ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification.

Slides:



Advertisements
Similar presentations
Network Devices Repeaters, hubs, bridges, switches, routers, NICs.
Advertisements

Topic 7 Local Area Networks (LAN)
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
ECE Department: University of Massachusetts, Amherst ECE 354 Lab 3: Transmitting and Receiving Ethernet Packets.
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Electrical and Computer Engineering Cali Antonellis Austin Cormier Michael Cormier David Hughes Medical Emergency Communication Assistant (MECA) ‏
ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
ECE Department: University of Massachusetts, Amherst ECE 354 Spring 2009 Lab 3: Transmitting and Receiving Ethernet Packets.
OSI Model.
Flatiron Mobile Device Security Monitor Thomas Horacek Lucas Greve.
ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Eric Putney Ben Johnson Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend or Foe Identification.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
Networking Components Chad Benedict – LTEC
What’s going on here? Leo Koppel Jan The OSI Model LayersData unitFunctionExamples Host layers 7. ApplicationApplication Data High-level APIs,
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
QualNet 2014/05/ 尉遲仲涵. Outline Directory Structure QualNet Basic Message & Event QualNet simulation architecture Protocol Model Programming.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
Wireless Sensor Monitoring Group Members: Daniel Eke (COMPE) Brian Reilly (ECE) Steven Shih (ECE) Sponsored by:
DESIGN & IMPLEMENTATION OF SMALL SCALE WIRELESS SENSOR NETWORK
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Flatiron Mobile Device Security Monitor Thomas Horacek Lucas Greve.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
CS/EE 145A Reliable Transmission over Unreliable Channel Netlab.caltech.edu/course.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.
EMERGENCY VEHICLE ALERT SYSTEM ECE 495C Digital Systems Senior Design Project Proposal Team #3 Spring 2008 January 09, 2008.
The OSI Model.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Module 8: Ethernet Switching
Network Coding Testbed Jeremy Bergan, Ben Green, Alex Lee.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
CENG 490/510 Network Programming Russell Deaton Rm
Done By: Amnon Balanov & Yosef Solomon Supervisor: Boaz Mizrachi Project ID: d02310.
Car-to-Car Communication for Accident Avoidance
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Devin Mullen Advisor: Professor Andrew Kun.  Background  Problem Definition  Proposed Solution  Design Objectives  Implementation and Testing  Budget.
Friend-Foe Identification System Justin Ayvazian, Ben Johnson, Eric Putney, Mike Ruth Faculty Advisor: Prof. Sandip Kundu Department of Electrical and.
© Paradigm Publishing Inc. 6-1 Chapter 6 Telecommunications and Networks.
Home Area Networking for the Smart Grid Erik Cates David Green Daniel Han Justin Michela ECE 4007 Koblasz/Maxwell Fall 2010 In Conjunction With: Unmesh.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Tufts University. EE194-WIR Wireless Sensor Networks. February 17, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Protocol Layering Chapter 11.
The OSI Model A Framework for Communications David A. Abarca July 19, 2005.
ENGS 112 Lecture 3 Packet Switching Chapter 3, Walrand WWW links, eg.
Dr. ClincyLecture1 Chapter 2 (handout 1– only sections 2.1, 2.2 and 2.3) 1 of 10 Dr. Clincy Professor of CS Exam #3 Monday (3/14/16): Opened Book, No Computer,
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Network Devices Repeaters, hubs, bridges, switches, routers, NIC’s.
The OSI Model Prof. Choong Seon HONG.
Layered Architectures
I. Basic Network Concepts
The OSI 7 Layer Model Ben, Stuart, Charles.
Network Architecture Models
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Presentation transcript:

ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification System

2 ECE 415 Senior Design Project Fall 2010 Current Project Status  Encryption modules finished RC5 incorporated into code  Communication modules completed Packets constructed and parsed correctly Communication structure implemented  Password interface implemented Uses switches on DE-II boards

3 ECE 415 Senior Design Project Fall 2010 Updated Hardware  Cannot use USB parts No O/S support for plug and play devices  Wireless Communication: Quatech WLNG-ET-DP501 WiFi Access Point Wireless ethernet bridge Demo demonstrates wired ethernet connectivity  GPS Receiver: Holux GM-210 GPS Receiver RS232 connection for low-level communication

4 ECE 415 Senior Design Project Fall 2010 Messages  UDP protocol used for packet transmission Each message will be preceded by unencrypted UDP headers  Each packet payload transmitted will be 64 bits Efficient for RC5 encryption scheme Extra bits (where necessary) will likely be “white noise” Randomly generated numbers  Vehicle and base modules will have unique unencrypted ID numbers contained in routing headers Makes decryption process more efficient by letting decryption module know what data is meaningful Especially important for WiFi prototype and handling of multiple vehicles

5 ECE 415 Senior Design Project Fall 2010 Individual Packet Structures and Sizes

6 ECE 415 Senior Design Project Fall 2010 Bandwidth Considerations  Largest data payload is 64 bits Full conversation between vehicle and base is 2048 bits Assumes no collisions or lost messages  Wireless connection has data speed of 54 Mb/s  System can theoretically support an absolute maximum of 26 thousand vehicles entering the range of the base per second  Currently undertaking a wireless network system simulation to determine number of vehicles system can reliably support in practice

7 ECE 415 Senior Design Project Fall 2010 Three Strikes Rule  Three chances to enter correct password Accounts for user error on vehicle side  By a certain point every vehicle with transponder must be identified as friendly or be labeled as hostile/hijacked  Based on incorrect entries and timeouts Timeouts are yet to be determined, but will place upper limit on time vehicles have to identify themselves as friendly Leave enough time for threats to be responded to appropriately

8 ECE 415 Senior Design Project Fall 2010 Base station look-up table  Sample of base module vehicle lookup struct:  ID 1,2: Secret and public ID numbers for each vehicle  PRV 1,2: Current and previous password randomization values for each vehicle Provides safeguard in case last message is not received by vehicle  State: Current state of vehicle’s conversation with base  Status: Current status of vehicle Friendly/hostile Also tracks number of strikes ID 1ID 2GPS Lat GPS Long PRV 1PRV 2StateStatus

9 ECE 415 Senior Design Project Fall 2010 Project Milestones  Completed: RC5 encryption integrated with software Ethernet communication between DE2 Boards User password interface Standalone GUI, web accessible  To be Implemented: Integrate GUI and DE2 Boards Bridge Wireless communication between modules Implement GPS hardware Timeout and multi-vehicle handling System Simulation Data

10 ECE 415 Senior Design Project Fall 2010 Future Team Roles  Ben: RC5 encryption module and password interface  Mike: Packet composition and GPS interfacing  Justin: Wireless communication integration  Eric: GUI and system implementation

11 ECE 415 Senior Design Project Fall 2010 Demo  GPS coordinates simulated for GUI Currently GUI is stand-alone Communication between base module and GUI not yet integrated Google API license acquired  Wired prototype of system Communication and encryption modules completed  Password interface and encoding integrated on DE-II 16 binary switches for password value with push button to simulate password submission Password randomization function implemented