Development of Vehicle Ignition Using Fingerprint: Jawaharlal Nehru Technological University, Hyderabad
Development of Vehicle Ignition Using Fingerprint: Jawaharlal Nehru Technological University, Hyderabad
Seminar Report of
Submitted by
GULAM NABI
(18C91A0325)
CERTIFICATE
8.1 advantage 24
8.2 disadvantage 25
No part of thesis is copied from books journals internet and wherever referred the same as been
duly acknowledged in text, the reported data are based on the seminar done by entirely by me
and no copied from any source.
GULAM NABI
18C91A0325
ABSTRACT
This paper presents a noble system to detect vehicle thefts. If an unauthorized person tries to
steal the vehicle, user and police station will be notified with GPS location. Methods:
Fingerprints stored in the memory of the system. If the fingerprint and RFID matches with the
stored ones then the controller triggers the powering circuit of the ECM else if the burglar tries to
start the car in any other ways it sends the alert messages of the interventions as well as the car’s
location to the owner’s mobile app via cloud. Findings: The system is implemented using Intel
Galileo gen2 board. The GPS, GSM, Wi-Fi module as well as an SD Card is also connected to
the board. Installing this smart system is helpful because this system won’t let the ECM to power
on the engine as designed. The system also incorporates certain other sensors to stop the car
burglary. If the burglar tries to turn on the battery by using paperclips in the fuses then the owner
will be notified about the past proceedings along with GPS location of the car. Application: The
system works well with low-price range car employed with keyless entry and self-start button
and is unique because it uses IoT to protect the low price cars.
CHAPTER 1
INTRODUCTION
Biometric technology is a method that requires the physical presence of the identified person. It
is a new state of art method for security systems. Fingerprint recognition is one of the most
widely used biometric system and also the oldest method which is dated back to 2200 BC [1].
The use of fingerprints as personal code was also in tradition method. Developing a prototype
with biometric system will serve a robust and embedded real time fingerprints-based ignition
systems in vehicle. This project focuses about developing a prototype of vehicle ignition using
fingerprint. According to [2] this system has a potential to avoid the vehicle from being stolen.
This lock security is developed to control the ignition of the vehicle by using fingerprint. The
existing lock at the vehicle is not highly secured which consist of handle lock and standard
switch lock. To overcome this, there are variety of security lock system that can be added to the
vehicle. By creating this prototype, security level of the vehicle ignition is highly protected and
could help to decrease theft. The main idea of this project is a fingerprint scanner will detect the
authorized or an unauthorized user and alert the user via GSM.
In the current era, there is high demand for robust security systems in vehicles. So, the designing
and developing a biometric security system using fingerprint technology to prevent unauthorized
vehicle is easy and very useful
Vehicle ignition
Ignition system basically is used to initiate a car’s 12-volt battery and send it to each sparkplug
in turn, starting the air fuel mixture in the engine’s combustion chamber. It then produces high
voltage arcs at the spark plug electrode. By using ignition coil, high voltages are produced where
it is supplied with lower voltage battery. The basically, ignition system consists of ignition
switch, relay, starter motor, battery and fuse.
The ignition system works when low voltage in the battery goes through the primary coil. Wire
connects to the kick starter using a wire from the battery while the other wires attach to the kick
starter to the key system. When the car key switch on the system once, two wires from the kick
starter to key system are connected. This results the engine to be in on condition. Followed by
the next turning of the key is where the third wire connects the other two joined wires which
cause the voltage to flow from the battery to the respected vehicle parts so that the
Vehicle ignition using fingerprint system is known as security system to prevent vehicle theft.
Vehicle usage is basically a necessity for everyone in current era. Nowadays, vehicle security
system depends on sensors that are way too costly and high efficient. This system is developed to
cut cost for the technology like only the premium car makers are imposing this in the market.
Thus, developing vehicle ignition using fingerprint would be efficient and low cost for users who
own vehicle to keep secure their vehicle without any worries. Fingerprints biometric system is
cheaper compared to the rest of the biometrics and there is also high usage among users [3].
Many network operators have signed agreements with foreign operators, so this makes the user
continue to use their mobile phones even while travelling. A Worldwide system for Mobile
(GSM) is more known as second era telecom framework standard that was worked to deal with
the crack issues of the main cell structures. Beforehand it was known as Group Special Mobile.
They chamber took up the task of demonstrating an ordinary Mobile correspondence structure
for Europe the 900 MHz band [5] [6].
CHAPTER 2
Liquid crystal display (LCD)
A 16x2 LCD is used to display the output of the project. Pin 1, 2, 3, 4, 5, 6, 7, 15 and 16 are
utilized to interface with the LCD. It is a dot matrix display that is used to display characters,
alphanumeric characters and symbols. The LCD will receive codes from the microcontroller and
displays it to its display data RAM. This will then transform the character code into character
pattern and display the characters in the LCD. The LCD can display the option to add and delete
the user. It will also show the status if authorized user is detected and reject if it is an
unauthorized user. The LCD will be display the message accordingly as per programmed.
A person's weight, eye color, and hair color can change or be changed, but his fingerprints
cannot be altered. They are unique to each individual, and can be differentiated and identified
based on certain distinctive patterns made by the ridges. The following are some of the
commonly used fingerprint patterns that have been identified and used in the process of
fingerprinting. There are basically three main forms of patterns that are made by the ridges of
fingerprints. a) Loops: Loops make up almost 70 percent of fingerprint patterns.
They originate from one side of the finger; curve around or upward, before exiting out the other
side.
A) LOOP:
pattern always comprises one delta, which is roughly a triangular formation in the pattern.
B) ARCHES:
Arches are encountered in only 5 percent of the patterns, and comprise lines that slope upward
and then down, similar to the outline of a small hill. There is generally no delta.
C) WHORLS:
Whorls constitute around 25% percent of all patterns. They are circular or spiral patterns, similar
to eddies. A pattern that contains 2 or more deltas will always be a whorl pattern.
CHAPTER 3
CLASSIFICATION OF FINGERPRINT SENSORS
3.1 CAPACITIVE SENSOR
This is a CMOS reader that uses capacitors and an image is formed using electrical current. It is
more expensive compared to optical readers. The advantage of using capacitive sensor it requires
a real fingerprint shape, not only a visual image. This is the reason for CMOS to be harder to get
tricked. It is embedded in a Silicon chip composed of 2D array of micro capacitor. Between the
finger surface and the Silicon plates, electrical charges are created. Plates leads to pattern of
distinguished capacitances are respected with the distance of variation of ridges and valleys.
Manikandan et al. proposed a 4 pin device that is used for various applications such banks, safety
deposits and access control, this sensor requires the visual image of the fingerprint.3.
Dimensional image is recorded by using this sensor and stored into the microcontroller. Light
incident on detector will convert the energy first to electrical charge. This is one of the most
commonly used fingerprint sensor, process starts when the user places their finger on top of the
glass. The scanner will not function if the image placed on top of the glass is too dark. This
senses difference of the intensity of reflected light from valleys and ridges; normally one
fingerprint is scanned at a time [9]
. The advantage of using capacitive sensor it requires a real fingerprint shape, not only a visual
image. This is the reason for CMOS to be harder to get tricked. It is embedded in a Silicon chip
composed of 2D array of micro capacitor. Between the finger surface and the Silicon plates,
electrical charges are created. Plates leads to pattern of distinguished capacitances are respected
with the distance of variation of ridges and valleys.
.
CHAPTER 4
REAL TIME BIOMETRICS VEHICLE SECURITY SYSTEM WITH GPS
AND GSM TECHNOLOGY
Kiruthiga et al. have been discussed about saving the vehicle from theft. This system is literally
to defend the vehicle from any illegal access, easy to use, fast usage; clear, consistently good in
performance and also reasonable fingerprint recognition technique. This development intimates
the position of the vehicle to the authorized user by Global System for Mobile (GSM)
technology. If an authorized person tries to access the vehicle, it is allowed meanwhile if an
unauthorized person tries to access a message will be sent to owner of the vehicle and the engine
will be immobilized. The GPS system is attached to know the position of the vehicle and its
current location. In any cases the vehicle got towed or theft detection the location will be
detected. If an engine is switched off, but the GPS changes significantly a message will send to
the authorized user to alert them. Besides that, PIC16F877a is used as the main platform of the
security system which monitors all the input and output of the system. Status of the system will
be displayed on LCD and SMS will be sent to notify the authorized user [11]
4.2 RESULTS
The system has been tested to demonstrate the project delivery’s functionality as in presented
design. The combination of the software applications and hardware components has enabled the
application operating as planned or labelled on the designed interface.
The data are taken from different fingerprints in order to examine the accuracy and consistency
of the system. Table and Figure method are used to interpret data that collected from the
prototype of vehicle ignition using fingerprint. Application used in this project is interfaced
together with Arduino software to control the commands. Application used is to notify the owner
on the usage of the vehicle.
The projects have been successfully created including the operation along with explanations of
the different functions used for the application software and hardware systems work.
CHAPTER 5
DESIGNING
Process flow to complete this project successfully is included with input, process and output of
the system. Fingerprint is scanned to activate the ignition when the authorized user fingerprint is
detected. Adding or deleting a fingerprint option is included in this project. In the case of adding
or deleting a fingerprint, a master fingerprint will be set as an ID first. When the master
fingerprint ID is authorized, then only user can be added to be an authorized user or deleted from
the list. Followed by the Arduino which will interpret the received message from the fingerprint
scanner. The results will display the status of the user in LCD. If the fingerprints are matched,
the ignition system of the vehicle will turn on. If an unauthorized fingerprint is detected, the
buzzer will turn on and an alert message is sent to the authorized user. Upon receiving the SMS
using GSM technology, the user will know that the vehicle is being operated by someone else.
CHAPTER 6
FLOWCHART OF THE SYSTEM.
6.1 BLOCK DIAGRAM FOR FINGERPRINT RECOGNITION
PROCESS
First the individual must register themselves in the biometric system database. This begins as the
fingerprint of an individual is acquired by a scanner. Followed by the verification task that will
identify the individuals. The biometric reader will take note on the individual’s fingerprint so
that could be determined and converts it to a digital format. Final task is identification which the
system differentiates the input of the biometric in the system database. the result is either
identified of an authorized user or alert as an unauthorized user.
6.1 Block diagram of the system
fingerprint of an individual is acquired by a scanner. Followed by the verification task that will
identify the individuals. The biometric reader will take note on the individual’s fingerprint so
that could be determined and converts it to a digital format. Final task is identification which the
system differentiates the input of the biometric in the system database. the result is either
identified of an authorized user or alert as an unauthorized user.
CHAPTER 7
HARDWARE SETUP
7.1 HARDWARE CIRCUIT CONNECTION
Connection of all the hardware’s are done accordingly. LCD pins are connected to A0, A1, A2,
A3, A4, A5, fingerprint scanner connected to pin 2 and 3, GSM to pin 10 and 11 (RX, TX), push
button pin 4, 5, 6 and 7, relay to pin 12 and buzzer to pin 13.
FIG 7.1 The connection of LCD, GSM, relay, fingerprint scanner, buzzer and push button
on the Arduino Uno board.
8.1 ADVANTAGES
• It offers high accuracy for fingerprint recognition
• Smaller storage space is needed for biometric sample and hence it reduces database
memory requirement.
• The fingerprints are unique to each finger of each individual and the ridge arrangement
remains permanent during one's lifetime.
8.2 DISADVANTAGES
• Following are the drawbacks or disadvantages of Fingerprint sensor:
• There are health issues involved due to touching of single scanning sensor device by
countless number of individuals. This has serious implications in pandemic situations
such as COVID-19 etc.