Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

Slides:



Advertisements
Similar presentations
Network II.5 simulator ..
Advertisements

Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
I/O Organization popo.
Gone in 360 Seconds: Hijacking with Hitag2
Autonomous Tracking Unit John Berglund Randy Cuaycong Wesley Day Andrew Fikes Kamran Shah Professor: Dr. Rabi Mahapatra CPSC Spring 1999 Autonomous.
The 8051 Microcontroller Chapter 5 SERIAL PORT OPERATION.
Programmable Keyboard/ Display Interface: 8279
DATA COLLECTION USING ZIGBEE NETWORK Timothy Melton Moscow, ID.
PIV Data Model Testing Ketan Mehta March 3, 2006.
Enter Dept name in Title Master Mobile Operating Vehicle Electronics- Fuel Management System SDP09:Team Gao By: Shelby Berleus, Lukasz Gawel, Karan Mendiratta,
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Biometric Security System Capstone Project CDR Mat Merkow Tung Nguyen Dipesh Shakya.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Iron Key and Portable Drive Security Zakary Littlefield.
Temporal Key Integrity Protocol (TKIP) Presented By: Laxmi Nissanka Rao Kim Sang Soo.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
VHDL AES 128 Encryption/Decryption
OUTLINE WHAT ? HOW ? WHY ? BLUEPOST Poster and Message Content Specified by the User Displaying the Poster Content on a Monitor Sending Messages to.
A Framework for Patient Monitoring A. L. Praveen Aroul, William Walker, Dinesh Bhatia Department of Electrical Engineering University of Texas at Dallas.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
Jirasak Raksachum Prince of Songkla University.  XBee ?  Specifications of the XBee®/XBee ‐ PRO®  Pin Signals  Serial Communications  ZigBee & Network.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Wireless Data Acquisition for SAE Car Project by: J.P. Haberkorn & Jon Trainor Advised by: Mr. Steven Gutschlag.
Microcontroller Architecture— PIC18F Family
E-Voting Machine - Design Presentation Group M1 Jessica Kim Chi Ho Yoon Jonathan Chiang Donald Cober Mon. Sept 8 Initial Design Secure Electronic Voting.
Microcontroller Architecture PIC18F Family
Secure Mobile Computing using Biotelemetrics Mahlon Graham University of Virginia NSF Research Experience for Undergraduates.
Voice Controlled Helicopter Team Members: Jonathan Lam, Mian Zhu.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
02/13/2002Team Epimetheus1 Team Epimetheus Wireless Robot Module Matt Beerman John Fatica Hubert Ho Erik Justen Brad Kramer Matt Rankin Karl Yeh EE682.
Made in United States of America EMIT SIM emit.descoindustries.com Rev:
 Purpose of our project  Get real world experience in ASIC digital design  Use same tools as industry engineers  Get practical experience in microprocessor.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Authentication Approaches over Internet Jia Li
Secure Embedded Processing through Hardware-assisted Run-time Monitoring Zubin Kumar.
Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems Ishtiaq Rouf, Hossen Mustafa Rob Miller Marco Grutese Presented By.
12004 MAPLD: 141Buchner Single Event Effects Testing of the Atmel IEEE1355 Protocol Chip Stephen Buchner 1, Mark Walter 2, Moses McCall 3 and Christian.
1. Presenters: Constantine Grantcharov Ryan Burbidge 2.
CHAPTER 3 TOP LEVEL VIEW OF COMPUTER FUNCTION AND INTERCONNECTION
Vintage Computer Hardware 101 Featuring the MITS Altair 680b Bill Degnan.
LZRW3 Decompressor dual semester project Characterization Presentation Students: Peleg Rosen Tal Czeizler Advisors: Moshe Porian Netanel Yamin
 “Zigbee is a suite of high level communication protocols using small, low power digital radios based on an IEEE 802 standard.”  Basically- short-range.
3.2 Software Fundamentals. A protocol is a formal description of digital message formats and the rules for exchanging those messages in or between computing.
Bully Blue Lock Midterm Presentation 2014 Senior Design II.
7 - 1 Texas Instruments Incorporated Module 7 : Serial Peripheral Interface C28x 32-Bit-Digital Signal Controller TMS320F2812.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
TinyOS By Valliappan Annamalai. Hardware Mica motes (Mica2 and Mica2Dot) Hardware –Radio –Microcontroller –Flash memory –ADC –Sensor Board (MTA310)
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
An optimization of the SAFER+ algorithm for custom hardware and TMS320C6x DSP implementation. By: Sachin Garg Vikas Sharma.
Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
SUBMITTED BY EDGEFX TEAM PORTABLE CODED WIRELESS MESSAGE COMMUNICATION BETWEEN TWO PARTIES SECRETLY WITH LCD DISPLAY.
SESM Demonstrator FPGA Power Node Prototype Emilio Bisbiglio, SESM, Przemyslaw Osocha, SESM,
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
Smart Portable Key ECE 445 Aashay Shah Akshay Chanana TA: Igor Fedorov Project No. 45 Spring 2013.
SUBMITTED BY EDGEFX TEAM
Team Epimetheus Wireless Robot Module
Outline The basic authentication problem
BioLock (Biometric Home Entry System)
SUBMITTED BY EDGEFX TEAM
SMART - AKK Department of Electrical and Computer Engineering
Programming Boe-Bots (Part 1)
AT91RM9200 Boot strategies This training module describes the boot strategies on the AT91RM9200 including the internal Boot ROM and the U-Boot program.
Processor Organization and Architecture
Computer Systems An Introducton.
Presentation by Anthony Dotterer
Presentation transcript:

Designed by: Anita Has Kristina Suen

SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration

MOTIVATION & REQUIREMENTS Security Vulnerabilities Lost/Stolen Key Eavesdropper SMART – AKK Requirements Encryption of data over communication line Tiny Encryption Algorithm Biometric verification module ARA-ME-01 Biometric Module Vehicle simulation Wireless communication via XBEEs

SMART - AKK

HARDWARE

DESIGN LAYOUT

SMART- AKKDESIGN

AKVDESIGN

X-Bee Wireless Modules 10 meter range test USART Communication 8-bit data packets baud rate

ARA-ME-01 Biometric Module On chip authentication Scanning & matching of 120 fingerprints Less than 3 seconds fingerprint matching

ARA-ME-01 Biometric Module USART Communication baud rate Packet format (in hex) Example packet Read image from sensor and store in image buffer Packet head Device address Packet flag Packet length CommandChecksum RequestEF01FFFFFFFF ResponseEF01FFFFFFFF A

ARA-ME-01 Biometric Module Application to SMART - AKK Master fingerprint Enroll additional fingerprints Reset memory and master Authenticate fingerprints Execute any command on AKV

SOFTWARE

Tiny Encryption Algorithm (TEA) Why TEA? i. Simplicity ii. Speed iii. Cryptographic strength AKV Data Packet:64-bits AKK/AKV VIN Key : 128-bits

Tiny Encryption Algorithm (TEA) Serial number consists of synchronized counter that is incremented by 0x8 to prevent eavesdropping Valid AKV Command Atmel55 Button Sequence 32-bit Action Before TEA 32-bit Action After TEA Lock All DoorsButton 1 0x xFB5319C8 Unlock All Doorsdouble click Button 1 0x x4F9270C3 Engine OnButton 2 0x x015F1A82 Engine Offdouble click Button 2 0x x0BBF3EDC PanicButton 3 0x x52CE67EA

initialize LEDs and buttons open USARTs fingerprint scanned ? fingerprint valid ? button pressed ? create action/serial packet encrypt Packet send start TX byte send packet in bytes send end TX byte SMART – AKK Software Flow NO

initialize LEDs open USART start TX byte received ? receive byte end TX byte received ? decrypt packet valid action/serial ? execute AKV action; LED sequence NO 8 byte buffer overflow ? NO AKV Software Flow

DEMONSTRATION

QUESTIONS