A Biometric Vehicle Theft Identification and Prevention Scheme Using GPS Location Tracking
A Biometric Vehicle Theft Identification and Prevention Scheme Using GPS Location Tracking
2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) | 979-8-3503-1590-5/23/$31.00 ©2023 IEEE | DOI: 10.1109/ACCAI58221.2023.10199574
Abstract- The demand for security is rising in every The in-car gadget relies on GPS and worldwide
sector of society as the pace of technological system for mobile (GSM) communication/general
development and scientific discovery quickens. Right packet radio service (GSM/GPRS) technologies to
now, having access to a car is essential. At the same do its job. The gadget is installed in a car whose
time, preventing theft from happening is crucial. The
whereabouts are being monitored in real time.
expense and complexity of conventional methods of
protecting vehicles are substantial. There is no further Control of the GSM and GSM/GPRS modules [1] is
action or option that might help the car's owner handled by a microprocessor. In order to keep track
recover their vehicle once it has been stolen. The usage of a vehicle's whereabouts, a GSM/GPRS module is
of biometrics such as fingerprints is widespread and is utilized to relay the coordinates it receives from a
now routine in many settings, including businesses, GPS module at predetermined intervals.
public buildings, educational institutions, and more.
The primary objective of this study is to secure the car It is possible to identify a specific persons by their
against unwanted entry using fingerprint recognition fingerprints, which serve as a biometric signature.
technology that is both quick and simple to implement, The computer can recognize the fingerprint pattern
as well as clear, reliable, and cost-effective. A method
and match it quickly and correctly. The fingerprint
was necessary to track where each vehicle was at all
times and how far it had gone. These days, active can be verified in a number of ways, including using
vehicle monitoring and GPS technologies are used to an optical fingerprint scanner or a capacitive
keep tabs on our motor vehicles. Images of scanner. The optical fingerprint scanner employs a
fingerprints are taken by the sensor, and the sensor glass prism to regulate total internal reflection (TIR),
then compares each fingerprint it reads to a database which is the fundamental mechanism behind its
of recorded fingerprints or to a module inside the operation. Light, typically green, is emitted by the
system. A GPS and GSM-based anti-theft car LED and enters the prism from one side at a certain
monitoring system would be the most cost-effective angle, causing total internal reflection. The camera's
means of tracing a vehicle's whereabouts and could image sensor is utilized to record the light that has
even be used to locate stolen vehicles. It is a built-in
been reflected off of the prism. Whenever a person
unit that utilizes GPS and the GSM network to
pinpoint the exact location and trajectory of a moving places a finger on the sensor, a series of events
vehicle (GSM) begins. While the sensor is idle (when no finger is
put), all of the incident light is reflected off of its
Index Terms—Vehicle Theft, IoT, Global Positioning surface, creating a flat picture.
System, Global system for mobile communication,
Fingerprint sensor. An asset's location may be tracked in real time and
recorded at regular intervals with the use of a GPS
I.INTRODUCTION tracking module, which utilizes the Global
Positioning System to pinpoint the exact location of
Every vehicle fitted with a tracking device may have the car, person, or other asset to which it is attached
its location and movement monitored in real time, [2]. Information about a tracked object's
regardless of its current location or the time of day. whereabouts can either be saved locally on the
Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
tracking device or sent over cellular network to a
centralized location database or online server
(GPRS). Whether it's in real time or when evaluating
the track afterwards, specialized software may plot
the asset's location on a map.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
Fingerprint an eye on cars, which can lead to human mistakes or
Fingerprint Vehicle ON starting used on
GPS gaps in attention due to weariness. In article [7], the
author describes a system that can detect car thefts in
real time using automation. The Canny Edge
Detection technique is used to identify moving
objects, and alerts either security guards or the
Remote control
parking lot manager. Before determining motion, the
Fingerprint
edges must be identified using the Canny technique,
Fingerprint USB
Token
Authentication
Management
and the border change ratio must be calculated.
Modern Edge detection algorithms exist, with Canny
Figure 2. Car tracking and anti-theft security using being one among them; nevertheless, the double
GPS and GSM, illustrated. thresholding and improved performance of the
method presented in this study make it the preferred
II.RELATED STUDY choice.
In the event of car theft, tracking systems using Theft of auto components is a serious problem in Sri
global positioning satellites and general mobile Lanka, however the country's response is
networks have become increasingly common. inadequate. In order to determine whether or not
Hardly no car could be found that was not nearby at Colombo, Sri Lanka is in need of a more robust
the time of the occurrence. To avoid being followed vehicle security system that can verify the
by cars that are too far away from the event site and legitimacy of vehicle components and identify the
time, it is imperative to conduct vehicle searches as most regularly stolen car parts, a poll was
soon as possible thanks to a more effective detection undertaken [8]. The poll confirmed what we already
method. The author of project [6] suggests knew: that there is a pressing demand for this type of
implementing a Vehicle Tracking System for vehicle safety equipment. In order to determine
locating vehicles. To prevent theft, we have installed whether or not the original pieces of a vehicle have
technology that can detect when a car is being been changed with aftermarket parts without the
moved or when the engine is being used. A GPS user's knowledge or agreement, a prototype model
module with an external Antenna is used for location has been designed, implemented, and tested, and its
detection, while cellular networks are used to results are presented in this study. The produced
transmit data and telemetry. The MQTT protocol is prototype model uses RFID technology to identify
used to transmit data from Google Cloud IoT Core theft and authenticity of automotive parts. The
to the Firestore database in Google Firebase. The combination of a single inexpensive RFID reader
information may be tracked by the vehicle owner via and an anti-collision mechanism based on time
a Progressive Web App based User Interface, that's division multiplexing (TDM) and signal relaying,
additionally constructed on top of Firebase and both of which help keep costs down, makes this
therefore will allow the owner to regulate device vehicle security system accessible to a wide range of
mode, demonstrate the vehicle's actual location via vehicle owners.
Google Maps, and view a collection of previous
information on the vehicle's movements. Whenever Implementing a vehicle theft surveillance system
the system detects a theft, it will send a notification and researching methods to prevent car theft are two
to the user's device. of the most common ways to keep your car safe
when parked and on the road [9]. If an unauthorized
In order to combat a long-standing problem, image individual tries to start the vehicle's ignition, the
and video processing has been used to the problem system will recognize them using facial recognition
of automobile theft from parking lots. Parking lot and administer a shock before alerting the owner via
owners and managers employ closed-circuit an internet-of-things application. With a
television (CCTV) cameras to monitor parking lots microprocessor called raspberry pi, a camera called a
for signs of stolen automobiles. The rise in pie cam, and a WIFI controller put in the car, the
popularity of CCTV and other forms of video system is both easy to operate and secure, making it
surveillance is indicative of their effectiveness as an effective anti-theft measure at a reasonable price.
theft deterrents, but a fundamental flaw of the
technology is that it relies on human beings to keep Due to a lack of leads and a sluggish start to the
Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
investigation, locating the stolen car proved Input Fingerprint Reader Real Time Clock
Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
6M, the Ublox Neo 6M GPS Module has you
covered. For precise positional data, this module
employs cutting-edge Ublox technology. Not only
does it have UART TTL connectors, but it also has
an external GPS Antenna. By having a built-in
rechargeable li-ion battery, this module can hot-start
in most situations and acquire a GPS lock more
quickly.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
box. The AC power supply is used to power the model. GPS and other forms of active vehicle
many gadgets that have been plugged into the tracking have become standard in modern fleet
junction box. management. In order to verify the identity of a user,
fingerprint sensors take pictures of their fingerprints
The vehicle's owner is the only person authorized to and compare them to the records kept in the module
register a fingerprint in the module. The code must or local system database. With GPS and GSM
always include the owner's cellphone number. In technologies, a car tracking system might provide
order to turn on the four-ignition, wheeler's the the cheapest source of vehicle tracking while also
proper fingerprint must be entered. serving as an effective anti-theft device.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
Table 1. Efficiency of identification devices is not restricted to remote device control; it
No. of images Efficiency also has automotive uses. For both secure and
100 97 convenient personal identification, the fingerprint is
200 96 a promising biometric pattern. This is an unheard-of
300 94 approach to concocting and constructing a stealthy,
400 92 compact anti-theft system for automobiles.
Foreseeable enhancements to the project include
These include: incorporating cloud computing, which would allow
In order to get entry to the system, a valid for comprehensive monitoring of all device
fingerprint must first be registered. activities. Because of this, there is less need for the
Fingerprints that haven't been registered, which computer to permanently store each individual's
means unauthorized entry. login details.
Dragging a car for a predetermined amount of
time. REFERENCES
User input required for system [1] R. Shukla, D. K and N. M, "Vehicle Theft Detection and Driver
activation/deactivation Identification System Using IoT," 2022 International
Conference on Power, Energy, Control and Transmission
Systems (ICPECTS), Chennai, India, 2022, pp. 1-6, doi:
10.1109/ICPECTS56089.2022.10047626.
[2] B. Balakrishnan, P. Suryarao, R. Singh, S. Shetty and S.
Upadhyay, "Vehicle Anti-theft Face Recognition System, Speed
Control and Obstacle Detection using Raspberry Pi," 2022 IEEE
5th International Symposium in Robotics and Manufacturing
Automation (ROMA), Malacca, Malaysia, 2022, pp. 1-5, doi:
10.1109/ROMA55875.2022.9915691.
[3] K. SriAnusha, S. SaddamHussain and K. P. Kumar, "Biometric
car security and monitoring system using IOT," 2019
International Conference on Vision Towards Emerging Trends
in Communication and Networking (ViTECoN), Vellore, India,
2019, pp. 1-7, doi: 10.1109/ViTECoN.2019.8899370.
[4] Z. Farr, M. Azab and E. Samir, "Blockchain-based cooperative
autonomous detection of suspicious vehicles," 2020 11th IEEE
Annual Information Technology, Electronics and Mobile
Communication Conference (IEMCON), Vancouver, BC,
Canada, 2020, pp. 0188-0192, doi:
10.1109/IEMCON51383.2020.9284881.
Figure 9. SMS alert [5] S. Bhattacharya, H. Jha and R. P. Nanda, "Application of IoT
and Artificial Intelligence in Road Safety," 2022
Improve the safety of your car by allowing only Interdisciplinary Research in Technology and Management
(IRTM), Kolkata, India, 2022, pp. 1-6, doi:
authorized drivers to access it with fingerprint 10.1109/IRTM54583.2022.9791529.
recognition. Further improvements in effectiveness [6] P. V. Crisgar, P. R. Wijaya, M. D. F. Pakpahan, E. Y.
Syamsuddin and M. O. Hasanuddin, "GPS-Based Vehicle
and precision can be accomplished by employing Tracking and Theft Detection Systems using Google Cloud IoT
either improved hardware for picture capture or Core & Firebase," 2021 International Symposium on
enhanced imaging methods. Electronics and Smart Devices (ISESD), Bandung, Indonesia,
2021, pp. 1-6, doi: 10.1109/ISESD53023.2021.9501928.
[7] S. Shammi, S. Islam, H. A. Rahman and H. U. Zaman, "An
V.CONCLUSION AND FUTURE SCOPE Automated Way of Vehicle Theft Detection in Parking
Facilities by Identifying Moving Vehicles in CCTV Video
Stream," 2018 International Conference on Communication,
Regardless matter the type of application, security is Computing and Internet of Things (IC3IoT), Chennai, India,
always a must-have. In this research, we present a 2018, pp. 36-41, doi: 10.1109/IC3IoT.2018.8668135.
[8] A. Jayakody, S. Nishshanka, N. Liyanage, N. De Silva and A.
new method for switching between devices that Abhayawardhana, "RFID Based Theft Detection System for
integrates fingerprint identification with global Automobile Parts," 2019 International Conference on
positioning system and cellular network capabilities. Advancements in Computing (ICAC), Malabe, Sri Lanka, 2019,
pp. 386-391, doi: 10.1109/ICAC49085.2019.9103398.
By using this method, several users may manage the [9] S. fasiuddin, S. Omer, K. Sohelrana, A. Tamkeen and M. A.
gadget's settings, and the fingerprint sensor's Rasheed, "Real Time Application of Vehicle Anti Theft
Detection and Protection with Shock Using Facial Recognition
identification features can speed up the fixing of any and IoT Notification," 2020 Fourth International Conference on
problems. This model's usage of the inexpensive and Computing Methodologies and Communication (ICCMC),
versatile Arduino board reduces costs and expands Erode, India, 2020, pp. 1039-1044, doi:
10.1109/ICCMC48092.2020.ICCMC-000194.
potential uses. The usage of remote switching of [10] P. V. Crisgar, P. R. Wijaya, M. D. F. Pakpahan, E. Y.
Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
Syamsuddin and M. O. Hasanuddin, "Hardware Design for IoT- [12] A. G, et al "An Artificial Neural Network Classifier for palm
Based Vehicle Tracking and Theft Detection System," 2021 Motion categorization based on EMG signal," (ICSES), 2022,
International Symposium on Electronics and Smart Devices pp. 1-11, doi: 10.1109/ICSES55317.2022.9914097
(ISESD), Bandung, Indonesia, 2021, pp. 1-6, doi:
10.1109/ISESD53023.2021.9501601.
[11] M. Tamilselvi, et al"A Novel Text Recognition Scheme using
Classification Assisted Digital Image Processing Strategy,"
(ACCAI), 2022, pp. 1-6, doi:
10.1109/ACCAI53970.2022.9752542
Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.