University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:

Slides:



Advertisements
Similar presentations
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Advertisements

What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Your future is bright blue! So Smart, Its Simple..
MICROCONTROLLED HOME Keith Jones EKU Deparment of Technology CEN.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Hotspot Express $ One of the Pioneers of complete WiFi solutions in India $ Hardware to create HOTSPOTs  Software to secure HOTSPOTs & Manage the users.
Department of Electrical & Computer Engineering Advisor: Michael Zink.
C Peace of mind is one step away Bluetooth Access Control System Product Presentation and Demo Copyright © 2007 Ztronicx Microsystems. All Rights Reserved.1/4/2007.
Shelby Berleus Lukasz Gawel Karan Mendiratta Juan Peralta Mobile Operating Vehicle Electronics ECE 415 Senior Design Project Fall 2009 Preliminary Design.
Flatiron Mobile Device Security Monitor Thomas Horacek Lucas Greve.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
Department of Electrical & Computer Engineering Preliminary Design Review Team: Lucas Root Telin Kim Brandon Thorpe Michael Shusta Advisor: Professor Tessier.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
University of Massachusetts Amherst InteLock TM Advisor: Professor Ganz Team: Emmanuel Seguin Christos Tsiokos Josh Coffin Anh-Kiet Huynh Remote Access.
PROJECT PROPOSAL Lennie Giannone, Ryan Savino, Carrie Johnston, and Jessica Fernandes.
Home Internet and Appliance Automation Using Ultra Tiny Linux TM Kim Rowe.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
Locknetics Upgrade Project Preliminary Design Review Akin Olugbade Justin Gilstrap Lutalo Webb.
Milestone 2: Project Proposal and Statement of Work TEAM 8: ANDRE ELLIOTTPROJECT: BITCOIN WALLET MARK NIXON KISHEN PATEL ZACH HOELZLE.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
ZigBee.  ZigBee is a specification for a suite of high level communication protocols used to create personal area networks built from small, low-power.
Software Solutions for Product Developers Copyright 2005 Software Technologies Group, Inc. All Rights Reserved. An Overview of ZigBee The Power of the.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Service Section Technical Training Dec A Standard Wireless Networking Protocol Zigbee Wireless Technology.
RADIO + MCU + FLASH + USB Low-Power RF System-on-Chip
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
DEC0905 Remote Control of Home Appliances ABSTRACT The objective of this project is to enable users to remotely control home appliances and systems over.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Wireless Sensor Monitoring Group Members: Daniel Eke (COMPE) Brian Reilly (ECE) Steven Shih (ECE) Sponsored by:
InteLock Emmanuel Seguin, Kit Huynh, Joshua Coffin, Christos Tsiokos Faculty Advisor: Professor Aura Ganz Background Currently, there have been many keyless.
Ruslan Masinjila Aida Militaru.  Nature of the Problem  Our Solution: The Roaming Security Robot  Functionalities  General System View  System Design.
Wireless Sensor Monitoring Group Members: Steven Shih (ECE) Brian Reilly (ECE) Dan Eke (COMPE) Sponsored by:
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
1 1 Local vs. remote intelligence A quick look at two different architecture management systems Copyright Nitrosoft 2010.
Implementing Network Access Protection
Flatiron Mobile Device Security Monitor Thomas Horacek Lucas Greve.
Abstract Other Resources Financial Resources Project Schedule Personnel Efforts Item DescriptionCost STK300 Microcontrollerdonated (Kanda) GM28 Cellular.
Module 7: Fundamentals of Administering Windows Server 2008.
Scott Coffin Adam Faucher Jason Graika Brian Voelz Client: Honeywell Advisor: Dr. Zhengdao Wang.
Automated Industrial Wind Tunnel Controller By Daniel Monahan and Nick DeTrempe Advised by Dr. Aleksander Malinowski.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Paul Banks, Yorick Robinson, Hans Weggeman, Evan Tu RISC TAKERS.
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
RFID Enabled Access Limited (R.E.A.L.) Security Christopher Lange, Team Leader Clinton Plaza Paul Brown David Kenney.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Add functionality to last year’s project Remotely operate and check the status of a door strike using a cell phone Last Year’s Project IR Signal Internet.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
The Secure, Automated Home Project Team: Alec Kulbacki Project Advisor: W. Thomas Miller.
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Strong Authentication to any Application Using SecureLogin and NMAS TM Scott Kiester and John Jolly Software Engineer Novell, Inc.
Bully Blue Lock Midterm Presentation 2014 Senior Design II.
Home Area Networking for the Smart Grid Erik Cates David Green Daniel Han Justin Michela ECE 4007 Koblasz/Maxwell Fall 2010 In Conjunction With: Unmesh.
Remote Control of Home Appliances PROJECT PLAN Team: ◦ Elie Abichar –CE ◦ Chris Tefer –CE ◦ Ananta Upadhyaya.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Bully Blue Lock Mid-Semester Presentation 2014 Senior Design I.
Applying Cryptography to Physical Security
BioLock (Biometric Home Entry System)
Presentation transcript:

University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor: Professor Ganz

2 Grenzebach Glier & Associates, Inc. Background & Motivation  Currently there are many solutions for keyless entry systems  Combination locks, remote key locks, electronic card key locks, fingerprint identification locks  Each of these solutions provide a more convenient alternative to the standard key and lock system  Minimizes required user actions for ease of use

3 Grenzebach Glier & Associates, Inc. Background & Motivation  Another alternative to keyless entry systems  Propose a new wireless product designed for residential market that fits into existing standard doors  Convenience of having the key located on user eliminates need to manually unlock door User key never has to be taken out of their pocket, wallet, purse, etc. Key is detected by keyless entry system User needs only to turn doorknob for access into the home

4 Grenzebach Glier & Associates, Inc. Background & Motivation  Allow Remote Access to Keyless Entry System  Connect system to internet so that the lock status can be queried and changed remotely. Enables user to lock or unlock door from anywhere when necessary.  Integrate system with PC so that user events can be logged and tracked. Allows home owner to monitor home security and user access.

5 Grenzebach Glier & Associates, Inc. Design Challenges  Form factor  Require small wireless components that are easily integrated into existing residential doors  Power consumption  Devices that require minimum power to operate  Security  Technology that provides a secure network  Efficiency  Data reliability and quick response time

6 Grenzebach Glier & Associates, Inc. Design Solution  User will be able to lock/unlock their door provided that a special key is range of the keyless system  When the special key is in range of the system, the user can simply lock/unlock their door with a turn of the doorknob  Turning the doorknob right denotes a lock command, while left denotes an unlock command  Non-valid keys will be detected by the system and access will be denied

7 Grenzebach Glier & Associates, Inc. Design Solution  System will be integrated with existing PC and internet gateway.  Software on PC will log events and allow for system monitoring and updating  Server running on PC will allow for remote monitoring and control of keyless entry system

8 Grenzebach Glier & Associates, Inc. Design Solution  Utilize new wireless technology: ZigBee  New up and coming standard for home automation  Small form factor make ZigBee easy to integrate into system design  Low power consumption enable ZigBee devices to run on same batteries for years  Support for a large number of nodes in network  Provides strong reliability and security

9 Grenzebach Glier & Associates, Inc. ZigBee Security Features  Provides freshness check to prevent replay attacks (an attacker from replaying messages)  Provides message integrity to prevent an attacker from modifying the message in transit or forging message  Up to 128 bits of integrity  Authentication and encryption protection possible at network and device levels

10 Grenzebach Glier & Associates, Inc.

11 Grenzebach Glier & Associates, Inc. Review MDR Specifications  Pseudo-code for embedded firmware on each system component  Assemble and test trigger mechanism for Door Knob  Establish communication between ZigBee coordinator and at least one node

12 Grenzebach Glier & Associates, Inc. Review MDR Specifications  Pseudo-code for embedded firmware on each system component  Assemble and test trigger mechanism for Door Knob  Establish communication between ZigBee coordinator and at least one node

13 Grenzebach Glier & Associates, Inc.

14 Grenzebach Glier & Associates, Inc.

15 Grenzebach Glier & Associates, Inc.

16 Grenzebach Glier & Associates, Inc.

17 Grenzebach Glier & Associates, Inc.

18 Grenzebach Glier & Associates, Inc. Review MDR Specifications  Pseudo-code for embedded firmware on each system component  Assemble and test trigger mechanism for Door Knob  Establish communication between ZigBee coordinator and at least one node

19 Grenzebach Glier & Associates, Inc. Demonstration  Doorknob trigger will now be demonstrated  Breadboard will simulate wireless communication between the doorknob microcontroller and the control unit Doorknob trigger mechanism

20 Grenzebach Glier & Associates, Inc. Review MDR Specifications Met  Pseudo-code for embedded firmware on each system component  Assemble and test trigger mechanism for Door Knob  Establish communication between ZigBee coordinator and at least one node  Establish communication between coordinator and one node using SPI… (revised spec)

21 Grenzebach Glier & Associates, Inc.

22 Grenzebach Glier & Associates, Inc. Deliverables Deliverables: -Phase I (1) Command unit (1) Door knob (1) Deadbolt (2) Keys Associated Source Code User Manual -Phase II Server Software for PC Source Code Interface between PC and Control unit User Manual Acceptance Tests: -Phase I Door must unlock only if valid Key is within range Deadbolt must disengage within a few seconds of knob turning -Phase II Software must be active whenever PC is running Interface must only allow authorized users to operate the system

23 Grenzebach Glier & Associates, Inc. Project Milestones  Complete AVR RISC code for Phase I devices  Assemble and test Phase I system  Integrate system with PC using a ZigBee USB interface.  Write and test Software interface for system log and system control.  Write and Test server for Remote access and control

24 Grenzebach Glier & Associates, Inc. Demo Day!  Phase I will be installed in functioning door with standard hardware placement for demonstration  Phase II will be installed on PC and will be demonstrated on a laptop with wireless access.

25 Grenzebach Glier & Associates, Inc. Budget Overview QuantityItemPrice 1 Atmel ZigBee Development Kit $245 1Doorknob$20 1Deadbolt$150 1ZigBee USB module$75 1PCB~$50 Batteries~$30 Additional Modules~$25 Total Spent$595 Total Left$5

26 Grenzebach Glier & Associates, Inc. Q & A ? ? ????? ? ? ? ? ? ? ?