Presentation is loading. Please wait.

Presentation is loading. Please wait.

Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

Similar presentations


Presentation on theme: "Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration."— Presentation transcript:

1 Designed by: Anita Has Kristina Suen

2 SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration

3 MOTIVATION & REQUIREMENTS Security Vulnerabilities Lost/Stolen Key Eavesdropper SMART – AKK Requirements Encryption of data over communication line Tiny Encryption Algorithm Biometric verification module ARA-ME-01 Biometric Module Vehicle simulation Wireless communication via XBEEs

4 SMART - AKK

5 HARDWARE

6 DESIGN LAYOUT

7 SMART- AKKDESIGN

8 AKVDESIGN

9 X-Bee 802.15.4 Wireless Modules 10 meter range test USART Communication 8-bit data packets 38400 baud rate

10 ARA-ME-01 Biometric Module On chip authentication Scanning & matching of 120 fingerprints Less than 3 seconds fingerprint matching (1:N)

11 ARA-ME-01 Biometric Module USART Communication 19200 baud rate 1-start, 1-stop, 8-bit data, no parity Packet format (in hex) Example packet Read image from sensor and store in image buffer Packet head Device address Packet flag Packet length CommandChecksum RequestEF01FFFFFFFF010003010005 ResponseEF01FFFFFFFF07000300000A

12 ARA-ME-01 Biometric Module Application to SMART - AKK Master fingerprint Enroll additional fingerprints Reset memory and master Authenticate fingerprints (1:N) Execute any command on AKV

13 SOFTWARE

14 Tiny Encryption Algorithm (TEA) Why TEA? i. Simplicity ii. Speed iii. Cryptographic strength AKV Data Packet:64-bits AKK/AKV VIN Key : 128-bits (used to encrypt data packet)

15 Tiny Encryption Algorithm (TEA) Example AKV Data Packet: Five possible action commands (Lock/Unlock Doors, Engine On/Off, Panic) Serial number consists of synchronized counter to prevent eavesdropping Action Command (32 bits) Serial Number (32 bits) Before Encryption2222222299999999 After EncryptionA2A74BBB5282844

16 initialize LEDs and buttons open USARTs fingerprint scanned ? fingerprint valid ? button pressed ? create AKV action/label packet encrypt Packet send start TX byte send packet in bytes send end TX byte SMART – AKK Software Flow NO

17 initialize LEDs open USART start TX byte received ? receive byte end TX byte received ? decrypt packet valid AKV action/label ? execute AKV action; LED sequence NO 8 byte buffer overflow ? NO AKV Software Flow

18 DEMONSTRATION

19 QUESTIONS

20 << 4 >> 5

21 Scan Valid Fingerprint Press Valid Button Sequence Create Action Command & Serial Number TEA Encrypt 64-Bit Packet X-Bee Send Packet AKV Execute Command


Download ppt "Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration."

Similar presentations


Ads by Google