You are on page 1of 21

ABSTRACT

The electronic toll collection system (ETC) is a wireless communication system to execute the automatic payments of transportation fee without stopping a toll gate in express ways. In the system, reflected, distracted, shadowed waves by the Canopy, wall, or booth, and interference waves from neighboring lanes may cause the problems in system operations. To suppress the undesired waves mentioned above, radio absorbers are installed on the whole surfaces of toll gates. But, the function of radio absorbers may be degraded by aging deterioration, and the function of radio absorbers should be maintained for the sustainable usage of the ETC. Then, the system which can evaluate the performance of radio absorbers is needed. In this background, the thesis proposes the radio propagation paths measurement system, which can identify the radio propagation paths in the real time measurement by using the ETC signal. Undesired radio paths enable us to find the radio absorbers degraded. This process can be done by using smart card technique. The SMARTCARD BASED TOLL-GATE will work on the principle on the contact type communication between the smart card and the reader. The microcontroller will checks the balance present on the smartcard and displayed on the LCD. The Smart Card used in this project is of Contact type. The Contact less type Smart Cards can be used by which the need to insert the Smart card can be avoided. The data stored on the smart card which resembles the information of a person is read by the smart card reader.

TABLE OF CONTENTS
CHAPTER
1. 2.

TITLE
INTRODUCTION DESIGN PROCEDURE 2.1.OVERVIEW 2.2. HARDWARE MODULE 2.3.SOFTWARE MODULE 2.4.ABOUT SMART CARDS 2.5. TYPES OF SMART CARDS CHARACTERIZATION OF ELETRONIC TOLL COLLECTION SYSTEM 3.1.ETC AND CREDIT-BASED PAYMENTS 3.2.REQUIREMENTS OF ETC 3.3.PROPERTIES OF ETC CURRENT APPLICATIONS ADVANTAGES CONCLUSION THE FUTUTE SCOPE

PG.NO

3.

4. 5. 6. 7.

LIST OF FIGURES
FIG.NO
2.2

TITLE
BLOCK DIAGRAM OF SMART CARD BASED TOLL GATE SYSTEM 2.2(a) PIN DIAGRAM OF 8052 MICRO CONTROLLER 2.2(b) SMART CARD READER ARCHITECTUTE OF SMART CARD 2.4(a) SMART CARD PIN OUT TYPES OF SMART CARDS 2.5(a) CONTACT SMART CARD 2.5(b) CONTACT LESS SMART CARD OS SUB SYSTEM

PG.NO

2.4

2.5

4.0

CHAPTER 1
INTRODUCTION
In our daily life we are seeing toll gate. We are going to pay certain amount to the government in form of tax through this toll gate. We can see this toll gates being placed in some national high ways etc., So in order to pay tax we are normally going to pay in form of cash, but instead of that as the technology is growing we can make use of smart card which is nothing but like a memory card in which we are going to store the details of particular person and certain amount. The main objective is to pay the toll gate tax using smart card. Smart card must be recharged with some amount and whenever a person wants to pay the toll gate tax, he needs to insert his smart card and deduct amount using keypad. By using this kind of projects there is no need to carry the amount in form of cash and so we can have security as well. These electronic toll Collection systems are a combination of completely automated toll collection systems (requiring no manual operation of toll barriers or collection of tolls) and semi-automatic lanes. Various traffic and payment data are collected and stored by the system as vehicles pass through. The different technologies involved are logically integrated with each other but remain flexible for upgrades. They also include sophisticated voilation enforcement. Some of the security components included are: Real-time toll plaza surveillance system Automatic vehicle identification system(based on in-road sensors) License plate recognition Zoom capability on captured images Laser based Toll Audit Systems The system effectively correlate captured video imageswith toll transaction data to provide a state-of-the-art,accurate and cost-effective violation enforcement system.Other benefits of the toll collection system's softwareinclude flexible database searches, easy data storage, and configurable archive management. Fully automatic tolling includes multiple paymentoptions (cash, smart card, debit card). Lanes at the tollplaza can be configured for optimal trafficmanagement, including some which are restricted topure electronic tolling and others which use manual fare collection.

CHAPTER 2
TRENDS
Up to now we are using the contact type smart cards. But during the latest trends contact less smartcards are also introduced it will work on the RF FREQUENCIES with the help of these smartcards there is no need to insert the smartcard in the reader it will read the smartcard from the distance also both the smartcard and the smartcard reader will have Transmitter and the Receiver so therefore it will mutually transfer the information not only that it is very fast compare to the contact type smartcards. A New type of system has been introduced which is SMARTCARD BASED TOLL GATE AUTOMATED SYSTEM, Smart card must be recharged with some amount and whenever a person wants to pay the toll gate tax, he needs to insert his smart card and deduct amount using keypad. By using this kind of projects there is no need to carry the amount in form of cash and so we can have security as well. What is a smart card? A smart card is a piece of plastic, the same size as a credit or debit card, with a silicon chip embedded in it. The chip contains a microprocessor, which is a miniature computer which can perform calculations and store data in its memory. These chips hold a variety of information, from stored (monetary)-value used for retail and vending machines, to secure information and applications for higher-end operations such as medical/health care records. New information and/or applications can be added depending on the chip capabilities. The card is "smart" because it is "active", that is that it can receive information, process it and then "make a decision". For example, when a smart card is inserted in a terminal, the terminal sends its "digital signature" to the microprocessor. If the digital signature agrees with the existing parameters in the processor's memory, then the memory files are opened and the data made visible to the terminal. In the same way, the card sends its "digital signature" to the terminal and the terminal's microprocessor verifies it. This mutual verification is done off-line, this means that the terminal is not connected to the system's central computer, known as the host. The verification process typically takes a fraction of a second. In addition to digital signatures, Personal Identification Numbers (PIN) and hand written signatures can be used.

2.1 Overview smartcard will work on the principle on the contact type communication between the smart card and the reader. Whenever a smart card is inserted in to the smartcard reader the reader will read the data which is present on the smartcard, and this information is transferred to the microcontroller through the RS232 the microcontroller will checks the balance present on the smartcard and displayed on the LCD. The linear keypad is provided to select according to the type of the vehicle, with the given keys and the amount will deducted from the smartcard and the microcontroller send the signal to the H-bridge now the H-bridge will rotate the motor in anticlockwise after some delay it will rotate in clockwise. 2.2 Hardware Module Micro controller Power supply Smart card and reader LCD Reader Buzzer Gate

POWER SUPPLY

LCD

SMART CARD READER

MICRO CONTROLLER
GATE

KEYPAD

FIG.2.2 Block Diagram Of Smartcard Based Toll-Gate System

Power supply In this system we are using 5V power supply for microcontroller of Transmitter section as well as receiver section. We use rectifiers for converting the A.C. into D.C and a step down transformer to step down the voltage. The full description of the Power supply section is given in this documentation in the following sections i.e. hardware components. Microcontroller (8052) Work the micro-controller is playing a major role. Micro-controllers were originally used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now also being used in regulators for individual control loops. In several areas Micro-controllers are now outperforming their analog counterparts and are cheaper as well. It is assumed that a Microcontroller with reasonable software is available for computations and simulations so that many tedious details can be left to the Microcontroller. The control system design is also carried out up to the stage of implementation in the form of controller programs in assembly language OR in C-Language.

FIG.2.2(a) Pin Diagram Of 8052 Micro controller

Smart Card Reader The Smart card reader is a device which reads the smart card being inserted into it. The data stored on the smart card which resembles the information of a person is read by the smart card reader. The card reader communicates with microcontroller using serial communication

FIG.2.2(b) Smart card Reader Keypad Section This section consists of a Linear Keypad. This keypad is used to enter the amount to deduct from smart card. The keypad is interfaced to microcontroller which continuously scans the keypad. LCD Display Section This section is basically meant to show up the status of the smart card. This smart card makes use of Liquid Crystal Display to Display or prompt for necessary information. 2.3 SoftWare Modules EMBEDDED C: UNSIGNED CHAR

The unsigned char is an 8-bit data type that takes a value in the range of 0-255(00-FFH). SIGNED CHAR

The signed char is an 8-bit data type that uses the most significant bit (D7 of D7-D0) to represent the or + values. As a result, we have only 7 bits for the magnitude of the signed number, giving us values from -128 to +127. UNSIGNED INT

The unsigned int is a 16-bit data type that takes a value in the range of 0 to 65535 (0000-FFFFH). It is also used to set counter values of more than 256.

SIGNED INT

Signed int is a 16-bit data type that uses the most significant bit (D15 of D15-D0) to represent the or + value. As a result we have only 15 bits for the magnitude of the number or values from -32,768 to +32,767. 2.4 About Smart Card The basic components of the smart card subsystem are based on PC/SC standards. These basic components include:

A resource manager that uses a Win32 application programming interface (API). A user interface(UI) that works with the resource manager. Several base service providers that provide access to specific services. In contrast to the resource manager's Win32 API, service providers use a COM interface model to provide smart card services.

The following illustration shows the relationships of these components in the overall smart card architecture.

FIG.2.4 Architecture of smart card Signals VCC Power supply RST Reset signal, used to reset the card's communications. CLK Provides the card with a Clock Signal, from which data communications timing is derived. GND Ground (reference voltage). VPP ISO/IEC 7816-3:1997 designated this as a programming voltage - an input for a higher voltage to program persistent memory (e.g EEPROM) I/O Serial input and output (half-duplex). C4, C8 The two remaining contacts are AUX1 and AUX2 respectively, and used for USB interfaces and other users

FIG.2.4(a) Smart Card Pinout

2.5 Types of Smart Cards There are two general categories of smart cards: contact and contactless.

FIG.2.5 Contact smart card A contact smart card must be inserted into a smart card reader with a direct connection to a conductive contact plate on the surface of the card (typically gold plated). Transmission of commands, data, and card status takes place over these physical contact points.

FIG.2.5(a) Contact less smart card A contactless card requires only close proximity to a reader. Both the reader and the card have antenna, and the two communicate using radio frequencies (RF) over this contactless link. Most contactless cards also derive power for the internal chip from this electromagnetic signal. The range is typically one-half to three inches for non-battery-powered cards. Two additional categories of cards are dual-interface cards and hybrid cards. A hybrid card has two chips, one with a contact interface and one with a contactless interface. The two chips are not interconnected. A dual-interface card has a single chip with both contact and contactless interfaces. With dual-interface cards, it is possible to access the same chip using either a contact or contactless interface with a very high level of security. The chips used in all of these cards fall into two categories as well: microcontroller chips and memory chips. Cards that use memory chips depend on the security of the card reader for

processing and are ideal for situations that require low or medium security. A microcontroller chip can add, delete, and otherwise manipulate information in its memory.

CHAPTER 3
CHARACTERIZATION OF ELECTRONIC TOLL COLLECTION SYSTEM
DSRC (Dedicated Short range Communication) is typically used as the primary method of charging where a charge is to be applied at one of a discrete number of points such as a toll plaza(an area where tollbooths are located) or a location on the open highway. The Rationale for Electronic Toll Collection ETC systems take advantage of vehicle-to-roadside communication technologies (traditionally via microwave or infrared communication, more recently via GPS technology) to perform an electronic monetary transaction between a vehicle passing through a toll station and the toll agency. Electronic Toll Road Systems in USA and some European Member States using microwave technology have functioned independently. The telematics systems are implemented in some states, an example being Hitachi System (Japan), as well as Barouh System (Taiwan), which provide the function of electronic road toll for highways and expressways and additionally function of transferring data from digital tachographs. Credit-Based Payment For ETC 3.1 ETC and Credit-Based Payments In ETC, users can complete their payment for their use of the road simply by passing the toll gate. Technologies for ETC are regarded to be quite important in terms of efficiency of tracs. Namely, if we can realize the safe communication between toll gates and cars within limited time for communications, trucks on the road can work much more smoothly. Although such systems have already been realized using prepaidbased payments, their functions are not enough. Usually, prepaid cards are emitted not as generalpurpose cards but limited to certain systems. It will be hard to convince users of ETC systems if they have to use separate prepaid cards for each tollgate operation. Furthermore without a general-purpose prepaid card system, procedures to join such systems must be specified for each system individually. Then, however, users might be reluctant to join ETC systems. These disadvantages might bring problems in the ETC. However, credit-based payments are available for many purposes. And, since there are already a lot of creditcard holders in the world, they can easily join the system. Hence, if creditbased payment can be realized in ETC, the system will be more e cient. Although credit-based payments have a number of advantages over other payment systems in terms of its simplicity, openness and so on, there seems to be a consensus among both researchers and practitioners regarding the relative ine ciency of the protocol. Namely, since messages in credit-based payments

consist of simple contents, they must be sent with high authenticity and confidentiality by using cryptographical tecniques.

Conventional credit-based payment systems (e.g. SET , CyberCash ) use public-key cryptosystems for this purpose. As well known, public-key cryptosystems require a large amount of computation time. Thus, when a conventional credit-based payment system is applied to ETC straightforwardly, it seems to be di cult to finish the communication between a toll gate and a car while the car passes the gate. Furthermore, toll gates also have to communicate with the credit company during the communications. The total time for communications is estimated to be 100ms. There has already been an attempt to solve this problem by using new cryptographical techniques such as elliptic curve cryptosystems or signcryption]. These technologies make the credit-payment systems much more e cient . Nevertheless, their performance is considered to be too low to work e ectively in ETC; so still computers with high performance are required even if these technologies are used. In this article, we propose an optimized credit-based payment system for ETC requirements into account. 3.2 Requirements for ETC In order to carry out credit-based payment system for ETC e ciently, some requirements must be fulfilled. These are shown below

A users computational power is assumed to be low. The computational power of the toll gates is also assumed to be low. Communications should be limited to a number as small as possible. Messages between users and toll gates must be kept secret and authenticated. Users privacy should be protected if possible.

Typically in ETC, the available time for processing a payment is limited to approximately 100ms in total. Extensive computations take a lot of time and therefore attention must be paid. This holds in particular for the car, where we can only assume computers with low performance such as IC cards. But also for the toll gates no computers with high computation power are expected because this reduces the costs for the equipment. Is also a consequence of the strictly limited time for communications and are usual requirements in many payment systems. When the system is constructed to be able to detect users illegal behavior more easily, users privacy is also revealed more easily. Such tradeo can be regarded as the general problem in all of the electronic payment systems. In our system, of course, we have to consider it carefully. The cryptographical algorithms and protocols at present allow to fullfill these requirements only with prepaid cards. Elliptic curve cryptosystems are 10 times faster than RSA, but still they are to slow to make contactless

payments with credit cards feasible. Therefore here a di erent approach is proposed based on the KPS. This allows to implement creditbased ETC using IC cards.

3.3 Properties of ETC ETC possesses some useful properties. Our optimization of credit-based payment for ETC is based on them. Property 1. Payment procedures are executed when car and toll gate meet. Property 2. The users cars can be clearly identified by unique information (e.g. number plates, shapes, colors and so on) . Property 3. All the users that passed an entrance toll gate also have to pass an exit toll gate. Thus,indicate that toll gates can obtain the unique information of users that want to use the road operated by the toll gates. Since these users unique information can be regarded as their identifiers, we can apply an ID-Based key cryptosystem to ETC. Assuming that users personality is not detected by using the users unique information, the users privacy can be protected. Besides, it indicates that toll gates have extra time to detect a users illegal behavior that could not be detected at the entrance toll gate. If the illegal behavior of a user is detected while the user is being on the road, he can be stopped when passing the exit toll gate

CHAPTER 4
CURRENT APPLICATIONS
A smart card, as mentioned above, is a portable computational device with data storage ability. As such, they can be a very reliable form of personal identification and a tamper-proof, secure information repository. The main possible applications of smart cards are the following:

Payphones
Out of the United States there is a widespread use of payphones equipped with card readers rather than p; or in addition to p; coin recognition and storage. The main advantages are that the phone company does not have to collect coins, and the users do not have to have coins or remember long access numbers and PIN codes. Smart cards have the further advantage over magnetic stripe cards of being reloadable, and allowing advanced features like phone banking automatic memory dailing and on-line services.

Mobile communictions
Smart cards are used as identification device for GSM digital mobile phones. The card stores all the necessary information in order to properly identify and bill the user, so that any user can use any phone terminal.

Electronic purse
A smart card can be used to store a monetary value for small purchases. Card readers retrieve the amount currently stored, and subtract the amount for the goods or services being purchased. Groceries, transportation tickets, parking, laundromats, cafeterias, taxis and all types of vending machines are only some of the purchases that often do not reach amounts to justify the hassle of using a credit card. Radio-read smart cards will allow the free flow of people through transportation systems, avoiding the need of ticketing machines or validation gates. ID verification and Access control The computational power of smart cards allows running mutual authentication and publickey encryption software in order to reliably identify the bearer of the card. For higher security needs, a smart card is a tamper-proof device to store such information as a user's picture or

fingerprints. Smart cards can be used also for network access: in addition or in alternative to user IDs and passwords, a networked computer equipped with a smart card reader can reliably identify the user.

Health Care
Smart cards allow the information for a patient's history to be reliably and safely stored. Health care professionals can instantaneously access such information when needed, and update the content. Instant patient verification allows immediate insurance processing and refund. Doctors and nurses themselves can carry smart card-based IDs that allow secure, multi-level access to private information.

O S Security
Data on Smart Cards is organized into a tree hierarchy. This has one master file (MF or root) which contains several elementary files (EF) and several dedicated files (DF). DFs and MF correspond to directories and EFs correspond to files, analogous to the hierarchy in any common OS for PCs. However, these two hierarchies differ in that DFs can also contain data. DF's, EF's and MF's header contains security attributes resembling user rights associated with a file/directory in a common OS. Any application can traverse the file tree, but it can only move to a node if it has the appropriate rights.

FIG.4.0 OS subsystem

CHAPTER 5
ADVANTAGES
ADVANTAGES Can store up to thousands of times of the information than the magnetic stripe card. Can be disposable or reusable. Performs multiple functions. Has wide range of applications (e.g., banking, transportation, healthcare...) Compatible with portable electronics (e.g., PCs, telephones...) Evolves rapidly applying semi-conductor technology

Smart Cards can hold a large amount of personal information,from medical/health history to personal banking and personal preferences They can carry all necessary functions and information on the card.

Other general benefits of smart cards are:


Portability7 Increasing data storage capacity Reliability that is virtually unaffected by electrical and magnetic fields.

CHAPTER 6
CONCLUSION
Most of the smart cards these days are capable of running java codes, because the minimum requirement for that is 16K of ROM, 8K of EEPROM and 256 RAM . Most of the iButton has a 64 Kbytes RAM, 134 ROM and can store over 30 certificates with 1024-bit keys using ISO X.509v3, the most widely recognized publickey certificate format. In both smart cards and intelligent tokens the maximum ROM is 64 Kbytes and the minimum is 24 Kbytes in smart cards. ROM in other hand has a maximum of 134 Kbytes in intelligent tokens and a minimum of 512 Bytes in some smart cards. The maximum EEPROM is 8 Kbytes in smart cards and the minimum is 2.25 Kbytes in smart cards also. I did not find any information about EEPROM with Intelligent tokens. I would like to mention that the blank places in above tables means that this feature hasnt been given for that item. I have found many sites that have smart cards and intelligent tokens features, but I have included only those sites that give at least two features and I tried to join items that have relatively the same features and manufacturer in one group, like the Hitachi semiconductors smart cards. I think the use of smart cards will increase in the future especially the contact-less type and also the use of intelligent tokens.

CHAPTER 7
THE FUTURE SCOPE
The important thing about Smart Cards is that they are everyday objects that people can carry in their pockets, yet they have the capacity to retain and protect critical information stored in electronic form. The smartness of Smart Cards comes from the integrated circuit embedded in the plastic card. Embedding similar circuits in other everyday objects, such as key rings, watches, glasses, rings or earrings, could perform the same electronic function. The development of contactless card technology was the catalyst for what is known as tags. Tags function like contactless Smart Cards but are in the form of a coin, a ring or even a baggage label. They are generally attached to objects such as gas bottles, cars or animals and can hold and protect information concerning that object. This allows the object to be managed by an information system without any manual data handling. The use of Biometrics will soon mean that his/her hand, fingerprint and the retina of the eye or the sound of the voice can reliably identify a person. Soon it will be possible to authorize the use of electronic information in Smart Cards by using a spoken word or the touch of a hand. Also, Smart Card readers will be appearing on the PC and will enable the user to pay for goods purchased over the Internet. This will be especially useful for small value purchases, which are not really appropriate for credit card transactions. If you have products that have relatively low value - for example a few pages of information about your product that customers may pay 50c for - they may well pay you in the future using a Smart Card. As a smart infrastructure for mobile computing, Smart Card technologies will prove to be the killer application for the networked economy. The Smart Card will be "charged up" with money and you will use it as you do cash or a phone card. In the near future, the traditional magnetic strip card will be replaced and integrated together into a single card by using the multiapplication Smart Card, which is known as an electronic purse or wallet in the Smart Card industry. It will be used to carry a lot of sensitive and critical data about the consumers ever more than before when compared with the magnetic strip card.

smart Cards are a relatively new technology that already affects the everyday lives of
millions of people.

REFERENCES
1. www.smartcard wikipedia.com 2. www.electronictoll collection.com

3. www.electronics for you.com


4. www.1000projects.com

5. www.101seminars.com

You might also like