Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.
|
|
- Moris Evans
- 8 years ago
- Views:
Transcription
1 EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management system Project Proposal P.D. Ehlers Study leader: Mr. D.V. Bhatt Evaluation of content Mark/20: Acceptable: Yes No Problem statement User requirement statement Functional analysis System specifications Deliverables Comments (also see inside): Proofreader: D.P. Visser Date
2 Development of a wireless home anti theft asset management system Project Proposal P.D. Ehlers Submitted as partial fulfilment of the requirements of Project EPR402 in the Department of Electrical, Electronic and Computer Engineering University of Pretoria Approved: April 2006 Study leader: Mr. D.V. Bhatt Mr. D.V. Bhatt (Study leader) Date Approved: Prof. J.J. Hanekom (Project lecturer) Date
3 1. PROBLEM STATEMENT With the ongoing and rapidly increasing acts of crime and theft in our society, an ever growing need arise to secure ourselves and our possessions. The main reason fueling these acts of theft is the unlimited demand for stolen goods on the black market. In order to eliminate these malicious acts of theft, one has to eliminate the market. The project addresses this problem and will assist the user in managing his/her domestic assets in a home environment. This system will easily be integrated in any electronic device in a home environment. The envisioned system will consist mainly of the following three elements; firstly, a wireless management module (WMM) that will be integrated in an electronic device. Secondly, wireless server that will act as an interface between the user and the WMM, and finally a radio frequency identification tag and reader. A device equipped with the WMM will, when powered, be non-functional until the user disables the WMM remotely over a computer network or manually with a authentication tag. The user will be in possession of a unique authentication code which will only entitle him/her to enable/disable the WMM. The engineering challenge faced in this project is the development of hardware and software needed to construct a wireless anti-theft asset management system. Challenges include the interfacing of a microprocessor to Zigbee transceiver and to a smart card reader. This task includes the physical realization of the circuitry as well as the development of the control firmware to be loaded on the microprocessor. Cryptographic firmware must also be developed and loaded on the microprocessor to ensure secure data transmissions to and from the WMM. Server side software must be developed which will include cryptographic algorithms to secure transmissions between client and server using the IEEE protocol as well as between the server and the WMM using the IEEE protocol. Limitations of this project are available hardware, the size of the WMM, the material of the enclosure of the electronic device to be equipped with the WMM and the RF range of a Zigbee transceiver. The transceiver required must incorporate encryption but the available transceivers do not support encryption. Thus, to compensate from this shortcoming, encryption firmware must be developed and loaded onto a powerful microprocessor which will be interfaced to the transceiver instead. The design requires a contact smart card but due to size and adaptability requirements a contactless smart card must be used. The size of the WMM is extremely important and therefore, the smallest components available will be used. The material of which the electronic device is manufactured of also plays a role when considering the RF range of the Zigbee transceiver as well as the RF contactless smart card reader. To accommodate this limitation certain modifications should be made to antennas of these components. 1
4 2. USER REQUIREMENT STATEMENT A durable WMM integrated into an electronic domestic device, which render the device non-functional when enabled and functional when disabled, is required. The life-cycle, durability, size, shape and working of the electronic domestic device should not be impaired by the WMM. The WMM should have wireless capabilities to connect to a wireless server through which the user can remotely change the state of the WMM. When the WMM comes into contact with an RF 1 authentication tag it should toggle between enable and disable. The WMM should by default be enabled, disabling the electronic domestic device. The domestic device should remain non-functional until the user disables the WMM with a unique authentication code, either sent through the wireless network or with a unique authentication tag. The user should at any time be able to check or change the status of the device given the device is powered. A flag should be toggled inside the WMM to store the current state on any specific time. 2.1 SYSTEM MISSION REQUIREMENTS The following list provides the mission requirements of the design. The WMM to be integrated in an electronic domestic device should in no way impair the device size, shape, life-cycle, durability and operation. To maintain the durability of the domestic device, it is critical that the WMM should be robust and durable. Integration of the WMM into a domestic device should limit tampering possibilities. The communication ability of the WMM should not be impaired by the noise generated by the domestic device. A power converter must be included in the WMM to convert the operating power of the electronic device to the operating power required by the WMM. The WMM should be enabled by default and should only change status when a user with a unique authentication code commands it. After a power failure, the WMM should adapt the enabled state. The wireless server and planted WMM should be able to work within a large home environment. 1 Radio frequency 2
5 2.2 VALUE SYSTEM The following aspects constitute the value system used in the design: functionality, cost, reliability, size and shape. 3. FUNCTIONAL ANALYSIS The system works in two directions, from the electronic device to the end user and from the end user to the electronic device, as shown in the functional diagrams(figure 1a and Figure 1b). When the user desires to query or change the status of a domestic device, the working direction will be from the end user to the electronic device (figure 1a). Figure 1a. Functional block diagram for user to electronic device communication. The user will access a web based user interface (FU3.2) located on the server unit (FU3) through the private wireless channel (FU2) with his/her wireless device (FU1). User input received from the user interface unit will be processed by the server processing unit (FU3.3). User input comprises of a device identification code, status command and 3
6 unique authentication code. Processed user input will be broadcast over the wireless channel with the wireless unit (FU3.1) to all the wireless management modules (FU4) in the domestic domain. The WMM consists of a wireless transceiver (FU4.1), a WMM processing unit (FU4.2), an enable/disable unit (FU4.3) and an authentication tag reader(fu4.4). All the wireless management modules in the domestic devices receive the broadcast with there wireless transceivers (FU4.1) and sends the received data to their processing units. The WMM processing unit compare it s device identification code to the received identification code. If the codes match, the received data is further processed, otherwise discarded. After confirmation on the authentication code is established, the received command is processed and executed. A control signal will be sent to the enable/disable unit (FU4.3) rendering the device functional or non-functional depending on the received command. If the system replies on a status check or confirms a status change, the system will operate in a reversed direction (figure 1b). Figure 1b. Functional block diagram for electronic device to user communication. After the WMM received and processed a status check or change command, the WMM processing unit sends a device identification code and a current status back to the server unit over the wireless channel. After data was received by the server it is sent to it s processing unit to update the user interface accordingly. An alternative to WMM disabling/enabling is the use of a unique authentication tag (FU5). The code read from the authentication tag will be sent to the WMM processor 4
7 unit where it will be matched to the stored code in the processing unit. The authentication tags will be read by the tag reader (FU4.4) in the WMM. If they match, the data processor unit will command the enable/disable unit to toggle the device functional or non-functional. A status change confirmation will be sent to the server unit (FU3) after a WMM status change occurred. 4. SYSTEM SPECIFICATIONS The following is a list of the specifications that this system has to comply with. 4.1 GLOBAL SPECIFICATIONS The wireless management module (WMM) should by default disable the device and it should stay in this state until a valid user authenticates it. The WMM should stay authenticated until the user commands it otherwise or it experience a power failure. A smart card and wireless network must be the only two methods of authentication. The wireless network will be the transmission medium for data sent, on the user s command, from a centralized server which will host the WMM control software. The WMM should be small enough to fit into the electronic device s enclosure. Devices equipped with a WMM should not be impaired by the WMM. The wireless communication network (FU2) must provide a reliable RF link over a diametrical distance of 20 meters. 4.2 DETAILED SPECIFICATIONS The WMM must not have an alternative power source other than the power source of the electronic device. The WMM in the electronic device should be able to cope with the noise generated by a device. The user s wireless device (FU1) should be able to communicate with the wireless server (FU3) using the and should IEEE standard and should operate at 11Mbps 2 or 54Mbps. The server unit (FU3) should be a personnel computer capable of processing high level cryptographic algorithms. A Pentium III with 256 MB 3 RAM 4 or higher. 2 Mega bits per second 3 Megabytes 4 Random access memory 5
8 The server wireless unit (FU3.1) must consist of and wireless devices capable of communicating with the different standard networks. The web based user interface unit must display a encrypted login web page which requires a username and password of a valid user stored in a secured database. After a secure login, the user is routed to a secure web page displaying the wireless module command software. The server unit (FU3) must communicate with the planted module (FU4) using the IEEE standard. The WMM (FU4) should consist of an zigbee transceiver, microprocessor and a smart card reader. The processing unit (FU4.2) must handle all the cryptographic calculations and the data processing required for data transmissions. An affordable RF tag (FU5) should be uniquely programmed to be the only tag which can enable/disable the WMM. 5. DELIVERABLES 5.1 TECHNICAL DELIVERABLES The following need to be delivered on completion of the project. A fully functional asset management system comprised of a WMM, a wireless server and a unique authentication tag. The WMM will contain a printed circuit board with an off-the-shelf wireless zigbee transceiver, microprocessor and a smart card reader etched on it. The smart card reader will require an antenna which will be designed and developed from first principles. A smart card programmed to authenticate the WMM. A server unit which will comprise of a personal computer and wireless access devices for different standards. The wireless access devices will be off-the-shelf products. Web based user interface software developed in C# and loaded on the server for easy remote access. The low level machine code (assembly code) to be loaded on the microprocessor will be developed from first principles. 6
9 5.2 ADDITIONAL PROJECT REQUIREMENTS In addition to the final product described above, a user manual for the system will also be provided. 5.3 DEMONSTRATION The following will be demonstrated at the exam. A working wireless home anti-theft asset management system will be demonstrated. This system will consist of a WMM integrated into a electronic domestic device and a wireless server which will handle all communication between user and WMM. The demonstration will show that when a device, equipped with the WMM, is powered, it will by default be non-functional till the user disables the WMM. It will be demonstrated that the user will be able to enable/disable the WMM through the wireless channel in a specific device or in all the devices simultaneously, as well as to check the status of any or all of the devices. It will also show that the device will be non-functional when the WMM is enabled and functional when the WMM is disabled. The demonstration will show that the user can enable/disable the WMM with a unique authentication tag when it makes physical contact with the device. 7
10 6. REFERENCES Kulkarni, A.D., Artificial Neural Networks for Image Understanding. New York: Van Nostrand Reinhold. 8
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
More informationRFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
More informationOnline Communication of Critical Parameters in Powerplant Using ZIGBEE
International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Online Communication of Critical Parameters in Powerplant Using ZIGBEE D.Santhiya 1, R.Renita Priyatharshini 2,K.C.Dhivya
More informationGemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationHow To Track A Vehicle With A Smart Vehicle Tracking System
SMART VEHICLE TRACKING SYSTEM Mrs. K.P.Kamble 1 Lecturer 1 Department of Electronics and Telecommunication Engineering, YCCE, Nagpur kanchan_114@rediffmail.com ABSTRACT It is amazing to know how simple
More informationImplementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
More informationEAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater
EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at
More informationOnline Student Attendance Management System using Android
Online Student Attendance Management System using Android ABSTRACT: We have seen over the years that the process of manual attendance has been carried outacross almost all educational institutions. The
More informationYO-301AP POE AP Datasheet
YO-301AP POE AP Datasheet 300Mbps Wi-Fi Ceiling POE Access Point VER:1.0 Date:2013-06-03 1 Product Description: Practical and powerful The Ceiling PoE wireless access point for your home or office network
More informationEPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.
EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5
More information920MHz Band Multi-hop Wireless Network System
920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationWhat is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
More informationEnhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationADVANCED VEHICLE TRACKING SYSTEM USING ARM7
ADVANCED VEHICLE TRACKING SYSTEM USING ARM7 L. Kishore 1, Arun Raja 2 1 M.E. Embedded Systems Technologies, Sri Ramakrishna Engineering College 2 Assistant Professor, Department of ECE, Sri Ramakrishna
More informationHow To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
More informationServer Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
More informationMobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
More informationRfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,
More informationBROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS
Review of the Air Force Academy No 2 (24) 2013 BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Marian ALEXANDRU, Vlad URSU Transilvania University of Brasov, Romania Abstract: A study of how to implement
More informationMOBILE GAMING SYSTEM POLICIES
MOBILE GAMING SYSTEM POLICIES This document is intended to provide further clarification on applicable mobile gaming Technical Standards and additionally to define policies associated with the manufacturing
More informationRFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
More informationHow To Run Eve 5 On A Pc Or Mac Or Ipad (For Pc Or Ipa) On A Network (For Mac) On Your Computer Or Ipro (For Ipro) On An Ipro Or Ipo (For Windows)
EVE5 Hardware and Software Requirements EVE5 is a Client/Server program. i.e. there are 2 components to the program: 1/ The Server: this controls your database and will be installed on one computer only.
More informationUsing ISO 15693 Compliant RFID Tags in an Inventory Control System
Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,
More informationUsing Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
More informationVoice Over Internet Protocol (VoIP) Configuration
(VoIP) Configuration ENGINEERING REPORT No: 02-003 Introduction This report describes interfacing the IPCS VoIP Gateway Model EGW-902 to an ESTeem Model 192E Wireless Ethernet radio modem in a demonstration
More informationLocation-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
More information4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19
4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software
More informationBasic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
More informationLongmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
More informationwww.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationSoftware Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007
Software Requirements Specification for VODKA Version 1.1 Approved April 24, 2007 Prepared by: Archit Baweja, Drew Hall, Sunny Huynh, Kevin Lynch, and Kanwarpreet Sethi Drexel University Revision History
More informationDepartment of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
More informationSecure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Embedded RF ABSTRACT This application report describes
More informationLiving Requirements Document: Sniffit
Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps
More informationQuick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
More informationSystem Services. Engagent System Services 2.06
System Services Engagent System Services 2.06 Overview Engagent System Services constitutes the central module in Engagent Software s product strategy. It is the glue both on an application level and on
More informationAbout the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
More informationRFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
More informationAn in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based
More informationWIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
More informationDesign of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationWireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
More informationCipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
More informationYour Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.
More informationHIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
More informationSecurity & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
More informationOctober 1, 2015. (Press release) Nippon Telegraph and Telephone Corporation
(Press release) October 1, 2015 Nippon Telegraph and Telephone Corporation High-density simultaneous compensation of distortion in wavelength-multiplexed signals using a time-reversal operation: World
More information3. Designed for installation by the user without further substantial support by the supplier; and
Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information
More informationACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
More informationLinksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
More informationUsing. Microsoft Virtual PC. Page 1
Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC
More informationWelch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview
Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation Best practices overview ii Welch Allyn Network installation 2015 Welch Allyn. All rights are reserved. To support the intended
More informationWi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing
More informationSaaS: Products and Licenses
SaaS: Products and Licenses Responsible for the content: audeosoft GmbH, Kreuzberger Ring 44a, 65205 Wiesbaden, Germany, hereinafter referred to as audeosoft. (Addendum to Terms of use audeosoft GmbH staffitpro
More informationSecuring Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
More informationAssessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
More informationProcess Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
More informationQUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT
QUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT A softcopy of this document can be found in the Support Center of our website. http://www.commdevices.com/support-center/technical-manuals/ - PA100/200 Cell-QuickStart.
More informationInternational Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)
Issues and Challenges in Ensuring Trust, Security, Performance and Scalability in a Common Multi-Banking Solution Sree Rekha.G Research Assistant, CORI, PESIT, Bangalore. V.K.Agrawal, Director, CORI, PESIT,
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
More information300Mbps Wireless N Gigabit Ceilling Mount Access Point
Datasheet 300Mbps Wireless N Gigabit Ceilling Mount Access Point 120 Highlights Wireless N speed up to 300Mbps Clustering function greatly simplified business wireless network management, to easy manage
More informationWater Quality Monitoring System Using Zigbee Based Wireless Sensor Network
24 Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network Zulhani Rasin Faculty of Electrical Engineering Universiti Teknikal Malaysia Melaka (UTeM) Melaka, Malaysia Email: zulhani@utem.edu.my
More informationR-Win. Smart Wireless Communication Management System
Smart Wireless Communication Management System General R-Win is a smart communications adapter for management of wireless communications in a SCADA/Distributed Control System. The R-Win system includes
More informationHow To Get A Power Station To Work With A Power Generator Without A Substation
Wi-Fi Protected Access for Protection and Automation Key Material Authentication Key Presented to: 13 December 2006 Dennis K. Holstein on behalf of CIGRE B5.22 1 The good news and the bad news Who is CIGRE
More informationComplying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
More informationKingpin, @stake, January 2002
Research In Motion s BlackBerry Wireless E-Mail Devices: Decoding the Mobitex protocol Kingpin, @stake, January 2002 1 Introduction The Research In Motion BlackBerry wireless e-mail device product line
More informationDocumentation. M-Bus 130-mbx
Documentation M-Bus 130-mbx Introduction The mx M-Bus module is part of the mx Smart Slot communications family. With the integrated SmartSlot technology, mx systems ag offers automatic consumer data read-out
More informationANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
More informationThat Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
More informationPurpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...
Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6
More informationSECTION 25 15 16 INTEGRATED AUTOMATION SOFTWARE FOR CONTROL OF MONITORING NETWORKS
SECTION 25 15 16 INTEGRATED AUTOMATION SOFTWARE FOR CONTROL OF MONITORING NETWORKS Specifier: The Specifier/Design Professional is responsible for the accuracy of all project specifications, including
More informationKey Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.
802.11a/n Long Range Wireless Outdoor CPE Key Features IEEE 802.11 a/n compliant Up to 300Mbps (5GHz) 24V Proprietary PoE support Waterproof Housing IP65 rated AP/CB/CR/WDS Modes 4 SSIDs support + VLAN
More informationInternational Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
More informationModern Wireless Communication
Modern Wireless Communication Simon Haykin, Michael Moher CH01-1 Chapter 1 Introduction CH01-2 1 Contents 1.1 Background 1.2 Communication Systems 1.3 Physical Layer 1.4 The Data-Link Layer 1.4.1 FDMA
More informationENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
More informationIngenious Systems. Evolute System's. Mobile Payment. Initiative
Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial
More informationWiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013
WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection
More informationVIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
More informationHacking. Aims. Naming, Acronyms, etc. Sources
Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.
More informationCisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
More informationFB-500A User s Manual
Megapixel Day & Night Fixed Box Network Camera FB-500A User s Manual Quality Service Group Product name: Network Camera (FB-500A Series) Release Date: 2011/7 Manual Revision: V1.0 Web site: Email: www.brickcom.com
More informationHow To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
More informationTrusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
More informationFREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID
FREE VOICE CALLING IN WIFI CAMPUS NETWORK ABSTRACT: USING ANDROID The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationWISP 101. The DO s and DON T s of becoming a Wireless ISP
WISP 101 The DO s and DON T s of becoming a Wireless ISP WISP 101 topics Choosing your hardware Setting up the Highsite Hardware Software Security Wireless Backhaul Setting up the client Choosing your
More informationAMI security considerations
AMI security considerations Jeff McCullough Introduction Many electric utilities are deploying or planning to deploy smart grid technologies. For smart grid deployments, advanced metering infrastructure
More informationA Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
More informationDeployment Scenarios
Deployment Scenarios Sun Cobalt Summary The Sun Cobalt is a network-based appliance for managing a large number of remote servers and for deploying services to these servers. A control station is deployed
More informationSecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
More informationCISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
More informationCQG Trader Technical Specifications. December 1, 2014 Version 2014-05
CQG Trader Technical Specifications December 1, 2014 Version 2014-05 Copyright 2014 CQG Inc. All rights reserved. Information in this document is subject to change without notice. Windows Vista, Windows,
More informationUSER MANUAL. PingBrother EPIW104 managed passive poe switch & IP watchdog
USER MANUAL PingBrother EPIW104 managed passive poe switch & IP watchdog CONTENT Content... 2 Chapter 1... 3 1.1 Preface... 3 1.2 CE mark warning... 3 1.3 FCC warning... 4 Chapter 2... 5 2.1 Physical description...
More information