SMART - AKK Department of Electrical and Computer Engineering

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

EECE **** Embedded System Design
1 Security in Wireless Protocols Bluetooth, , ZigBee.
DATA COLLECTION USING ZIGBEE NETWORK Timothy Melton Moscow, ID.
Controlling Robot Car via Smartphone Supervisor: Dr. Jamal Kharousheh Prepared by : Hamza Qaddara Esmat Hedariya Hareth Hanani Faculty of Engineering Telecommunication.
Biometrics & Security Tutorial 5. 1 (a) Understand two stages (Enrollment and Authentication) in a fingerprint system. (P6: 12)
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Department of Electrical & Computer Engineering Advisor: Michael Zink.
Ryan Toukatly– Electrical Engineer Trey Minarcin – Electrical Engineer Erwan Suteau – Electrical Engineer Pete Franz– Electrical Engineer Sponsor : Harris.
A Framework for Patient Monitoring A. L. Praveen Aroul, William Walker, Dinesh Bhatia Department of Electrical Engineering University of Texas at Dallas.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Project Proposal: Security Threats for Wireless Devices Matt Fratkin April 11 th, 2005 E6886.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems Ishtiaq Rouf, Hossen Mustafa Rob Miller Marco Grutese Presented By.
passenger counting System
HEXAPOD ROBOT MINI PROJECT B-TECH ELECTRONICS AND COMMUNICATION ENGINEERING SIXTH SEMESTER ASWATHY.K RANJITH.R SREELAKSHMI.M SREEYENAN.E.K GUIDE Ms.Sreebala.P.
By Alex Wright and Terrence Bunkley Mentored by Dr. Kamesh Namaduri College of Engineering Department of Computer Science and Engineering Department of.
Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.
IR Controls Motors An-Najah National University Faculty of Engineering Electrical Engineering Supervised by: Dr. Ra’ad Jaber Prepared by: Rayad Hayek بسم.
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
ABSTRACT Currently, drivers must utilize a third-party, such as a radio or broadband device, to learn about local traffic conditions. However, this information.
Friend-Foe Identification System Justin Ayvazian, Ben Johnson, Eric Putney, Mike Ruth Faculty Advisor: Prof. Sandip Kundu Department of Electrical and.
Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.
Communication Based Projects Ideas for Engineering Students.
Revised Problems 1)Banana Plugs unable to withstand stress of CIP module and cord under 2)Physical connection problems between CIP and lock 3)Time consumption.
FINGERPRINT BASED ACCESS CONTROL SECURITY SYSTEM SPONSERED BY : PINACLE SOLUTIONS GROUP MEMBERS : 1.PRATIBHA DESAI 2.MANISHA BOLAGE 3.SEEMA KAKADE GROUP.
TV Remote As A Wireless Mouse For PC.
A Wireless Local Area Network by Raymond Woodward.
INTELLIGENT MACHINE DESIGN LAB EML 5666 With Dr. Arroyo & Dr. Schwarz Luther Lloyd III Mechanical Engineer 2 nd Year Graduate Student.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Understand Wireless Security LESSON Security Fundamentals.
Smart Portable Key ECE 445 Aashay Shah Akshay Chanana TA: Igor Fedorov Project No. 45 Spring 2013.
AC AUTO ELECTRICAL ABOUT US At A C Auto Electrical & Mechanical we always try to remain ahead of any potential issue. To accomplish.
Ketan Mehta March 3, 2006 PIV Data Model Testing Ketan Mehta March 3, 2006.
Multiway Noticeboard with User Configure Features Using IOT & PC
Applying Cryptography to Physical Security
Outline The basic authentication problem
VOICE CONTROLLED SMART HOME AUTOMATION SYSTEM BASED ON ZIGBEE NETWORK
BioLock (Biometric Home Entry System)
Microcontrollers, Basics Fundamentals of Designing with Microcontrollers 16 January 2012 Jonathan A. Titus.
Operating System for Sensor Network
Wireless Communication Project
Clean Slate Mesh Protocol Design Using WARP
Ahmed Damoni Ahmed Sabha.
network interface card (NIC)
Communication Lines Fundamentals.
Data Transmission and Computer Communications ECE: 412
Software Defined Radio
Protocols and the TCP/IP Suite
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96
ANALYSIS OF WIRED EQUIVALENT PRIVACY
Topic 5: Communication and the Internet
Cordova AMI/AMR Security
NETWORK SECURITY.
I am comparing humans to a(n) (type animal here)
Biometric technology.
Optical Networks & Smart Grid Lab.
How the Biometrics Works
Networked Door Locking System
Security Of Wireless Sensor Networks
Manual Robotics ..
Depth Analysis With Stereo Camera
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Protocols and the TCP/IP Suite
Depth Analysis With Stereo Camera
Hardware Graduation Project (2) Seminar
Advanced Encryption Standard
Feistel Cipher Structure
Presentation transcript:

SMART - AKK Department of Electrical and Computer Engineering Anita Has & Kristina Suen CMPE 490 Design Project 2010w Presenting at 9:50am What is a SMART–AKK ? The SMART-AKK acts as a small radio transmitter which grants remote access to your vehicle using a biometric verification module and a Feistel encryption scheme. SMART – AKK Features Hardware AT91EB55 Microcontroller Biometric Verification [ARA-ME-01] Wireless Communication [X-Bee] AK Vehicle Simulator (AKV) Software Encryption [Tiny Encryption Algorithm] Biometric Verification Scanning & Matching up to 120 unique fingerprints 1 Master fingerprint to erase & enroll fingerprints Enrolled fingerprints are able to control AKV < 3 seconds fingerprint matching Encryption Why Tiny Encryption Algorithm? AKV Data Packet : 64-bits AKK/AKV VIN Key : 128-bits (used to encrypt data packet) Example AKV Data Packet: Simplicity Speed Cryptographic Strength Software Flow Action Command (32 bits) Serial Number Before Encryption 22222222 99999999 After Encryption A2A74BB B5282844 Five possible action commands (Lock/Unlock Doors, Engine On/Off, Panic) Serial number consists of synchronized counter to prevent eavesdropping Department of Electrical and Computer Engineering