Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Size: px
Start display at page:

Download "Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V."

Transcription

1 EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management system Project Proposal P.D. Ehlers Study leader: Mr. D.V. Bhatt Evaluation of content Mark/20: Acceptable: Yes No Problem statement User requirement statement Functional analysis System specifications Deliverables Comments (also see inside): Proofreader: D.P. Visser Date

2 Development of a wireless home anti theft asset management system Project Proposal P.D. Ehlers Submitted as partial fulfilment of the requirements of Project EPR402 in the Department of Electrical, Electronic and Computer Engineering University of Pretoria Approved: April 2006 Study leader: Mr. D.V. Bhatt Mr. D.V. Bhatt (Study leader) Date Approved: Prof. J.J. Hanekom (Project lecturer) Date

3 1. PROBLEM STATEMENT With the ongoing and rapidly increasing acts of crime and theft in our society, an ever growing need arise to secure ourselves and our possessions. The main reason fueling these acts of theft is the unlimited demand for stolen goods on the black market. In order to eliminate these malicious acts of theft, one has to eliminate the market. The project addresses this problem and will assist the user in managing his/her domestic assets in a home environment. This system will easily be integrated in any electronic device in a home environment. The envisioned system will consist mainly of the following three elements; firstly, a wireless management module (WMM) that will be integrated in an electronic device. Secondly, wireless server that will act as an interface between the user and the WMM, and finally a radio frequency identification tag and reader. A device equipped with the WMM will, when powered, be non-functional until the user disables the WMM remotely over a computer network or manually with a authentication tag. The user will be in possession of a unique authentication code which will only entitle him/her to enable/disable the WMM. The engineering challenge faced in this project is the development of hardware and software needed to construct a wireless anti-theft asset management system. Challenges include the interfacing of a microprocessor to Zigbee transceiver and to a smart card reader. This task includes the physical realization of the circuitry as well as the development of the control firmware to be loaded on the microprocessor. Cryptographic firmware must also be developed and loaded on the microprocessor to ensure secure data transmissions to and from the WMM. Server side software must be developed which will include cryptographic algorithms to secure transmissions between client and server using the IEEE protocol as well as between the server and the WMM using the IEEE protocol. Limitations of this project are available hardware, the size of the WMM, the material of the enclosure of the electronic device to be equipped with the WMM and the RF range of a Zigbee transceiver. The transceiver required must incorporate encryption but the available transceivers do not support encryption. Thus, to compensate from this shortcoming, encryption firmware must be developed and loaded onto a powerful microprocessor which will be interfaced to the transceiver instead. The design requires a contact smart card but due to size and adaptability requirements a contactless smart card must be used. The size of the WMM is extremely important and therefore, the smallest components available will be used. The material of which the electronic device is manufactured of also plays a role when considering the RF range of the Zigbee transceiver as well as the RF contactless smart card reader. To accommodate this limitation certain modifications should be made to antennas of these components. 1

4 2. USER REQUIREMENT STATEMENT A durable WMM integrated into an electronic domestic device, which render the device non-functional when enabled and functional when disabled, is required. The life-cycle, durability, size, shape and working of the electronic domestic device should not be impaired by the WMM. The WMM should have wireless capabilities to connect to a wireless server through which the user can remotely change the state of the WMM. When the WMM comes into contact with an RF 1 authentication tag it should toggle between enable and disable. The WMM should by default be enabled, disabling the electronic domestic device. The domestic device should remain non-functional until the user disables the WMM with a unique authentication code, either sent through the wireless network or with a unique authentication tag. The user should at any time be able to check or change the status of the device given the device is powered. A flag should be toggled inside the WMM to store the current state on any specific time. 2.1 SYSTEM MISSION REQUIREMENTS The following list provides the mission requirements of the design. The WMM to be integrated in an electronic domestic device should in no way impair the device size, shape, life-cycle, durability and operation. To maintain the durability of the domestic device, it is critical that the WMM should be robust and durable. Integration of the WMM into a domestic device should limit tampering possibilities. The communication ability of the WMM should not be impaired by the noise generated by the domestic device. A power converter must be included in the WMM to convert the operating power of the electronic device to the operating power required by the WMM. The WMM should be enabled by default and should only change status when a user with a unique authentication code commands it. After a power failure, the WMM should adapt the enabled state. The wireless server and planted WMM should be able to work within a large home environment. 1 Radio frequency 2

5 2.2 VALUE SYSTEM The following aspects constitute the value system used in the design: functionality, cost, reliability, size and shape. 3. FUNCTIONAL ANALYSIS The system works in two directions, from the electronic device to the end user and from the end user to the electronic device, as shown in the functional diagrams(figure 1a and Figure 1b). When the user desires to query or change the status of a domestic device, the working direction will be from the end user to the electronic device (figure 1a). Figure 1a. Functional block diagram for user to electronic device communication. The user will access a web based user interface (FU3.2) located on the server unit (FU3) through the private wireless channel (FU2) with his/her wireless device (FU1). User input received from the user interface unit will be processed by the server processing unit (FU3.3). User input comprises of a device identification code, status command and 3

6 unique authentication code. Processed user input will be broadcast over the wireless channel with the wireless unit (FU3.1) to all the wireless management modules (FU4) in the domestic domain. The WMM consists of a wireless transceiver (FU4.1), a WMM processing unit (FU4.2), an enable/disable unit (FU4.3) and an authentication tag reader(fu4.4). All the wireless management modules in the domestic devices receive the broadcast with there wireless transceivers (FU4.1) and sends the received data to their processing units. The WMM processing unit compare it s device identification code to the received identification code. If the codes match, the received data is further processed, otherwise discarded. After confirmation on the authentication code is established, the received command is processed and executed. A control signal will be sent to the enable/disable unit (FU4.3) rendering the device functional or non-functional depending on the received command. If the system replies on a status check or confirms a status change, the system will operate in a reversed direction (figure 1b). Figure 1b. Functional block diagram for electronic device to user communication. After the WMM received and processed a status check or change command, the WMM processing unit sends a device identification code and a current status back to the server unit over the wireless channel. After data was received by the server it is sent to it s processing unit to update the user interface accordingly. An alternative to WMM disabling/enabling is the use of a unique authentication tag (FU5). The code read from the authentication tag will be sent to the WMM processor 4

7 unit where it will be matched to the stored code in the processing unit. The authentication tags will be read by the tag reader (FU4.4) in the WMM. If they match, the data processor unit will command the enable/disable unit to toggle the device functional or non-functional. A status change confirmation will be sent to the server unit (FU3) after a WMM status change occurred. 4. SYSTEM SPECIFICATIONS The following is a list of the specifications that this system has to comply with. 4.1 GLOBAL SPECIFICATIONS The wireless management module (WMM) should by default disable the device and it should stay in this state until a valid user authenticates it. The WMM should stay authenticated until the user commands it otherwise or it experience a power failure. A smart card and wireless network must be the only two methods of authentication. The wireless network will be the transmission medium for data sent, on the user s command, from a centralized server which will host the WMM control software. The WMM should be small enough to fit into the electronic device s enclosure. Devices equipped with a WMM should not be impaired by the WMM. The wireless communication network (FU2) must provide a reliable RF link over a diametrical distance of 20 meters. 4.2 DETAILED SPECIFICATIONS The WMM must not have an alternative power source other than the power source of the electronic device. The WMM in the electronic device should be able to cope with the noise generated by a device. The user s wireless device (FU1) should be able to communicate with the wireless server (FU3) using the and should IEEE standard and should operate at 11Mbps 2 or 54Mbps. The server unit (FU3) should be a personnel computer capable of processing high level cryptographic algorithms. A Pentium III with 256 MB 3 RAM 4 or higher. 2 Mega bits per second 3 Megabytes 4 Random access memory 5

8 The server wireless unit (FU3.1) must consist of and wireless devices capable of communicating with the different standard networks. The web based user interface unit must display a encrypted login web page which requires a username and password of a valid user stored in a secured database. After a secure login, the user is routed to a secure web page displaying the wireless module command software. The server unit (FU3) must communicate with the planted module (FU4) using the IEEE standard. The WMM (FU4) should consist of an zigbee transceiver, microprocessor and a smart card reader. The processing unit (FU4.2) must handle all the cryptographic calculations and the data processing required for data transmissions. An affordable RF tag (FU5) should be uniquely programmed to be the only tag which can enable/disable the WMM. 5. DELIVERABLES 5.1 TECHNICAL DELIVERABLES The following need to be delivered on completion of the project. A fully functional asset management system comprised of a WMM, a wireless server and a unique authentication tag. The WMM will contain a printed circuit board with an off-the-shelf wireless zigbee transceiver, microprocessor and a smart card reader etched on it. The smart card reader will require an antenna which will be designed and developed from first principles. A smart card programmed to authenticate the WMM. A server unit which will comprise of a personal computer and wireless access devices for different standards. The wireless access devices will be off-the-shelf products. Web based user interface software developed in C# and loaded on the server for easy remote access. The low level machine code (assembly code) to be loaded on the microprocessor will be developed from first principles. 6

9 5.2 ADDITIONAL PROJECT REQUIREMENTS In addition to the final product described above, a user manual for the system will also be provided. 5.3 DEMONSTRATION The following will be demonstrated at the exam. A working wireless home anti-theft asset management system will be demonstrated. This system will consist of a WMM integrated into a electronic domestic device and a wireless server which will handle all communication between user and WMM. The demonstration will show that when a device, equipped with the WMM, is powered, it will by default be non-functional till the user disables the WMM. It will be demonstrated that the user will be able to enable/disable the WMM through the wireless channel in a specific device or in all the devices simultaneously, as well as to check the status of any or all of the devices. It will also show that the device will be non-functional when the WMM is enabled and functional when the WMM is disabled. The demonstration will show that the user can enable/disable the WMM with a unique authentication tag when it makes physical contact with the device. 7

10 6. REFERENCES Kulkarni, A.D., Artificial Neural Networks for Image Understanding. New York: Van Nostrand Reinhold. 8

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Online Communication of Critical Parameters in Powerplant Using ZIGBEE

Online Communication of Critical Parameters in Powerplant Using ZIGBEE International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Online Communication of Critical Parameters in Powerplant Using ZIGBEE D.Santhiya 1, R.Renita Priyatharshini 2,K.C.Dhivya

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

How To Track A Vehicle With A Smart Vehicle Tracking System

How To Track A Vehicle With A Smart Vehicle Tracking System SMART VEHICLE TRACKING SYSTEM Mrs. K.P.Kamble 1 Lecturer 1 Department of Electronics and Telecommunication Engineering, YCCE, Nagpur kanchan_114@rediffmail.com ABSTRACT It is amazing to know how simple

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at

More information

Online Student Attendance Management System using Android

Online Student Attendance Management System using Android Online Student Attendance Management System using Android ABSTRACT: We have seen over the years that the process of manual attendance has been carried outacross almost all educational institutions. The

More information

YO-301AP POE AP Datasheet

YO-301AP POE AP Datasheet YO-301AP POE AP Datasheet 300Mbps Wi-Fi Ceiling POE Access Point VER:1.0 Date:2013-06-03 1 Product Description: Practical and powerful The Ceiling PoE wireless access point for your home or office network

More information

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1. EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5

More information

920MHz Band Multi-hop Wireless Network System

920MHz Band Multi-hop Wireless Network System 920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

What is a Smart Card?

What is a Smart Card? An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types

More information

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Enhancing Organizational Security Through the Use of Virtual Smart Cards Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

ADVANCED VEHICLE TRACKING SYSTEM USING ARM7

ADVANCED VEHICLE TRACKING SYSTEM USING ARM7 ADVANCED VEHICLE TRACKING SYSTEM USING ARM7 L. Kishore 1, Arun Raja 2 1 M.E. Embedded Systems Technologies, Sri Ramakrishna Engineering College 2 Assistant Professor, Department of ECE, Sri Ramakrishna

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,

More information

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Review of the Air Force Academy No 2 (24) 2013 BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Marian ALEXANDRU, Vlad URSU Transilvania University of Brasov, Romania Abstract: A study of how to implement

More information

MOBILE GAMING SYSTEM POLICIES

MOBILE GAMING SYSTEM POLICIES MOBILE GAMING SYSTEM POLICIES This document is intended to provide further clarification on applicable mobile gaming Technical Standards and additionally to define policies associated with the manufacturing

More information

RFID Security: Threats, solutions and open challenges

RFID Security: Threats, solutions and open challenges RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)

More information

How To Run Eve 5 On A Pc Or Mac Or Ipad (For Pc Or Ipa) On A Network (For Mac) On Your Computer Or Ipro (For Ipro) On An Ipro Or Ipo (For Windows)

How To Run Eve 5 On A Pc Or Mac Or Ipad (For Pc Or Ipa) On A Network (For Mac) On Your Computer Or Ipro (For Ipro) On An Ipro Or Ipo (For Windows) EVE5 Hardware and Software Requirements EVE5 is a Client/Server program. i.e. there are 2 components to the program: 1/ The Server: this controls your database and will be installed on one computer only.

More information

Using ISO 15693 Compliant RFID Tags in an Inventory Control System

Using ISO 15693 Compliant RFID Tags in an Inventory Control System Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,

More information

Voice Over Internet Protocol (VoIP) Configuration

Voice Over Internet Protocol (VoIP) Configuration (VoIP) Configuration ENGINEERING REPORT No: 02-003 Introduction This report describes interfacing the IPCS VoIP Gateway Model EGW-902 to an ESTeem Model 192E Wireless Ethernet radio modem in a demonstration

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items

More information

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software

More information

Basic Network Design

Basic Network Design Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007 Software Requirements Specification for VODKA Version 1.1 Approved April 24, 2007 Prepared by: Archit Baweja, Drew Hall, Sunny Huynh, Kevin Lynch, and Kanwarpreet Sethi Drexel University Revision History

More information

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National

More information

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Embedded RF ABSTRACT This application report describes

More information

Living Requirements Document: Sniffit

Living Requirements Document: Sniffit Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps

More information

Quick Start Guide: Iridium GO! Advanced Portal

Quick Start Guide: Iridium GO! Advanced Portal Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...

More information

System Services. Engagent System Services 2.06

System Services. Engagent System Services 2.06 System Services Engagent System Services 2.06 Overview Engagent System Services constitutes the central module in Engagent Software s product strategy. It is the glue both on an application level and on

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the

More information

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

Security & Chip Card ICs SLE 44R35S / Mifare

Security & Chip Card ICs SLE 44R35S / Mifare Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info

More information

October 1, 2015. (Press release) Nippon Telegraph and Telephone Corporation

October 1, 2015. (Press release) Nippon Telegraph and Telephone Corporation (Press release) October 1, 2015 Nippon Telegraph and Telephone Corporation High-density simultaneous compensation of distortion in wavelength-multiplexed signals using a time-reversal operation: World

More information

3. Designed for installation by the user without further substantial support by the supplier; and

3. Designed for installation by the user without further substantial support by the supplier; and Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Linksys WAP300N. User Guide

Linksys WAP300N. User Guide User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating

More information

Using. Microsoft Virtual PC. Page 1

Using. Microsoft Virtual PC. Page 1 Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC

More information

Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview

Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation Best practices overview ii Welch Allyn Network installation 2015 Welch Allyn. All rights are reserved. To support the intended

More information

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing

More information

SaaS: Products and Licenses

SaaS: Products and Licenses SaaS: Products and Licenses Responsible for the content: audeosoft GmbH, Kreuzberger Ring 44a, 65205 Wiesbaden, Germany, hereinafter referred to as audeosoft. (Addendum to Terms of use audeosoft GmbH staffitpro

More information

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

More information

QUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT

QUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT QUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT A softcopy of this document can be found in the Support Center of our website. http://www.commdevices.com/support-center/technical-manuals/ - PA100/200 Cell-QuickStart.

More information

International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)

International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA) Issues and Challenges in Ensuring Trust, Security, Performance and Scalability in a Common Multi-Banking Solution Sree Rekha.G Research Assistant, CORI, PESIT, Bangalore. V.K.Agrawal, Director, CORI, PESIT,

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

300Mbps Wireless N Gigabit Ceilling Mount Access Point

300Mbps Wireless N Gigabit Ceilling Mount Access Point Datasheet 300Mbps Wireless N Gigabit Ceilling Mount Access Point 120 Highlights Wireless N speed up to 300Mbps Clustering function greatly simplified business wireless network management, to easy manage

More information

Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network

Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network 24 Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network Zulhani Rasin Faculty of Electrical Engineering Universiti Teknikal Malaysia Melaka (UTeM) Melaka, Malaysia Email: zulhani@utem.edu.my

More information

R-Win. Smart Wireless Communication Management System

R-Win. Smart Wireless Communication Management System Smart Wireless Communication Management System General R-Win is a smart communications adapter for management of wireless communications in a SCADA/Distributed Control System. The R-Win system includes

More information

How To Get A Power Station To Work With A Power Generator Without A Substation

How To Get A Power Station To Work With A Power Generator Without A Substation Wi-Fi Protected Access for Protection and Automation Key Material Authentication Key Presented to: 13 December 2006 Dennis K. Holstein on behalf of CIGRE B5.22 1 The good news and the bad news Who is CIGRE

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

Kingpin, @stake, January 2002

Kingpin, @stake, January 2002 Research In Motion s BlackBerry Wireless E-Mail Devices: Decoding the Mobitex protocol Kingpin, @stake, January 2002 1 Introduction The Research In Motion BlackBerry wireless e-mail device product line

More information

Documentation. M-Bus 130-mbx

Documentation. M-Bus 130-mbx Documentation M-Bus 130-mbx Introduction The mx M-Bus module is part of the mx Smart Slot communications family. With the integrated SmartSlot technology, mx systems ag offers automatic consumer data read-out

More information

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

SECTION 25 15 16 INTEGRATED AUTOMATION SOFTWARE FOR CONTROL OF MONITORING NETWORKS

SECTION 25 15 16 INTEGRATED AUTOMATION SOFTWARE FOR CONTROL OF MONITORING NETWORKS SECTION 25 15 16 INTEGRATED AUTOMATION SOFTWARE FOR CONTROL OF MONITORING NETWORKS Specifier: The Specifier/Design Professional is responsible for the accuracy of all project specifications, including

More information

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode. 802.11a/n Long Range Wireless Outdoor CPE Key Features IEEE 802.11 a/n compliant Up to 300Mbps (5GHz) 24V Proprietary PoE support Waterproof Housing IP65 rated AP/CB/CR/WDS Modes 4 SSIDs support + VLAN

More information

International Journal of Engineering Research & Management Technology

International Journal of Engineering Research & Management Technology International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of

More information

Modern Wireless Communication

Modern Wireless Communication Modern Wireless Communication Simon Haykin, Michael Moher CH01-1 Chapter 1 Introduction CH01-2 1 Contents 1.1 Background 1.2 Communication Systems 1.3 Physical Layer 1.4 The Data-Link Layer 1.4.1 FDMA

More information

ENHWI-N3. 802.11n Wireless Router

ENHWI-N3. 802.11n Wireless Router ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home

More information

Ingenious Systems. Evolute System's. Mobile Payment. Initiative

Ingenious Systems. Evolute System's. Mobile Payment. Initiative Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial

More information

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013 WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection

More information

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security

More information

Hacking. Aims. Naming, Acronyms, etc. Sources

Hacking. Aims. Naming, Acronyms, etc. Sources Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,

More information

FB-500A User s Manual

FB-500A User s Manual Megapixel Day & Night Fixed Box Network Camera FB-500A User s Manual Quality Service Group Product name: Network Camera (FB-500A Series) Release Date: 2011/7 Manual Revision: V1.0 Web site: Email: www.brickcom.com

More information

How To Hack An Rdi Credit Card

How To Hack An Rdi Credit Card RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu

More information

Trusted Platforms for Homeland Security

Trusted Platforms for Homeland Security Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business

More information

FREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID

FREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID FREE VOICE CALLING IN WIFI CAMPUS NETWORK ABSTRACT: USING ANDROID The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

WISP 101. The DO s and DON T s of becoming a Wireless ISP

WISP 101. The DO s and DON T s of becoming a Wireless ISP WISP 101 The DO s and DON T s of becoming a Wireless ISP WISP 101 topics Choosing your hardware Setting up the Highsite Hardware Software Security Wireless Backhaul Setting up the client Choosing your

More information

AMI security considerations

AMI security considerations AMI security considerations Jeff McCullough Introduction Many electric utilities are deploying or planning to deploy smart grid technologies. For smart grid deployments, advanced metering infrastructure

More information

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,

More information

Deployment Scenarios

Deployment Scenarios Deployment Scenarios Sun Cobalt Summary The Sun Cobalt is a network-based appliance for managing a large number of remote servers and for deploying services to these servers. A control station is deployed

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

CISCO WIRELESS CONTROL SYSTEM (WCS)

CISCO WIRELESS CONTROL SYSTEM (WCS) CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

CQG Trader Technical Specifications. December 1, 2014 Version 2014-05

CQG Trader Technical Specifications. December 1, 2014 Version 2014-05 CQG Trader Technical Specifications December 1, 2014 Version 2014-05 Copyright 2014 CQG Inc. All rights reserved. Information in this document is subject to change without notice. Windows Vista, Windows,

More information

USER MANUAL. PingBrother EPIW104 managed passive poe switch & IP watchdog

USER MANUAL. PingBrother EPIW104 managed passive poe switch & IP watchdog USER MANUAL PingBrother EPIW104 managed passive poe switch & IP watchdog CONTENT Content... 2 Chapter 1... 3 1.1 Preface... 3 1.2 CE mark warning... 3 1.3 FCC warning... 4 Chapter 2... 5 2.1 Physical description...

More information