Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm

ABSTRACT

Armed robbery is one of the most serious and potentially dangerous crimes committed in Nigeria today. A robber commits a hold up because he or she believes that their profit will be worth the risk. By decreasing the possible profit and increasing the risk of apprehension, potential victims can reduce their chance of becoming a target. Personal safety is always the most important consideration when planning how to react to an armed robbery. This material provides a device that can and will diminish robbery attact using GSM.

CHAPTER ONE

INTRODUCTION

Mobile security or mobile phone security has become increasingly important in mobile computing. Of particular concern is the security of personal and business information now stored on smartphones.

More and more users and businesses employ smartphones as communication tools, but also as a means of planning and organizing their work and private life.

All smartphones, as computers, are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of communication like Short Message Service (SMS, aka text messaging), Multimedia Messaging Service (MMS), Wi-Fi networks, Bluetooth and GSM, the de facto global standard for mobile communications.

Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps.

This work deals with the automatic armed robbery protective system using gsm, which is being used to prevent/control arm robbery.  The developed system makes use of an embedded system based on GSM technology. The designed and developed system is installed in home and the vehicle. An interfacing mobile is also connected to the microcontroller, which is in turn, connected to the engine. Once, the vehicle is being stolen, the information is being used by the vehicle owner for further processing. The information is passed onto the central processing insurance system, where by sitting at a remote place, a particular number is dialed by them to the interfacing mobile that is with the hardware kit which is installed in the vehicle. By reading the signals received by the mobile, one can control the ignition of the engine; say to lock it or to stop the engine immediately. Again it will come to the normal condition only after entering a secured password. The owner of the vehicle and the central processing system will know this secured password. The main concept in this design is introducing the mobile communications into the embedded system. The designed unit is very simple and low cost. The entire designed unit is on a single chip. When the vehicle is stolen, owner of vehicle may inform to the central processing system, then they will stop the vehicle by just giving a ring to that secret number and with the help of SIM tracking knows the location of vehicle and informs to the local police or stops it from further movement.

 

GSM warning device is associate warning device that operative through GSM (global system for mobile communications) network; not requiring a phonephone line. merely insert a SIM card and push the battery switch to ON, it’ll work by the mobile network. once the system discover intrusion, fire, or the other emergency, the sensors (eg. door sensor) or accessories (eg. panic button) can trigger the alarm, and therefore the GSM alarm can instantly motor vehicle dial one amongst 5 numbers that is pre-stored within the alarm, or send a brief message. The alarm can phone every range till a response is issued to prevent the alarm.

Fortunately, advancements in mobile phone technology have LED to the increase of GSM cellular home alarm systems, creating today’s security systems considerably more practical and sturdy. They’re conjointly that abundant more durable for a stealer to induce past to induce to you and your valuables.
A GSM cellular home warning device works during a fashion kind of like ancient systems, however with a twist. ancient systems have variety of sensors and/or cameras stationed around your house and property. once a window is opened, as an example, a sign is distributed across a wire to the system’s electrical device. The electrical device then would send a sign over your phonephone line to the alarm company.

Today, however, things square measure a trifle totally different. additionally to the cellular facet most of these access purpose sensors square measure currently wireless. meaning you don’t got to run a bunch of wiring everywhere your home simply to guard it. merely install the system and make certain to vary the batteries on those access points as required.
The big distinction, and therefore the one meaning the foremost to you, is that the portion of the system that sends the signal to the house security company currently depends on a cell signal rather than a conventional line to attach.
In fact, most cellular home alarm systems currently take things a step more. Not solely will the alarm signal travel the safety company via your mobile phone, however you will truly be ready to manage your system from your mobile phone. In some cases, you’ll dial the system’s mobile phone range and obtain a voice menu of choices. In alternative cases, you’ll truly manage your warning device from your smartphone.

1.1                                   AIM AND OBJECTIVE OF THE PROJECT

The aim of this project is to provide security to the restricted area even if the owner is anywhere in the world. For this purpose user can use any type of Mobile. This way it overcomes the limited range of infrared and radio remote controls.

1.2                                         SIGNIFICANCE OF THE PROJECT

 

Built-in PIR motion sensor

When intruders come into defense area, motion sensor will detect movements and trigger device to send message alerts to your phone. When intruders come into defense area, motion sensor will detect movements and trigger device to send message alerts to your phone.

 

 Video Recording

Just send a command message to the device and it will start video recording for 1-5 minutes. Flipwill be saved by default to TF card. After that, the device will be back to standby mode, waiting for next command to start recording.                          Picture Taking

Use you mobile phone to send a command message to the alarm camera to start taking picture, it will save picture to TF card.

1.3                                          APPLICATION OF THE PROJECT

GSM armed robber protective system is a widely used security device based on GSM/GPRS network and accessible all over the world. It is of easy installation, and can be remotely controlled by mobile phone anytime anywhere via SMS or GPRS command. This GSM security device can be used all over the world. With Android & IOS APP, All photos and commands can be sent via GPRS. You can also view all photos from our free service platform or APP. This device can be widely used for villas, shops, cars, hospitals, schools, financial offices, factory floors, oil and gas pipelines monitor, pumping stations.

1.4                                           LIMITATION OF THE PROJECT

When a smartphone is infected by an attacker, the attacker can attempt several things:

  • The attacker can manipulate the smartphone as a zombie machine, that is to say, a machine with which the attacker can communicate and send commands which will be used to send unsolicited messages (spam) via sms or email;
  • The attacker can easily force the smartphone to make phone calls. For example, one can use the API (library that contains the basic functions not present in the smartphone) PhoneMakeCall by Microsoft, which collects telephone numbers from any source such as yellow pages, and then call them. But the attacker can also use this method to call paid services, resulting in a charge to the owner of the smartphone. It is also very dangerous because the smartphone could call emergency services and thus disrupt those services;
  • A compromised smartphone can record conversations between the user and others and send them to a third party. This can cause user privacy and industrial security problems;
  • An attacker can also steal a user’s identity, usurp their identity (with a copy of the user’s sim card or even the telephone itself), and thus impersonate the owner. This raises security concerns in countries where smartphones can be used to place orders, view bank accounts or are used as an identity card;
  • The attacker can reduce the utility of the smartphone, by discharging the battery. For example, they can launch an application that will run continuously on the smartphone processor, requiring a lot of energy and draining the battery. One factor that distinguishes mobile computing from traditional desktop PCs is their limited performance.
  • The attacker can prevent the operation and/or starting of the smartphone by making it unusable. This attack can either delete the boot scripts, resulting in a phone without a functioning OS, or modify certain files to make it unusable (e.g. a script that launches at startup that forces the smartphone to restart) or even embed a startup application that would empty the battery;
  • The attacker can remove the personal (photos, music, videos, etc.) or professional data (contacts, calendars, notes) of the user.

1.5                                                 SCOPE OF THE PROJECT

When customer starts security device with an ease touch/push switch before moving out of office or house, to activate the device. It will activate the security sensors which are especially designed by Fortuner for critical applications. It alerts on security break and on any motion or movement in your office/house/car. it will immediately alert via call & message to owner.

Module device regularly sends the message and makes the call till the customer will not make the return call or message to the module.

As module recognizes the Movement, in same way it also senses the fire and smoke and makes the alert call and sms.

APA

Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm. (n.d.). UniTopics. https://www.unitopics.com/project/material/design-and-construction-of-an-automatic-armed-robbery-protective-system-using-gsm/

MLA

“Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm.” UniTopics, https://www.unitopics.com/project/material/design-and-construction-of-an-automatic-armed-robbery-protective-system-using-gsm/. Accessed 26 November 2024.

Chicago

“Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm.” UniTopics, Accessed November 26, 2024. https://www.unitopics.com/project/material/design-and-construction-of-an-automatic-armed-robbery-protective-system-using-gsm/

WORK DETAILS

Here’s a typical structure for Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm research projects:

  • The title page of Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm should include the project title, your name, institution, and date.
  • The abstract of Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm should be a summary of around 150-250 words and should highlight the main objectives, methods, results, and conclusions.
  • The introduction of Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm should provide the background information, outline the research problem, and state the objectives and significance of the study.
  • Review existing research related to Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm, identifying gaps the study aims to fill.
  • The methodology section of Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm should describe the research design, data collection methods, and analytical techniques used.
  • Present the findings of the Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm research study using tables, charts, and graphs to illustrate key points.
  • Interpret Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm results, discussing their implications, limitations, and potential areas for future research.
  • Summarize the main findings of the Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm study and restate its significance.
  • List all the sources you cited in Design And Construction Of An Automatic Armed Robbery Protective System Using Gsm project, following a specific citation style (e.g., APA, MLA, Chicago).