Presentation is loading. Please wait.

Presentation is loading. Please wait.

Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

Similar presentations


Presentation on theme: "Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration."— Presentation transcript:

1 Designed by: Anita Has Kristina Suen

2 SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration

3 MOTIVATION & REQUIREMENTS Security Vulnerabilities Lost/Stolen Key Eavesdropper SMART – AKK Requirements Encryption of data over communication line Tiny Encryption Algorithm Biometric verification module ARA-ME-01 Biometric Module Vehicle simulation Wireless communication via XBEEs

4 SMART - AKK

5 HARDWARE

6 DESIGN LAYOUT

7 SMART- AKKDESIGN

8 AKVDESIGN

9 X-Bee 802.15.4 Wireless Modules 10 meter range test USART Communication 8-bit data packets 38400 baud rate

10 ARA-ME-01 Biometric Module On chip authentication Scanning & matching of 120 fingerprints Less than 3 seconds fingerprint matching

11 ARA-ME-01 Biometric Module USART Communication 19200 baud rate Packet format (in hex) Example packet Read image from sensor and store in image buffer Packet head Device address Packet flag Packet length CommandChecksum RequestEF01FFFFFFFF010003010005 ResponseEF01FFFFFFFF07000300000A

12 ARA-ME-01 Biometric Module Application to SMART - AKK Master fingerprint Enroll additional fingerprints Reset memory and master Authenticate fingerprints Execute any command on AKV

13 SOFTWARE

14 Tiny Encryption Algorithm (TEA) Why TEA? i. Simplicity ii. Speed iii. Cryptographic strength AKV Data Packet:64-bits AKK/AKV VIN Key : 128-bits

15 Tiny Encryption Algorithm (TEA) Serial number consists of synchronized counter that is incremented by 0x8 to prevent eavesdropping Valid AKV Command Atmel55 Button Sequence 32-bit Action Before TEA 32-bit Action After TEA Lock All DoorsButton 1 0x111111110xFB5319C8 Unlock All Doorsdouble click Button 1 0x111122220x4F9270C3 Engine OnButton 2 0x222222220x015F1A82 Engine Offdouble click Button 2 0x222233330x0BBF3EDC PanicButton 3 0x333333330x52CE67EA

16 initialize LEDs and buttons open USARTs fingerprint scanned ? fingerprint valid ? button pressed ? create action/serial packet encrypt Packet send start TX byte send packet in bytes send end TX byte SMART – AKK Software Flow NO

17 initialize LEDs open USART start TX byte received ? receive byte end TX byte received ? decrypt packet valid action/serial ? execute AKV action; LED sequence NO 8 byte buffer overflow ? NO AKV Software Flow

18 DEMONSTRATION

19 QUESTIONS


Download ppt "Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration."

Similar presentations


Ads by Google