scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Locking and unlocking of theft vehicles using CAN (Theft Control System)

TL;DR: Design and development of a theft control system for an automobile, can be achieved by making use of GPS feature of mobile phone to develop security for vehicles and embedded system to communicate with engine of the vehicle.
Abstract: Avoiding Vehicle Theft is making buzz in present automobile industry Design and development of a theft control system for an automobile, can be achieved by making use of GPS feature of mobile phone The developed system makes use of an mobile phone that is embedded in the vehicle with an interfacing to Engine Control Module(ECM) through Control Area Network (CAN) Bus, which is in turn, communicated to the ECM The vehicle being stolen can be stopped by using GPS feature of mobile phone and this information is used by the owner of the vehicle for future processing The owner sends the message to the mobile which is embedded in the vehicle which has stolen which in turn controls the vehicles engine by locking the working of the engine immediately The developed system accept the message and broadcasted to the Vehicle Network through CAN Bus The engine can be unlocked only by the owner of the vehicle by sending the message again The goal behind the design is to develop security for vehicles and embedded system to communicate with engine of the vehicle
Citations
More filters
Patent
07 Oct 2014
TL;DR: In this paper, a method for protection of a means of transportation against unauthorised usage or theft using a lock and an end device that can be operated in a cellular network is presented.
Abstract: The present invention relates to a method for protection of a means of transportation against unauthorised usage or theft using a lock and an end device that can be operated in a cellular network. Subject of the invention are further a lock for protection of a means of transportation against unauthorised usage or theft as well as a end device that can be operated in a cellular network, that are particularly designed to carry out process steps of the inventive method which need to be carried out by the lock respectively the end device.

8 citations

Patent
19 Nov 2014
TL;DR: In this paper, a universal remote receiver for vehicles, home automation and industry through mobile devices is presented, which receives commands from mobile devices, such as mobile phones, pcs, tablets, etc., which emit and receive signals via WiFi (10a), bluetooth (10b), gsm (10c), or nfc (10d), without excluding other wireless technologies.
Abstract: Wireless universal remote receiver for vehicles, home automation and industry through mobile devices. The aforementioned invention has as its object a universal receiver fig.1, which receives commands from mobile devices fig.1 (10) with operating system, such as mobile phones, pcs, tablets, etc., which emit and receive signals via wifi (10a) ), bluetooth (10b), gsm (10c) or nfc (10d), without excluding other wireless technologies. This receiver is installed in vehicles, home or industry, and upon receiving commands from the aforementioned mobile devices will activate one or several relays fig.1 (5 no = x) with potential-free contacts, to apply them to the desired drive and be able to perform a certain function of turning on or off a device, machine, etc; at the same time it can communicate in serial mode with other buses or devices that have communication ports, such as zigby network, can, gps, rs 232, etc. (Machine-translation by Google Translate, not legally binding)

4 citations

Proceedings ArticleDOI
01 Jan 2015
TL;DR: In this paper, a MEMS-based alcohol sensor using COMSOL Multiphysics 4.4 can be used to detect the presence of alcohol in a vehicle in case of vehicular theft.
Abstract: The objective of this paper is towards reducing the impaired driving effect encountered so as to ensure the safety of passengers in a vehicle and towards ameliorating the security systems in case of vehicular theft action. The current practicing technologies for alcohol detection and theft control systems were discussed and the need for redesigning the alcohol sensor and theft control system was encountered. The choice for sensing material is the most important aspect for designing the alcohol sensor. From studies, Tin oxide was found to satisfy the requirements for alcohol detection in automobiles. Design for MEMS based alcohol sensor using COMSOL Multiphysics 4.4 can be performed. The role of immobilizer in security of in-vehicle communication was studied in depth and the need for mutual authentication between all its modules is required.
01 Jan 2014
TL;DR: The design and development of a theft control system for an automobile using the GPS feature in the mobile phone and the goal behind the design and system is to develop security for vehicles.
Abstract: Automobile industry is buzzing about avoidingvehicle theft in the present. By making use of the GPS feature in the mobile phone the design and development of a theft control system for an automobile can be achieved. In this system mobile phone used is embedded in the vehicle with an interfacing to Engine Control Module (ECM) through CAN (Controller Area Network) Bus. This in turn is communicated to the ECM. By using the GPS feature of mobile phone the owner of the vehicle being stolen can stop the vehicle and this information is also used by the owner for future processing. The owner can send a message to the mobile which is embedded in the vehicle which is stolen and in turn can control the vehicles engine by locking the working of the engine. Through CAN Bus, the developed system accept the message send by the owner and this is broadcasted to the vehicles network. The locked engine can be unlocked only by owner by sending the message again. Also as soon as the engine is locked all the windows of the vehicle get locked and a poisonous gas comes through AC and thief becomes unconscious. This prevents the thief from escaping in any way. The goal behind the design and the system is to develop security for vehicles.
Journal ArticleDOI
TL;DR: There are a few methods of anti-theft vehicle security systems discussed briefly which play a vital role in reduction of vehicle thefts in India.
Abstract: India has a high population rate and so is the number of automobiles. With the increase in the automobiles comes the increase in their theft and the present systems lack a few parameters which isn’t being helpful in dealing with this important concern of the vehicle owner. In this time of taking off vehicle, vehicle security has turned into a question of Prime significance, especially in urban cities, where these incidents take place each and every day. Agents owe this expansion in burglaries to the lack of appropriate parking spots in neighborhood and also absence of accessibility of refined security gadgets. Advancement in technology has been proven to be effective in managing vehicle thefts. There is a need to reduce these burglaries/thefts using the required means for vehicle security. Therefore, anti-theft systems play a vital role in reduction of vehicle thefts. Implementation of biometric anti-theft security system has been operational. In this article, there are a few methods of anti-theft vehicle security systems discussed briefly
References
More filters
Book
26 May 2005
TL;DR: This book discusses GPS Modernization towards GPS III, Legal and Market Policy of Satellite Navigation, Integration with Existing and Future Systems, and Augmentation Systems.
Abstract: Navigation Basics. The Global Positioning System. Augmentation Systems. GALILEO. GPS Modernization towards GPS III. Legal and Market Policy of Satellite Navigation. Layer Issues. Integration with Existing and Future Systems. Open Issues and Perspectives.

173 citations

Journal ArticleDOI
TL;DR: It is revealed that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the streams; that is, steganography in the inactive audio frames attains a largerData embedding capacity than that in the active audio frames under the same imperceptibility.
Abstract: This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which is used extensively in Voice over Internet Protocol (VoIP). This study reveals that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the streams; that is, steganography in the inactive audio frames attains a larger data embedding capacity than that in the active audio frames under the same imperceptibility. By analyzing the concealment of steganography in the inactive frames of low bit rate audio streams encoded by G.723.1 codec with 6.3 kb/s, the authors propose a new algorithm for steganography in different speech parameters of the inactive frames. Performance evaluation shows embedding data in various speech parameters led to different levels of concealment. An improved voice activity detection algorithm is suggested for detecting inactive audio frames taking into packet loss account. Experimental results show our proposed steganography algorithm not only achieved perfect imperceptibility but also gained a high data embedding rate up to 101 bits/frame, indicating that the data embedding capacity of the proposed algorithm is very much larger than those of previously suggested algorithms.

127 citations

01 Jan 2008
TL;DR: This work considers only wired networks connecting automotive embedded systems, and “wireless” is clearly a crucial technology for everything from assisted living to national defense, and wireless networking is a growing area of importance to the twenty-first century automobile.
Abstract: Up until now, we’ve considered our embedded control system to be self-contained: an algorithm implemented in software resident on a single microprocessor, communicating with its environment through sensors and actuators via peripheral devices such as an analog-to-digital converter. In fact, many embedded systems are distributed, consisting of multiple microprocessors communicating over one or more networks to accomplish shared tasks. For example, a modern automobile may have seventy or more microprocessors communicating over several networks to manage entertainment and navigation functions, central locking mechanisms, lighting and other vehicle systems. Safety systems such as air bags employ dedicated high speed network communication, as does powertrain control for communication between, for example, the engine and transmission controllers. Figure 1 illustrates some of the networks connecting automotive embedded systems [1, 2]. Although we will consider only wired networks, “wireless” is clearly a crucial technology for everything from assisted living to national defense [4], and wireless networking is a growing area of importance to the twenty-first century automobile. Applications include toll collection, fleet vehicle management, stolen vehicle tracking, automatic collision notification and remote diagnostics. One may expect that the confluence of in-vehicle and external communication technologies will lead to new information, entertainment and safety services such as the in-vehicle display of roadway emergency warnings or even active mitigation of collisions at intersections and vehicle-to-vehicle cooperation for improvement of safety and traffic flow [3].

66 citations

Journal Article
TL;DR: This project will serve as good indication of how important it is to curb car theft in the country and the means of sending the data to the owner of the vehicle using SMS when the alarm is triggered are specified.
Abstract: Surveillance system using phone line for security and tracking. Based on the above statement, it is targeted that this project will serve as good indication of how important it is to curb car theft in the country. Surveillance is specified to car alarm system and the means of sending the data to the owner of the vehicle using SMS when the alarm is triggered. Due to the inefficient conventional car security system, the possibility of the car can be stolen is high. The main reason is that the alarm is limited to the audible distance. Somehow if there is another way of transmitting the alarm to the car owner ,tracking the vehicle ,knowing the exactly that the car is been stolen at the same time that is not limited to the audible and line of sight, the system can be upgraded. SMS is a good choice of the communication to replace the conventional alarm, because it can be done and does not require much cost. Although most of people know  GPS can provide more security for the car but the main reason people does not apply it because the cost. Advance car security system is too expensive. Cost for the gadget is too high. Beside that, people also must pay for the service monthly. Tracking systems were first developed for the shipping industry because they wanted to determine where each vehicle was at any given time. Passive systems were developed in the beginning to fulfill these requirements. For the applications which require real time location information of the vehicle, these systems can't be employed because they save the location information in the internal storage and location information can only be accessed when vehicle is available. To achieve automatic Vehicle Location system that can transmit the location information in real time. Active systems are developed. Real time vehicular tracking system incorporates a hardware device installed in the vehicle (In-Vehicle Unit) and a remote Tracking server. The information is transmitted to Tracking server using GSM/GPRS modem on GSM network by using SMS or using direct TCP/IP connection with Tracking server through GPRS. Tracking server also has GSM/GPRS modem that receives vehicle location information via GSM network and stores this information in database. This information is available to authorized users of the system via website over the internet. Keywords : GPS,GPRS,Sensors

50 citations

Proceedings ArticleDOI
21 Nov 2008
TL;DR: This paper describes an info-security framework, system design, and the first solution prototype, which shows that the proposed solution is feasible and that the initial prototype shows that it is feasible.
Abstract: The emerging vehicular networks in the forms of intra-car, car-to-car, and car-to-infrastructure communications will enable a variety of applications for safety, traffic efficiency, driver assistance, as well as infotainment to be incorporated into future automotive designs. However, the availability of these exciting automotive applications can also lead to formidable set of exploits and vulnerable to attacks, as more and more data is being exchanged and communicated in and out of a car. In this paper, we present our initial works on embedded info-security solutions to protect the critical data for car communications via vehicular networks. We describe an info-security framework, system design, and the first solution prototype in this paper. The initial prototype shows that the proposed solution is feasible.

12 citations