Presentation is loading. Please wait.

Presentation is loading. Please wait.

ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification.

Similar presentations


Presentation on theme: "ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification."— Presentation transcript:

1 ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification System

2 2 ECE 415 Senior Design Project Fall 2010 Project Overview  Friend Foe Identification System  Allow for identification and threat assessment of military vehicles approaching base stations  Security Secure transmissions Prevent digital terrorism and impersonation of friendly vehicles Password interface Prevent hijackings of military vehicles

3 3 ECE 415 Senior Design Project Fall 2010 Final Design Concept  Prototype system with limited range Design hardware and communication modules, leave actual method of transmission up to end user  WiFi as wireless transmission prototype Well defined standards, inexpensive implementation  Nios II Run C code on top of hardware Transition from software prototype Especially useful for testing hardware modules

4 4 ECE 415 Senior Design Project Fall 2010 Progress  Project website Project documents Design review presentations System block diagrams  Hardware FPGA: Altera DE-2 development boards (borrowed) GPS: Ambicom GPS Navigation Receiver (~$70) WiFi Antenna: IOGear GWU523 (802.11b/g) (~$20) GUI: Google Maps overlay applet

5 5 ECE 415 Senior Design Project Fall 2010  Scaling as follows:  Range: 2 miles -> 100 m  Speed: 105 km/h -> 6.56 km/h GUI Applet: Vehicle’s speed is 1.83 m/s  Time to react: 110 seconds  GPS Accuracy: 5 ~ 10 m Updates every.1 seconds Take average over a 1 second period to limit inaccuracy Scaling to Prototype

6 6 ECE 415 Senior Design Project Fall 2010 Data Flow Diagram

7 7 ECE 415 Senior Design Project Fall 2010 Interrogator Unit

8 8 ECE 415 Senior Design Project Fall 2010 Transponder Unit

9 9 ECE 415 Senior Design Project Fall 2010 Identification Process

10 10 ECE 415 Senior Design Project Fall 2010 Packet Structures  4 message types: Base Module: Request Identification Acknowledge ID/Update Hash Value Vehicle Module: Transmit Identification Acknowledge Hash Update

11 11 ECE 415 Senior Design Project Fall 2010 Messages  Each message will be preceded by an unencrypted acknowledge message  Vehicle module may have unique unencrypted messages  Makes decryption process more efficient by letting decryption module know what data is meaningful

12 12 ECE 415 Senior Design Project Fall 2010 Password Transformation  Why do passwords need to be unique? Avoid physical keys, use shared password Encryption is data dependant  Implementation Shared 16 bit password for all vehicles Multiply by randomly generated 16-bit number 2 32 possible values “Three strikes rule” - ~ 7x10 -8 % chance of correctly guessing password even if all other parts of the system have been compromised

13 13 ECE 415 Senior Design Project Fall 2010 Randomization Value Updating  Updated through rolling encryption scheme Similar to system used for remote entry devices for cars  Last message from base to vehicle sends new randomization value Generated by base, stored by vehicle  Base stores current and most recent randomization values Final message is vehicle to base Base must store both in case final transmission not received

14 14 ECE 415 Senior Design Project Fall 2010 RC5 Encryption Module  Initial C-based implementation—Completed Timing trials from 32-bit XP OS, running on a 1.83 GHz processor.  Future Verilog implementation Timing Expectations  Algorithm requirements: Strong Security Data Dependant rotations Fast Encryption, Decryption, and Key Expansion

15 15 ECE 415 Senior Design Project Fall 2010 RC5—Security Strength  Several strategies for breaking block cipher: Exhaustive search Statistical tests Linear Cryptanalysis Differential Cryptanalysis  Most efficient attack a variant of differential cryptanalysis  Still requires unreasonable amounts of plaintext/ciphertext pairs

16 16 ECE 415 Senior Design Project Fall 2010 RC5—Security Strength (cont.)  Data Dependent Rotations Helps protect against differential cryptanalysis Coupled with the use of the password transformation, identical messages will have different ciphertexts. Prevents Timing analysis  Strength against other known cryptanalysis methods Linear Exhaustive 2 Bits_in_key attempts Statistical Data-dependent rotations/Hashing function

17 17 ECE 415 Senior Design Project Fall 2010 RC5—Operation Speed  Real-time requirement for transmissions  Speed Results for RC5 – 32/12/16  What if we increase the number of rounds? Achieves ≈220μs Key Expansion with 2000 rounds  Hypothesis: Verilog implementation will be more efficient than C Processor SpeedCompilerKey ExpansionEncryption/Decryptionbytes/second 90 MHz16-bit Borland220μs22μs36,000Bps 1.83GHz32-bit GCC>1μs >64MBps

18 18 ECE 415 Senior Design Project Fall 2010 GUI  Output on the base module will be a GUI using a Google Maps overlay  Present Used the longitude and latitude for UMass in demo 100 meters at UMass longitude is.00127 0 100 meters at UMass latitude is.001 0 Range of base station is 100 meters  Future Will be putting the GUI in an applet – need to acquire license from Google Simulated path based on normal UMass walkways will be used for demos– need GPS module before data can be taken

19 19 ECE 415 Senior Design Project Fall 2010 Deliverables - Prototype Java to C Model  Vehicle: Password encryption Data parsing & concatenation Bitwise shifting and transformation  Base Station: Password encryption Data parsing & concatenation Bitwise shifting and transformation GUI implementation

20 20 ECE 415 Senior Design Project Fall 2010 Future Deliverables - FDR Working Model C and Verilog code GUI Implemented RC5 encryption scheme Full Communication Between: GPS and Vehicle via USB Vehicle and Base Station via 802.11 protocols Base Station and GUI via USB Equipment GPS via USB port Working Antenna Transceivers Fully Implemented DE2 Boards

21 21 ECE 415 Senior Design Project Fall 2010 Future Considerations  WiFi relays Increased range while maintaining hardware and low power in vehicles module  Ad Hoc networking Allow vehicles to identify one another away from base  Enhanced driver identification system Increased protection against hijackings Example: fingerprint scan More specific to military personnel

22 22 ECE 415 Senior Design Project Fall 2010 GUI Demo

23 23 ECE 415 Senior Design Project Fall 2010 Sources  [1] B. Kaliski, Y. Yin. On the Security of the RC5 Encryption Algorithm. v1.0, September 1998. Available at ftp://ftp.rsasecurity.com/pub/rsalabs/rc5/rc5-report.pdf.  [2] R. Rivest. The RC5 Encryption Algorithm. March 20, 1997. Available at http://people.csail.mit.edu/rivest/Rivest- TheRC5EncryptionAlgorithm.http://people.csail.mit.edu/rivest/Rivest-  [3]R. Rivest. The RC5 Algorithm. Dr. Dobbs Journal number 226, pages 146-148. January 1995. Available at http://people.csail.mit.edu/rivest/Rivest-rc5rev.pdf http://people.csail.mit.edu/rivest/Rivest-rc5rev.pdf


Download ppt "ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification."

Similar presentations


Ads by Google