0% found this document useful (0 votes)
24 views8 pages

A Biometric Vehicle Theft Identification and Prevention Scheme Using GPS Location Tracking

This document presents a biometric vehicle theft identification and prevention scheme that utilizes GPS location tracking and fingerprint recognition technology. The system aims to enhance vehicle security by allowing only authorized users to start the vehicle while providing real-time tracking and alerts in case of theft. The integration of GSM communication enables the owner to receive updates and control the vehicle remotely, making it a cost-effective solution for preventing auto theft.

Uploaded by

Sai Manoj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views8 pages

A Biometric Vehicle Theft Identification and Prevention Scheme Using GPS Location Tracking

This document presents a biometric vehicle theft identification and prevention scheme that utilizes GPS location tracking and fingerprint recognition technology. The system aims to enhance vehicle security by allowing only authorized users to start the vehicle while providing real-time tracking and alerts in case of theft. The integration of GSM communication enables the owner to receive updates and control the vehicle remotely, making it a cost-effective solution for preventing auto theft.

Uploaded by

Sai Manoj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

A Biometric Vehicle Theft Identification and

2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) | 979-8-3503-1590-5/23/$31.00 ©2023 IEEE | DOI: 10.1109/ACCAI58221.2023.10199574

Prevention Scheme using GPS Location Tracking


K. Jeevitha1, J. Venkatesh2, V. Indhumathi3, K. Krishna Veni4, R. Prem Kumar5, and Devadarshini. M6
1
Assistant Professor, Department of ECE, R.M.K. Engineering College, Chennai.
2
Professor, Department of CSE, Chennai Institute of Technology, Chennai.
3
Assistant Professor, Department of CSE, Panimalar Institute of Technology, Chennai.
4
Assistant Professor, Department of ECE, R.M.D. Engineering College, Chennai.
5
Assistant Professor, Department of CSE, R.M.K. College of Engineering and Technology, Chennai.
6
UG Scholar, Department of ECE, R.M.K. Engineering College, Chennai.

E-mail : [email protected], [email protected], [email protected], [email protected],


[email protected], [email protected]

Abstract- The demand for security is rising in every The in-car gadget relies on GPS and worldwide
sector of society as the pace of technological system for mobile (GSM) communication/general
development and scientific discovery quickens. Right packet radio service (GSM/GPRS) technologies to
now, having access to a car is essential. At the same do its job. The gadget is installed in a car whose
time, preventing theft from happening is crucial. The
whereabouts are being monitored in real time.
expense and complexity of conventional methods of
protecting vehicles are substantial. There is no further Control of the GSM and GSM/GPRS modules [1] is
action or option that might help the car's owner handled by a microprocessor. In order to keep track
recover their vehicle once it has been stolen. The usage of a vehicle's whereabouts, a GSM/GPRS module is
of biometrics such as fingerprints is widespread and is utilized to relay the coordinates it receives from a
now routine in many settings, including businesses, GPS module at predetermined intervals.
public buildings, educational institutions, and more.
The primary objective of this study is to secure the car It is possible to identify a specific persons by their
against unwanted entry using fingerprint recognition fingerprints, which serve as a biometric signature.
technology that is both quick and simple to implement, The computer can recognize the fingerprint pattern
as well as clear, reliable, and cost-effective. A method
and match it quickly and correctly. The fingerprint
was necessary to track where each vehicle was at all
times and how far it had gone. These days, active can be verified in a number of ways, including using
vehicle monitoring and GPS technologies are used to an optical fingerprint scanner or a capacitive
keep tabs on our motor vehicles. Images of scanner. The optical fingerprint scanner employs a
fingerprints are taken by the sensor, and the sensor glass prism to regulate total internal reflection (TIR),
then compares each fingerprint it reads to a database which is the fundamental mechanism behind its
of recorded fingerprints or to a module inside the operation. Light, typically green, is emitted by the
system. A GPS and GSM-based anti-theft car LED and enters the prism from one side at a certain
monitoring system would be the most cost-effective angle, causing total internal reflection. The camera's
means of tracing a vehicle's whereabouts and could image sensor is utilized to record the light that has
even be used to locate stolen vehicles. It is a built-in
been reflected off of the prism. Whenever a person
unit that utilizes GPS and the GSM network to
pinpoint the exact location and trajectory of a moving places a finger on the sensor, a series of events
vehicle (GSM) begins. While the sensor is idle (when no finger is
put), all of the incident light is reflected off of its
Index Terms—Vehicle Theft, IoT, Global Positioning surface, creating a flat picture.
System, Global system for mobile communication,
Fingerprint sensor. An asset's location may be tracked in real time and
recorded at regular intervals with the use of a GPS
I.INTRODUCTION tracking module, which utilizes the Global
Positioning System to pinpoint the exact location of
Every vehicle fitted with a tracking device may have the car, person, or other asset to which it is attached
its location and movement monitored in real time, [2]. Information about a tracked object's
regardless of its current location or the time of day. whereabouts can either be saved locally on the

Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
tracking device or sent over cellular network to a
centralized location database or online server
(GPRS). Whether it's in real time or when evaluating
the track afterwards, specialized software may plot
the asset's location on a map.

It seems that more cars are being stolen and never


recovered. An anti-theft system, such a fingerprint
scanner, can help cut down on auto theft. The
Arduino is integrated with a fingerprint sensor. The
vehicle's ignition system has been tweaked. To turn
on and off the Arduino, a voltage regulator receives Figure 1. Image of fingerprint
power from the ignition switch; the Arduino then
receives power from the voltage regulator; and the A global positioning system (GPS) receiver is at the
fingerprint sensor scans a user's fingerprint in heart of the car tracking system, providing the driver
response to user input. After a successful fingerprint with accurate updates on the vehicle's whereabouts
comparison, the starting relay will be activated. at all times. After a short pause, the MCU stores this
Because of this, the motor may be started. The real-time information in the Main Memory Module
fingerprint reader will deactivate after that. If a (Main Control Unit). Undoubtedly, the GSM module
finger is not scanned or a picture of a finger is not a is linked to the MCU, which drives and receives the
match, the beginning system will not activate. The SMS. The MMC is read by the GSM module, which
vehicle's fingerprint sensor will not start the motor. then relays the data to the user's connected mobile
Just the starting relay is controlled, thus either device. The true time and date, as well as the
engine cranking is prevented or allowed [3] [5]. location's longitude and latitude, altitude, ground
speed, and direction, are included in this data. We
The primary objective of this work is to safeguard can pinpoint the precise position of the car with the
the car from being stolen. We're implementing this help of Google Maps.
safety measure by using biometrics, such as a
fingerprint, for authentication. The fingerprint Figure 2 depicts an example of vehicle theft
module in a car has to have the owner's fingerprint prevention and tracking through global positioning
saved in it first. In Figure 1 we see a fingerprint system and general mobile communications
picture. The GSM modem is used to communicate network. In addition to providing information on the
with the owner, both sending and receiving location of the car, the vehicle tracking system also
messages. The code must permanently store the helps keep the car safe. It's important to pull over as
owner's phone number. The approved fingerprint is quickly as possible so that you can figure out where
required to start the engine of the four-wheeler. The the car is parked. Both of these methods of
owner will be notified instantly as well as the local communication are linked to the car's buzzer and the
alarm system will activate if an unregistered vehicle's electrical system in preparation for the
fingerprint is used to gain entry. The GSM modem vehicle's repossession. To return the car quickly, the
built into the system also allows us to track the user only send a text message to turn off the engine.
whereabouts of the four-wheeler in the case of theft. As passwords are the most easily compromised part
Then, the owner receives a constant stream of of otherwise robust security systems, there is a
updates on the vehicle's precise GPS location concerted effort from a number of quarters to replace
through text message [4]. Messages to the system them with more robust forms of authentication. The
can also be used to manage the car's ignition [11] primary goal of the design process for this vehicle's
[12]. anti-theft system was to include all of the
aforementioned elements into a single, cohesive
whole. In order to ensure the safety of the car and
prevent theft, many levels of security have been
installed.

Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
Fingerprint an eye on cars, which can lead to human mistakes or
Fingerprint Vehicle ON starting used on
GPS gaps in attention due to weariness. In article [7], the
author describes a system that can detect car thefts in
real time using automation. The Canny Edge
Detection technique is used to identify moving
objects, and alerts either security guards or the
Remote control
parking lot manager. Before determining motion, the
Fingerprint
edges must be identified using the Canny technique,
Fingerprint USB
Token
Authentication
Management
and the border change ratio must be calculated.
Modern Edge detection algorithms exist, with Canny
Figure 2. Car tracking and anti-theft security using being one among them; nevertheless, the double
GPS and GSM, illustrated. thresholding and improved performance of the
method presented in this study make it the preferred
II.RELATED STUDY choice.

In the event of car theft, tracking systems using Theft of auto components is a serious problem in Sri
global positioning satellites and general mobile Lanka, however the country's response is
networks have become increasingly common. inadequate. In order to determine whether or not
Hardly no car could be found that was not nearby at Colombo, Sri Lanka is in need of a more robust
the time of the occurrence. To avoid being followed vehicle security system that can verify the
by cars that are too far away from the event site and legitimacy of vehicle components and identify the
time, it is imperative to conduct vehicle searches as most regularly stolen car parts, a poll was
soon as possible thanks to a more effective detection undertaken [8]. The poll confirmed what we already
method. The author of project [6] suggests knew: that there is a pressing demand for this type of
implementing a Vehicle Tracking System for vehicle safety equipment. In order to determine
locating vehicles. To prevent theft, we have installed whether or not the original pieces of a vehicle have
technology that can detect when a car is being been changed with aftermarket parts without the
moved or when the engine is being used. A GPS user's knowledge or agreement, a prototype model
module with an external Antenna is used for location has been designed, implemented, and tested, and its
detection, while cellular networks are used to results are presented in this study. The produced
transmit data and telemetry. The MQTT protocol is prototype model uses RFID technology to identify
used to transmit data from Google Cloud IoT Core theft and authenticity of automotive parts. The
to the Firestore database in Google Firebase. The combination of a single inexpensive RFID reader
information may be tracked by the vehicle owner via and an anti-collision mechanism based on time
a Progressive Web App based User Interface, that's division multiplexing (TDM) and signal relaying,
additionally constructed on top of Firebase and both of which help keep costs down, makes this
therefore will allow the owner to regulate device vehicle security system accessible to a wide range of
mode, demonstrate the vehicle's actual location via vehicle owners.
Google Maps, and view a collection of previous
information on the vehicle's movements. Whenever Implementing a vehicle theft surveillance system
the system detects a theft, it will send a notification and researching methods to prevent car theft are two
to the user's device. of the most common ways to keep your car safe
when parked and on the road [9]. If an unauthorized
In order to combat a long-standing problem, image individual tries to start the vehicle's ignition, the
and video processing has been used to the problem system will recognize them using facial recognition
of automobile theft from parking lots. Parking lot and administer a shock before alerting the owner via
owners and managers employ closed-circuit an internet-of-things application. With a
television (CCTV) cameras to monitor parking lots microprocessor called raspberry pi, a camera called a
for signs of stolen automobiles. The rise in pie cam, and a WIFI controller put in the car, the
popularity of CCTV and other forms of video system is both easy to operate and secure, making it
surveillance is indicative of their effectiveness as an effective anti-theft measure at a reasonable price.
theft deterrents, but a fundamental flaw of the
technology is that it relies on human beings to keep Due to a lack of leads and a sluggish start to the

Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
investigation, locating the stolen car proved Input Fingerprint Reader Real Time Clock

challenging. To aid in the search, it would be helpful


to have a device already installed on the car that
could both offer location data and alert the owner to
any attempted theft. To address these issues, Power Supply Arduino Mega 2560
researcher [10] created hardware for mounting on Relay

motor vehicles that may report the position of the


vehicle and alert the owner to any suspicious
LCD NEO-6M SIM800L
activity, such as an attempt to turn the engine. Using Turn ON/OFF

data from the on-board diagnostic (OBDII) system,


the gadget will be able to pick up vibrations and Power Supply
noises coming from a motor vehicle in motion.
Finally, the MQTT protocol is used to relay the data Figure 3. Structure of the Car's Spark Plugs and
to the Google IoT Core server. The GPRS network Distributor
is accessed through the SIM800L communication
module, the ESP32 microcontroller module, the A fingerprint verification module, which offers
IP5306 battery management module, and the Neo- robust protection and authentication, has been
6m global positioning system (GPS) module. The included into the design. Along with the GSM and
test is conducted in both "Line of Sight" (LOS) GPS modules, having this one built in allows us to
situations, where there are no obstructions, and quickly identify and fix any problems that may arise
"Non-LOS" conditions, when there are numerous with the device. In the sections that follow, we'll go
barriers, such as roadways that pass beneath trees or over the many parts of this design that must be in
under flyovers. With a success rate of 96%, the place for it to work.
program's traceability tests showed precision up to
10 meters from either the test point of comparison. SIM800L Module
Having tested the theft identification itself is done The GSM module allows mobile devices to perform
through a modelling technique using a passenger tasks such as sending and receiving text messages.
vehicle, in which the scenario performed is to The GSM module has an antenna built in so that the
transform on the car as well as move it 50 meters user's cell phone may connect to the network.
from the preliminary step, and the findings of the Suitable with Arduino, the SIM800L V2.0
research in which the message towards the consumer GSM/GPRS Module supports four different
is effectively lit in all of these two situations. GSM/GPRS bands. The module may be used to
incorporate either GSM functionality (voice call or
III.METHODOLOGY SMS) or GPRS functionality. Because to the 5V
voltage of both the VCC and TTL serial lines, these
In this research, we present an alternate design that modules are ideal for use with Arduino or any other
incorporates a fingerprint module with the Arduino minimal system operating at this voltage. The
microcontroller to strengthen the security SIM800L component is seen in Figure 4.
characteristics of the device. The suggested scheme
is a more thorough strategy for hands-free operation
of the gadget. The suggested architecture's block
diagram is seen in Figure 3. The suggested layout
makes use of a GSM/GPS-based module to monitor
the device's whereabouts and grant access to a user
in a faraway place. The best approach to protect your
car from theft is with a vehicle locking framework,
which guarantees your safety in the event of any
form of theft. It's a high-tech security device for cars
that provides the owner with more luxurious
coverage options. Figure 4. SIM800L module

NEO-6M GPS Module


A full GPS module depending on the Ublox Neo

Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
6M, the Ublox Neo 6M GPS Module has you
covered. For precise positional data, this module
employs cutting-edge Ublox technology. Not only
does it have UART TTL connectors, but it also has
an external GPS Antenna. By having a built-in
rechargeable li-ion battery, this module can hot-start
in most situations and acquire a GPS lock more
quickly.

The UBlox NEO 6M GPS Module Engine is Figure 6. Arduino microcontroller


excellent and features a highly precise binary output.
Because to its great sensitivity, it may be used R307 Optical Fingerprint Reader Sensor Module
successfully in indoor settings as well. The internal Here, an Arduino board serves as both an interface
battery also powers the EEPROM that stores the and a power source for a fingerprint sensor module.
device's setup settings. The module has a UFL The ATmega2560 microcontroller may be
Connector for use in securing a wired connection to programmed with the user's fingerprint through the
a GPS antenna. This provides mounting options for Arduino IDE. The fingerprint reader is versatile,
the GPS Module, ensuring that the antenna is always allowing for subsequent development and
pointed upwards for optimal reception. In this way, incorporation into many other devices. Superb
it is highly effective for usage in automobiles and efficiency, cheap cost, compact size, and lack of
other mobile GPS systems. power usage. Accurate module production using
expert-level optical technologies. A picture with a
The NEO-6M GPS receiver module is seen in Figure resolution of up to 500 dpi may be captured with the
5. The NEO-6M GPS module is a high-performance, help of modern image processing technology. Figure
all-in-one GPS receiver that features a 25 x 25 x 7 shows the R307 optical fingerprint reader.
4mm ceramic antenna and excellent satellite search
performance. You can see how the module is doing
by looking at the power and signal lights. The
module's data backup battery keeps everything safe
in the event of an unexpected power outage. Thanks
to the 3mm mounting holes, it can be easily attached
to your aircraft, allowing it to hover in place,
automatically return to Home, fly to predetermined
waypoints, etc. You could even use it to make your
automobile into a "smart" robot by programming it Figure 7. R307 optical fingerprint reader sensor
to automatically return to its starting point or travel module.
to a specified location.
Liquid Crystal Display (LCD)
A liquid crystal display (LCD) is a device used for
video representation of the output, and it displays
information using the characteristics of light
modulation. An LCD is necessary for this project so
that the user can see the numerous messages being
shown. A permission granted communication, an
access request statement, and so on are all examples
Figure 5. NEO-6M GPS module. of the several sorts of messages that may be sent.
Arduino Microcontroller Relay circuit
The ATmega2560-based microcontroller board that A relay is an electrical component that acts as a
is used in the proposed architecture is an Arduino switch, allowing one signal to operate many circuits.
Mega 2560. The microcontroller directs the various In this project, the suggested layout is being put into
components to produce the desired result. A picture practice in real time through the usage of a junction
of an Arduino microcontroller is seen in Figure 6.

Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
box. The AC power supply is used to power the model. GPS and other forms of active vehicle
many gadgets that have been plugged into the tracking have become standard in modern fleet
junction box. management. In order to verify the identity of a user,
fingerprint sensors take pictures of their fingerprints
The vehicle's owner is the only person authorized to and compare them to the records kept in the module
register a fingerprint in the module. The code must or local system database. With GPS and GSM
always include the owner's cellphone number. In technologies, a car tracking system might provide
order to turn on the four-ignition, wheeler's the the cheapest source of vehicle tracking while also
proper fingerprint must be entered. serving as an effective anti-theft device.

The owner will be notified instantly as well as the


local warning system will activate if an unregistered
fingerprint is used to gain entry. Next, the vehicle's
current GPS location is communicated to the owner
via text message, allowing for continuous, real-time
tracking. Messages to the system can also be used to
manage the car's ignition. There are now two serial
ports in use. One for the Global System for Mobile
Communication modem and another for the Global
Positioning System modem. An attachment to the
car is required for use of the gadget. The car tracking (a)
system equipment communicates with the client via
a wireless network, and the customer uses their
mobile phone to keep tabs on everything. A GSM
SIM card may be put into the vehicle tracking
device's specific SIM card slot to enable it to receive
and send SMS messages. The user may send an
SMS from his mobile phone, find out where his car
is, and lock it down.

IV.RESULTS AND DISCUSSIONS


(b)
ATMs, mobile phones, autos, computers, and Figure 8.Setup of the model
workplaces, among other places that require
authorized access, can all benefit from biometric To begin the implementation procedure, the LCD
security measures. Biometrics have brought and GSM modem must be initialized. Once the
substantial improvements to security systems, device's components have been booted up, the user
making them safer, more efficient, and less may send text messages to operate it. With this
expensive. One common biometric security method setup, an authorized bystander can also use the
is fingerprint scanning. Because everyone has a gadget with the user's authorization. Someone near
unique fingerprint, this method is more foolproof. the device terminal uses a fingerprint reader to log
That being said, this project is straightforward. in. The owner of the device will be notified via
message whether the fingerprint is a good picture. A
Vehicle theft continues unabated, and none of the nearby user can take manual control of the gadget if
stolen cars have been recovered. Thievery may be its owner first sends a message allowing access.
reduced with the use of security systems like Nevertheless, an "invalid user" notice will appear on
fingerprint systems, which are especially useful in the LCD screen if the fingerprint image is invalid,
automobiles. An Arduino fingerprint sensor hybrid and the user will be denied access. Several different
has been developed. Everyone has to have access to kinds of test cases, both legitimate and malicious,
their own personal automobile. As such, installing a will be used to ensure the project is ready for
vehicle monitoring system to protect your car from launch.The alarm SMS is seen in Figure 9. Table 1
theft is crucial. Figure 8 shows the setup of the shows the efficiency of identification.

Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
Table 1. Efficiency of identification devices is not restricted to remote device control; it
No. of images Efficiency also has automotive uses. For both secure and
100 97 convenient personal identification, the fingerprint is
200 96 a promising biometric pattern. This is an unheard-of
300 94 approach to concocting and constructing a stealthy,
400 92 compact anti-theft system for automobiles.
Foreseeable enhancements to the project include
These include: incorporating cloud computing, which would allow
 In order to get entry to the system, a valid for comprehensive monitoring of all device
fingerprint must first be registered. activities. Because of this, there is less need for the
 Fingerprints that haven't been registered, which computer to permanently store each individual's
means unauthorized entry. login details.
 Dragging a car for a predetermined amount of
time. REFERENCES
 User input required for system [1] R. Shukla, D. K and N. M, "Vehicle Theft Detection and Driver
activation/deactivation Identification System Using IoT," 2022 International
Conference on Power, Energy, Control and Transmission
Systems (ICPECTS), Chennai, India, 2022, pp. 1-6, doi:
10.1109/ICPECTS56089.2022.10047626.
[2] B. Balakrishnan, P. Suryarao, R. Singh, S. Shetty and S.
Upadhyay, "Vehicle Anti-theft Face Recognition System, Speed
Control and Obstacle Detection using Raspberry Pi," 2022 IEEE
5th International Symposium in Robotics and Manufacturing
Automation (ROMA), Malacca, Malaysia, 2022, pp. 1-5, doi:
10.1109/ROMA55875.2022.9915691.
[3] K. SriAnusha, S. SaddamHussain and K. P. Kumar, "Biometric
car security and monitoring system using IOT," 2019
International Conference on Vision Towards Emerging Trends
in Communication and Networking (ViTECoN), Vellore, India,
2019, pp. 1-7, doi: 10.1109/ViTECoN.2019.8899370.
[4] Z. Farr, M. Azab and E. Samir, "Blockchain-based cooperative
autonomous detection of suspicious vehicles," 2020 11th IEEE
Annual Information Technology, Electronics and Mobile
Communication Conference (IEMCON), Vancouver, BC,
Canada, 2020, pp. 0188-0192, doi:
10.1109/IEMCON51383.2020.9284881.
Figure 9. SMS alert [5] S. Bhattacharya, H. Jha and R. P. Nanda, "Application of IoT
and Artificial Intelligence in Road Safety," 2022
Improve the safety of your car by allowing only Interdisciplinary Research in Technology and Management
(IRTM), Kolkata, India, 2022, pp. 1-6, doi:
authorized drivers to access it with fingerprint 10.1109/IRTM54583.2022.9791529.
recognition. Further improvements in effectiveness [6] P. V. Crisgar, P. R. Wijaya, M. D. F. Pakpahan, E. Y.
Syamsuddin and M. O. Hasanuddin, "GPS-Based Vehicle
and precision can be accomplished by employing Tracking and Theft Detection Systems using Google Cloud IoT
either improved hardware for picture capture or Core & Firebase," 2021 International Symposium on
enhanced imaging methods. Electronics and Smart Devices (ISESD), Bandung, Indonesia,
2021, pp. 1-6, doi: 10.1109/ISESD53023.2021.9501928.
[7] S. Shammi, S. Islam, H. A. Rahman and H. U. Zaman, "An
V.CONCLUSION AND FUTURE SCOPE Automated Way of Vehicle Theft Detection in Parking
Facilities by Identifying Moving Vehicles in CCTV Video
Stream," 2018 International Conference on Communication,
Regardless matter the type of application, security is Computing and Internet of Things (IC3IoT), Chennai, India,
always a must-have. In this research, we present a 2018, pp. 36-41, doi: 10.1109/IC3IoT.2018.8668135.
[8] A. Jayakody, S. Nishshanka, N. Liyanage, N. De Silva and A.
new method for switching between devices that Abhayawardhana, "RFID Based Theft Detection System for
integrates fingerprint identification with global Automobile Parts," 2019 International Conference on
positioning system and cellular network capabilities. Advancements in Computing (ICAC), Malabe, Sri Lanka, 2019,
pp. 386-391, doi: 10.1109/ICAC49085.2019.9103398.
By using this method, several users may manage the [9] S. fasiuddin, S. Omer, K. Sohelrana, A. Tamkeen and M. A.
gadget's settings, and the fingerprint sensor's Rasheed, "Real Time Application of Vehicle Anti Theft
Detection and Protection with Shock Using Facial Recognition
identification features can speed up the fixing of any and IoT Notification," 2020 Fourth International Conference on
problems. This model's usage of the inexpensive and Computing Methodologies and Communication (ICCMC),
versatile Arduino board reduces costs and expands Erode, India, 2020, pp. 1039-1044, doi:
10.1109/ICCMC48092.2020.ICCMC-000194.
potential uses. The usage of remote switching of [10] P. V. Crisgar, P. R. Wijaya, M. D. F. Pakpahan, E. Y.

Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.
Syamsuddin and M. O. Hasanuddin, "Hardware Design for IoT- [12] A. G, et al "An Artificial Neural Network Classifier for palm
Based Vehicle Tracking and Theft Detection System," 2021 Motion categorization based on EMG signal," (ICSES), 2022,
International Symposium on Electronics and Smart Devices pp. 1-11, doi: 10.1109/ICSES55317.2022.9914097
(ISESD), Bandung, Indonesia, 2021, pp. 1-6, doi:
10.1109/ISESD53023.2021.9501601.
[11] M. Tamilselvi, et al"A Novel Text Recognition Scheme using
Classification Assisted Digital Image Processing Strategy,"
(ACCAI), 2022, pp. 1-6, doi:
10.1109/ACCAI53970.2022.9752542

Authorized licensed use limited to: JNT University Kakinada. Downloaded on January 24,2024 at 09:53:16 UTC from IEEE Xplore. Restrictions apply.

You might also like