WvU-Secure Group 10 - Wireless Sensor Network Security System Steven Andryzcik, Daniel Gilmore, Dane Hamilton, and Garrett Michael.

Slides:



Advertisements
Similar presentations
Pervasive Wireless Solutions © Copyright IBM Corporation 2004 IBM La Gaude Smart Home / Intelligent Building Jean-Michel Corrieu IBM Europe Technical Manager.
Advertisements

Wireless Sensor Network and Internet Protocol Integration with COTS Sigit Basuki Wibowo Widyawan.
Prepared By Naieem Khan & Ummiya Rahman Presentation On.
University of Belgrade, Serbia School of Electrical Engineering (ETF) European FP7 Project PROSENSE Applying integrated sensor networks in public distribution.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Web-based Distributed Flexible Manufacturing System (FMS) Monitoring and Control Student: Wei Liu Instructor: Dr. Chang Apr. 23, 2003.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
2008/7/3 NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and.
SSL From Your Smartphone Support for Android Smartphones /
Network Topologies.
 The Circuit  Home Security Systems are a simple electric circuit. To open or close a light, you simply throw a switch. In a burglar alarm it?s the.
HOME AUTOMATION THROUGH ANDROID MOBILE. What is Home Automation?  Home automation involves introducing a degree of computerized or automatic control.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
Sensors and Actuator Network Based Architectures and Protocols for Smart Homes Bluetooth enabled Smart Home Mark Shaw Giorgio Politano Supervisor: Mieso.
MINI MEDIA CENTER Charles Hayden Network Security and Electronics Department of Applied Engineering and Technology Eastern Kentucky University.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
AND Technology Redefining mobile solutions for your business success.
Training Agenda Introduction September 24 & 25, 2010.
Microcontroller-Based Wireless Sensor Networks
WIRELESS DISPLAY OVER BLUETOOTH USING PI AND ANDROID PHONE Group Members: Shweta Ware, David Etim Network Embedded Systems.
Smart Charge+ Senior Design 2014 Presented By: Alex Bouvy, Matt Freifeld, Doug Kerr, Mike Steele, Anselm Tamasang, Gavin White.
Group 10: wvU- Secure Final Presentation 24 April, :00 P.M. ESB 801.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Smart Garden Irrigation System Pranshu Bansal, Michael Fields, Chirag Tailor.
Dustin Matheny Haley Smith Steve Kimble Eric Loy Mercury Remote Robot Challenge Group 10.
SENIOR DESIGN 1 FALL 2015 HOME SECURITY SYSTEM [1]
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
HOME SECURITY SYSTEM Senior Design 1 Fall 2015 [1]
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
A Prototype for the Continuous and Cost-Effective Measurement of River Discharge.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
788.11J Presentation Wearable Wireless Body Area Networks (WWBAN) Presented by Jingjing He.
Wireless Mesh Networking or Peer to Peer Technology Andre Lukito – Johnsonsu – Wednesday, 9.
A Cost Effective Centralized Single parameter Patient Monitoring System Abstract Lack of Medical monitoring equipment's in rural areas of underdeveloped.
Saahithi Chillara Radhika Goyal ECE Fall Senior Design Project.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Projekt „ESSNBS“ Niš, November 4 th – 7 th, DAAD Wireless Measurement System for Environmental Monitoring and Control MM. Srbinovska, V. Dimcev,
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
training-in-chennai.
Home Phone Service February, CONFIDENTIAL AND PROPRIETARY | What is Ooma? The smartest home phone is the one that gives you exactly what you want.
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
Comparison between Cisco ISR G2 Routers
Askar Muratbek uulu Gediz University Electrical – Electronics Engineering.
HOME SECURITY SYSTEM Senior Design II Spring 2016 [1]
Introduction to Android Programming. Features of Android.
Intro. to Telecommunications
Sensors Journal, IEEE, Issue Date: May 2013,
Configure Instruction
Architecture for security monitoring in IoT environments
Types of Internet Access
SMART BUILDING WITH INDOOR NAVIGATION SYSTEM -using iot
① Introduction ② Features ③ Connectivity Features ④ Platform & Storage Features.
Issues with Your D-Link Router; Call D-Link Router Customer Support Number
Canada Residential Products
What we learn during Program
Business Phone Service
CAPWAP Architectural Requirements on
Smart Home and Garden System
Business Phone Service
Business Phone Service
Tareq Khan, Ph.D. Assistant Professor,
Instructor: Mort Anvari
AP-AC communications and Functional Architecture
Providing Teleworker Services
Presentation transcript:

wvU-Secure Group 10 - Wireless Sensor Network Security System Steven Andryzcik, Daniel Gilmore, Dane Hamilton, and Garrett Michael

Introduction  Background  Problem Statement  Architecture  Major Technologies and Innovations  Challenges and Expected Outcomes  Project Plan  Component Procurement Plan

Background  Incarnations of security systems have existed for centuries  Each generation adds more security  Modern systems are more advanced than ever

Modern Systems  Features:  remote monitoring of home  dialing owners/authorities  (recently) smartphone integration  Can require any of the following:  costly installation by a professional  monthly subscription fees  a landline for calling

Problem Statement  Develop a system to remove most requirements  No professional installation required  No subscription fees  No landline required  Implement smartphone integration

Overall Architecture

Major Technologies Telos B Raspberry Pi

Major Technologies  Telos B Module  Central Node (Raspberry Pi + Telos B connected to router)  Phone Application (Android OS)

Innovations  Android mobile device support  No monthly fee  Reliability and features of a permanent system while allowing flexibility with wireless nodes

Challenges  Communication between Android application and WSN security system  Battery management system  Modifying TinyOS

Expected Outcomes  Secure Residence  Inexpensive  Useful  Large Customer Base

Project Plan

Procurement Plan  3 Telos B Wireless Remotes  1 Raspberry Pi  1 8GB SD Card

Conclusions  Security Systems for All People  Breakthrough Technologies  Extendable