Hit and Run Vehicle Identification Using RFID

DOI : 10.17577/IJERTCONV6IS08018

Download Full-Text PDF Cite this Publication

Text Only Version

Hit and Run Vehicle Identification Using RFID

R. Ashok Kumar, M.E,

Dept. of Electronics and communication

Engineering, Assistant professor, V.S.B Engineering College, Karur.

R. Sudharsan,

Dept. of Electronics and communication Engineering, UG Scholar,

V.S.B Engineering College, Karur.

R. Santhosh Kumar,

Dept. of Electronics and communication Engineering, UG Scholar,

V.S.B Engineering College, Karur.

M. Sasidharan ,

Dept. of Electronics and communication Engineering, UG Scholar,

V.S.B Engineering College, Karur.

T. Ranjith Kumar,

Dept. of Electronics and communication Engineering, UG Scholar,

V.S.B Engineering College, Karur.


The vehicles usage in this busy world has been increased. There is an increased possibility for accident to occur due to lack of traffic awareness. The rules have to be followed strictly to avoid such critical situations. But, the urge for following those rules is not inculcated. So there are some possibilities of hit and run incidents to occur periodically. This is to avoid being caught by the laws and imprisonments. In order to identify the culprit, we are using the RFID systems. The tag from the culprits car is scanned by the RFID reader placed in the victims car. Hence the information gets collected and it is sent to the registered number through GSM module. Thus the case can be filed and the culprit can be found within a short duration of time.


In recent days, the number of accidents is being increased. This is due to the traffic violations which is common nowadays. Every user must be taught of the rules before they become a professional vehicle handler. This project is based on the concept of RFID. Each vehicle has its own tag and a reader. The tag is of two types. They are active and passive RFID tags. A passive tag requires line of sight and hence the tag must be placed near to the reader. But the active tag does not require line of sight and hence the reader can detect the tag up to a distance of 100 meters. Thus we use an active tag in each vehicle. When two cars colloid, the reader from the victims car scans the tag in the culprits car and sends the information to the registered location via GSM. This helps in identifying the culprit and to take legal actions.


There is an increased probability of hit and run in recent days. This has become a serious issue which violates the rules and regulations that are laid by the government. As a result, there is an increase in number of death due to accident. It shows the reduced loyalty among the people in modern word.

The core theme of this paper is :

  1. To track the culprits vehicle that has involved in hit and run.

  2. To file the case and to take necessary action.

  3. To get compensation for the damage.

  4. To reduce the hit and run chases.

  5. To increase the probability of surviving as the information is sent immediately.


a).RFID based automated toll collection system

We come to know that currently there is an implementation of automated toll system. It uses RFID tag for the purpose of detection by the reader. The user has to maintain certain level of amount in his tag so that when the vehicle crosses the toll, the amount gets detected automatically. Here the vehicles do not need to wait or stop at the toll booth.

b).Security System for Vehicle using Number Plate Detection and Radio Frequency Identification (RFID)

Here the vehicles number plate is sensed by the camera. It is compared with the database that is done in the MATLAB. During this comparison it uses a edge detection and compares pixel to pixel formats that are already define in the program. After

matching the number plate it request for the RFID tag. For this purpose, the RF receiver is also connected with it and when RFID tag is shown before the RF receiver it detects its information and matches with the ID that is already stored in the database.


The automatic toll collection is implemented in India to reduce the traffic and the time in toll booths. The vehicles are implemented with a RFID tag. This tag consists of the information about the vehicle and the owner and also the amount that is fed. When the vehicle moves to the toll, the reader reads the tag and deduces the toll fee automatically. This reduces the waiting time.

fig. automatic toll collection unit


Similar to the automatic toll system, a tag with a reader is fixed in each vehicle. When two cars colloids, the reader from a car scans the tag placed on another car. The information that is collected from that tag will be sent to the desired location through

GSM. We can also use zig-bee mechanism instead of GSM to make the information even more detailed.

case if required. The user can claim for compensation from the culprit if required. Once the case is registered, the vehicle is placed in the black list in central server unit. So that whenever culprit arrives at toll plaza CSU sends message to TCU and indicates it to not to allow the vehicle to pass through.



RF Waves from

RFID reader

Message to control room

Message to

Desired mobile number



Base station

Fig. Vehicle identification system


This system comprises of RFID reader and RFID tag for each vehicle to provide different RFID number to each vehicle. This system consists of vibration sensor (piezoelectric plate) for sensing vibration during collision. Piezoelectric sensors are placed in the front part of vehicle to detect vibration during collision. When collision occur two vehicles strikes and the vibration sensors of respective vehicles get sensed. This sense produces electrical signal in piezoelectric sensors. The vibration sensor gives input to Arduino Uno through its analog pin. Now the Arduino enables the RFID reader. RFID reader reads the RFID tag of the another vehicle. Hence both the vehicles exchange the RFID numbers and store it in the controller. This information can be used by vehicle owner to register the

Fig. Vehicle detection unit


When two vehicles gets colloided, both vehicles are vibrated and the vibration sensor gets activated. This signal is sent to the arduino and it sends an indiation to the RFID reader. Now the reader from the car which has been hit scans the tag that is placed in the car that has been escaped from the spot. The tag consists of respective vehicle number and name of the owner. This information which has been scanned gets transferred from the GSM module to the destination number. The destination may be the mobile number of a family member or some emergency contacts like police or ambulance.


The reader reads the tag that is placed in the opposite vehicle. It extracts the information from that tag and sends it to the GSM module. The mobile number which has been fed in the arduino, receives the information about the car and its owner.


    Arduino Uno is a microcontroller board based on the ATmega328P. It has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz quartz crystal, a USB connection, a power jack, an ICSP header and a reset button. It contains everything needed to support the microcontroller; simply connect it to a computer with a USB cable or power it witha AC-to-DC adapter or battery to get started.


    It works on the principle electromechanical. The vibration sensors operate in accordance with the electro dynamic principle. They are used for measuring the bearing absolute vibration based on the piezoelectric effect. If there is any change in resistance due to the force acting on it, it converts them into 4 – 20 mA. They have measuring differences in oscillation, so they want a -12v and

    +12v swing with 0 as the base line we have piezoelectric sensor which detects the vibration created on a ground area or ground surface. We can also use another sensor called shock sensor to detect vibration.

    Fig. Vibration sensor

    Fig. Circuit diagram of vibration sensor


The RFID reader reads the radio waves that are emitted from the tag. There are two types of RFID tags. They are active tag and passive tag. Active tag does not require line of sight as they can scan a tag which is placed up to a distance of 100 meters. Passive tag can be recognized only when they are placed near the reader. This turns out to be a major disadvantage in using passive radio frequency reader.

Fig. RFID reader


Thus we have extracted the details of the vehicle which has involved in the accident. The extracted details have been sent to the desired location i.e., the mobile number

which is fed into the GSM module. The message that contains the details of the vehicle can be sent to a family member or an emergency number such as police and ambulance. Thus we have extracted the details of the vehicle which has involved in the accident. The extracted details have been sent to the desired location i.e., the mobile number which is fed into the GSM module. The message that contains the details of the vehicle can be sent to a family member or an emergency number such as police and ambulance


  1. Dirección General de Tráfico (DGT). (2010). The Main Statistics of

    Road Accidents Spain [Online]. Available: http://www.dgt.es/portal/es/seguridad_vial/e stadistica

  2. Eurostat: Statistical Office of the European Communities. (2012) Transport Statistics in the EU [Online]. Available:

    http://epp.eurostat.ec.europa.eu/portal/page/ portal/transport/data/main_tables

  3. J. Miller, Vehicle-to-vehicle-to- infrastructure (V2V2I) intelligent

    transportation system architecture, in Proc. IEEE Intell. Veh.

    Symp., Eindhoven, Netherlands, Jun. 2008, pp. 715720.

  4. F. Martinez, C.-K. Toh, J.-C. Cano, C. Calafate, and P. Manzoni,

    Emergency services in future intelligent transportation systems

    based on vehicular communication networks, IEEE Intell. Transp.

    Syst. Mag., vol. 2, no. 2, pp. 620, Oct.


  5. M. Fogue et al., Prototyping an automatic notification scheme for

    traffic accidents in vehicular networks, in

    Proc. 4th IFIP WD,

    Niagara Falls, ON, Canada, Oct. 2011.

  6. M. Fogue et al., Evaluating the impact of a novel message

    dissemination scheme for vehicular networks using real maps,

    Transp. Res. Part C: Emerg. Technol., vol. 25, pp. 6180, Dec.


  7. B&B Electronics. (2012). The OBD-II Home Page [Online]. Available: http://www.obdii.com

  8. U. Fayyad, G. Piatetsky-Shapiro, and P.

    Smyth, The KDD process for

    extracting useful knowledge from volumes of data, Commun. ACM,

    vol. 39, pp. 2734, Nov. 1996.

  9. M. Hall et al., The WEKA data mining software: An update,

    SIGKDD Explor., vol. 11, pp. 1018, Nov. 2009.

  10. European New Car Assessment Programme (Euro NCAP). (2012) Test Procedures [Online]. Available:

http://www.euroncap.com/testprocedures.as px

  1. K. Yu and E. Dutkiewicz, Geometry and motion-based positioning

    algorithms for mobile tracking in NLOS environments, IEEE

    Trans. Mobile Comput., vol. 11, no. 2, pp. 254263, Feb. 2012.

  2. M. Hall, Correlation-based feature selection for machine learning,

    Ph.D. dissertation, Dept. Comput. Sci., Univ. Waikato, Hamilton,

    New Zealand, 2008.

  3. T. K. Anderson, Kernel density estimation and K-means clustering

to profile road accident hotspots, Accident Anal. Prev., vol. 41, no.

3, pp. 359364, 2009

  1. Nat. Hwy. Traffic Safety Admin. (NHTSA). (2012). National

    Automotive Sampling System (NASS) and General Estimates System

    (GES) [Online]. Available: http://www.nhtsa.gov/NASS/

  2. Nat. Hwy. Traffic Safety Admin. (NHTSA). (2012). FTP Site for the General Estimates System (GES) [Online]. Available:


Leave a Reply