ISecurity End of Semester Presentation November 29, 2012.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO Wi-Fi TECHNOLOGY.
Advertisements

Kalpesh Vyas & Seward Khem
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
Track Timer Final Semester Presentation Senior Design I April 19, 2011.
Presented by Tianhe Wang. Mobile applications: People send/receive messages using wireless network much more frequently. Multimedia messages are often.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 19: Configuring Windows Firewall
Remote Surveillance Vehicle Design Review By: Bill Burgdorf Tom Fisher Eleni Binopolus-Rumayor.
Modern Remote Control Copyright
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
Review of the test results and plan for the final testing campaign Panagiotis Mousouliotis EDUSAFE ESR3 PhD Candidate, Aristotle University of Thessaloniki.
VPresent Collaborative Presentation System on Mobile Devices.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Brian Lee LTEC 4550 Network System Administration Mr. John West.
Cloud Control Senior Project Summer Overview Cloud Control is a platform to control data transmission to/from internet connected devices from the.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
1 Chapter Overview Wireless Technologies Wireless Security.
11 KDDI Trial Hub & Spoke Shu Yamamoto Carl Williams Hidetoshi Yokota KDDI R&D Labs.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Android Husam Abdel Rahman. Introduction Android Operating system is most popular operating system these days with the advance in voice communications.
General Status  Analyze various options for connecting to the robot  Develop requirements for each connection  Check example projects o Videos with.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Click to edit Master title style Ramsey Baker Kunal Parbadia Radford Parker Rohit Sahay David Salazar SecurityCam Single Modular Wi-Fi Enabled Security.
Presented by Team A Wireless Home Networks By Abraham Kopyt, John Leonard, Christine Terry.
Integrating and Troubleshooting Citrix Access Gateway.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Bully Blue Lock Midterm Presentation 2014 Senior Design II.
SENIOR DESIGN 1 FALL 2015 HOME SECURITY SYSTEM [1]
HOME SECURITY SYSTEM Senior Design 1 Fall 2015 [1]
Accuracy In Your Back Pocket Mid-Semester Presentation March 26, 2015.
Android Multi-Meter (AMM)
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Laundry Now Senior Design Project Submitted By:
Powerpoint Templates Page Senior Design II Mid-Semester Presentation.
FriendFinder Location-aware social networking on mobile phones.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
FriendFinder Location-aware social networking on mobile phones.
Midterm Presentation Senior Design II February 28, 2012.
ISecurity Mid-Semester Presentation Draft September 26, 2012.
Accuracy In Your Back Pocket Mid Semester Presentation October 13, 2015.
Medication Compliance Alarm (MCA) Senior Design I Final Presentation.
ISecurity Mid-Semester Presentation October 9, 2012.
V i t a l i s Wireless Biometric Sensor ECE 477 Final Presentation Team 13  Spring 2013 Paste a photo of team members with completed project here. Annotate.
Smoke Notification System (SNS) Final Presentation Senior Design II November 19, 2013.
Smoke Notification System (SNS) Final Presentation Senior Design 1 April 18, 2013.
ISecurity Mid Semester Presentation February 26, 2013.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
INTRODUCTION TO THE INTERNET Internet Protocol Cameras Training: Session 1.
Digital-watchdog.com Complete Megapixel Surveillance Solution DW-VP9xT4P DW-VP12xT8P DW-VP16xT8P Rev : 04/15 Presenter’s Name Title |
Methods of Tracking Position i Pod Touch – Wi-Fi used to find location by detecting known hotspots. iPhone – Cellular triangulation uses the mobile communication.
Digital Carpool Aid Mid-semester Presentation Senior Design I March 5, 2015.
Digital Carpool Aid Mid-semester Presentation Senior Design I March 5, 2015.
Network System Security - Task 2. Russell Johnston.
U-PROX SMART HANDLE Fully incorporated Wireless Handle and Furniture Locking Set.
HOME SECURITY SYSTEM Senior Design II Spring 2016 [1]
VIVOTEK 2007 Product Roadmap
IP Camera and Doorbell Camera
Module Overview Installing and Configuring a Network Policy Server
Plug and Play NVR Solution
Server-to-Client Remote Access and DirectAccess
Smart Grid in the Home Senior Project Proposal
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

iSecurity End of Semester Presentation November 29, 2012

Team Members Jonathan Lalo Read Sprabery Brandon Dahler John Gazzini Dr. Yogi Dandass Computer Engineer Team Leader Image comparision Wifi Establisment Software Engineer Image format translation Image Transmission Server programming Software Engineer Server programming Image comparison Image Storage Computer Engineer iPhone application Image comparison

Outline Problem Solution Constraints ‒ Practical ‒ Technical System Overview Prototype Testing & Debugging Future Tasks Timeline

Problem A need exists to monitor homes while away at various locations. Devices that address this are expensive and difficult to install, making them inaccessible to the majority of potential users.

Solution iSecurity: Camera & WiFi device configured through iPhone application Notifications sent directly to the iPhone Device requires home wireless internet connection Minimal user interaction required for setup

Practical Design Constraints

Economic IZON - Close competitor [1] ‒ $130 price point, similar feature set ‒ Includes audio iSecurity ‒ $99 price point ‒ $49.99 manufacturing cost ‒ Competitive with ability to profit

Sustainability Device relies on external server ‒ Product Takes Off  Load problems  Need to be scalable and extensible for new products ‒ Product fails / Business Fails  Server still needs to be maintained, possibly downgraded  Continued support for existing products, possibly with degraded performance

Technical Design Constraints

Image Processing Performance Frame Analyzation in under 75ms ‒ Comparison between frames ‒ Storage ‒ Transmission Wireless Standards Basic requirements for Wi-Fi module ‒ WEP, WPA Personal, and WPA2 Personal ‒ Ad-hoc mode available for configuration

Storage Removable SD Card ‒ Adequate size and speed Power 120V AC to 5V DC ‒ Must provide at least 700mA Range Motion detectable at 40 feet ‒ Algorithm should be adjustable by the consumer

System Overview

Testing & Debugging

Distance Testing Approx. 40 Ft.

Unit Testing of Python Functions Used to isolate functionality for more thorough testing

Wireshark

NetCat

Prototype

Prototype: iSecurity Device Connect to iPhone over TCP via ad-hoc wifi. Get network credentials Connect to iSecurity Server Connect directly to iPhone via UDP hole-punching. Upload images via custom protocol

iPhone Connect to device over TCP via ad-hoc wifi. Request a list of all networks in range. Receive list and an authentication token Prompt user to select network, obtain credentials, send them back to device. Connect to iSecurity server via HTTP, create account. Request device ip address and port number Connect directly to device via UDP hole- punching. Request / Receive images via custom protocol

Prototype: iPhone Home ScreenFirst image successfully transmitted

Prototype: iPhone It just works Secure login Images streamed directly from camera to iPhone Significantly reduced server traffic Custom UDP protocol for streaming images

Prototype: iPhone Apple Push Notification Service [2]

Prototype: iPhone

Future Tasks Research and Purchase New Camera Faster Image Processing Local Network Functionality Professionally Package the Device Motion Detection Rage Adjustable through iPhone Finish iPhone UI

First Semester Timeline September 26 Order Parts October 14 Save pictures to SD card, begin motion detection, basic accounts on server November 14 Detect motion on device, broker connections via server, send pictures over Wi-Fi November 28 iPhone app full functionality, Server functionality December 1 Begin optimization

References [1] [2] NotificationsPG/ApplePushService/ApplePushService.htmlhttp://developer.apple.com/library/ios/#documentation/NetworkingInternet/Conceptual/Remote NotificationsPG/ApplePushService/ApplePushService.html

Questions?