, dc motor starts, the above procedure continues and the information is
posted using internet of things. This vehicle theft prevention and tracking system is
used in client’s vehicle as a theft prevention and rescue device.
is increasing day by day. The automobile manufacturers are try to improve the
security features of their products by introducing advanced technologies to avoid the
thefts particularly in the case of cars. Despite the various technologies that have been
introduced in recent years to deter car thefts and tracking it, It was reported that as
many as cars were stolen yearly in the world. According to the National Crime
Information Centre (NCIC), in 2006, 1,192,809 motor vehicles were reported stolen,
the losses were 7.9$ billion. Several security and tracking systems are designed to aid
corporations with large number of vehicles and several usage purposes.
A fleet management system can minimize the cost and effort of employees to
complete road assignments within a minimal time. Besides, assignments can be
scheduled in planed based on, current vehicles location. Therefore, central fleet
management is essential to all large enterprises to meet the varying requirements of
customers and to improve the productivity. However, there are still some security
gaps where these technologies can't prevent a vehicle from theft, don‘t assist to
recover it and don‘t allow the users to know the status of their vehicles. They can‘t
permit the user to communicate with the vehicle online, even if the user is certain that
his vehicle was stolen. In wireless data transporting, it is a common feature with all
mobile network service providers. Utilization of WIFI technology has become
popular because it is low cost, convenient and accessible way of transferring and
receiving data with high reliability
With the advancement of innovation in the recent years, various systems and
developments are utilized in different fields. Vehicle burglary discovery focuses
essentially on the different lock framework or observing and controlling of vehicle
from a far off area. These kinds of gadgets can't be for all intents and purposes
inferred as there are different deficiencies and the rationales should be reconsidered.
A sensor based vehicle burglary discovery framework alongside certain highlights
like fire identification is executed in the vehicle.
Two android gadgets speak with one another one from the vehicle and the other is
with the proprietor of the vehicle. A secret phrase lock is utilized to control the
vehicle. At the point when a client attempts to get to the vehicle the proposed utilizes
should be approved really at that time the vehicle start can be turned on. Steady
observation of any article is kept up on vehicle. Distant checking of vehicle is spilled
through the observation cushion.
With the help of Raspberry Pi, checking and tracking gets conceivable, System plays
a significant role in controlling and tracking vehicle live. At whatever point there is
vehicle theft situation or vehicle's mishap situations occur, the proposed system gives
the vehicle's present location, speed to the vehicle proprietor's portable. One of the
advantage is live tracking of vehicle prior. There is concern that arrangement is given
to a student according to circumstances.
ignition key. In proposed method we have 4 pin Push button Patton based
unlocking system to turn ON the ignition. This system activates only when the GPS
module is gets activated and this extension for controlling mechanisms which
remotely locks the vehicle engine and prevents the theft. In proposed technique,
user can start/stop the vehicle either by using the android application or by the
ignition keypad based security unlocking system..
The monitoring system contains several components. This chapter gives a detailed
review of each of this part along with its working.
Block Diagram of
Power Supply
As shown in the figure above, this circuit is a way to obtain DC 12V and 5V DC
power. This circuit uses two integrated circuits 7812 (IC1) and 7805 (IC2) to obtain
the required voltage. The AC power supply voltage will be reduced by the
transformer T1, filtered and rectified by the capacitor C1 to obtain a constant DC
level. IC1 regulates this voltage to bypass B1 to obtain a constant 12V DC. The
output of IC1 will be regulated by IC2 to obtain a constant DC voltage of 5V at its
output. In this way 12V and 5V DC are obtained. This type of circuit is very useful
when we need two DC voltages to run the circuit. The LM78XX series of three
terminal positive regulators are packaged in TO-220 with multiple fixed output
voltages and can be used in a wide range of applications. Each type uses internal
current limit, thermal shutdown, and safe operation area protection, making it
basically indestructible. If they provide enough heat dissipation, they can provide
more than 1A of output current. Although primarily designed as fixed voltage
regulators, these devices can be used with external components to obtain adjustable
voltage and current. The power supply part is the part that provides +5V power
supply for the components. The IC LM7805 is used to provide a constant +5V power
supply. The AC voltage (usually 220 V) is connected to the transformer to reduce the
AC voltage to the required DC output level. The diode rectifier then provides a
fullwave rectified voltage, which is initially filtered through a simple capacitor filter
to generate a DC voltage. The resulting DC voltage usually has some AC voltage
fluctuations or changes. Even if the input DC voltage changes or the load connected
to the output DC voltage changes, the voltage regulator circuit will eliminate the
ripple and keep the same DC value. This voltage regulation is generally
accomplished using a popular voltage regulator IC unit.
Transformer
Transformers convert alternating current from one voltage to another with almost
no power loss. The transformer only works on alternating current, which is one of
the reasons why the grid is alternating current.
The step-up transformer steps up the voltage, and the step-down transformer
steps down the voltage. Most power supplies use step-down transformers to
reduce the dangerous high supply voltage (230V in India) to a safer low voltage.
The input coil is called as the primary and the output coil is called the secondary.
There is no electrical connection between the two coils; instead, they are
connected by an alternating magnetic field generated in the soft iron core of the
transformer. The transformer wastes very little energy, so the output energy is
(almost) equal to the input. Note that as the voltage decreases, the current
increases. The transformer reduces the supply voltage (0-230 V) to (0-6 V) level.
Then connect the secondary of the voltage transformer to the rectifier bridge,
which is constructed with the help of PN junction diodes. The advantage of using
a bridge rectifier is that it can provide a DC peak voltage output.
Rectifier
There are several ways to connect diodes to make a rectifier that converts
alternating current to direct current. The bridge rectifier is the most important, it
produces a full-wave variable DC. If you use a center tapped transformer, you can
also use only two diodes to make a full-wave rectifier, but this method is rarely
used now because the diodes are cheaper. A single diode can be used as a
rectifier, but it uses only the positive (+) part of the AC waveform to generate a
DC variable half-wave
Bridge Rectifier
When four diodes are connected as shown, the circuit is called a rectifier bridge. The
input of the circuit is applied to the diagonal of the network, and the output comes
from the remaining two corners. Assuming that the transformer works normally,
point A is a positive potential, point B is a negative potential, and the positive
potential of point A will drift forward by D3 and backward by D4.
Bridge rectifier
The negative potential at point B will forward D1 and reverse D2. At this time, D3
and D1 are forward biased to allow current to flow; D4 and D2 are reverse biased to
prevent current flow.
One advantage of the bridge rectifier over the traditional full-wave rectifier is that for
a given transformer, the voltage output produced by the bridge rectifier is almost
twice that of the traditional full-wave circuit. Chapter
I. The main advantage of this bridge circuit is that it doesn’t require a special center-
tapped transformer, thereby reducing its size and cost
II. The single secondary winding is connected to one side of the diode bridge
network and the load is connected to the other side
III. The result is still pulsating DC, but the frequency is doubled.
Output
Waveform Of
DC
Smoothing
Smoothing is completed by the large-capacity electrolytic capacitors connected to
both ends of the DC power supply, which act as a reservoir and provide current to the
output when the variable DC voltage of the rectifier drops. The capacitor quickly
charges around the peak of the variable DC, and then discharges when supplying
current to the output.
Voltage Regulators
Many fixed voltage regulator ICs have 3 wires and look like power transistors,
such as 7805 + 5V 1Amp regulators. If necessary, they include a hole to connect
the heat sink.
7805 voltage
NODE MCU :
Node MCU is an open source firmware and development kit that can help you use a
few lines of Lua scripts to build your IoT product prototype. ESP8266 is the name of
a microcontroller designed by Expressive Systems.
This module has a built-in USB connector and a variety of pins. Using a micro USB
cable, you can connect the Node MCU devkit to your laptop and flash it in easily, just
like an Arduino. It also works with breadboard Node MCU out of the box Features:
• Open source
• Interactive
• Programmable
• Low cost
• Simple and easy
• Smart
• Supports WI-FI
ESP8266 INTRODUCTION:
ESP8266 is a low-cost MCU with built-in Wi-Fi. It can be paired with another host
microcontroller (such as Arduino) to provide Wi-Fi network functions for the basic
The Node MCU team designed a complete open source development board around
ESP8266, including an additional USB to serial UART adapter, a micro USB port for
programming, and a 3.3v voltage regulator. The Node MCU board is ready to use,
you can connect to the computer, install the USB driver and start programming to
connect to the Wi-Fi network. The average price for all of these on eBay is about $ 4.
Features of ESP8266:
• 802.11 b/g/n
• SDIO 2.0, (H) SPI, UART, I2C, I2S, IR remote control, PWM, GPIO
• Standby power consumption <1.0mW (DTIM3) • +20 dBm output power in 802.11b
You must hold down the SW2 switch (switch programming) to keep the GPIO-0 pin
grounded. So we can enter the programming mode and upload the code. Once the
code is released, the switch can be released.
There are many methods and IDEs for ESP modules, but the most widely used is
Arduino IDE. The
ESP8266 module is only suitable for 3.3V, any value higher than 3.7V will kill the
module. Use the FTDI board that supports 3.3V programming to program the ESP-01.
A common problem that everyone faces when using ESP-01 is the ignition problem.
This module consumes quite a lot of power when you are programming, and uses the
3.3V pin on the Arduino to power it, or only uses a voltage divider. Therefore it is
important to make a small voltage regulator for 3.31v that can provide at least 500mA
of current. A recommended regulator is the LM317. Below is a simplified circuit
diagram using the ESP8266-01 module
Circuit diagram
PIEZO-BUZZER
Form in the form of a live sound or continuous or intermittent sound. Initially, this
device was based on an electromechanical system identical to the electrical bell
without a metal gang (sound noise). In many cases, these units were fixed to walls and
ceilings and ceilings and walls used as sound boards. Another implementation that
uses several AC connection devices drives a speaker in trouble and implements
circuits to increase the current to sufficient noise to engage this circuit in a low-cost
8Ω speaker. Nowadays, it is more common to use a piezoelectric probe based on
ceramic as Sonalert making an acute tone. In general, these were connected to the
"driver" circuit that changes the sound tone.
Specifications:
Rated Voltage:
The piezoelectric buzzer is driven by a square wave (V p-p). Operating voltage:
used for normal work. However, there is no guarantee that the minimum sound
Capacitor:
The Piezo Buzzer can generate a higher sound pressure level with a higher
sound output is measured with a decibel meter. Apply a nominal voltage and a
square wave at a distance of 10 cm.
Nominal Frequency:
The buzzer can emit sounds of any frequency, but we recommend that the highest and
most stable sound pressure level comes from the nominal frequency.
working temperature:
RELAY
Relay
Working
In most of the part, the relay consists of a inductor coil, a spring (not appeared in the
figure), Swing terminal, and two high force contacts named as ordinarily shut (NC)
and typically opened (NO). Hand-off utilizes an Electromagnet to move swing
terminal between two contacts (NO and NC). When there is no force applied to the
inductor curl (Relay is OFF), the spring holds the swing terminal is connected to NC
contact.
Representation of Relay
Whenever required power is applied to the inductor coil, the current flowing through
the coil generates a magnetic field which is helpful to move the swing terminal and
attached it to the normally open (NO) contact. Again when power is OFF, the spring
restores the swing terminal position to NC.
Advantage of Relay:
A relay takes small power to turn ON, however it can handle high force gadgets to
turn ON and OFF. Think about a model; a transfer is utilized to control the roof FAN
at our home. The roof FAN may runs at 230V AC and draws a current limit of 4A. In
this manner the force required is 4X230 = 920 watts. Off base we can handle AC,
lights, and so on, depend up on the hand-off evaluations. Transfers can be utilized to
control DC engines in ROBOTICs.
The output of the driver is open collector and the gatherer ebb and flow rating of each
Darlington pair is 500mA. Darlington sets might be resembled if higher current is
required. The driver IC likewise comprises of a 2.7KΩ base resistor for each
Darlington pair. Hence each Darlington pair can be worked straightforwardly with
TTL or 5V CMOS gadgets. This driver IC can be utilized for high voltage
applications up to 50V.
Features
* 500mA appraised collector current (Single output)
PUSH BUTTONS
Uses:
Pushbuttons are frequently shading coded to connect them with their capacity so the
administrator won't press some unacceptable catch in mistake. Usually utilized tones
are red for halting the machine or interaction and green for beginning the machine or
cycle.
Red pushbuttons can likewise have enormous heads (mushroom formed) for simple
activity and to work with the halting of a machine. These pushbuttons are called crisis
stop fastens and are commanded by the electrical code in numerous wards for
The wellspring of the energy to enlighten the light isn't straightforwardly attached to
the contacts on the rear of the pushbutton yet to the activity the pushbutton controls.
In this manner a beginning catch when pushed will cause the interaction or machine
activity to be begun and an auxiliary contact planned into the activity or cycle will
near turn on the pilot light and imply the activity of pressing the catch made the
resultant interaction or activity start.
Push to ON button
DC MOTOR
What is DC Motor?
A DC motor is an electric motor that sudden spikes in demand for direct flow (DC)
power. In any electric engine, activity depends on straightforward electromagnetism.
A current-conveying conductor creates an attractive field; when this is then positioned
Fig.4.8(c) DC motor
Each DC motor has six essential parts - hub, rotor (a.k.a., armature), stator,
commutator, field magnet(s), and brushes. In most basic DC engines, the outer
attractive field is delivered by high-strength lasting magnets1. The stator is the fixed
piece of the engine - this incorporates the engine packaging, just as at least two lasting
magnet shaft pieces. The rotor pivots concerning the stator. The rotor comprises of
windings (by and large on a center), the windings being electrically associated with
the commutator. The above chart shows a typical engine design - with the rotor inside
the stator (field) magnets.
The calculation of the brushes, commutator contacts, and rotor windings are to such
an extent that when force is applied, the polarities of the invigorated winding and the
stator magnet(s) are skewed, and the rotor will pivot until it is nearly lined up with the
stator's field magnets. As the rotor arrives at arrangement, the brushes move to the
following commutator contacts, and invigorate the following winding. Given our
model two-post engine, the revolution turns around the bearing of current through the
rotor twisting, prompting a "flip" of the rotor's attractive field, driving it to keep
pivoting.
All things considered, however, DC engines will consistently have multiple posts
(three is an exceptionally basic number). Specifically, this maintains a strategic
distance from "dead spots" in the commutator. You can envision how with our model
two-post engine, if the rotor is actually at the center of its turn (consummately lined
up with the field magnets), it will get "stuck" there. In the mean time, with a two-shaft
engine, there is a second where the commutator shorts out the force supply (i.e., the
two brushes contact both commutator contacts at the same time). This would be
terrible for the force supply, squander energy, and harm engine segments also. One
more detriment of such a basic engine is that it would display a high measure of force
"swell".
So since most little DC engines are of a three-post plan, we should dabble with the
functions of one through an intuitive movement (JavaScript required)
You'll notice a couple of things from this - in particular, each post is completely
invigorated in turn (yet two others are "mostly" stimulated). As each brush changes
starting with one commutator contact then onto the next, one curl's field will quickly
fall, as the following loop's field will quickly energize (this happens inside a couple of
microsecond). We'll see more about the impacts of this later, however meanwhile you
can see that this is an immediate aftereffect of the loop windings' arrangement wiring.
GPS is made up of three parts: in between 24 and 32 satellites orbiting the Earth, four
control and monitoring stations on Earth, and the GPS receivers owned by users. GPS
satellites broadcast signals from space that are used by GPS receivers to give
threedimensional location (latitude, longitude, and altitude) plus the time.
Why do we require GPS?
• To determine position locations.
The Global Positioning System (GPS) is a U.S. space-based worldwide route satellite
framework. It gives dependable situating, route, and timing administrations to overall
clients consistently in all climate, day and night, anyplace on or close to the Earth.
For example, you need to radio a helicopter pilot the directions of your position area
so the pilot can get you.
• To explore starting with one area then onto the next; for instance, you need to
go from a post to the fire border.
• To make digitized maps; for instance, you are allocated to plot the fire border
and problem areas.
• To decide distance between two focuses or how far you are from another area.
Working:
GPS satellites circle the earth double a day in an extremely exact circle and
communicate signal data to earth. GPS beneficiaries take this data and use
triangulation to figure the client's definite area. Basically, the GPS collector thinks
about the time a sign was communicated by a satellite with the time it was gotten. The
time contrast tells the GPS collector the distance away the satellite is. Presently, with
distance estimations from a couple of more satellites, the recipient can decide the
client's position and show it on the unit's electronic guide.
The premise of the GPS is a heavenly body of satellites that are consistently circling
the earth. These satellites, which are furnished with nuclear clocks, send radio signals
that contain their accurate area, time, and other data. The radio signs from the
satellites, which are checked and remedied by control stations, are gotten by the GPS
collector.
A GPS recipient needs just three satellites to plot an unpleasant, 2D position, which
won't be extremely precise. Preferably, at least four satellites are expected to plot a 3D
position, which is substantially more precise.
The three fragments of GPS are the space, control, and client.
The space fragment comprises of 29 satellites orbiting the earth at regular intervals at
12,000 miles in height. This high elevation permits the signs to cover a more
prominent region. The satellites are organized in their circles so a GPS recipient on
earth can get a sign from in any event four satellites at some random time. Each
satellite contains a few nuclear tickers. The satellites send low radio signs with an
exceptional code on various frequencies, permitting the GPS beneficiary to recognize
the signs.
The primary motivation behind these coded signals is to permit the GPS collector to
compute travel season of the radio sign from the satellite to the recipient. The
movement time duplicated by the speed of light equivalents the separation from the
satellite to the GPS collector.
A GPS collector should be bolted on to the sign of at any rate three satellites to
compute a 2D position (scope and longitude) and track development. With at least
four satellites in see, the collector can decide the client's 3D position (scope, longitude
and height). When the client's position has been resolved, the GPS unit can figure
other data, like speed, bearing, track, trip distance, distance to objective, dawn and
dusk time and the sky is the limit from there.
The control fragment tracks the satellites and afterward furnishes them with rectified
orbital and time data. The control portion comprises of five automated screen stations
and one Master Control Station. The five automated stations screen GPS satellite
signals and afterward send that data to the Master Control Station where oddities are
remedied and sent back to the GPS satellites through ground recieving wires.
c. User Segment — The GPS recipients claimed by regular folks and military
The client section comprises of the clients and their GPS beneficiaries. The quantity of
concurrent clients is boundless.
Route FEATURES:
Tracks: Automatic track log; 10 saved tracks let you follow your way in the two ways
Outing PC: Resettable odometer, clocks, normal and most extreme rates
Cautions: Anchor drag, approach and appearance, off base and nearness waypoint
Tables: Built-in heavenly tables for best occasions to fish and chase, sun and moon
rise/set dependent on date and area
Position design: Lat/Lon, UTM/UPS, Maidenhead, MGRS, Loran TDs and different
frameworks, including client matrix
Execution
Collector: WAAS empowered, 12 equal station GPS recipient constantly tracks and
uses up to 12 satellites to process and refresh your position
Procurement Times:
GPS Accuracy:
WAAS precision:
Elements: 6g's
Interfaces: RS232 with NMEA 0183, RTCM 104 DGPS information configuration
and restrictive Garmin
Show: 2.2"W x 1.5"H (5.6 x 3.8 cm), 256 x 160 pixels, high-balance FSTN with
splendid backdrop illumination. Switchable direction.
Case: Fully gasketed, high-sway plastic composite, waterproof to IEC 529 IPX7
principles
2.7.4 Applications:
There are such countless gadgets made with the execution of Global Positioning
System. Google Earth is the most acclaimed application that utilizes the signs got by
the GPS beneficiaries. It empowers public likewise to get to the guides which educate
the clients concerning the areas all around the world.3DEM is uninhibitedly accessible
programming that will make 3D landscape scenes and flyby movements and fare GIS
territory information records utilizing any of the accompanying openly accessible
landscape information as a source. Individuals utilize Global Positioning System for a
few employments. An exploration distributed on a magazine expresses that the level
of employments for each few necessity is as per the following.
Tracking 10%
GIS 8%
Survey 7%
Manufacturing 7%
Vessel Voyage 2%
Military Related 1%
Application GPS:
While initially a tactical venture, GPS is viewed as a double use innovation, which
means it has huge military and regular citizen applications.
Military Navigation:
GPS permits troopers to discover goals, even in obscurity or in new region, target
following, rocket and shot direction and search and salvage.
Non military personnel: Many regular citizen applications utilize at least one of GPS's
three fundamental parts: supreme area, relative development, and time transfer.
CHAPTER-5 SOFTWARE
ARDUINO UNO INSTALLATION:
In this we will get know of the process of installation of Arduino IDE and
interface Arduino uno to Arduino IDE.
Step 1:
First we should have our Arduino board (we can pick our favorite board) and a
USB cable. In case we use Adriana UNO, Arduino Duemilanove, Nano, Arduino
Mega 2560, or Diecimila, we will require a standard USB cable (A plug to B plug), t
In that case we use Arduino Nano, we will need an A to Mini-B cable.
Step 2 − Download Arduino IDE Software. We can get various forms of Arduino IDE
from the Download page on the Arduino Official site. We should choose wer
programming, which is viable with wer working framework (Windows, IOS, or
Linux).
After wear document download is finished, unfasten the record
Connect the Arduino board to wer computer by using the USB cable. The green power
LED
(labeled PWR) should glow.
Step 4 − Launch Arduino IDE.
After our Arduino IDE software is downloaded, we need to unfasten the folder. Inside
the folder, we can find the application icon with an infinity label (application.exe).
Double click on the icon to start the IDE.
To stay away from any blunder while transferring wear program to the board, we
should choose the right Arduino board name, which matches with the board
associated with wer PC.
Here, we have selected Arduino Uno board, according to our tutorial, but we must
select the name matching with the board that we are using.
Select the sequential device of the Arduino board. Go to Tools → Serial Port menu.
This is probably going to be COM3 or higher (COM1 and COM2 are normally saved
for equipment sequential ports). To discover, we can detach wer Arduino board and
re-open the menu, the section that vanishes ought to be of the Arduino board.
Reconnect the board and select that sequential port.
Prior to clarifying how we can transfer our program to the board, we should exhibit
the capacity of every image showing up in the Arduino IDE toolbar.
Note − If we have an Arduino Mini, NG, or other board, we need to press the reset
button
truly on the board, preceding tapping the transfer button on the Arduino Software.
BLYNK APP
Blynk was intended for the Internet of Things. It can handle hardware distantly, it can
show sensor data, and it can store data, visualize it and do numerous other cool things.
• Blynk App - permits to you make astounding interfaces for your activities
utilizing different gadgets we give.
• Blynk Server - answerable for every one of the correspondences between the cell
phone and equipment. You can utilize our Blynk Cloud or run your private Blynk
worker locally. Its open-source, could undoubtedly deal with a huge number of
gadgets and can even be dispatched on a Raspberry Pi.
Presently envision: each time you press a Button in the Blynk application, the message
goes to the Blynk Cloud, where it mysteriously discovers its way to your equipment.
It works something similar the other way and everything occurs in a blynk of an eye.
• Similar API & UI for all supported hardware & devices • Connection to the
cloud using: o Wi-Fi
o Bluetooth and BLE o Ethernet
o USB (Serial)
o GSM
• Set of easy-to-use Widgets
• Direct pin manipulation with no code composing
• Easy to integrate and add new functionality using virtual pins
• History data monitoring via Super Chart widget
• Device-to-Device communication using Bridge Widget
• Sending messages, tweets, push notifications, etc.
• New highlights are constantly added.
You can discover example sketches covering basic Blynk Features. They are included
in the library, All the sketches are designed to be simply combined with each other.
The Blynk App is well designed interface builder. It works on both iOS and Android,
so no holy wars here,
After you download the Blynk App, we need to create a New Blynk account. This
account is unrelated from the accounts used for the Blynk Forums, in case you already
have now one.
We recommend using a real email address because it will work on things later.
After you’ve successfully signed into your account, start by creating a new project.
Select the hardware model you will use. Check out at the list of supported hardware
Auth Token
Auth Token is a unique identifier which is used to connect your hardware to your
smartphone. Every new project you create have its own Auth Token. You’ll get Auth
Token automatically to your email after project creation. You can likewise copy it
manually. Click on devices section and select required device:
NOTE: Don’t share your Auth Token with anyone, unless if you want someone to
have access to your hardware.
It’s very convenient to send it over email. Press the email button and the token will be
sent to the e-mail address you used for registration. You can also click on the Token
line and it will be copied to the clipboard.
Now press on the “Create” button.
5. Add a Widget
Your project canvas is empty, let’s we add a button to control our LED.
Tap anywhere on the material to open the widget box, all the available widgets are
located here. Now pick a button.
Widget Box
Drag-n-Drop - Tap and hold the Widget to drag it to the new position.
Widget Settings - Each Widget has it’s own settings. Tap on the widget to, get to
them.
The most important parameter is to set PIN . The rundown of pins reflects physical
pins defined by your hardware. If your LED is interface to Digital Pin 8 - then select
D8 (D - stands for Digital).
Run The Project
When you are finish with the Settings - press the PLAY button. This will switch you
from EDIT mode to PLAY mode where you can interface with the hardware. While in
PLAY mode, you will not be able to drag or set up new widgets, press STOP and get
return to EDIT mode.
You will get a message saying “Arduino UNO is offline”. We’ll manage with that in
the next section
This project is well prepared and acting accordingly (including all the
hardware and software) as per the initial specifications and requirements of our
project. Because of the creative nature and design the idea of applying this
project is very new, the oppurtunities for this project are immense.
CHAPTER-7 CONCLUSION
An IoT based vehicle theft detection and remote engine locking system is GPS
technology that helps the users identify the vehicle in theft mode and enables the
controlling mechanism technique and In this way vehicles are provided with better
controlling mechanism and thus reducing the crimes.
.
REFERENCES
[2] E. Nickel, ―IBM automotive software foundry,‖ in Proc. Conf. Comput. Sci.
Autom. Ind., Frankfurt, Germany, 2003.
[3] M.Wolf,A.Weimerskirch,andT.Wollinger,―Stateof theart:Embedding security
in vehicles,‖ EURASIP J. Embedded Syst., vol. 2007, no. 5, p. 1, 2007.
[4] R. Charette, This Car Runs on Code. [Online]. Available: http://www.
spectrum.ieee.org/feb09/7649
[5] T.Nolte,H.Hansson,andL.L.Bello,―Automotiveco mmunicationspast, current
and future,‖ in Proc. IEEE Int. Conf. Emerging Technol. Factory Autom., 2005, vol. 1,
pp. 992–999.
[6] K. H. Johansson, M. Torngren, and L. Nielsen, ―Vehicle applications of
controller area network,‖ in Handbook of Networked and Embedded Con-
trolSystems. NewYork,NY,USA:SpringerVerlag,2005,pp.741–765.
[7] T. Hoppe and J. Dittman, ―Sniffing/replay attacks on CAN buses: A simulated
attack on the electric window lift classified using an adapted CERT taxonomy,‖ in
Proc. Conf. Embedded Syst. Security, 2007, pp. 1–6.
[8] T. Hoppe, S. Kiltz, and J. Dittmann, ―Security threats to automotive CAN
networks—Practical examples and selected shortterm countermeasures,‖ Rel. Eng.
Syst. Safety, vol. 96, no. 1, pp. 11– 25, Jan. 2011.
[9] K. Koscher et al., ―Experimental security analysis of a modern automo- bile,‖ in
Proc. IEEE Security Privacy. Symp., Oakland, CA, USA, 2010, pp. 447–462. [10]
The EVITA project, 2008, Webpage. [Online]. Available: http:// evitaproject.org