The goal of this project is to design and build a GSM-enabled car tracker system with code. A nice car attracts everyone, including thieves. Car owners should exercise extreme caution when it comes to vehicle safety. Many safety devices are available on the market these days. The ‘alarming device’ is usually the most successful. Car alarms are useful, but they cannot provide complete satisfaction. Smart thieves know how to dismantle the most sophisticated car alarm security systems, and before the police can begin a search, thieves can export various parts of the car to countries such as China, and the owner may never know if that car ever existed on this planet. In that case, a A GSM-enabled car tracker system with a code can be a great way to ensure maximum safety. The GSM-enabled car tracker system is intended to allow users to control their vehicle from anywhere in the world using a mobile phone. If the vehicle is stolen, the user can deactivate it while the GSM network provider tracks the vehicle using the GSM tower triangulation network. A registered GSM SIM card with a MODEM is used to connect to the GSM network and serves as an interface between the vehicle and its owner. Other fundamental components used in the project’s construction include 9013 bipolar junction transistors, a controller IC, electromagnetic relays, 7812 and 7805 DC regulators, and light emitting diodes. diodes, (LED) (LED). It makes no difference whether the vehicle key is present or not, or whether the vehicle is in motion or not; the system must stop the vehicle. As a result, the risk of theft or car disappearance is greatly reduced, if not entirely eliminated.



1.1      Concept of Study

Over the years, automobile manufacturers have integrated various security systems into their vehicles to ensure that users have all of the security needed to ensure the vehicle’s safety. Companies recognize that their customers are always busy and have little or no information about lifestyle outside of their work place, given the lifestyle of the majority of users. According to their research, a large percentage of vehicle users use cell phones as their primary means of communication with their family, friends, and offices (Joann Muller) (2005-11-28,). This sparked the idea of creating a system that allows drivers and vehicle owners to maintain constant contact with the world outside their vehicle.

Since the concept of security has become a major concern for our world and for the majority of vehicle users, automobile manufacturers implemented the concept of vehicle security systems that could not only assist the human agent but could also provide all of the necessary security requirements without supervision.

As a type of vehicle security system, an Automobile Security System (ASS) combines the installation of an electronic device in a vehicle or fleet of vehicles with purpose-designed computer software to allow the owner to track the vehicle’s location while collecting data. A telecommunication system and method are used in this type of security system to instruct a device interfaced with a vehicle’s electrical system to activate or deactivate specific electrical devices.

Using a cellular network, such as the ignition, car lock system, and electronic fuel injector. This can be accomplished by using a mobile terminal or a unit containing the mobile terminal receiver, also known as a “GSM MODEM” or “Radio Interface Unit” (RIU), which is linked to a “Power Interface Unit” (PIU).

The PIU communicates directly with the vehicle’s electrical system and ignition. This system allows the vehicle owner to access the electrical system of their vehicle from a remote location simply by dialing the cellular phone number (a number associated with the RIU/GSM MODEM) from another mobile phone. When triggered, the RIU will either send SMS or phone calls to the vehicle user or receive instructions from the same user to activate or deactivate the vehicle.

Deactivate electrical devices based on the nature of the user’s instruction.

With ASS, the user can lock the doors, turn off the ignition, monitor the temperature, turn on the light, cut off the electronic fuel injector, and have different reactions for various situations.


There are numerous differentiating factors that can be used to categorize Automobile Security Systems, but in this work, we will categorize them under two major headings;

Systems that are intelligent.

Systems that are not intelligent.

We could further categorize it as microcomputer-based and non-microcomputer-based security systems.

Intelligent systems are security systems that include an intelligent device that monitors the space area or variable under guard and sends a response signal when there is a normalcy bridge. These systems are composed of digital devices such as microprocessors and microcontrollers, and they have a level of intelligence that allows them to measure the variables under surveillance. They may also be completely or partially unmanned. Sensors and transducers play an important role in the design of these systems. Sensors

The actual components that work with the processor to achieve a fully automated system are known as transducers.

Non-Intelligent Systems: Systems that lack a processor in their circuitry are classified as non-intelligent. This ranges from the manual crude method that relies on human effort and manually operated machines to the monitored cameras and laser monitoring intruder devices that sound alarms.


The goal and purpose of a car tracker system is to have a dependable and highly precise security means to ensure vehicle safety. If the vehicle is stolen, the device can make the search more efficient. Without a GSM-enabled car tracker system, there is a chance that a stolen vehicle will not be recovered. The goal of a GSM-enabled car tracker system is to provide users with the assurance that their vehicle will be restored in a timely manner.

1.3.2 SCOPE

When an authorized user calls the vehicle security number from a GSM mobile cell phone, the car tracker is used to immobilize or demobilize a vehicle. Only the coded users/numbers can use their GSM phone to control the vehicle. The car tracker’s GSM hardware system allows the mobile service provider to know the location of the vehicle anywhere in the world by using GSM tower triangulation.


Fleet operators commonly use automobile security systems for fleet management functions such as routing, dispatch, on-board information, and security. Along with commercial fleet operators, urban transit agencies use the technology for a variety of purposes, including monitoring bus schedule adherence, changing the destination sign displays at the end of the line (or other set location along a bus route), and triggering pre-recorded announcements for passengers. This could be referring to external announcements. As the bus approaches a stop, identify the next stop. Data collected as a transit vehicle travels its route is frequently fed into a computer program that compares the vehicle’s actual location and time with its schedule, resulting in a constantly updating display.

for the driver, indicating how early or late he or she is at any given time, potentially making it easier to adhere to the published schedule. These programs are also used to provide customers with real-time information about the wait time until the next bus arrives at a given stop. Some transit agencies offer a virtual map on their website, with icons depicting the current locations of buses in service on each route for the convenience of their customers.

Among the other applications are:

Stolen vehicle recovery, in which both consumer and commercial vehicles can be outfitted with Radio Frequency (RF) units to allow police to track and recover stolen vehicles. The tracking unit can be activated directly, and tracking signals are generated as a result.

To track or monitor the vehicle, contact the police or the vehicle’s owner.

Asset tracking, in which businesses that need to track valuable assets for insurance or other monitoring purposes can now plot the real-time asset location on a map and closely monitor the asset’s movement and operation status.

Field service administration Companies that use a field service workforce for services like repair or maintenance must be able to plan field workers’ time, schedule subsequent customer visits, and run this department efficiently. Vehicle tracking enables businesses to quickly locate and dispatch a field engineer to meet a customer’s request.

Surveillance: In this case, a tracker may be installed on a vehicle to track its movements.

Transit tracking: users ensure that the assets are in transit. To ensure asset security, do not stop on the routes or make a U-turn.


Any individual or group’s top priority is security. This section discusses car security in order to reduce security risks for car owners. The ultimate goal of the security system is to prevent intruders from gaining access to the monitored device. This protects the property of individuals, groups, and organizations. The alarming rise in theft and related intruder cases has necessitated the enhancement of security infrastructure.

A vehicle anti-theft device known as a ‘immobilizer’ reduces a thief’s chances of starting or driving away a target vehicle. Immobilizers typically consist of a switch wired into some parts of the vehicle’s electrical section, allowing the engine to be easily disabled.


Leave a Comment