Can’tTouchThis KSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh.

Slides:



Advertisements
Similar presentations
About us Development and production of equipment and software under Parsec trade mark started in 1997 The variety of Parsec products allow to use it.
Advertisements

Team 4 Baby Peas “Pulse Early Alarm Sensor”
Motorcycle product sheets
ELECTRONIC STICK FOR BLIND PEOPLE
Reliability Different worlds – same problem …one solution: Redundancy
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
Motorcycle antitheft systems Spyball 6500 platform Benefits 6500 Description: compact motorcycle antitheft alarm and engine immobiliser. Arming/disarming.
JSM Hammer’s Can’tTouchThis Mid-Semester Demo
RADAGAST power of the worlds Team Members: Chanin Laohaphan Mian Luo Andrew Noh Brian Pfiffner Jonathan Wu.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Team 1: Reflex Project Presentation System Architecture Use Case Reliability Inbae Lee Paul Thurlow
S.W.A.T (Security Watching All the Time) Jeff Shin Tyler Stubbs Paul Kasemir Pavel Mayyak.
Solar Car Data Collection System Matt Boyden Rene Dupuis Ryan Lavallee 4/23/08.
Mark CerritelliMatthew Fister Charles Cole Mine Yalcinalp.
Preliminary Design Review 27 January 2004 Weather Bulletin Board System (WeBBS): Fahid Jahrami, Arian Lalezari, Justin Lasiewicz, Joshua Miers, Nathan.
Mark CerritelliMatthew Fister Charles Cole Mine Yalcinalp.
Group 9: Chill Geordi: RFID based location sensing Brian Loo (bloo) Geeta Shroff (gshroff) Zane Starr (zcs)
Flatiron Mobile Device Security Monitor Thomas Horacek Lucas Greve.
Team GPS Rover Critical Design Review Alex Waskiewicz Andrew Bousky Baird McKevitt Dan Regelson Zach Hornback.
EE Capstone Spring 2008 Team RFID Mike Gauthiere Mike Loptien Chris Reid Kirk Spowart Vincent Wu.
Can’tTouchThis KSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh.
1 Application Accessory For Cellular Phone - Characterization Presentation - Performed by: Avi Feldman Omer Kamerman Project instructor: Boaz Mizrachi.
Electrical & Computer Engineering Mid-Course Design Review Anh-Vu Huynh Timothy Levernoch Samuel Patterson Christopher Ramonetti Advisor: Professor Siqueira.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
1 Mark CerritelliMatthew Fister Charles Cole Mine Yalcinalp.
Electrical and Computer Engineering Personal Heads-Up Display Ivan Bercovich Radu-Andrei Ivan Jeff Little Felipe Vilas-Boas Faculty: Dr. Tilman Wolf Preliminary.
Introducing The Revolutionary ENSA  EN ergy SA ving Automated Wireless Light Switch A World First For The Security Industry By Making Alarm Sensors Dual.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
USER INTERFACE CONTROL MODULE S ECURE IT : Automated Laptop Security System University of Pennsylvania School of Engineering and Applied Science Electrical.
Team Members: Nahiyan Ali Shrabantee Chatterjee Vaibhav Kumar Alex Weigel Tao Zeng Advisor: Dr. Mani Mina Client: Senior Design Dr. Gregory Smith.
Can’tTouchThis JSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh.
FALL DETECTION USING SMS ALERT. AIM  To find effective & timely fall of elderly and paralyzed patients using our fall detection method which is a combination.
Electromechanical Systems “Robotic Sorting System” Brent GuyJonathan Penney.
EMBEDDED WEB SERVER. CONTENT: 1.ABSTRACT 2.INTRODUCTION TO EMBEDDED SYSTEMS 3.INTRODUCTION TO EMBEDDED WEB SERVER 4.BLOCK DIAGRAM 5.POER SUPPLY 6.COMPONENT.
YouWatchMyStuff Team: Amrutha Doosa, Richard Atwood, Randy Duran, Raed Alkhaldi, Hussain Alsafar.
Systems Approach Burglar Alarm Project PROBLEM SITUATION DESIGN
AZOR – easy solution GSM mini alarm Azor. AZOR - introduction Common alarm system = STRESSFUL Your home is changing to „PROTECTED PREMISES“ Complicated.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
SHANTILAL SHAH ENGINEERING COLLEGE ,BHAVNAGAR
Flatiron Mobile Device Security Monitor Thomas Horacek Lucas Greve.
PROJECT TITLE : AUTOMATED EVALUATION OF RETAIL PRICE OF PRODUCTS IN THE TROLLEY SYSTEM AND WIRELESS TRANSMISSION OF THE BILLING SYSTEM.
By : Anand Yadav. What is Zigbee?  The CC2520 is Texas Instrument’s second generation ZigBee/IEEE RF transceiver for the 2.4 GHz unlicensed.
The Secure, Automated Home Project Team: Alec Kulbacki Project Advisor: W. Thomas Miller.
ABSTRACT Introduction: Air Mouse is used for navigation of cursor on the computer screen. It can be waved around in air without the need of a surface.
HOME SECURITY SYSTEM Senior Design 1 Fall 2015 [1]
LBS Division INDOOR POSITIONING SYSTEM Indoors Independent infrastructure that communicates via wireless connection standards: RFID Technology: Continuous.
Sponsored By: Freescale Sponsor: Kevin Kemp Faculty Advisor: William Stapleton Project # 1.3.
Mid Semester Presentation Glove Mouse. Jacob BassettChelsea MosserRobert BlackBryan Lee Electrical Engineer HID Protocol Enclosure Electrical Engineer.
Team01: Zelun Tie The design project Wall-E Prototype I is an intelligent automated trash collecting robot with obstacle detection capability. The robot.
HOT CAR BABY DETECTOR Group #20 Luis Pabon, Jian Gao ECE 445 Dec. 8, 2014.
ECE 477 Final Design Review
Theory of Operation and Hardware Design. PIC18F45K20 Microcontroller use at least 9 channels of ATD conversion with 2 more used for reference voltage.
HOME SECURITY SYSYTEM P.SHRAVAN KUMAR- 08N11A0477 K.RAKESH- 08N11A0444 M.INTHIYAZ- 08N11A0470 S.MUSTHAFEER - 08N11A0499 Under the guidance of D.HEMANTH.
D.L.PRASSANA KUMAR T.MAHENDAR SOFI SHAIK. ABSTRACT  This circuit turns on the horn of the bike to alert you of the impending theft if anybody tries to.
UWave: Accelerometer-based personalized gesture recognition and its applications Tae-min Hwang.
Can’tTouchThis JSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh.
RFID Based Access Control System using 8051
Applying Cryptography to Physical Security
Application Case Study Security Camera Controller
CMS:Children Monitoring System
DBS INSTITUTE OF TECHNOLOGY
UNMANNED INTELLIGENT MILITARY ROBOT USING ZIGBEE
INTELLIGENT ENERGY SAVING SYSTEM USING PIC MICROCONTROLLER
Personal Heads-Up Display
Sunnytek sensor networks
Automatic Cloth Folding Machine
Today’s Smart Sensors January 25, 2013 Randy Frank.
Automatic visitor based room light controller
Elecbits.
Diana Garcia California State University, Chico EECE 490A
Presentation transcript:

Can’tTouchThis KSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh

Project Concept/Motivation Concept: This project will act as deterrence against laptop thefts, providing the owner a greater degree of security. The prototype integrates off-the-shelf embedded components, such as motion-sensing accelerometer, buzzer, RFID reader and tags for passive activation of the device and the Tmote Sensor. Motivation: A laptop owner today is unable to leave his/her laptop unattended without risk of the laptop being stolen. Using our prototype system, an alarm will be activated if the laptop is being handled by unauthorized personnel.

Competitive Analysis: Caveo Anti-Theft PC Card: The product works by sensing motion and emitting an alarm when its moved. Our product will automatically activate the lock when it does not sense the user’s presence Kensingstone Cable Lock: The product works by physically locking the laptop to a secure object. Our product requires less user input and is a smaller and lighter solution.

Requirements: Functional Requirements: Detects the presence of the user when in range and disarms the device. Arms the device when user is out of range. Allows software arming and disarming of device. Detects movement of laptop when armed and sounds alarm accordingly. Non-functional Requirements: Reliability: When armed, the device will detect significant movement and sound the alarm. Usability: The device will require minimal user input after installation. Threshold: Non-extended small movements will be tolerated by the system. Timing: The alarm will trigger within 5 seconds of detection of motion.

Technical Specifications: Microcontroller: Moteiv “Tmote Sky” Buzzer: Generic “Buzzer” $2.50 ea Motion sensor: Freescale “MMA7260QT Accelerometer” $5.68 ea Rechargeable battery : Generic “3V Rechargeable Lithium Battery” Quote pending Wireless keycard components: RFID Reader: Texas Instruments “Series 2000 Micro Reader RI-STU-MRD1” Quote pending RFID Tag: Texas Instruments “Card Transponder TRP-R4FF” Quote pending Voltage step-up converter: Texas Instruments “TPS61027” $3.15 ea

Architecture Block Diagram

State Chart for Laptop

State Chart for Microcontroller

State chart for RFID reader State chart for Buzzer State chart for Accelerometer

List of Use Cases Bootstrapping TearDown

User leaves laptop User moves laptop List of Use Cases(continued…)

Thief moves laptop User approaches laptop List of Use Cases(continued…)

Risks R1. Compatibility between RFID reader and Telos Motes R2. Compatibility between voltage regulator, RFID reader and Telos Motes R3. Compatibility of rechargeable battery with rechargeable mechanisms on Telos Motes R4. Real-world performance of RFID reader with respect to range R5. Constraints with respect to the ports available on Telos Motes R6. Difficulty in finding suitable algorithms differentiating significant and non-significant movements R7. Usage under different laptop operating environments

Mitigation of Risks Worst case usage of Zigbee protocol and Telos Motes for passive device  (R1, R2, R4) Requires device to always be plugged into laptop  (R3) Usage of board to meet specific port requirements  (R5) Usage of multiplexers to meet port requirements  (R5) For worst case, any slight movement would trigger alarm  (R6) Requires Windows as main Operating System  (R7)