1. Presenters: Constantine Grantcharov Ryan Burbidge 2.

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

VEHICLE TRACKING SYSTEM 007B
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
OfficeTrack Fuel and other Static Sensors Control.
Daniel Bichler Page 1 Security and Privacy in Pervasive Computing Environments PhD project –Infineon AIM SC D TD, Munich –Started on
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Aloaha protects Mobile M2M Communication with secureSIM.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Introducing new GPS based Vehicle Tracking System DG-Tracker Digilog Systems is now Nelso Technology Pvt. Ltd.
Bryan Donyanavard Nik Sumikawa. Project Description Transfer data between two mobile phones via Bluetooth. A unique cell phone movement will establish.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Vehicle Security Advance Mobile App. Always Connected with your Car Connected with your Car even though, your car is parked at unknown place.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Telecommunication and Networks
TSP Must Fit Within An Overall Agency ITS Plan. Transit Priority Data Needs Vehicle Location –Speed Door & Lift Status –Predictions Passenger Counting.
Networks Evolving? Justin Champion C208 Ext:3723
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
2013 InTeam is a Project Collaboration Platform. Nenvo has developed their mobile phone (v1) applications Nenvo Development Included:
Introduction Mobile Switch is a device which will be helpful to switch on and off any electrical/electronic devices through a SMS. The parameters of these.
Sensors and Actuator Network Based Architectures and Protocols for Smart Homes Bluetooth enabled Smart Home Mark Shaw Giorgio Politano Supervisor: Mieso.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
DEC0905 Remote Control of Home Appliances ABSTRACT The objective of this project is to enable users to remotely control home appliances and systems over.
RCEEMS Project Remotely Controlled Engine Management System Valery Gorohovsky & Shmuel Koyas Supervised by Boaz Mizrachi 19/04/2012.
Quality of Protection (QoP) An approach that separates the development of security services from the application development partitions security services.
Web Services (Part 1) Service-Oriented Architecture Overview ITEC 625 Web Development Fall 2006 Reference: Web Services and Service-Oriented Architectures.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
Save-bees’ solution : Consists of standalone devices that are placed in the beehives and offer accurate measurement information for The weight of the.
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
ODU Safety Button Presented by Wayne Stilwell CS 495 Fall 2011.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1.
Trackstar Navigations Pvt. Ltd. Presenting New Generation GPS Tracking System.
Module 9: Fundamentals of Securing Network Communication.
Performix Business Services Converging to Unified Messaging With convergence of telephony, computer and multimedia communication becoming a realistic vision,
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
A Study of Wireless Virtual Network Computing Kiran Erra.
Add functionality to last year’s project Remotely operate and check the status of a door strike using a cell phone Last Year’s Project IR Signal Internet.
Csci5233 computer security & integrity 1 Cryptography: an overview.
System integration of WAP and SMS for home network system Editor : Chi-Hsiang Wu, Rong-Hong Jan School : the National Chiao Tung University Source : Computer.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Bus Detection Device For The Passenger Using GPS And Gsm Application Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
V-Dile Solution Nigeria Your Choice, Our Motivation.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
LBS Division INDOOR POSITIONING SYSTEM Indoors Independent infrastructure that communicates via wireless connection standards: RFID Technology: Continuous.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Auto-Park for Social Robots By Team Daedalus. Requirements for FVE Functional Receive commands from user via smartphone app Share data with other cars.
Investigation into developing stand- alone Location Based services (LBS) Nkululeko Gojela g01g2471.
6.033 Quiz3 Review Spring How can we achieve security? Authenticate agent’s identity Verify the integrity of the request Check the agent’s authorization.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Personal Trip Assistance System. Intelligent Transport Systems Increase in traffic intensity  need for intelligent way for road usage.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Applying Cryptography to Physical Security
Version B.00 H7076S Module 3 Slides
A Study of Wireless Virtual Network Computing
Networked Door Locking System
Install AD Certificate Services
Presentation transcript:

1

Presenters: Constantine Grantcharov Ryan Burbidge 2

 The Anti-theft System What are the Tracker and Locator?  System Components The Locator The Tracker  So What’s the Point?  Reaching the Destination  In The End… 3

Tracker Locator 4

5

User Input:  SMS  Bluetooth Comm. Module:  Decrypts SMS/Bluetooth messages  Deciphers user’s commands Communication Module Controller Module LBS Module Notifications Module 6

Comm. Module:  Remote Location Request  ON / OFF Communication Module Controller Module LBS Module Notifications Module 7

LBS (Location Based Services) Module:  Location Request: “Where am I?”  Location Response: GPS Coordinates  Uses GPS / Wi-Fi to perform look-ups Communication Module Controller Module LBS Module Notifications Module 8

Controller Module:  Detects when vehicle theft occurs.  Monitors GPS / Wi-Fi signal strength and connections. Communication Module Controller Module LBS Module Notifications Module 9

Notifications Module:  Alerts user of thefts and system status  Protocols: SMS Real-Time Protocol Communication Module Controller Module LBS Module Notifications Module 10

11

GUI Sender/ Receiver Sender/ Receiver Encryption / Decryption Encryption / Decryption Communication Module Basic Functions:  Allows the user to control the anti-theft system Pair, Lock, Unlock, and Get Location Control remotely via Bluetooth or SMS  Gives the user feedback Command confirmation Location feedback  Provides initial pairing and encryption setup 12

GUI Sender/ Receiver Sender/ Receiver Encryption / Decryption Encryption / Decryption Communication Module  Allows the user to control the anti-theft system Pair, Lock, Unlock, and Get Location Control remotely via Bluetooth or SMS 13

GUI Sender/ Receiver Sender/ Receiver Encryption / Decryption Encryption / Decryption Communication Module  Gives the user feedback Command confirmation Theft notification Location feedback 14

GUI Sender/ Receiver Sender/ Receiver Encryption / Decryption Encryption / Decryption Communication Module  Provides initial pairing and encryption setup Exchanges ID information for future communication Establishes cryptographic keys to secure communications 15

 The goal is to create an automobile security/recovery system that… Uses mobile phone and GPS technology. Reports its location upon theft or per user request. Secures communication through an authentication process and cryptography. 16

 Key Accomplishments: LBS Module (GPS) GUI Module  Are we on schedule? Two weeks behind  Challenges / Next Steps: Implementing and testing real-world behavior that cannot be simulated due to lack of devices Integration of all components 17

 Empower users to put their vehicle security into their own hands.  Help law enforcement agencies reduce the 146,000 reported motor-vehicle thefts in Canada 18

19 I’ve been stolen! Save me!