OUTLINE  Motivation  Introduction  Problem Statement  Assumptions  Proposed Solution  Results  Conclusions  Future Work  References  Acknowledgements.

Slides:



Advertisements
Similar presentations
New Security Issues Raised by Open Cards Pierre GirardJean-Louis Lanet GERMPLUS R&D.
Advertisements

LECTURE 1: COURSE INTRODUCTION Xiaowei Yang. Roadmap Why should you take the course? Who should take this course? Course organization Course work Grading.
BioSENSE I introduction
Aaron Eastham Network Security & Electronics Program Dept. of Applied Engineering & Technology Eastern Kentucky University.
Presented by: Carl Skeene. OUTLINE Motivation Introduction Problem statement Assumption Proposed solution Results Conclusion Future work References Acknowledgements.
MICROCONTROLLED HOME Keith Jones EKU Deparment of Technology CEN.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
Effective Math Questioning
P OOR MAN ’ S SECURITY Sean Evans EKU, Dept. of Technology, Net Program.
Gateplus Time Attendance and Access Control System.
MULTIMEDIA ALARM SERVICES. The current Alarms Business Model.
Unmanned Surveillance Tank Frederick Guilfoil Eastern Kentucky University Dept. of Technology, CEN 499.
PI : TV A PI MEDIA CENTER Michael Hoskins Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
PLC HOME SECURITY SYSTEM Wesley Roe EKU, Department of Technology Computer Electronic Networking.
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
SKY-PEak: BRIDGING SKYPE Jamie Caudill Eastern Kentucky University.
Microcontroller Based Wireless Camera Security System John Saylor Computer Electronic Networking.
REMOTE DOOR LOCK CONTROL Robert B. Schidle EKU, Dept. of Technology, CEN.
ARDUINO GAME BOARD Shawn Denny Eastern Kentucky University May 8, 2013.
Team Welcome to Woop Woop Project WiFi Clock. Introduction Team Members  Rosemary Peters  Kirby Wigton  Nate Perkins  Joe Haggberg Advisor Dr. Aziz.
RFID P ET F EEDER Sally Smith Eastern Kentucky University Department of Technology NET program.
LOD Surveillance System Jamie Creech Software Engineer.
MICROCONTROLLER BASED PARKING GARAGE Kevin Reynolds EKU, Dept. of Technology Computer Electronic Networking.
SET UP A SOHO SERVER AND NETWORK: THE BASICS Tony Hancock (NET 2012 Capstone. EKU) Presented by: Tony Hancock.
Homeland Security System Danny Butler EKU, Dept. of Technology.
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
Active Home Timmy Henery Affiliation EKU, Dept. of Technology.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
ALL CAPS TITLE Presenter’s Firstname Lastname Affiliation (such as EKU, Dept. of Technology, CEN/CET)
ATTIC BOULDERING IN ACTION Brandon Powell EKU Technology department EET 499 CET/CEN Capstone project 2009.
ANDREW SIX EASTERN KENTUCKY UNIVERSITY RED Rover.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
MOVIE TERMINAL APPLICATION Michael Disney EKU, Dept. of Technology, CEN/CET.
NETWORK OPERATING SYSTEM INTEROPERABILITY Jason Looney EKU, Department of Technology, CEN.
USER IDENTIFICATION SYSTEM.
SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Joshua Paige NET 499 Capstone Project APPLE REMOTE DESKTOP WITH A SIDE ORDER OF ALICE.
Microcontroller Based Automobile Security System Chuan-An (Chen) Hou EKU, Dept. of Technology Computer Electronic Networking.
A Multi-Purpose Remote Controller Based on Bluetooth Mobile Phone Advisor: Chao-Huang Wei Student: Syue-Ming Lin PPT Production rate: 100% Data: 2012 /
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
ALL CAPS TITLE Presenter Name Affiliation (University)
Master/Slave networking configuration Alan Maynard Computer Electronic Networking.
SOLARPACKING Mitch Vernon Eastern Kentucky University.
THE FUTURE OF PUBLIC TRANSPORTATION Roosevelt Cooper Project Presentation 1 History : C++, Html, Java, C, Obj C.
LINUX CLUSTERING USING OPENMOSIX Jose Matthews Computer Electronic Networking, EKU College of Business and Technology.
ALL CAPS TITLE Group Name Presenter Names Affiliation Information.
MY NETWORK TAP Richard Elswick Easter Kentucky University.
ALL CAPS TITLE Source Author Name(s) & Affiliation (University/Lab/Company) Presented by: Your Group Name & Member Names.
HOME SECURITY USING PLC Ryan Badgett EKU, Dept. of Technology, CEN.
MICROCONTROLLER DETECTION SYSTEM Joshua Bosiljevac EKU.
CabSec Integrated Security ANTHONY WARNER NETWORK SECURITY & ELECTRONICS PROGRAM OF AE&T AT EASTERN KENTUCKY UNIVERSITY.
HOME AUTOMATION Robert Brandenburg EKU, Dept. of Technology, CEN/CET.
Raspberry Pi Garage Door Mark Barron NET 499 Eastern Kentucky University.
HOME SCHOOL FOR NETWORK SECURITY James Coffey Network Security & Electronics Program Dept. of Applied Engineering & Technology Eastern Kentucky University.
TECHNOLOGY RESOURCE MANAGEMENT PORTAL Casey Spires Eastern Kentucky University.
PARSLEY PIE BOX James (Kyle) Parsley Network Security & Electronics Program.
HIGH END DESKTOP WITHOUT HIGH END PRICE VIRGIL EDWARDS NET 499 SPRING 2016 EASTERN KENTUCKY UNIVERSITY 1.
LEARNBOT Matthew Williams Network Security and Electronics Program Dept. of Applied Engineering & Technology, Eastern Kentucky University.
Key features of version 2.0 Personalised dashboard Wireless locks
Dr. Kyung Eun Park Summer 2017
Port Knocking Benjamin DiYanni.
The Claw Alert Feline Training Assistant
Clinton A Jones Eastern Kentucky University Department of Technology
ALL CAPS TITLE Source Author Name(s) & Affiliation (University/Lab/Company) Presented by: Your Group Name & Member Names For the final capstone presentation.
Welcome to Glenallan’s Community Connection with a Math Focus!
SMART BUILDING WITH INDOOR NAVIGATION SYSTEM -using iot
Fix QuickBooks Payroll Update Error Call
Electronic Door Unlock with Face Recognition
Presentation transcript:

OUTLINE  Motivation  Introduction  Problem Statement  Assumptions  Proposed Solution  Results  Conclusions  Future Work  References  Acknowledgements 2

MOTIVATION  RFID based door systems are used world-wide in a variety of industries.  Problem is they aren’t as secure as people think.  Someone can steal a valid RFID card and gain access.  Or someone could clone someone’s valid RFID card.  I wanted to find a way to make RFID based door systems more secure. 3

INTRODUCTION  I’ve always been interested in RFID technology.  After a little research I found a problem in one area of RFID technology implementation.  RFID card reader based door systems aren’t very secure.  Anyone with a little common sense could find a way in through a door using traditional RFID based systems.  All they RFID reader based door systems on the market are basically the same. 4

INTRODUCTION  I set out to design a system to fix this security issue.  I wanted to develop a custom RFID card reader door system with an Arduino. 5

PROBLEM STATEMENT  RFID card reader based door entry systems are insecure.  This gives people using these systems a false sense of security.  It provides a possible entry- point for criminals… 6

ASSUMPTIONS  People assume that RFID based entry systems are expensive.  That these systems are hard to install, implement or manage.  The system I designed can be installed at a residence, business or warehouse.  My system cost about ten times less than commercially available systems.  This system does require someone to have knowledge about electronics and how they operate.  You also need to have some understanding or experience programming with C++, C, Java and HTML. 7

PROPOSED SOLUTION  List steps taken to solve the problem such as but not limited to:  Research RFID systems and how they work.  Research Arduino microcontrollers.  Design an RFID based system with an Arduino microcontroller.  Finding reasonable resources to obtain hardware needed for this project.  Writing custom code for Arduino.  Configuring hardware and software.  Troubleshooting issues with hardware/software.  Testing in a real-world environment.  Verifying results 8

PROPOSED SOLUTION  My system uses an IP cam to let the other person see who’s on the other side of the door.  Then they can make a decision to either unlock the door, lock the door or to sound an alarm.  This system is available over the internet and can be seen from any where in the world with an internet connection.  This allows for being able to control the door remotely. 9

10 PROPOSED SOLUTION

11 PROPOSED SOLUTION

RESULTS  To build my system it costs a total of $  Most RFID based entry systems can costs thousands of dollars.  My system adds another layer of authentication that involves interaction from a human to identify the person trying to access the door.  This two-factor form of security makes my system superior to other similar systems. 12

CONCLUSIONS  This project proposes a viable and practical solution to the security flaws with most available RFID based door systems.  Before starting this project I couldn’t tell you what an Arduino even was.  My understanding of electronics, microcontrollers and my programming skills in C++, C, Java and HTML have improved tremendously. 13

FUTURE WORK  This project could be customized in many ways.  Due to the limitations of the Arduino because of it’s small amount of memory and limited processing power, I would look for a better microcontroller.  I would recommend moving away from the Arduino microcontroller and implementing the Raspberry Pi.  This project can be scaled up to incorporate multiple doors and cameras.  Thank you for watching this presentation.  If you have questions, comments or suggestions, you can send them to me at 14

15 QUESTIONS???

REFERENCES  Long, T.( 2013,May 05) Remote Security Solutions. Retrieved from: aet.org/net/Capstone/2013/TommyLong_EKU- NET_Capstone2013_presentation.pptxhttp:// aet.org/net/Capstone/2013/TommyLong_EKU- NET_Capstone2013_presentation.pptx  Long, T.(2013,May 05) Remote Security Solutions Tutorial. Retrieved from: aet.org/net/Capstone/2013/TommyLong_EKU_NET_Capsto ne2013_video.wmvhttp:// aet.org/net/Capstone/2013/TommyLong_EKU_NET_Capsto ne2013_video.wmv 16

ACKNOWLEDGEMENTS  Margolis, M. (2011). Arduino cookbook. Beijing: O'Reilly. Provide a thumbnail of image/video along with online/author information  RFID card swipe image. Retrieved May 05,2013 from  Arduino Uno image. Retrieved May 05, 2013 from  Burglar image. Retrieved May 05, 2013 from  Security Guard image. Retrieved May 05, 2013 from  Special thanks to Andrew Six for his help. 17