ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Multilevel Security System for Automotives using RFID and Biometric Techniques in LabVIEW

Priya Darshini.V1, Prasannabalaje S.M2, Prakash.R3, Rekha.V4,Vinodhini.R5, Sangeetha Monica.T6
  1. Assistant Professor, Dept. of ECE, Dr N.G.P Institute of Technology, Coimbatore, Tamil Nadu, India
  2. B.E. Final Year Student, Dept. of ECE, Dr N.G.P Institute of Technology, Coimbatore, India
  3. B.E. Final Year Student, Dept. of ECE, Dr N.G.P Institute of Technology, Coimbatore, India
  4. B.E. Final Year Student, Dept. of ECE, Dr N.G.P Institute of Technology, Coimbatore, India
  5. B.E. Final Year Student, Dept. of ECE, Dr N.G.P Institute of Technology, Coimbatore, India
  6. B.E. Final Year Student, Dept. of ECE, Dr N.G.P Institute of Technology, Coimbatore, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

Motor vehicle theft is a serious problem in many parts of the world. In India, the annual loss from the car theft is over $4 billion. The Automotive Information Council (AIC) reports that over one million motor vehicles are stolen in the country each year. That is one motor vehicle theft occurs for every 31 seconds. Hence it has become essential to secure the automotive in this modern world. This proposed thesis aims at securing the automotive using the technologies like Radio Frequency Identification (RFID) technology, thumb registration system and face recognition which is efficient by nature.The operational modes in this project are classified as training mode, automatic mode and manual mode .Initially the RFID system gets authenticated. The importance of this system is, it gets its verification from the Road Transportation Office (RTO).This authentication leads to the thumb registration module by which the efficiency of the thumb is enhanced using Pattern Matching Algorithm (PMA). Face recognition system is used after the thumb registration. Then the system allows the user to drive the car. For emergency, a key insertion slot will be placed in the system with the help of which the user can insert the key. During this emergency mode of operation the camera captures the driver’s image and sends it to the owner’s mobile as Multimedia Messaging Service (MMS). The owner provides the password then the system allows the user to drive the vehicle. Global System for Mobile communication (GSM) module is also kept inbuilt for tracking purpose. The software testing in this project is done using LabVIEW. The timing and efficiency will be analyzed for both hardware and software based on which the implementation will be done in future.

Keywords

Face Recognition, GSM Module, MMS Module, Radio Frequency Identification technology, Thumb Registration.

INTRODUCTION

In today’s world owing a car is not a big deal but safeguarding the owned car has become a great deal. Even though the modern automobiles are heterogeneously combined by the combination of latest digital components it had also created the opportunity for new attacks [1]. A recent statistical report by United States of America (USA) has stated that around 2800 vehicles are being stolen in an average for a day. While the automotive industry has always considered safety a critical engineering concern, it is not logical whether the vehicle manufacturers have anticipated in their designs and the possibility of an adversary. Compounding this issue, in order to resolve the attack over the automotives many security systems such as car alarm, radar communication system and immobilizer perceptions are in existence. The current prevailing security system has certain disadvantages by itself [2] .Hence it has become evident to develop a security system to make an identity and monitor the security of an automotive.

OVERVIEW OF THE PROJECT

The ultimate aim of this project is to provide a hi-tech security to the automotive and preventing the unauthorized persons from accessing it .The proposed system possess three modes of operations namely training mode, automatic mode and the manual mode. In the training mode certain parameters of the driver such as name, license number, employment ID, and blood groups are initially collected in the database for each individuals. The corresponding person’s thumb impressions in different textures will be trained using Pattern Matching Algorithm (PMA). Parallely the facial image of the individual will also be put together and accumulated as a total database. In the automatic mode, system will be verified with the RFID module based testing. Based on the result obtained, if matched with the above criterion will be placed in the thumb registration system. The verification of this module leads to the face recognition in which the faces of the current person will be compared with the training faces and the selection of the original image will be done using the Principle Component Analysis (PCA) algorithm. Soon after the assessment the user will be permitted to drive the vehicle.
In case of emergency the key will be inserted in the key insertion slot after which the camera in the car takes the snap of the person who drives the car .The snap shot will be messaged to the owner with the help of Multimedia Messaging Service (MMS).The owner after providing the password makes the driver to drive the car.The path of the car will be traced with the help of the Global Positioning System (GPS) module with the help of which the location of the car is monitored and the car will also be stopped by providing the password to the system by the owner if required. All the above mentioned technologies will be tested using the LabView software. Based on the results obtained from the software, the design of hardware is done with the suitable components. The steps are taken to reduce the time delay required to complete these modules successfully by the authenticated user.

LITERATURE REVIEW

Security systems nowadays have become a need for vehicles available with many modern features. This car security system with extra access and intelligent alarming. This system will be accessed and configured by owner using Bluetooth module communication via mobile phone to turn in on or off [3]. This system suggests that GSM based security system are more stout then an ordinary security system .The ordinary systems are simply based on the concept of sensors .They sound an alarm on detecting movement [4,5]. This system of technology has now lost its appeal as it became a common sighting in meteors where these alarms go of unnecessarily. Due to the insecure environment the ratio of the vehicle theft increases rapidly [6]. Because of this the manufactures of the automotive are taking some serious steps for the protection of their valuable vehicles which includes activating alarms, steering wheel lock systems. They ensure authorization for the owners and also inbuilt these anti-theft system to prevent car from theft [7].
Drawbacks
The automotive theft and the hijackings had been taken place by common ways of stealing cars .This is done by deactivating the alarm or steering wheel lock by cutting wires, but the methods proposed in above surveys would also sound ineffective [8]. The drawback of this system is, the results obtained from RADAR are not accurate. The drawback of immobilizer concept was the software present in the system could be hacked easily.

BLOCK DIAGRAM OF THE SYSTEM

The block diagram of the overall system is shown in the fig 1. It comprises of many modules such as RFID system, Thumb Registration system, face recognition system as its main segments .It also includes different modules such as GPS, Toggle switch for toggling purpose, and Retrieving switch along with the LED and LCD indication .All these modules are supplied with power with the help of Power supply unit.

STRUCTURE OF RFID SYSTEMS

The modules that are required to design this system are as follows Voltage Maintainer circuit, Oscillator block, Transistor-Transistor Logic (TTL), Encoder.Voltage Maintainer converts 5v to 3.3vusing IC-LM358 for maintaining at the appropriate voltages [9]. These kinds of maintainers are preferred for baud rate at 2400 rates per second. The Oscillator will be employed in order to avoid the ripple factor. They also use the filters to achieve resonant frequency generated at the rate of 125 KHz at the baud rate of 2400.Helical type of antenna is employed in this paper. The Transistor-Transistor Logic (TTL) uses up to convert 3.3v to 5v of power supply.Zener diode is used to regulate the voltage. Common emitter configuration is carried out in TTL logic. The database of RFID system is shown in fig 2.

THUMB REGISTRATION SYSTEM

Fingerprint Identification and Digital Certification and it is used in a wide range of embedded applications. It features with the SEA/RSA accelerator engines, the embedded non-volatile memory (Flash/OTP), the fingerprint processing accelerator and its algorithm firmware. Cordis 5+ is the 32-bit RISC core which is featured with 16-/32-bit ISA and Harvard bus architecture. The Enhanced DSP instruction extensions and accelerators are supported by this core system. In addition, a 5-stage pipeline is used to increase the amount of operational parallelism, giving the most performance out of each clock cycle. It is competent for System on Chip (SOC) products targeted at consumer, networking, automotive and other cost-sensitive markets. The image of synochipis shown in the fig 3.
The thumb impressions of different users are taken initially and stored.The database is chosen as such, the RFID of a particular user has to get matched with the thumb impression. They are matched using the PMA.This algorithm was used inbuilt in the embedded programming .The image of thumb impression for different users is shown in the fig 4.

IMPLEMENTATION OF MODULES

A. INTERFACE OF RF MODULE WITH DSPIC
The RF transmitter employs a SAW-stabilized oscillator, for ensuring accurate frequency control for best range performance. It receives serial data and transmits it wirelessly through RF through its antenna. The bandwidth of RF transmitter works on typical frequency of 12 Megahertz. The LCD is seized with the circuit to display the required information. The interface of DSPIC with RF module is specified in the fig 5.
B.INTERFACE OF FINGER PRINT SENSOR WITH DSPIC
Fingerprints are the traces of an impression from the friction ridges of any part of a human or other primate hand. The finger print sensor consists of a synochip which incorporates the various images of finger prints. It features with the SEA/RSA accelerator engines, the embedded non-volatile memory (Flash/OTP), the fingerprint processing accelerator and its algorithm firmware. Synochip works on typical frequency of 120 MHz .The DSPIC is interfaced with the finger print sensor as shown in the fig6.

RESULTS AND DISCUSSIONS

On following the above procedures and methodology hardware implementation as well as the software implementation has been done. The software implementation is done withthe help of LabVIEW software. The fig 7.1shows the result of the overall hardware implementation of RFID systems and thumb registration.
The biometrics recognition has been implemented. This module testing has been executed with the help of LabVIEW software. The analysis of the system is done with the help of Pattern Matching Algorithm (PMA).The fig 7.2 displays the output of thumb authentication system.

CONCLUSION

Hence these modules are fully designed and implemented. In future this thumb registration will be followed by the face recognition .After developing the face recognition system .The modules such as MMS and GPS will be implemented in the forth coming days. It is totally dealt with the external security to the automotive .In future this project may extend its security for the human beings to safe guard their valuable life from accidents. Even if occurred, the monitoring necessities such as the status of the person, the heartbeat, the pulse of the human and the condition of the patient will be reported to their relatives and the nearby hospitals .These ideas will be implemented in future.

ACKNOWLEDGMENT

The authors would like to thanks the Management, Principal and the HOD Electronics and Communication Engineering, Dr.N.G.P.Institute of Technology, Tamil Nadu, India for their support and technical advices.

Figures at a glance

Figure Figure Figure Figure
Figure 1 Figure 2 Figure 3 Figure 4
Figure Figure Figure Figure
Figure 5 Figure 6 Figure 7 Figure 8
 

References