Sunteți pe pagina 1din 6

International Journal of Mechanical Engineering and Technology (IJMET)

Volume 10, Issue 07, July 2019, pp. 46-51. Article ID: IJMET_10_07_006
Available online at http://www.iaeme.com/ijmet/issues.asp?JType=IJMET&VType=10&IType=7
ISSN Print: 0976-6340 and ISSN Online: 0976-6359

© IAEME Publication

CAN BASED AUTOMATED VEHICLE


SECURITY SYSTEM
Ganesh Babu Loganathan
Head of the Department, Department of Mechatronics Engineering, Tishk International
University, Erbil, Iraq,

ABSTRACT
The proposed framework faculties even the scarcest vehicle movement subsequent
to being furnished (bolted) and gives an upgraded hands-free remote keyless section
framework dependent on ZigBee remote correspondence. The venture is based upon a
continuous in-vehicle arrange that includes two incredible car conventions CAN and
LIN. The caution sign may normally be a glimmering of the lights or potentially the
sounding of the vehicle horn or an alarm. Moreover, the vehicle start power might be
specifically crippled dependent on an alert condition. The remote transmitter might be
utilized to arm and incapacitate the vehicle security framework or give other remote
control highlights from a foreordained range far from the vehicle. The ZigBee keyless
section framework allows the client to remotely open the vehicle entryways utilizing a
little handheld transmitter. Dynamic Car Finder Locate your vehicle in jam-packed
leaving lots.CAN system incorporates a movement detecting subsystem, throttle control
subsystem and Zigbee remote correspondence subsystem and a body control unit that is
helped by LIN sub organize. The LIN (Local Interconnect Network) arrange includes
vehicle subsystems, for example, headlight control and horn control.
Keywords: CAN,LIN,Zig-Bee,MEMS.
Cite this Article Ganesh Babu Loganathan, Can Based Automated Vehicle Security
System, International Journal of Mechanical Engineering and Technology, 10(7), 2019,
pp. 46-51.
http://www.iaeme.com/IJMET/issues.asp?JType=IJMET&VType=10&IType=7

I. INTRODUCTION
Vehicle security frameworks are broadly used to hinder vehicle burglary, keep robbery of
resources from a vehicle, prevent vandalism, and to ensure vehicle proprietors and inhabitants.
A run of the mill car security framework, for instance, incorporates a focal processor or
controller associated with a majority of vehicle sensors. The sensors, for instance, may identify
the opening of the entryways, windows, and furthermore development of the vehicle or inside
the vehicle. Movement sensors and switches might be utilized as sensors. The controller
regularly works to give an alert sign in case of activating of a vehicle sensor. The caution sign
may ordinarily be a blazing of the lights and additionally the sounding of the vehicle horn or an

http://www.iaeme.com/IJMET/index.asp 46 editor@iaeme.com
Ganesh Babu Loganathan

alarm. What's more, the vehicle start power might be specifically incapacitated dependent on
an alert condition. An ordinary security framework likewise incorporates a beneficiary related
with the controller that coordinates with at least one remote transmitters ordinarily conveyed
by the client as revealed. The remote transmitter might be utilized to arm and incapacitate the
vehicle security framework or give other remote control highlights from a foreordained range
far from the vehicle.
The core of the car vehicle security framework is the Electronic Control Unit (ECU), the
different control procedures are inserted in it. Those control procedures make our framework
splendid. The control units are movement detecting ECU, Acceleration petal position ECU,
Wheel control ECU, CAN-LIN Gateway ECU, and LIN hubs. The Electronic Control Unit that
has PIC16F877A microcontroller, CAN Controller 2515 CAN Transceiver 82C250 and CAN
transport. This Electronic control unit communicates something specific sign through a control
zone arrange (CAN) transport. It is a two wired occasion activated correspondence convention
for car applications.

2. LITRATURE SURVEY
Unmistakable instances of CPS and IoT frameworks and their relating applications [1]
incorporate, among others, self-governing vehicles, which is the focal point of this work.
Security structures of business or mechanical frameworks dependably begin from the security
destinations of the frameworks which need to think about the administration and individuals
parts of the frameworks [2]. The general population/social/condition components are
commonly a portion of the real wellsprings of vulnerabilities, which fluctuate from framework
to framework. A progressive point by point discourse on socio-specialized issues identified
with security is accessible at [3][4]. This works in comparative standards as in remote sensor
systems, where trust the board [5] ends up trying for low-end gadgets. For such an asset, trust
tying down should be possible utilizing Physically Unclonable Functions (PUFs). In [6], this
framework depicts an ongoing wellbeing model that identifies the driver condition and changes
the speed of the vehicle. Sensors are utilized to distinguish the driver condition. It utilizes
Psychological sign. At the point when the driver is in irregular condition initial a notice sign is
issued to caution, the driver and braking will be connected in the event that he keeps driving.
In [7], the equipment and programming of the GPS and GSM system were created. The
proposed GPS/GSM based System has the two sections, first is a versatile unit and another is
controlling station. The framework forms, interfaces, associations, information transmission
and gathering of information among the portable unit and control stations are working
effectively. These outcomes are good with GPS advancements.
In [8], a vehicle following framework is an electronic gadget, introduced in a vehicle to
empower the proprietor or an outsider to follow the vehicle's place. This paper proposed to
structure a vehicle following a framework that works utilizing GPS and GSM innovation. This
framework manufactured dependent on an inserted framework, utilized for following and
situating of any vehicle by utilizing Global Positioning System (GPS) and Global framework
for portable correspondence (GSM). This plan will constantly watch a moving Vehicle and
report the status of the Vehicle on interest. A wide scope of contraptions is accessible in the
market as an answer to this issue. Be that as it may, every single one of them has its own benefits
and faults either being not ready to play out the ideal undertaking adequately or in a constrained
manner by neglecting to cover the entire gambit of security [9].
Plenty of works has been done on working out specialized modalities for vehicle security
frameworks in the two states while it is left and furthermore while moving [10]. Writing relating
to vehicle robotized leaving, vehicle observing and vehicle security frameworks utilizing
different procedures and systems have been investigated and analyzed. Rashidi, Ariff, and

http://www.iaeme.com/IJMET/index.asp 47 editor@iaeme.com
Can Based Automated Vehicle Security System

Ibrahim [11] have been proposed a vehicle observing framework utilizing the Bluetooth
Security System. The central purpose of the framework is on the adequacy of the Bluetooth
framework to keep the vehicle from being infringed upon or being associated with burglary.
Balajee and Manikandan [12] proposed a vehicle security framework dependent on face
acknowledgment structure utilizing Global System for Mobile Communications (GSM) [13]
organize. The creators built up a vehicle security framework by utilizing Global Positioning
System (GPS) [14] module, a GSM and a little face location webcam and a control module
Miguel et al. [15] proposed a Bluetooth/General Mobile Radio Service(GMRS) Car Security
System with a haphazardly found development criminologist gadget by utilizing a framework
that connections the Starter Disable Unit (SDU) and a Randomly Located Device (RLD).

3. EXISTING FRAMEWORK
As vehicles become increasingly advanced, vehicle security frameworks must be more
grounded than at any other time. An advanced vehicle uses remote keyless section framework
and Immobilizer frameworks as the principle weaponry against vehicle robbery. These
frameworks anticipate unapproved access of the vehicle yet in the event that the vehicle is lifted
or jacked in general it offers neither counteractive action nor discovery.

4. PROPOSED FRAMEWORK
Transceiver & Accelerator Pedal position ECU:
It comprises of Zigbee Transceiver, start switch control and Accelerator Pedal position
Sensor that flag the quickening pedal position ECU, the sensor is generally a potentiometer,
and in this way gives a variable opposition subordinate upon the situation of the increasing
speed pedal. The ZigBee Transceiver interconnect with ECU through UART.
Driving wheel control ECU:
It comprises of motored Wheel and Driving wheel control unit, driving control ECU gets
signal regarding advanced qualities from other control units relies on the sign it control the
motored wheel or Driving wheel through PWM.

http://www.iaeme.com/IJMET/index.asp 48 editor@iaeme.com
Ganesh Babu Loganathan

Figure.1 Proposed Block Diagram


Motion sensing ECU:
It comprises of a Micro Electro Mechanical System (MEMS) and its control unit. MEMS
sense the movement of the vehicle in an outfitted state if the sensor recognizes the movement
or variety in the equipped state it sends a sign to the controller.
ZigBee is a detail for a suite of abnormal state correspondence conventions utilizing little,
low-control computerized radios dependent on the IEEE 802.15.4-2006 standard for remote
individual zone systems (WPANs, for example, remote earphones associating with mobile
phones by means of short-run radio. The innovation characterized by the ZigBee determination
is proposed to be less difficult and more affordable than different WPANs, for example,
Bluetooth.
The non-reference point mode will be incorporated into a framework where gadgets are
'sleeping' almost dependably, as in smoke alarms and robber alerts. The gadgets wake up and
affirm their proceeded with nearness in the system at arbitrary interims Non-signal activity
infers dependence on the CSMA and affirmation highlights for effective correspondences.
In the reference point mode, a gadget watches out for the facilitator's guide that gets
transmitted at occasionally, bolts on and searches for messages routed to it. On the off chance
that message transmission is finished, the facilitator manages a calendar for the following signal
with the goal that the gadget 'rests'; truth be told, the organizer itself changes to rest mode.

http://www.iaeme.com/IJMET/index.asp 49 editor@iaeme.com
Can Based Automated Vehicle Security System

Figure.2. CAN ECU - Circuit


The CAN correspondence convention is a CSMA/CA convention. The CSMA represents
Carrier Sense Multiple Access. This means each hub on the system must screen the transport
for a time of no action before attempting to communicate something specific on the transport
(Carrier Sense). Likewise, when this time of no movement happens, each hub on the transport
has an equivalent chance to transmit a message (Multiple Access). In CAN convention, a
nondestructive bitwise intervention strategy is used. This implies messages stay flawless after
intervention is finished regardless of whether impacts are identified. The majority of this
assertion happens immediately of the higher need message.
CAN convention is a message-based convention, not a location based convention. This
implies messages are not transmitted starting with one hub then onto the next hub dependent
on addresses. Implanted in the CAN message itself is the need and the substance of the
information being transmitted. All hubs in the framework get each message transmitted on the
transport (and will recognize whether the message was appropriately gotten). It is up to every
hub in the framework to choose whether the message got ought to be quickly disposed of or
kept to be prepared. A solitary message can be bound for one specific hub to get, or numerous
hubs dependent on the manner in which the system and framework are structured.
Another valuable element incorporated with the CAN convention is the capacity for a hub
to demand data from different hubs. This is known as a Remote Transmit Request (RTR). For
instance, a wellbeing framework in a vehicle gets incessant updates from basic sensors like the
airbags, however it may not get continuous updates from different sensors like the oil weight
sensor or the low battery sensor to ensure they are working appropriately. Intermittently, the
wellbeing framework can demand information from these different sensors and play out an
exhaustive security framework check. The framework creator can use this element to limit
system traffic while as yet keeping up the honesty of the system. One extra advantage of this
message-based convention is that extra hubs can be added to the framework without the need
to reconstruct every single other hub to perceive this option. This new hub will begin accepting
messages from the system and, in view of the message ID, choose whether to process or dispose
of the got data.

5. CONCLUSION
The programmed security framework is acquired with the assistance of CAN LIN organize. In
this technique, vehicle discoverer highlight is incorporated by giving the Beep sound and
glimmer light when the driver draws close to the vehicle. In the equipped state, three
measurement position of vehicle is estimated. It gives the blare sound and glimmer light when
the development surpasses limit level of vehicle. This task can actualized in all autos in
future.Dynamic code bouncing method is executed for secret word which averts the age of copy
zigbee key dandies for the vehicle.

http://www.iaeme.com/IJMET/index.asp 50 editor@iaeme.com
Ganesh Babu Loganathan

REFERENCES
[1] S. K. Khaitan and J. D. McCalley. Design techniques and applications ofcyberphysical
systems: A survey. IEEE Systems Journal, 9(2):350–365, June 2015.
[2] National Institute of Standards and Technology Special Publication (SP) 800-64 Revision
2, Security Considerations in the System DevelopmentLife Cycle, October 2008.
[3] http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-64r2.pdf.Socio-
TechnicalSecurityMetrics,2014.https://www.dagstuhl.de/en/program/calendar/semhp/?se
mnr=14491.
[4] AssessingICTSecurityRiskinSocioTechnicalSystems,2016.https://www.dagstuhl.de/en/pro
gram/calendar/semhp/?semnr=16461.
[5] T. Abera, N. Asokan, L. Davi, F. Koushanfar, A. Paverd, A. R. Sadeghi,and G. Tsudik.
Invited: Things, trouble, trust: On building trustin iot systems. In 2016 53nd
ACM/EDAC/IEEE Design AutomationConference (DAC), pages 1–6, June 2016.
[6] Saif Al-Sultan, Ali H. Al-Bayatti and Hussien Zedan, “Context Aware Driver Behavior
Detection System in Intelligent Transportation Systems” IEEE Vol 15, 2014
[7] Chen, H., Chiang, Y. Chang, F., H. Wang, H. (2010). Toward Real-Time Precise Point
Positioning: Differential GPS Based on IGS Ultra Rapid Product,SICE Annual Conference,
The Grand Hotel, Taipei, Taiwan August 18-21.
[8] Asaad M. J. Al-Hindawi, IbraheemTalib, “Experimentally Evaluation of GPS/GSM Based
System Design”, Journal of Electronic Systems Volume 2 Number 2 June 2012
[9] Tang, V., Zheng, Y. & Cao, J., 2006. An Intelligent Car Management System based on
Wireless Sensor Networks. 1st International Symposium on Pervasive Computing and
Applications. Hong Kong, Wednesday 4th March 2009. Hong KongPolytechnic University:
IEEE.pp. 65-70.
[10] Al-Absi, H., Sebastian, P., Devaraj, J. &Voon Y., Vision-Based Automated Parking
System. 10th Internation Conference on Information Science, Signal Processing and their
Applications. Kuala Lumpur, Malaysia 2011.
[11] Rashidi, F., Ariff, M., & Ibrahim M.. Car Monitoring using Bluetooth Security System
.International conference on Electronic, Control and computer engineering. Pahang,
Malaysia, 2011.
[12] Seshasayee, V. &Manikandan, E., 2013, Automobile Security System Based on Face
Recognition Structure Using GSM Network.Advance in Electronic and Electric
Engineering. 3 (6). P. 733-738.
[13] Shah, R. &Gharge, A., 2012. GSM Based Car Security System. International Journal of
Engineering and Innovation Technology. 2. P. 203-206
[14] India yellow pages, 2014.Pantagone satellite Bhopal. [Online] Available from:
http://www.indianyellowpages.com/pantagone-satellite-
bhopal/products.htm?slno=257962. [Accessed: 5th May 2012].
[15] Miguel A., Porta G., Jose A., Estufillo S., & y Moises Sanchez A., 2006.Bluetooth/GMRS
Car Security System with a Randomly Located Movement.Electronics,
[16] Robotics and Automotive Mechanics.Washington, 2006.IEEE Computer
SocietyWashington, DC, US. CAN in Automation (CiA), Controller Area Network (CAN).
Avaliable :http://www.can-cia.org/

http://www.iaeme.com/IJMET/index.asp 51 editor@iaeme.com

S-ar putea să vă placă și