EMAILING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Banking, Finance and Insurance.
Advertisements

JED Microprocessors Pty Ltd Presenting the JED T430 low-cost Projector Controllers Nov 22nd, 2009.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
Bush Library Proposal By Yvana. Introduction The museum will assume that people have their own wireless devices such as iPods, cell phones, and MP3 players.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
DCS-932/932L Wireless N Day & Night Mjpeg Network Camera Sales guide D-Link Confidential.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Khaled A. Al-Utaibi  What is Arduino?  Arduino Boards  Arduino Shields  Arduino Uno Hardware.
PI : TV A PI MEDIA CENTER Michael Hoskins Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
Wireless Networking 102.
OUTLINE  Motivation  Introduction  Problem Statement  Assumptions  Proposed Solution  Results  Conclusions  Future Work  References  Acknowledgements.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Methods of communication
SKY-PEak: BRIDGING SKYPE Jamie Caudill Eastern Kentucky University.
Microcontroller Based Wireless Camera Security System John Saylor Computer Electronic Networking.
FRONT DOOR MONITOR Tremayne L. Perkins EKU Dept of Technology, CEN/CET.
DCS-5230 Wireless N PTZ Network Camera Sales guide D-Link Confidential.
Chapter 2 What is an Alarm System? Alarms: The First Line of Defense
NET 499 Leonard Paul Vinas Network Security and Electronics Department of Technology.
1. 2 Windows Live Hotmail  offers access via special Outlook Connector software o provides a two-way sync for  mail  calendar  contacts o access.
Private and Confidential TraceTek iServer Concepts, Set-up, Operation.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
Professional Solution for Central Management and Visual Alarm Verification Presentation by TeleEye Group Presentation by TeleEye Group TeleEye Central.
Homeland Security System Danny Butler EKU, Dept. of Technology.
Ethernet and Wifi Chapter 7 & 8. Send and Receive Data network adapter or network interface NIC card the most common wired Ethernet network interfaces.
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
LOGO Server. Contents Introduction 1 Problem Definition 2 Proposed Solution 3 Architecture Diagram 4 Server Technology 5 Hardware and Software.
Active Home Timmy Henery Affiliation EKU, Dept. of Technology.
CLOUD COMPUTING FOR EVERYONE
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Alarm / Notification June 25, 2010 Created by Jason-Su / Andy Chen.
Introduction to Computers COMP 900 St. Lawrence College Lecture Two: Networking and the Internet.
1 Weblite Product Introduction. 2 Control Equipment via the Internet 8 Universal Inputs 8 Universal Outputs software selectable as analog or digital signals.
SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone.
“A mobile market researcher wants a smartphone capable of shooting quality video, playing their music, browsing the web and running a range of applications”.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Introduction :  In the beginning, the calculator is the basic idea of computers out, then that arrived at the large computers.  in1980 or late seventies.
Securing A Wireless Home Network. Simple home wired LAN.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Introduction to Networking. What is a Network? Discuss in groups.
System Optimization Networking
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
A microcontroller-based system for multi sensor monitoring and messaging via GSM network Bachelor thesis Angelakis Vaios Supervisor:Kazarlis S.
HIGH END DESKTOP WITHOUT HIGH END PRICE VIRGIL EDWARDS NET 499 SPRING 2016 EASTERN KENTUCKY UNIVERSITY 1.
AUTOMATING HOME SECURITY RYAN C. KRAUSE. BACKGROUND: HOME SECURITY Many providers including, self-building kits ADT, Gaurdian, Xfinity, LifeShield, Protection.
Installation and Setting up a Wireless LAN. Why would you want a Wireless LAN? Because it would take a lot of cable to set up your Internet, and a wireless.
Learning to read Installing a wired modem router.
Network System Security - Task 2. Russell Johnston.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
CMV-NET Chigo VRF Network Centralized Control System
XBee Based Industrial And Home Security System
Gary m. smith, usaf (Retired)
Smart Parking Application
Buttons, Sockets and Slots of a Desktop Computer
Configure Instruction
Introduction to Wireless Technology
USING A RASPBERRY PI AS A WATER DETECTION SYSTEM
Using the BBC micro:bit for Home Security
What The Right Steps To Check RR Mail If It Is Hacked?
Wireless Fidelity (15881A0515).
Arduino and Grove LET’S START.
Topic 5: Communication and the Internet
Welcome to Digital Electronics using the Arduino Board
Major Difference between CCTV and Surveillance. As we know CCTV and Surveillance Camera both are majorly use as security purpose, but most of us doesn’t.
On the off chance that your business utilizes Roadrunner as your Internet specialist organization, you will have at least one accounts. While you.
“The Theft Buster” Before you begin
Arduino and Grove LET’S START.
Presentation transcript:

ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone

ARDUINO ING SYSTEM  Motivation  Problem Statement  Assumptions  Solution  Results  Design (top level)  Video Time  Future Work  Q & A 2

MOTIVATION  The motivation behind this project was to provide clear instruction on how to install an IP camera to help people catch a burglar or home invader. 3

INTRODUCTION  In 2012, there were 2,100,000 burglaries in (FBI.gov)  A reported 4.7 billion dollars was lost as a result. (FBI.gov) 4 property-crime/burglary

PROBLEM STATEMENT  People need an option for a monitoring security system that will provide a relatively cheap alternative to current solutions  Provide a way to privately notify the client so he/she can take action to catch the burglar. 5

PROPOSED SOLUTION  Use an Arduino microcontroller with inputs in specific places to monitor for unauthorized changes in signal (such as a door opening).  If change is detected then the Arduino should contact the client and let them know about the change. 6 ►The system should be customizeable towards each client.

ASSUMPTIONS  You have a working internet connection  You have either A router with a free LAN port OR a laptop with a free LAN port AND internet connection sharing enabled  You have an RJ45 Ethernet cable to use  You have a laptop with a USB port to program and power the Arduino  You have an account that will accept the Gmail accounts are fine. Yahoo accounts will not accept the . 7

RESULTS  The key result of this project was  A functional security system which could send s to a Gmail account controlled via local area connection (or WLAN).  The system has two inputs to monitor a door and movement as well as one master button to disarm the system. 8

9

_1/AnthonyFriend_EKU_NET_Capstone2014_FinalVideo.mp4 Video Time! ~ 3:00

CONCLUSIONS  Great for small environments  Great stepping stone for future improvements  Easy to configure and wire  Cheap compared to other systems 11

FUTURE WORK  Add an alarm or a bell to scare off potential intruders Could also wire an MP3 player to play a recorded message of you screaming “get out of here”  Add indicator LEDs to let the users know if there is an issue in sending the  Replace the Arduino Uno to Arduino Mega in order to add more to the Arduino program Replace the security system inputs with an analog temperature sensor circuit and use that as an alert system at the grocery store I work at to monitor freezer temperatures. 12

13 Questions or Suggestions? *Why use a third party service to send , why not send mail directly to your inbox? The more popular SMTP services block unencrypted logins that the Arduino is forced to do. Because of this you have to go through a service that will accept plain text logins. *Since you send your account information in plain can’t someone sniff out that information and steal your account information? It would be possible, however, someone would have to be sniffing while someone is attempting to break into your house, I think the chances of both of those happening at the same time is pretty low. Also the login information is in Base64 format which isn’t really the same thing as plain text, but is very easy to decode. *Does this system have to be plugged into a computer to work? No, as long as you have a working internet connection through the Ethernet shield and a 9V power adapter.

REFERENCES 14 Federal Bureau of Investigation. (Sep. 16, 2013). Fbi releases 2012 crime statistics. releases/fbi-releases-2012-crime-statistics