ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification.

Slides:



Advertisements
Similar presentations
Handheld Wireless GPS Tracking Device Senior Design EEL 4914C : UWF, Fall 2006.
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Cryptography and Network Security Chapter 3
Block Ciphers and the Data Encryption Standard
Department of Electrical & Computer Engineering Advisor: Professor Michael Zink Team: Brigit Lyons Fadi Maalouli Tony Panetta Renzo Silva Final Project.
Department of Electrical & Computer Engineering Advisor: Professor Michael Zink Team: Brigit Lyons Fadi Maalouli Tony Panetta Renzo Silva Midway Design.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification.
ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Eric Putney Ben Johnson Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Wireless Data Acquisition for SAE Car Project by: J.P. Haberkorn & Jon Trainor Advised by: Mr. Steven Gutschlag.
ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend or Foe Identification.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Chapter 20 Symmetric Encryption and Message Confidentiality.
EMERGENCY VEHICLE ALERT SYSTEM ECE 495C Digital Systems Senior Design Project Proposal Team #3 Spring 2008 January 09, 2008.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
Cryptography Team Presentation 2
WEP Protocol Weaknesses and Vulnerabilities
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
“Implementation of a RC5 block cipher algorithm and implementing an attack on it” Cryptography Team Presentation 1.
6.375 Final Presentation Jeff Simpson, Jingwen Ouyang, Kyle Fritz FPGA Implementation of Whirlpool and FSB Hash Algorithms.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Republic of Slovenia Ministry for economic relations and development Metrology Institute of the Republic of Slovenia Laboratory for Information Technology.
Public / Private Keys was a big year… DES: Adopted as an encryption standard by the US government. It was an open standard. The NSA calls it “One.
ABSTRACT Currently, drivers must utilize a third-party, such as a radio or broadband device, to learn about local traffic conditions. However, this information.
Car-to-Car Communication for Accident Avoidance
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Friend-Foe Identification System Justin Ayvazian, Ben Johnson, Eric Putney, Mike Ruth Faculty Advisor: Prof. Sandip Kundu Department of Electrical and.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Remote Control of Home Appliances PROJECT PLAN Team: ◦ Elie Abichar –CE ◦ Chris Tefer –CE ◦ Ananta Upadhyaya.
1 Wireless Threats 1 – Cracking WEP Cracking WEP in Chapter 5 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Computer and Network Security Rabie A. Ramadan Lecture 3.
The RC5 Encryption Algorithm: Two Years On Lisa Yin RC5 Encryption –Ron Rivest, December 1994 –Fast Block Cipher –Software and Hardware Implementations.
Chapter 2 Symmetric Encryption.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Information Systems Design and Development Security Precautions Computing Science.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
WEP & WPA Mandy Kershishnik.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Cryptography after DES
Implementation of IDEA on a Reconfigurable Computer
PART VII Security.
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification System

2 ECE 415 Senior Design Project Fall 2010 Project Overview  Friend Foe Identification System  Allow for identification and threat assessment of military vehicles approaching base stations  Security Secure transmissions Prevent digital terrorism and impersonation of friendly vehicles Password interface Prevent hijackings of military vehicles

3 ECE 415 Senior Design Project Fall 2010 Final Design Concept  Prototype system with limited range Design hardware and communication modules, leave actual method of transmission up to end user  WiFi as wireless transmission prototype Well defined standards, inexpensive implementation  Nios II Run C code on top of hardware Transition from software prototype Especially useful for testing hardware modules

4 ECE 415 Senior Design Project Fall 2010 Progress  Project website Project documents Design review presentations System block diagrams  Hardware FPGA: Altera DE-2 development boards (borrowed) GPS: Ambicom GPS Navigation Receiver (~$70) WiFi Antenna: IOGear GWU523 (802.11b/g) (~$20) GUI: Google Maps overlay applet

5 ECE 415 Senior Design Project Fall 2010  Scaling as follows:  Range: 2 miles -> 100 m  Speed: 105 km/h -> 6.56 km/h GUI Applet: Vehicle’s speed is 1.83 m/s  Time to react: 110 seconds  GPS Accuracy: 5 ~ 10 m Updates every.1 seconds Take average over a 1 second period to limit inaccuracy Scaling to Prototype

6 ECE 415 Senior Design Project Fall 2010 Data Flow Diagram

7 ECE 415 Senior Design Project Fall 2010 Interrogator Unit

8 ECE 415 Senior Design Project Fall 2010 Transponder Unit

9 ECE 415 Senior Design Project Fall 2010 Identification Process

10 ECE 415 Senior Design Project Fall 2010 Packet Structures  4 message types: Base Module: Request Identification Acknowledge ID/Update Hash Value Vehicle Module: Transmit Identification Acknowledge Hash Update

11 ECE 415 Senior Design Project Fall 2010 Messages  Each message will be preceded by an unencrypted acknowledge message  Vehicle module may have unique unencrypted messages  Makes decryption process more efficient by letting decryption module know what data is meaningful

12 ECE 415 Senior Design Project Fall 2010 Password Transformation  Why do passwords need to be unique? Avoid physical keys, use shared password Encryption is data dependant  Implementation Shared 16 bit password for all vehicles Multiply by randomly generated 16-bit number 2 32 possible values “Three strikes rule” - ~ 7x10 -8 % chance of correctly guessing password even if all other parts of the system have been compromised

13 ECE 415 Senior Design Project Fall 2010 Randomization Value Updating  Updated through rolling encryption scheme Similar to system used for remote entry devices for cars  Last message from base to vehicle sends new randomization value Generated by base, stored by vehicle  Base stores current and most recent randomization values Final message is vehicle to base Base must store both in case final transmission not received

14 ECE 415 Senior Design Project Fall 2010 RC5 Encryption Module  Initial C-based implementation—Completed Timing trials from 32-bit XP OS, running on a 1.83 GHz processor.  Future Verilog implementation Timing Expectations  Algorithm requirements: Strong Security Data Dependant rotations Fast Encryption, Decryption, and Key Expansion

15 ECE 415 Senior Design Project Fall 2010 RC5—Security Strength  Several strategies for breaking block cipher: Exhaustive search Statistical tests Linear Cryptanalysis Differential Cryptanalysis  Most efficient attack a variant of differential cryptanalysis  Still requires unreasonable amounts of plaintext/ciphertext pairs

16 ECE 415 Senior Design Project Fall 2010 RC5—Security Strength (cont.)  Data Dependent Rotations Helps protect against differential cryptanalysis Coupled with the use of the password transformation, identical messages will have different ciphertexts. Prevents Timing analysis  Strength against other known cryptanalysis methods Linear Exhaustive 2 Bits_in_key attempts Statistical Data-dependent rotations/Hashing function

17 ECE 415 Senior Design Project Fall 2010 RC5—Operation Speed  Real-time requirement for transmissions  Speed Results for RC5 – 32/12/16  What if we increase the number of rounds? Achieves ≈220μs Key Expansion with 2000 rounds  Hypothesis: Verilog implementation will be more efficient than C Processor SpeedCompilerKey ExpansionEncryption/Decryptionbytes/second 90 MHz16-bit Borland220μs22μs36,000Bps 1.83GHz32-bit GCC>1μs >64MBps

18 ECE 415 Senior Design Project Fall 2010 GUI  Output on the base module will be a GUI using a Google Maps overlay  Present Used the longitude and latitude for UMass in demo 100 meters at UMass longitude is meters at UMass latitude is Range of base station is 100 meters  Future Will be putting the GUI in an applet – need to acquire license from Google Simulated path based on normal UMass walkways will be used for demos– need GPS module before data can be taken

19 ECE 415 Senior Design Project Fall 2010 Deliverables - Prototype Java to C Model  Vehicle: Password encryption Data parsing & concatenation Bitwise shifting and transformation  Base Station: Password encryption Data parsing & concatenation Bitwise shifting and transformation GUI implementation

20 ECE 415 Senior Design Project Fall 2010 Future Deliverables - FDR Working Model C and Verilog code GUI Implemented RC5 encryption scheme Full Communication Between: GPS and Vehicle via USB Vehicle and Base Station via protocols Base Station and GUI via USB Equipment GPS via USB port Working Antenna Transceivers Fully Implemented DE2 Boards

21 ECE 415 Senior Design Project Fall 2010 Future Considerations  WiFi relays Increased range while maintaining hardware and low power in vehicles module  Ad Hoc networking Allow vehicles to identify one another away from base  Enhanced driver identification system Increased protection against hijackings Example: fingerprint scan More specific to military personnel

22 ECE 415 Senior Design Project Fall 2010 GUI Demo

23 ECE 415 Senior Design Project Fall 2010 Sources  [1] B. Kaliski, Y. Yin. On the Security of the RC5 Encryption Algorithm. v1.0, September Available at ftp://ftp.rsasecurity.com/pub/rsalabs/rc5/rc5-report.pdf.  [2] R. Rivest. The RC5 Encryption Algorithm. March 20, Available at TheRC5EncryptionAlgorithm.  [3]R. Rivest. The RC5 Algorithm. Dr. Dobbs Journal number 226, pages January Available at