•  
  •  
 

Keywords

Vehicle security; low-cost system; location change; theft detection

Document Type

Article

Abstract

Motor vehicle theft is a crime that can potentially harm the owner of the vehicle. This crime should be anticipated, and a security system should be implemented to avoid vehicle theft. Research about vehicle security systems has run into an uptrend. Previous research has already developed security system devices for vehicles with many peripherals. This study aims to develop a new low-cost vehicle security device with location change calculation to cut unused peripherals. The proposed device has a logic checker, horn controller, and vehicle controller as security systems. According to the testing result, the device can detect the vehicle status from off to on while the security system is active. The device will turn on the horn and turn the vehicle off. This function always works at 100%. This device also detects theft according to the location change. This feature works at a 100% rate, with an average error reading location of 4,83m and an average error distance calculation of 0,91m. This distance is tolerable because the owner can still see the vehicle. This research result proves that the device can be used to secure the vehicle. This device's performance will increase if placed outside the building. The data was also successfully sent to the IoT platform without data loss or incomplete data. Compared with other research, the proposed device has fewer peripherals with the same or more security features.

First Page

38

Last Page

51

Page Range

14

Issue

ISSN 2580-6424 (printed) | ISSN 2477-2399 (online)

Volume

Vol 9, No 1(2024)

Digital Object Identifier (DOI)

10.21831/elinvo.v9i1.65951

References

[1] BPS, Statistik Kriminal 2022. Badan Pusat Statistik, 2022. [2] R. Rohmadi, F. Rachman, and Y. Purwanti, “Pencurian Kendaraan Bermotor Ditinjau dari Aspek Krimnologi,” Viva Themis J. Ilmu Huk., vol. 2, no. 1, pp. 1–10, Sep. 2020, doi: 10.24967/vt.v2i1.766. [3] S. N. Christie, P. Yuliartini, and Dewa Sudika Mangku, “Tinjauan Kriminologis Terhadap Tindak Pidana Pencurian Kendaraan Bermotor Di Kota Singaraja,” J. Komunitas Yust. Univ. Pendidik. Ganesha Progr. Stud. Ilmu Huk., vol. 4, no. 1, pp. 119– 125, 2021. [4] S. Seriyanti, “Upaya Penanggulangan Pencurian Kendaraan Bermotor Yang Dilakukan Oleh Remaja,” Indones. J. Crim. Law, vol. 2, no. 1, pp. 56–64, Feb. 2020, doi: 10.31960/ijocl.v2i1.389. [5] M. A. Gustalika, S. Sudianto, D. C. Fransisca, F. M. Wibowo, M. A. Afandi, and R. D. Wahyuningrum, “Implementation of the Internet of Things for Flood Mitigation and Environmental Sustainability,” in 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), Nov. 2022, pp. 426–431, doi: 10.1109/COMNETSAT56033.2022.9994492. [6] A. K. Putri, A. Prakasa, and M. A. Afandi, “Sistem Pemantau Densitas Debu Gudang Elektronik: Perancangan dan Analisanya,” J. Telecommun. Electron. Control Eng., vol. 3, no. 2, pp. 81–86, Dec. 2021, doi: 10.20895/jtece.v3i2.367. [7] A. A. W. Aisyah, H. Pujiharsono, and M. A. Afandi, “Sistem Monitoring dan Kontrol Pakan Budidaya Ikan Lele menggunakan NodeMCU berbasis IoT,” J. Telecommun. Electron. Control Eng., vol. 4, no. 2, pp. 108–116, Jul. 2022, doi: 10.20895/jtece.v4i2.533. [8] N. F. N. Azizah, H. Pujiharsono, and M. A. Afandi, “Sistem Pengendali Suhu dan Kadar pH pada Kolam Ikan Lele Berbasis IoT pada Desa Kutaringin Kabupaten Banjarnegara,” JRST (Jurnal Ris. Sains dan Teknol., vol. 6, no. 1, p. 65, Nov. 2022, doi: 10.30595/jrst.v6i1.11693. [9] H. R. Maulida, F. T. Syifa, and M. A. Afandi, “Analisis dan Perancangan Prototipe untuk Memonitoring Lahan Perkebunan Teh menggunakan LoRa,” J. Telecommun. Electron. Control Eng., vol. 4, no. 2, pp. 117–127, Jul. 2022, doi: 10.20895/jtece.v4i2.538. [10] N. Maharani Raharja, M. Arief Fathansyah, and A. Nur Nazilah Chamim, “Vehicle Parking Security System with Face Recognition Detection Based on Eigenface Algorithm,” J. Robot. Control, vol. 3, no. 1, pp. 78–85, Oct. 2021, doi: 10.18196/jrc.v3i1.12681. [11] H. Isyanto, A. Solikhin, and W. Ibrahim, “Perancangan dan Implementasi Security System pada Sepeda Motor Menggunakan RFID Sensor Berbasis Raspberry Pi,” Resist. (elektRonika kEndali Telekomun. tenaga List. kOmputeR), vol. 2, no. 1, p. 29, May 2019, doi: 10.24853/resistor.2.1.29-38. [12] T. Juwariyah, D. Widiyanto, and S. Sulasmingsih, “Purwa Rupa Sistem Pengaman Sepeda Motor Berbasis IoT (Internet of Things,” J. Otomasi Kontrol dan Instrumentasi, vol. 11, no. 1, p. 49, May 2019, doi: 10.5614/joki.2019.11.1.5. [13] Astuti, Nuraeni Puji, R. Ritzkal, A. H. Hendrawan, and B. A. Prakosa, “Vehicle Security System using Short Message Service (SMS) as a Danger Warning in Motorcycle Vehicles,” J. Robot. Control, vol. 1, no. 6, 2020, doi: 10.18196/jrc.1642. [14] J. K. Maulidin, A. Hiswara, and R. Sari, “Designing Motorcycle Security System Using E-KTP Sensor and SMS Gateway,” PIKSEL Penelit. Ilmu Komput. Sist. Embed. Log., vol. 9, no. 2, pp. 161–172, Sep. 2021, doi: 10.33558/piksel.v9i2.3073. [15] K. Purwanto, Iswanto, T. Khristanto, and M. Yusvin, “Microcontroller-based RFID, GSM and GPS for Motorcycle Security System,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 3, 2019, doi: 10.14569/IJACSA.2019.0100357. [16] R. Ananda and M. Amin, “Use of KTP to Activate Start Motorcycle Engine with Module RC-522,” JURTEKSI (Jurnal Teknol. dan Sist. Informasi), vol. 9, no. 3, pp. 515–520, Jun. 2023, doi: 10.33330/jurteksi.v9i3.2495. [17] R. Muzawi, Y. Irawan, D. Akhiyar, and D. Setiawan, “Pattern Lock and GPS-Based Motorcycle Security System,” Int. J. Eng. Trends Technol., vol. 70, no. 3, pp. 185–194, Mar. 2022, doi: 10.14445/22315381/IJETT-V70I3P221. [18] B. Artono, T. Lestariningsih, R. G. P. Yudha, and A. A. Bachri, “Motorcycle Security System using SMS Warning and GPS Tracking,” J. Robot. Control, vol. 1, no. 5, 2020, doi: 10.18196/jrc.1531. [19] Chandra Husada, Kristoko Dwi Hartomo, and Hanna Prillysca Chernovita, “Implementasi Haversine Formula untuk Pembuatan SIG Jarak Terdekat ke RS Rujukan COVID-19,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 5, pp. 874– 883, Oct. 2020, doi: 10.29207/resti.v4i5.2255. [20] R. Hidayati and N. Mutiah, “Penerapan Metode Haversine Formula Pada Pencarian Lokasi Fasilitas Kesehatan Terdekat,” J. MEDIA Inform. BUDIDARMA, vol. 6, no. 1, p. 278, Jan. 2022, doi: 10.30865/mib.v6i1.3445. [21] A. Hakim and M. Saefudin, “Aplikasi Sistem Informasi Geografis Menggunakan Metode Haversine Formula Pencarian Rumah Kost Daerah Jakarta Selatan,” J. Inf. Syst. Informatics Comput., vol. 5, no. 2, p. 397, Nov. 2021, doi: 10.52362/jisicom.v5i2.640. [22] M. Liviandra, Z. K. A. Baizal, and R. Dharayani, “Conversational Recommender System for Impromptu Tourists to Recommend Tourist Routes Using Haversine Formula,” J. MEDIA Inform. BUDIDARMA, vol. 5, no. 4, p. 1224, Oct. 2021, doi: 10.30865/mib.v5i4.3229. [23] H. R. Hatta, M. H. Suroso, I. F. Astuti, D. M. Khairina, and S. Maharani, “Application of Haversine Formula in Education Game ‘Landmark Nusantara,’” 2021, doi: 10.2991/aer.k.210810.039. [24] S. Winoto, A. Fadlil, and R. Umar, “Penerapan Haversine Formula Pada Penerimaan Peserta Didik Baru Jalur Zonasi,” J. MEDIA Inform. BUDIDARMA, vol. 4, no. 1, p. 103, Jan. 2020, doi: 10.30865/mib.v4i1.1573. [25] U. Syaripudin, N. Fauzi, W. Uriawan, W. Z, and A. Rahman, “Haversine Formula Implementation to Determine Bandung City School Zoning Using Android Based Location Based Service,” 2020, doi: 10.4108/eai.11-7-2019.2303558.

Share

COinS