On Spot identification system for non custom paid vehicles
On Spot Identification System for Non-Custom Paid Wanted/Stolen Vehicles (NCPW/SVs) are not only serious threat to the security situation of Balochistan, Pakistan but also result in huge financial loss to the economy by not paying the custom duties. NCPVs includes unregistered/smuggled cars whose cu
2025-06-28 16:34:18 - Adil Khan
On Spot identification system for non custom paid vehicles
Project Area of Specialization Information & Communication TechnologyProject SummaryOn Spot Identification System for Non-Custom Paid Wanted/Stolen Vehicles (NCPW/SVs) are not only serious threat to the security situation of Balochistan, Pakistan but also result in huge financial loss to the economy by not paying the custom duties. NCPVs includes unregistered/smuggled cars whose custom duty is not paid and the cars with fake registration having no records in the excise and taxation department. These NCPVs results in poor and undocumented economic progress of the province. Secondly, it results in additional traffic burden on the roads. Furthermore, these NCPVs could be used in abduction, terrorist attacks and smuggling of drugs and illegal weapons, and cannot be traced easily. With rapid growth in the number of vehicles on the roads, it is difficult to identify the illegal/unregistered vehicle on the road in the current capacity of excise and taxation department. As mostly these cars are driven by the highly influential persons, who have linkages and sources in the law enforcement agencies. It becomes difficult for an ordinary policemen standing on the roads to stop such vehicles and register a case against the individuals using NCPVs.
Project Objectives• To identify the Non-Custom Paid Wanted/Stolen Vehicles (NCPW/SVs).
• The developed NCPW/SVs identification system would to be Efficient, Fool proof, state of the art technology.
• To decrease the smuggling and crime rate.
• NCPW/SVs results in a huge financial gain to the economy.
• Decreasing of traffic on the road.
• The proposed should be highly scalable and robust.
• Improve the efficiency of law enforcement agencies
• Reduce traffic burden and fossil fuel consumption
• Reduction in road accidents.
Project Implementation MethodMaking of RFID Tag unclonable is the first step of our project. To solve this issue, we have studied much literature review about RFID Tag. In RFID chip there are three portions to store data information security portion, the controlling area and the information area portion. The information security area has three portions Assigned number, chip manufacturing code, serial number the assigned number represents production of different standard chip. The chip manufacturing code represent the chip. The serial number denotes the different chip. The information security area can be written once in the factory and cannot be changed after factory.
The security protocols are also use in the security of RFID Tag because to make RFID Tag full secured and its transmission. For security Advance Encryption Standard (AES) algorithm is to be used. This technique is uses in RFID Tags to encrypt and decrypt data, this algorithm uses different bit keys like 128/192/256. AES is use to protect various type of data video, voice, text.
Developing database in Visual Studio (C# language) database contain five tables Vehicle ID No., Manufacturing company, Model No. and Chassis No. Matlab software is used for encryption and decryption purpose. The original data is encrypted through matlab and inserted in RFID Tag, the encrypted data is then decrypted at checkpoint through host PC.
For simulation we use Cadence's Incisive EDA tool. In this software we will select RFID Tag, Reader so we will interface each other and apply Advance Encryption Standard (AES) algorithm which will give us result in the wave of simulation and text file. In the text fill “?” means that there is a collision it appears once it at the heat or tail but the data is not interrupted.
For real time prototype we need RFID Tag, RFID Reader, Database. RFID Tag will be mounted on the number plate of the Vehicle. The reader will be mounted on tool booth arm of the check post. RFID reader will be connected with the database at host PC in the control room. When the vehicles come near to the RFID reader so reader will ask to receive data from the tag and tag will provide data under secure conditions which are implemented. So the reader will provide the tag data to the database and database will check this data with the original data if this data matches so the green light become ON and tool booth arm will open otherwise red light will be ON and tool bath will not be open.
Followings are the main steps.
• After a vast literature review we have solution to develop an RFID tag data unclonable.
• For the encryption we use AES algorithm.
• For Simulation of the project Cadence's Incisive EDA tool will be use.
• Database will be developed in the host PC. Placed at check points.
Benefits of the ProjectThe main targeted beneficiaries of this project are the general public and law enforcement agencies. More specifically, the provincial excise & taxation department, FBR, interior ministries, and intelligence agencies can highly benefit from the proposed system.
• NCPW/SVs helps the country to increase in economy by paying of custom duties and excise tax.
• NCPW/SVs play a vital role in the decreasing of Crime rate and Smuggling.
• It is time savage for both police man and vehicle driver of manually identification of vehicle.
• It results in decreasing traffic burden on the roads.
• Due to this project the traffic on the road will decrease very much
• This project helps the government to stop corruption in custom, excise and taxation department.
• Due to custom paid vehicles the luxuries get market value.
• This project differentiates between custom paid and Non-custom paid vehicles.
• The people doesn’t use vehicles in crimes due to fear of government.
• Due to NCPV’S the costly vehicles can be bought half of the price.
Technical Details of Final Deliverable• NCPW/SVs project aim is to develop identification system as Efficient, Fool proof, state of the art technology
• The main idea of this project is to stop smuggling and Crime rates in Pakistan.
• This project will be efficient in the form of time and accuracy.
• No one can cheat with this project idea to clone it.
• This technology is new and very helpful for government to search and for public to take registration paper each and every place.
• No one can damage the registration paper of the vehicle because everyone keeps his document at secure place due to this project.
• The development of this smart system save much time of peoples.
• The smart system is much secured no one can cheat this system to make NCPV as CPV(Custom Paid Vechiles).
Final Deliverable of the Project Hardware SystemCore Industry SecurityOther IndustriesCore Technology Internet of Things (IoT)Other TechnologiesSustainable Development Goals Decent Work and Economic GrowthRequired Resources| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 79500 | |||
| Ucode dna tag | Equipment | 20 | 500 | 10000 |
| UHF Reader | Equipment | 3 | 15000 | 45000 |
| Ardiuno | Equipment | 3 | 650 | 1950 |
| PC | Equipment | 1 | 13000 | 13000 |
| Final thesis printing | Miscellaneous | 2 | 2500 | 5000 |
| Stationary | Miscellaneous | 1 | 550 | 550 |
| Other expenses | Miscellaneous | 1 | 4000 | 4000 |