• Nenhum resultado encontrado

MMS Based Car Security System

N/A
N/A
Protected

Academic year: 2016

Share "MMS Based Car Security System"

Copied!
4
0
0

Texto

(1)

International Journal of Electronics and Computer Science Engineering 623

Available Online at www.ijecse.org ISSN- 2277-1956

ISSN 2277-1956/V2N2-623-626

MMS Based Car Security System

Surendra Sot

1

1 Department of Electronics and Communication Engineering 1 SRTMU Nanded, Maharashtra, India

1Surendra_sot@yahoo.co.in

Abstract- In This paper “MMS Based Car Security System” is being proposed to solve the issue. It introduces the integration between monitoring and tracking system. Both elements are very crucial in order to have a powerful security system. The system can send SMS and MMS to the owner to have fast response especially if the car is nearby. This paper focuses on using MMS and SMS technology. As soon as there is intrusion detected, first the SMS is sent to master user and the picture of the intruder will be sent via local GSM/GPRS service provider to user (and / or) police mail ID. The implementation and testing results show the success of prototype in sending MMS to owner within 30 seconds. The timing and results are suitable to owner and police to take suitable action against intruder. User can also control the module using command. User has to send different SMS to module while configuration of module for master. Master user can be change as per need, only master user can make changes in to the module.

Keywords – MMS, Security system, Mobile Application, Car Monitoring System, Tracking System

I.INTRODUCTION

Statistics show that the number of cars is increasing rapidly and so is the number of car theft attempts, locally and internationally [1]. Although there are a lot of car security systems that had been produced lately, but the result is still disappointing as the number of car theft cases still increases. The thieves are inventing cleverer and stronger stealing techniques that need more powerful security systems [2]. This paper “MMS Based Car Security System” is being proposed to solve the issue. It introduces the integration between monitoring and tracking system. Both elements are very crucial in order to have a powerful security system. The system can send SMS and MMS to the owner to have fast response especially if the car is nearby. This thesis focuses on using MMS and SMS technology [3-6]. As soon as there is intrusion detected, first the SMS is sent to master user and the picture of the intruder will be sent via local GSM/GPRS service provider to user (and / or) police mail ID. The implementation and testing results show the success of prototype in sending MMS to owner within 40 seconds. The timing and results are suitable to owner and police to take suitable action against intruder. User can also control the module using command. User has to send different SMS to module while configuration of module for master. Master user can be change as per need, only master user can make changes in to the module.

II.MBCSSMODELCONCEPTANDDESIGN

PIR sensor sense unauthorized access of car. GPRS /GSM module’s I/O port get activated. Module sends SMS to master user (i.e. “Intrusion Detected”), Camera gets activated and takes image of intruder. Module also sends MMS to Master user and to the police mail ID after taking image. Master user can control GPRS/GSM module through SMS command. There is security code for master user. Master user can edit master user number, police mail ID. Module also make call to master user, after receive that call user can listen conversation. MMS received on police mail id is used for investigation. Police will compare image of intruder with their data base.

(2)

IJECSE,Volume2, Number 2

Surendra Sot

et al.

624

ISSN 2277-1956/V2N2-623-626

Figure 1. MBCSS Model Flow

III.MBCSSMODEL IMPLEMENTATION AND TESTING

A. Setting for Master User–

Fist we connect power supply to the MBCSS model. Wait until blinking of LED stop, it takes 20 to30 sec. During this time network get initialize, again wait for 10 sec to initialize application which in module. Fist send message “#00#1234” to MBCSS module for setting master user. Where 1234 is default password set for module. Master user can change password.

After setting master we have to do the mms setting. In MMS setting we have different command to set number on which master user expect MMS. To setting number for MMS we have to send message “#14#+91****10 digit mobile number***”.

Figure 2. Setting Destination Mobile Number

To set mail ID send message “#15#Mail_ID”. To change mail ID send same message with new mail ID.

(3)

625

MMS Based Car Security System

ISSN 2277-1956/V2N2-623-626

B. Intrusion Detected and Receiving MMS on Mobile phone and Mail ID-

As soon as MBCSS model receive high signal on I/O port from PIR sensor, it send SMS to master as” Intrusion Detected” first and then it send MMS to master. From the result it is proved that 40 sec is required to receiving MMS after intrusion occurs.

Figure4. Received MMS on Mobile Phone

As soon as MBCSS model receive high signal on I/O port from PIR sensor, it send MMS to the police mail ID. The intruder photo will receive on police mail ID within 4 minutes.

Figure5. Received MMS on Mail ID

IV.CONCLUSION

(4)

IJECSE,Volume2, Number 2

Surendra Sot

et al.

626

ISSN 2277-1956/V2N2-623-626

V.REFERENCE

[1] Hameed, S.A.; Khalifa, O.; Ershad, M.; Zahudi, F.; Sheyaa, B.; Asender, W.; , "Car monitoring, alerting and tracking model: Enhancement with mobility and database facilities," Computer and Communication Engineering (ICCCE), 2010 International Conference on , vol., no., pp.1-5, 11-12 May 2010.

[2] http://www.interpol.int/Public/Vehicle/Default.asp(Feb2010)

[3] Ni, S.; Haggman, S.-G.; , "GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems," Wireless Communications and Networking Conference, 1999. WCNC. 1999 IEEE , vol., no., pp.1417-1421 vol.3, 1999.

[4] B. Yusekkaya, A. A. Kayalar, M. B. Tosun, M. K. Ozcan, and A. Z.Alkar, “A GSM, internet and speech controlled wireless interactive home automation system,IEEE Trans. Consumer Electron., vol. 52,no. 3, pp. 837-843, Aug. 2006.

[5] Regis J. B. Bates, (2001), GPRS: General Packet Radio Service, McGraw-Hill Professiona, New York.

[6] Gwenaël Le Bodic, (2003), Multimedia Messaging Service: An Engineering Approach to MMS, Wiley; 1 edition, Washington. [7] http://garefowl.manufacturer.globalsources.com/si/6008825952750/pdtl/Mobile-wireless/1003820826/MMS-GPRS-Modem.html [8] http://www.sierrawireless.com/productsandservices/AirPrime/Embedded_Modules/Q_Series.aspx

[9] http://www.sierrawireless.com/productsandservices/AirPrime/Embedded_Modules/Q_Series/Q2686.aspx

[10] http://www.sierrawireless.com/en/sitecore/content/Sierra%20Wireless/Support/Downloads/AirPrime/Q_Series/AirPrime_Q2686.aspx [11] http://www.sierrawireless.com/en/productsandservices/AirPrime/Sierra_Wireless_Software_Suite.aspx

Referências

Documentos relacionados

The cost differences for every new solution are determined and ordered, the first difference being added to the current value and the corresponding solution is sent to a local search

São todo o tipo de exercícios que tem um menor numero de jogadores em jogo, em que as condições de espaço e de tempo devem ser adequados á situação proposta e

Foi-me apresentado para assinar o contrato para professor extraordinário da secção de História e Filosofia da Faculdade de Letras da Universidade de Lisboa, válido de 7

E sseendo todo ujsto pello dicto almoxariffe mandou ao dicto cabidoo sse se quissese escusar de pagar o dicto ujnho que çitasse os herdeiros d afomso

A mais conhecida delas talvez seja aquela onde Kierkegaard está no centro do universo e todas as demais coisas gravitam ao seu redor, o periódico aponta que

Nesse contexto, os objetivos do presente estudo foram: a) avaliar, mediante uma análise de variância de medidas repetidas, se existem diferenças estatísticas na geração

Pese embora o desiquilíbrio na frequência de ocorrência, com uma proporção de 4,6 cheias para 1 de movimentos de massa, os dois tipos de fenómenos possuem índices de

The routing algorithm minimizes the distance to a target on a step by step form, in every street crossing. This is done under a hierarchic street level structure that