International Journal of Interactive Mobile Technologies (iJIM) – eISSN: 1865-7923 – Vol. 15, No. 04, 2021 Paper—Development of a Secured Vehicle Spot Detection System Using GSM Development of a Secured Vehicle Spot Detection System Using GSM https://doi.org/10.3991/ijim.v15i04.19267 Loay F. Hussein (), Anis Ben Aissa, Islam Abdalla Mohamed, Saed Alruwaili, Abdalazi Alanzi Jouf University, Sakaka, Kingdom of Saudi Arabia lfahmed@ju.edu.sa Abstract—The number of vehicles stolen is increasing annually. The alarm system for vehicles is commonly used to expose the burglars publicly to make a scene. If the vehicle owner is far away, it will be hard to distinguish the threat to the vehicle from the intruder. To deter such crime, there should be a safer pro- tection mechanism for vehicles around the globe. Moreover, overcrowd parking lot problems have always been an issue. Nevertheless, it became even worse with the progressing urbanization and population expansion. Anyone may have experienced that moment of panic when you realize you have no idea where you parked your vehicle. Note that, the keyless remote control of vehicles has a short-range radio transmitter. It usually can reach up 5–20 meters. Therefore, this paper develops a proposed system that is used for detecting vehicle location using Global System for Mobile Communications (GSM). It is basically capa- ble to switch ON and OFF vehicle alarm system to detect the location of the ve- hicle in a crowded area. PIC microcontroller that has been embedded in the sys- tem programmed using C language. The intelligent proposed system also de- signs to enhance the security feature for the transportation era. The proposed system offers better service and cost-effective for the vehicle owners. Keywords—GSM, SMS, PIC16F886 Microcontroller, Buzzer 1 Introduction In modern society, transportation is an essential element. Increased number of ve- hicles on the road continuously confirmed intelligent transport systems are inevitable. Recently, the automotive manufacturers companies are working and competing to- gether with substantial technology organizations to deliver the most exceptional, most comfortable, and most secure vehicles on the market. The existing vehicle alarm sys- tems have lock and alarm employed within vehicle. If a thief can manage to pick the lock, then it becomes easy for the thief to stop the alarm and steal the vehicle without the vehicle owner’s knowledge. To avoid such situations, there must be a better secu- rity system for the vehicle. Global System for Mobile Communications (GSM) and Short Message Service (SMS) technologies are frequently utilized for wireless data transmission [1-3]. The iJIM ‒ Vol. 15, No. 04, 2021 85 https://doi.org/10.3991/ijim.v15i04.19267 Paper—Development of a Secured Vehicle Spot Detection System Using GSM GSM module is a standard developed by the European Telecommunications Stand- ards Institute (ETSI). It possesses SIM card slot which can send any an informative SMS to the destination. Exploitation of these technologies have become popular more than ever before because it does not involve much cost. Moreover, it is convenient, offline, and accessible aspect of transmitting and receiving data with high reliability. The proposed controllable system includes a magnetic sensor which acts as a cau- tion call prior the robbery is been initiated. If the theft identified, alerted massage will be fed to a microcontroller which is interfaced with a GSM modem. The microcon- troller sends it to the concerned vehicle owner in the form of an SMS over GSM mo- dem. It also interfaced with relay which is immobilized the vehicle ignition system on demand. Adopting such technology will be highly useful to transport companies to keep protecting and detecting their vehicles. Also, in crowded areas the proposed system has the ability to detect the vehicle location by sending SMS from the owner’ cellular to trigger the alarm system with huge sounds. Briefly, the contributions of the proposed vehicle spot detection system are: - • To locate the position of the owner’s vehicle in crowd area. • To warn the vehicle owner if an invasion happens via the GSM module. • To activate the alarm system for the vehicle and defuse the engine in robbery time. The remaining of paper is arranged as follows: Section 2 investigates the related works, Section 3 introduces the proposed system overview, Section 4 describes the system design and the implementation, Section 5 conducts the results. Finally, the conclusion is covered in Section 6. 2 Related Works This section examines the previous selected research works that have been done. There are many distinct technologies were applied to control vehicles, especially when they have been hijacked. Some of the technologies are alarming system, IoT, password security, Arduino, face reorganization, GPS, deep learning, Cloud Compu- ting, RF communication, Radio-Frequency Identification (RFID) and so forth as in [4- 14]. Each technology technique is suitable with its function but in some system, Inter- net accessibility is need continuously. Failing to do so, the system can go down. Namely, without Internet connectivity, the system is useless because in some cases only google maps can display vehicle position. Samuel and Alexander developed anti-vehicle theft system using GSM and GPS with image acquisition. Their prototype has security button if it is not pressed after starting the engine, the vehicle will be immobilized. Then, E-mail comprising the image of the unapproved person and the co-ordinate of the vehicle will be sent to vehicle owner [15]. This research work [16] studies a vehicle tracking system which is used various sensors to discover alcohol consumption and identify the accident. The Sensor values can be monitored from a distance using thing speak channel. Furthermore, RFID 86 http://www.i-jim.org Paper—Development of a Secured Vehicle Spot Detection System Using GSM technology has been employed to simplify security to the vehicle tracking and anti- theft system. Kaustubh and Vibha [17] proposed a detailed study of the vehicle detection in dy- namic conditions. Various problems demonstrate the difficulty of vehicle identifica- tion in unpredictable road driving conditions. By transition in transport, the far undis- closed benefits of autonomous vehicles have an immense effect. These technologies have given cars with the ability to minimize energy usage, collisions, and emissions and to reduce the cost of congestion. In this work numerous collections of visual data such as ground, shadow, and light are represented eligible for car identification. One of the papers done by Muruganandham and P. Mukesh shows an active tech- nology that are built in order to achieve automated location of vehicles and can trans- fer position information in real time [18]. The vehicular monitoring system involves a hardware device installed in the vehicle unit and a remote monitoring server. The extracted information from GSM/GPRS/Server is available to approved owners of the system via website via the Internet. Authors in this paper [19] investigate the same pervious work, however the PHP-written web interface is used to connect directly to a database. The database table contains geographic coordinates and unique ID of the vehicle. Moreover, a mobile app was created to display a position on Google maps. A.Swapna et al. used the following technologies GSM, GPS and RF communication [20]. The authors proposed smart helmet and bike that make riders to drive more se- curely than before. Md. Marufi et al. [21] used an Arduino UNO board with At- mega328 microcontroller, GSM module and GPS receiver to monitor a moving vehi- cle and report the status of the vehicle. The proposed system will guarantee safety and security of vehicle, driver, and passengers. Through using the camera, it can further boost the vehicle tracking system built on Arduino to obtain a real-time view. In [22- 23], authors develop a theoretical model of GSM network-based vehicle tracking system and design simulation of vehicle lane tracking using Matlab. Sabah et al. [24] employs a new diagrammatic language in constructing a conceptual (non-technical) model of vehicle-tracking systems. The proposed tracking system uses Thinking Ma- chine (TM) which can be the foundation for building larger and more sophisticated advanced fleet management and optimization systems. A decent system has a certain margin of error, which is why it is an outstanding system if the system makes a minimal error. This work [25] tests the exactness of the location that is being dispatched to user when the vehicle on the run or stationary in the city. 3 The Proposed System Overview For all vehicle owners, automotive protection is a big concern. Vehicle owners as well as manufacturers companies are always looking for modern and upgraded vehi- cle safety features. In this section, the methodology for the proposed secured vehicle detection system is elaborated thoroughly. The new system can be mounted and concealed in vehicle without anyone noticing. The block diagram of the proposed system is presented in Figure 1. Putting together iJIM ‒ Vol. 15, No. 04, 2021 87 Paper—Development of a Secured Vehicle Spot Detection System Using GSM the pieces, the bird’s eye view for the proposed system is depicted in Figure 2. The block diagram consists of vehicle owner mobile phone, GSM module, microcontrol- ler, buzzer, relay, and magnetic sensor. Generally, the proposed system places into sleeping mode while the vehicle tapped by the owner otherwise it turns to active mode. The microcontroller acts as brain to the system. The relay used to immobilize the vehicle ignition system. Fig. 1. Block diagram of the proposed system Fig. 2. Bird’s eye view for the proposed system The GSM modem has a valid SIM card with a sufficient top-up amount to be able to send SMS and received ongoing call. Every wireless modems and dial-up modems, need an AT command to interact with a mobility device or computer machine. AT is 88 http://www.i-jim.org Paper—Development of a Secured Vehicle Spot Detection System Using GSM the abbreviation of Attention. These commands are instructions used to control a modem. “AT” or “at” begins every command line. The “AT” prefix tells the modem the command-line is begun. Namely, it is not portion of the AT command name. Two forms of AT commands exist: Basic commands and extended commands as well. The basic commands are AT commands that do not start with “+” such as D (Dial) and A (Answer). Whereas, the extended commands are AT commands that start with “+” such as +CMGS (Send SMS message), +CMGL (List SMS messages) and +CMGR (Read SMS messages). By the way, all GSM AT commands are extended commands. The proposed controllable system retains two fundamental operations modes. The first mode can be described as follows: In conjunction with crowd area, the owner can send SMS massage with “#” symbol to GSM module to activate the alarm in order to locate the vehicle. Also, the vehicle owner has another option which is the privilege to call the GSM SIM number directly to active the alarm. Figure 3 displays pseudo code for the detection and safety procedures of the proposed system. As we can see from the code below, if a call has been initiated by the vehicle owner, the GSM has to hangs up the call using “ATH” command. This command is known to end the voice call. Then, it will activate the buzzer and LED. Finally, the vehicle owner can send SMS message to GSM module with symbol “%” to switch on the relay or “$” to shut down the relay in order to turn on the vehicle engine. Fig. 3. Pseudo code for the detection and safety actions of the proposed system In contrary, the second mode is used for security purposes. It can be explained as follows: The vehicle owner receives a SMS threat notification massage from the pro- posed system in case the alarm system buzz sounds when the vehicle is tampered with and designates that intruder is in progress. Afterwards, the microcontroller initiations the relay to cripple the vehicle ignition system. Figure 4 depicts the pseudo code of the magnetic sensor loop. Whenever the magnetic sensor is off, the pull-up resistor is iJIM ‒ Vol. 15, No. 04, 2021 89 Paper—Development of a Secured Vehicle Spot Detection System Using GSM used to making sure that the voltage is well-defined even when the switch is open. As we can observe from the code below, while (1) is used for infinite loop. As soon as, the magnetic sensor has been triggered by intruder movement, the buzzer and LED will be enabled and followed by a warn SMS sending to the vehicle owner. Finally, the relay consequently will be turned on to disable the car engine. Fig. 4. Pseudo code of the magnetic sensor loop The pseudo code of sending the SMS message from GSM to the vehicle owner is shown in Figure 5. As we can noticed from the code, the AT+CMGS command has been used to send message with text “Car Security System Thief!” to the vehicle owner phone. Fig. 5. Pseudo code function of sending SMS from GSM to the vehicle owner 90 http://www.i-jim.org Paper—Development of a Secured Vehicle Spot Detection System Using GSM 4 System Design and Implementation In the development of the vehicle detecting system controlled by a microcontroller, hardware and software design techniques are needed [26]. Overall system is parti- tioned into four major design units. The main hardware units are the PIC16F886 mi- crocontroller, GSM modem module, buzzer and 5V relay. Besides that, the proposed system has magnetic switch and LM2596 step down voltage regulator module. These elements are briefly discussed below in this section. 4.1 PIC16F886 microcontroller The PIC16F886 microcontroller is an embedded controller made up by Microchip Technology as shown in Figure 6. It is powerful yet easy-to-program with. Also, it is one of the 8-bit microcontroller comes with 28 pins. Each pin can perform multiple functions. The PIC16F886 microcontroller is the most important unit in the proposed system. A typical microcontroller can be seen as a small computer which includes a processor, memory, and input/output (I/O) peripherals on a single chip. Essentially, the PIC16F886 microcontroller assembles input, processes this information, and out- puts a precise action based on the information collected. Fig. 6. PIC16F886 pinout diagram 4.2 SIM800L GSM module SIM800L Global System for Mobile Communications (GSM) module is a versatile tiny system with an external antenna and SIM card slot that maintains connection of voice, data, SMS, MMS, Fax, and Internet services support for TCP, UDP, HTTP and FTP as illustrated in Figure 7 [27]. It is used widely for common applications. The operating voltage of the chip is from 3.4V to 4.4V. The SIM800L GSM module doesn’t come with onboard voltage regulator. So, an external power supply adjusted iJIM ‒ Vol. 15, No. 04, 2021 91 Paper—Development of a Secured Vehicle Spot Detection System Using GSM to voltage is needed. The GSM module responds to AT command set. The AT commands are instructions used to control a modem. It is the abbreviation of attention. AT is the prefix that notifies the modem about the start of a command line. However, it is not part of the AT command name. There are two kinds of AT commands: basic commands and extended commands. The basic commands do not begin with “+”, whereas the extended commands are AT commands that start with “+”. Fig. 7. SIM800L GSM Module 4.3 LM2596 step down voltage regulator LM2596 step-down switching voltage regulator is suitable for acquiring a voltage lower than the input, with very high efficiency of up to 98%. Some termed it a buck converter circuit. The adjustable version can take in input voltage from 4.5V to 40V and transform it to fluctuating voltage sourcing up to of 3A of constants current. The LM2596 regulator is very user-friendly because it needs very limited number of parts. It has a multi-turn trimpot (potentiometer) that a person can utilize to modify the LM2596's output voltage. As, the potentiometer possesses 25 turns of regulation you can effortlessly alter the output of the module to exactly the voltage you require. In short, this voltage stabilizer circuit has the advantages of high efficiency and low heat. 4.4 Relay In the proposed system, a relay is an electromagnetic switch that integrates to PIC16F886 microcontroller in order to activate or deactivate the vehicle engine. It connects with 19, 20 and 22 pins of the microcontroller. This device managed by a reasonably small electric current that can turn on or off a much larger electric current. Numerous relays are protective in function. They were earlier used in the electric telegraph and Morse code. The essential operation of the relay is to make or break contact with the aid of a signal without any human engagement in order to switch it ON or OFF. Explicitly, if a relay contact is normally open (NO), then there is an open contact when the relay is not energized. Otherwise, if a relay contact is Normally Closed (NC), then there is a closed contact when the relay is not energized. Later this 92 http://www.i-jim.org Paper—Development of a Secured Vehicle Spot Detection System Using GSM device was improvised and applied in several applications such as switch starting coils, heating elements, pilot lights, audible alarms and prevent equipment damage. Lastly, the relay requires 5V DC supply for the coil voltage. 4.5 Buzzer Buzzer is an electronic signalling instrument that might be mechanical, electro- mechanical or piezoelectric. This beeper is very tiny and compact 2-pin structure thus can be clearly installed and manipulated on PCB or breadboard. In the proposed sys- tem, the buzzer is working in three cases: Received SMS from the vehicle owner, received ongoing call from the vehicle owner and the magnetic sensor is ON. 4.6 Schematic diagram and PCB design This sub-section represents the schematic diagram of the proposed system as shown in Figure 8. In addition, it displays the top and bottom PCB composite layer in Figure 9 and Figure 10 respectively. The PCB design is a natural and quick addition of the design process [28]. The power supply portion is very crucial for all electronic circuits. The incoming 12V will be regulated by LM2596 step down voltage regulator to feed the GSM as well as the microcontroller with 4V. Proteus, ISIS and ARES professional programs are used for drawing the schematic diagram and PCB of the proposed system. Fig. 8. Schematic diagram of the proposed system iJIM ‒ Vol. 15, No. 04, 2021 93 Paper—Development of a Secured Vehicle Spot Detection System Using GSM Fig. 9. Before and after top PCB composite layer Fig. 10. Before and after bottom PCB composite layer 94 http://www.i-jim.org Paper—Development of a Secured Vehicle Spot Detection System Using GSM 4.7 Flowchart Self-explanatory flowchart for the proposed vehicle spot detection system is pre- sented in Figure 11. It summarizes the operations steps for the proposed system. Pro- gramming of the system design is accomplished using MikroC Pro from Mikro- elektronika and PIC kit 2 software as well. The code for the proposed system begins by setting up and configuring the PCB components such as internal oscillator, com- parators, buzzer, LED, relay and magnetic sensor. Next, the GSM modem is going to be initiated by using AT+CMGF and AT+CNMI command. The AT+CMGF (Format Message) is used to choose the operating mode of the GSM modem or mobile phone. The parameter’s value may be either 0 or 1. The values 0 and 1 denote to SMS PDU mode and SMS text mode respectively. Additionally, the AT+CNMI command is used to show how to handle newly arrived SMS messages. Afterward, the code utiliz- es the AT command +CMGD (Delete Message) to erase the pervious SMS message(s) from message storage. The vehicle owner can send a “#” sign message or dial the SIM number of GSM to detect the location of the car. This will cause energizing the buzzer and LED. The magnetic sensor is designed to detect intrusion – unauthorized entry – into a vehicle. In time of robbery, a caution message will be sent to vehicle owner. Then, the microcontroller will trigger ON the buzzer, LED and relay to prevent the robbery. Eventually, the vehicle owner can control and immobilize the vehicle igni- tion system by sending “%” and “$” symbol signs to GSM in order to switch the relay ON or OFF, respectively. Fig. 11. Flowchart of the proposed system iJIM ‒ Vol. 15, No. 04, 2021 95 Paper—Development of a Secured Vehicle Spot Detection System Using GSM 5 Results At the beginning, the proposed system has been tested successfully in breadboard as illustrated in Figure 12. Fig. 12. The proposed system in breadboard Then, it has been built in a printed circuit board (PCB) for possible commercializa- tion. Once the proposed system gets started, the (Light Emitting Diode) LED will turn ON for a while in order to checkup the GSM module with the SIM slot are working perfectly as depicted in Figure 13. Fig. 13. The proposed system in PCB board 96 http://www.i-jim.org Paper—Development of a Secured Vehicle Spot Detection System Using GSM As we can see from Figure 14. whenever the magnetic sensor is switched ON indi- cating the robbery in progress, the alarm system “LED and Buzzer” will be activated and the relay will be started to immobilize the vehicle ignition system. Fig. 14. Opening the magnetic switch circuit Besides that, the vehicle owner’s mobile phone will receive intruder alert notifica- tion i.e., a SMS massage entitled with “Car Security System Thief!!!” as displayed in Figure 15. Fig. 15. Intruder alert notification Figure 16. shows the final assemble prototype for the proposed system. It helps any vehicle owner to detect the vehicle location in full packed areas by sending SMS text with “#” symbol. Otherwise, the vehicle owner could call the prototype fitted within the vehicle to trigger the alarm system for spot recognition. iJIM ‒ Vol. 15, No. 04, 2021 97 Paper—Development of a Secured Vehicle Spot Detection System Using GSM Fig. 16. The final prototype 6 Conclusion Wireless communications allow users the possibility of accessing to any sort of in- formation from anywhere and at any moment. This paper develops a secured vehicle spot detection system based on GSM with minimal hardware and software require- ments. Therefore, the anti-theft proposed system is very low-cost solution for public and private vehicles. Moreover, it offers a user friendly, easily installable and safety insurance benefits. The prototype has been implemented successfully. The obtained result validates that, the prototype works perfectly in case of detecting the vehicle spot in congested environment and guarding any vehicle from hijacking intruders. In con- clusion, this system should be considered for commercialization in automotive indus- try worldwide. 7 References [1] G. GU and G. Peng, “The survey of GSM wireless communication system,” in Proc. Inter- national Conference on Computer and Information Application (ICCIA), pp.121-124, Dec. 2010. https://doi.org/10.1109/ICCIA.2010.6141552 [2] S. Willassen, “Forensics and the GSM mobile telephone system,” International Journal of Digital Evidence, vol. 2, pp.1-17, Spring 2003. https://doi.org/10.1.1.76.8992 [3] J. Brown, et al., “SMS: The Short Message Service,” Computer, IEEE, vol. 40, pp. 106 - 110, Dec. 2007. https://dx.doi.org/10.1109/MC.2007.440 [4] A. Mohammad, “Hybrid GPS-GSM Localization of Automobile Tracking System,” Inter- national Journal of Computer Science & Information Technology (IJCSIT), Vol 3, pp.75- 85, Dec 2011. https://doi.org/10.5121/ijcsit.2011.3606 98 http://www.i-jim.org https://doi.org/10.1109/ICCIA.2010.6141552 https://doi.org/10.1.1.76.8992 https://dx.doi.org/10.1109/MC.2007.440 https://doi.org/10.5121/ijcsit.2011.3606 Paper—Development of a Secured Vehicle Spot Detection System Using GSM [5] V. Kaustubh, “Review of Vehicle Detection Systems in Advanced Driver Assistant Sys- tems,” Archives of Computational Methods in Engineering, Springer, vol. 27, pp. 591– 610, March 2019. https://doi.org/10.1007/s11831-019-09321-3 [6] H. Fathy, et al., “Finding a Parked Car Location in a Multi-Storey Building without GPS Service,” International Journal of Interactive Mobile Technologies (iJIM), Vol. 14, No. 10, pp. 7-21, 2020. https://doi.org/10.3991/ijim.v14i10.14385 [7] T. Tewari, et al, “Vehicle Detection in aerial images using Selective Search with a simple deep learning-based combination classifier,” In: 3rd International conference on microelec- tronics computing and communication systems (MCCS-2018), May 2018. https://dx.doi.org/10.1007/978-981-13-7091-5_21 [8] O. Aloquili, et al, “Automatic vehicle location tracking system based on GIS environ- ment,” IET Software, vol. 3, pp. 255-263, 2009. https://dx.doi.org/10.1049/iet-sen.2008. 0048 [9] P. Mashwama, et al., “Development of a Mobile Inter-Vehicular Communication System Based on Gossip Algorithm,” International Journal of Interactive Mobile Technologies (iJIM), Vol. 14, No. 11, pp.4-21. 2020. https://doi.org/10.3991/ijim.v14i11.12949 [10] L. Sommer, et al,” Fast deep vehicle detection in aerial images,” In: IEEE winter confer- ence on applications of computer vision (WACV), pp. 311-319, 2017. https://dx.doi.org/ 10.1109/WACV.2017.41 [11] R. Ramani, et al,” Vehicle Tracking and Locking System Based on GSM and GPS,” I.J. Intelligent Systems and Applications, vol. 9, pp. 86-93, August 2013. https://dx.doi.org/10.5815/ijisa.2013.09.10 [12] O. Peter, et al., “Vehicle Tracking System Using GPS-GSM Technology, “International Research Journal of Engineering and Technology (IRJET), vol. 5, pp. 1638-1641, July 2018. https://www.irjet.net/archives/V5/i7/IRJET-V5I7294.pdf [13] D. Josea, et al., “ Intelligent Vehicle Monitoring Using Global Positioning System and Cloud Computing,” 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15), Procedia Computer Science, vol. 50, pp. 440-446, 2015. https://doi.org/ 10.1016/j.procs.2015.04.012 [14] A. Saeliw, et al., “Smart Car Parking Mobile Application based on RFID and IoT,” Inter- national Journal of Interactive Mobile Technologies (iJIM), Vol. 13, No. 5, pp. 4-14, 2019. https://doi.org/10.3991/ijim.v13i05.1009 [15] S. Farayola and A. Zakari, “Design of Anti-Vehicle Theft System using GSM and GPS with Image Acquisition,” Asian Journal of Engineering and Technology, vol. 05, pp. 82- 92, August 2017. https://doi.org/10.24203/AJET.V5I4.4935 [16] A. Swapna, et al., “Secured Vehicle Safety System using GSM Technology, “ International Journal of Innovative Technology and Exploring Engineering, vol. 8, pp.832-836, April 2019. https://doi.org/10.35940/ijitee.F1167.0486S419 [17] V. Kaustubh, et al., “Review of Vehicle Detection Systems in Advanced Driver Assistant Systems,” Archives of Computational Methods in Engineering, pp. 591-610, 2019. https://doi.org/10.1007/s11831-019-09321-3 [18] M. Muruganandham and P. Mukesh, “Real Time Web based Vehicle Tracking using GPS,” World Academy of Science, Engineering and Technology, pp.91-99, 2010. https://doi.org/10.1.1.192.9391 [19] S. Lee, et al., “Design and Implementation of Vehicle Tracking System Using GPS/GSM/GPRS Technology and Smartphone Application,” IEEE World Forum on In- ternet of Things (WF-IoT), pp. 353-368, March 2014. https://doi.org/10.1109/WF -IoT.2014.6803187 [20] A. Mounika and A. Chepuru, “IOT Based Vehicle Tracking and Monitoring System Using GPS and GSM,” International Journal of Recent Technology and Engineering, vol. 8, pp. 2399-2403, September 2019. https://doi.org/10.35940/ijrte.B1275.0982S1119 iJIM ‒ Vol. 15, No. 04, 2021 99 https://doi.org/10.1007/s11831-019-09321-3 https://online-journals.org/index.php/i-jim/article/view/14385 https://online-journals.org/index.php/i-jim/article/view/14385 https://doi.org/10.3991/ijim.v14i10.14385 https://dx.doi.org/10.1007/978-981-13-7091-5_21 https://dx.doi.org/10.1049/iet-sen.2008.0048 https://dx.doi.org/10.1049/iet-sen.2008.0048 https://doi.org/10.3991/ijim.v14i11.12949 https://dx.doi.org/10.1109/WACV.2017.41 https://dx.doi.org/10.1109/WACV.2017.41 https://dx.doi.org/10.5815/ijisa.2013.09.10 https://www.irjet.net/archives/V5/i7/IRJET-V5I7294.pdf https://doi.org/10.1016/j.procs.2015.04.012 https://doi.org/10.1016/j.procs.2015.04.012 https://doi.org/10.3991/ijim.v13i05.1009 https://doi.org/10.24203/AJET.V5I4.4935 https://doi.org/10.35940/ijitee.F1167.0486S419 https://doi.org/10.1007/s11831-019-09321-3 https://doi.org/10.1.1.192.9391 https://doi.org/10.1109/WF-IoT.2014.6803187 https://doi.org/10.1109/WF-IoT.2014.6803187 https://doi.org/10.35940/ijrte.B1275.0982S1119 Paper—Development of a Secured Vehicle Spot Detection System Using GSM [21] M. Marufi, et al., “Real Time Google Map and Arduino Based Vehicle Tracking System,” International Conference on Electrical, Computer & Telecommunication Engineering, pp. 1-4, Dec.2016. https://doi.org/10.1109/ICECTE.2016.7879577 [22] M. Zaved, et al., “A Theoretical Model of GSM Network Based Vehicle Tracking Sys- tem.,” 6th International Conference on Electrical and Computer Engineering, pp. 594-597, Dec 2010. https://doi.org/10.1109/ICELCE.2010.5700762 [23] A. Nyein, et al., “Design and Simulation of Vehicle Lane Tracking Using Matlab, “Asian Journal of Engineering and Technology, vol. 2, pp. 185-190, April 2014. https://doi.org/10.6180/jase.2013.16.3.05 [24] S. Sabah, et al., “Tracking Systems as Thinging Machine: A Case Study of a Service Company,” (IJACSA) International Journal of Advanced Computer Science and Applica- tions, vol. 9, pp. 110-119, 2018. https://doi.org/10.14569/IJACSA.2018.091014 [25] M. Saaid, et al., “Vehicle Location Finder Using Global Position System and Global Sys- tem for Mobile,”5th Control and System Graduate Research Colloquium, IEEE, pp. 279- 284, Aug. 2014. https://doi.org/10.1109/ICSGRC.2014.6908737 [26] N. Matic, “BASIC for PIC Microcontrollers: The complete BASIC programming language manual for PIC microcontrollers,” pp. 1-163, Jan. 2003. http://scalak.elektroda.eu/html/ pliki/BasicforPICMicrocontrollers.pdf [27] J. Scourias, “Overview of GSM: The global system for mobile communications,” Dept. Comput. Sci., Univ. Waterloo, Waterloo, ON, Canada,Tech. Rep. cs-96-15, 1996. https://doi.org/10.1.1.42.6148 [28] L. David, “PCB Design Tutorial,” pp. 1-25, Jun. 2004. https://www.alternatezone.com . 8 Authors Loay F. Hussein received a bachelor degree in Electrical and Electronics Engi- neering (Computer Engineering) from university of science & technology, Sudan, 2005. Also, he received MSc degree and PhD degree in Computer and Information Engineering from International Islamic University Malaysia in 2011 and 2016, re- spectively. Meanwhile, he is working as an assistant professor in Jouf University from 2017 to till date. His research interest in the areas of Quality of Service in IP net- works, Network Security and Mobile Communications. E-mail: lfahmed@ju.edu.sa. Anis Ben Aissa received his B.S, M.S and Ph.D. in Computer Science from Tunis- El Manar University in 2005, 2007 and 2013, respectively. Currently, he is an Assis- tant Professor in Computer Science Department at Jouf University, KSA. E-mail: aabenaissi@ju.edu.sa. Islam Abdalla Mohamed received the B.Sc. and M.Sc. degrees from the Al Neelain University University, Sudan in 2007 and 2010. He received his Ph.D. degree in Information security from Al Neelain University, Sudan in 2015. Currently, work- ing as an assistant professor with Jouf University, Saudi Arabia. His research interest in information security and cyberattacks. E-mail: iaabass@ju.edu.sa. Saed Alruwaili Department of Computer Science, Jouf University, Saudi Arabia. E-mail: s3ad.056@gmail.com. Abdalazi Alanzi Department of Computer Science, Jouf University, Saudi Arabia. E-mail: azoozalfqeer@hotmail.com. Article submitted 2020-10-17. Resubmitted 2021-01-03. Final acceptance 2021-01-04. Final version published as submitted by the authors. 100 http://www.i-jim.org https://doi.org/10.1109/ICECTE.2016.7879577 https://doi.org/10.1109/ICELCE.2010.5700762 https://doi.org/10.6180/jase.2013.16.3.05 https://doi.org/10.14569/IJACSA.2018.091014 https://doi.org/10.1109/ICSGRC.2014.6908737 http://scalak.elektroda.eu/html/pliki/BasicforPICMicrocontrollers.pdf http://scalak.elektroda.eu/html/pliki/BasicforPICMicrocontrollers.pdf https://doi.org/10.1.1.42.6148 https://www.alternatezone.com/ mailto:lfahmed@ju.edu.sa mailto:aabenaissi@ju.edu.sa mailto:iaabass@ju.edu.sa mailto:s3ad.056@gmail.com mailto:azoozalfqeer@hotmail.com