Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.



Similar documents
The next generation of knowledge and expertise Wireless Security Basics

RFID based Bill Generation and Payment through Mobile

Online Communication of Critical Parameters in Powerplant Using ZIGBEE

Gemalto Mifare 1K Datasheet

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

How To Track A Vehicle With A Smart Vehicle Tracking System

Implementation of Wireless Gateway for Smart Home

EAP N Wall Mount Access Point / WDS AP / Universal Repeater

Online Student Attendance Management System using Android

YO-301AP POE AP Datasheet

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & b up to 108 Mbps) User Manual. Version: 1.

920MHz Band Multi-hop Wireless Network System

Ensuring the security of your mobile business intelligence

What is a Smart Card?

Enhancing Organizational Security Through the Use of Virtual Smart Cards

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

ADVANCED VEHICLE TRACKING SYSTEM USING ARM7

How To Ensure Correctness Of Data In The Cloud

Server Software Installation Guide

Mobile MasterCard PayPass Testing and Approval Guide. December Version 2.0

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

MOBILE GAMING SYSTEM POLICIES

RFID Security: Threats, solutions and open challenges

How To Run Eve 5 On A Pc Or Mac Or Ipad (For Pc Or Ipa) On A Network (For Mac) On Your Computer Or Ipro (For Ipro) On An Ipro Or Ipo (For Windows)

Using ISO Compliant RFID Tags in an Inventory Control System

Using Contactless Smart Cards for Secure Applications

Voice Over Internet Protocol (VoIP) Configuration

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Chapter 6 Using Network Monitoring Tools

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

Basic Network Design

Longmai Mobile PKI Solution

Server Installation ZENworks Mobile Management 2.7.x August 2013

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Living Requirements Document: Sniffit

Quick Start Guide: Iridium GO! Advanced Portal

System Services. Engagent System Services 2.06

About the Authors Preface Acknowledgements List of Acronyms

RFID SECURITY. February The Government of the Hong Kong Special Administrative Region

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Design of Remote data acquisition system based on Internet of Things

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

Wireless Sensor Network: Challenges, Issues and Research

CipherShare Features and Benefits

Your Mobile Phone as a Ticket (NFC)

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Security & Chip Card ICs SLE 44R35S / Mifare

October 1, (Press release) Nippon Telegraph and Telephone Corporation

3. Designed for installation by the user without further substantial support by the supplier; and

ACER ProShield. Table of Contents

Linksys WAP300N. User Guide

Using. Microsoft Virtual PC. Page 1

Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson

SaaS: Products and Licenses

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Process Control and Automation using Modbus Protocol

QUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT

International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)

RFID BASED VEHICLE TRACKING SYSTEM

Chapter 6 Using Network Monitoring Tools

300Mbps Wireless N Gigabit Ceilling Mount Access Point

Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network

R-Win. Smart Wireless Communication Management System

How To Get A Power Station To Work With A Power Generator Without A Substation

Complying with PCI Data Security

January 2002

Documentation. M-Bus 130-mbx

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

That Point of Sale is a PoS

Purpose Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations Data Encryption...

SECTION INTEGRATED AUTOMATION SOFTWARE FOR CONTROL OF MONITORING NETWORKS

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.

International Journal of Engineering Research & Management Technology

Modern Wireless Communication

ENHWI-N n Wireless Router

Ingenious Systems. Evolute System's. Mobile Payment. Initiative

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Hacking. Aims. Naming, Acronyms, etc. Sources

Cisco Wireless Control System (WCS)

FB-500A User s Manual

How To Hack An Rdi Credit Card

Trusted Platforms for Homeland Security

FREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID

Chapter 1: Introduction

WISP 101. The DO s and DON T s of becoming a Wireless ISP

AMI security considerations

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

Deployment Scenarios

SecureCom Mobile s mission is to help people keep their private communication private.

CISCO WIRELESS CONTROL SYSTEM (WCS)

CQG Trader Technical Specifications. December 1, 2014 Version

USER MANUAL. PingBrother EPIW104 managed passive poe switch & IP watchdog

Transcription:

EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management system Project Proposal P.D. Ehlers 21017914 Study leader: Mr. D.V. Bhatt Evaluation of content Mark/20: Acceptable: Yes No Problem statement 4 3 2 1 0 User requirement statement 4 3 2 1 0 Functional analysis 4 3 2 1 0 System specifications 4 3 2 1 0 Deliverables 4 3 2 1 0 Comments (also see inside): Proofreader: D.P. Visser Date

Development of a wireless home anti theft asset management system Project Proposal P.D. Ehlers 21017914 Submitted as partial fulfilment of the requirements of Project EPR402 in the Department of Electrical, Electronic and Computer Engineering University of Pretoria Approved: April 2006 Study leader: Mr. D.V. Bhatt Mr. D.V. Bhatt (Study leader) Date Approved: Prof. J.J. Hanekom (Project lecturer) Date

1. PROBLEM STATEMENT With the ongoing and rapidly increasing acts of crime and theft in our society, an ever growing need arise to secure ourselves and our possessions. The main reason fueling these acts of theft is the unlimited demand for stolen goods on the black market. In order to eliminate these malicious acts of theft, one has to eliminate the market. The project addresses this problem and will assist the user in managing his/her domestic assets in a home environment. This system will easily be integrated in any electronic device in a home environment. The envisioned system will consist mainly of the following three elements; firstly, a wireless management module (WMM) that will be integrated in an electronic device. Secondly, wireless server that will act as an interface between the user and the WMM, and finally a radio frequency identification tag and reader. A device equipped with the WMM will, when powered, be non-functional until the user disables the WMM remotely over a computer network or manually with a authentication tag. The user will be in possession of a unique authentication code which will only entitle him/her to enable/disable the WMM. The engineering challenge faced in this project is the development of hardware and software needed to construct a wireless anti-theft asset management system. Challenges include the interfacing of a microprocessor to Zigbee 802.15.4 transceiver and to a smart card reader. This task includes the physical realization of the circuitry as well as the development of the control firmware to be loaded on the microprocessor. Cryptographic firmware must also be developed and loaded on the microprocessor to ensure secure data transmissions to and from the WMM. Server side software must be developed which will include cryptographic algorithms to secure transmissions between client and server using the IEEE 802.11 protocol as well as between the server and the WMM using the IEEE 802.15.4 protocol. Limitations of this project are available hardware, the size of the WMM, the material of the enclosure of the electronic device to be equipped with the WMM and the RF range of a Zigbee transceiver. The transceiver required must incorporate encryption but the available transceivers do not support encryption. Thus, to compensate from this shortcoming, encryption firmware must be developed and loaded onto a powerful microprocessor which will be interfaced to the transceiver instead. The design requires a contact smart card but due to size and adaptability requirements a contactless smart card must be used. The size of the WMM is extremely important and therefore, the smallest components available will be used. The material of which the electronic device is manufactured of also plays a role when considering the RF range of the Zigbee transceiver as well as the RF contactless smart card reader. To accommodate this limitation certain modifications should be made to antennas of these components. 1

2. USER REQUIREMENT STATEMENT A durable WMM integrated into an electronic domestic device, which render the device non-functional when enabled and functional when disabled, is required. The life-cycle, durability, size, shape and working of the electronic domestic device should not be impaired by the WMM. The WMM should have wireless capabilities to connect to a wireless server through which the user can remotely change the state of the WMM. When the WMM comes into contact with an RF 1 authentication tag it should toggle between enable and disable. The WMM should by default be enabled, disabling the electronic domestic device. The domestic device should remain non-functional until the user disables the WMM with a unique authentication code, either sent through the wireless network or with a unique authentication tag. The user should at any time be able to check or change the status of the device given the device is powered. A flag should be toggled inside the WMM to store the current state on any specific time. 2.1 SYSTEM MISSION REQUIREMENTS The following list provides the mission requirements of the design. The WMM to be integrated in an electronic domestic device should in no way impair the device size, shape, life-cycle, durability and operation. To maintain the durability of the domestic device, it is critical that the WMM should be robust and durable. Integration of the WMM into a domestic device should limit tampering possibilities. The communication ability of the WMM should not be impaired by the noise generated by the domestic device. A power converter must be included in the WMM to convert the operating power of the electronic device to the operating power required by the WMM. The WMM should be enabled by default and should only change status when a user with a unique authentication code commands it. After a power failure, the WMM should adapt the enabled state. The wireless server and planted WMM should be able to work within a large home environment. 1 Radio frequency 2

2.2 VALUE SYSTEM The following aspects constitute the value system used in the design: functionality, cost, reliability, size and shape. 3. FUNCTIONAL ANALYSIS The system works in two directions, from the electronic device to the end user and from the end user to the electronic device, as shown in the functional diagrams(figure 1a and Figure 1b). When the user desires to query or change the status of a domestic device, the working direction will be from the end user to the electronic device (figure 1a). Figure 1a. Functional block diagram for user to electronic device communication. The user will access a web based user interface (FU3.2) located on the server unit (FU3) through the private wireless channel (FU2) with his/her wireless device (FU1). User input received from the user interface unit will be processed by the server processing unit (FU3.3). User input comprises of a device identification code, status command and 3

unique authentication code. Processed user input will be broadcast over the wireless channel with the wireless unit (FU3.1) to all the wireless management modules (FU4) in the domestic domain. The WMM consists of a wireless transceiver (FU4.1), a WMM processing unit (FU4.2), an enable/disable unit (FU4.3) and an authentication tag reader(fu4.4). All the wireless management modules in the domestic devices receive the broadcast with there wireless transceivers (FU4.1) and sends the received data to their processing units. The WMM processing unit compare it s device identification code to the received identification code. If the codes match, the received data is further processed, otherwise discarded. After confirmation on the authentication code is established, the received command is processed and executed. A control signal will be sent to the enable/disable unit (FU4.3) rendering the device functional or non-functional depending on the received command. If the system replies on a status check or confirms a status change, the system will operate in a reversed direction (figure 1b). Figure 1b. Functional block diagram for electronic device to user communication. After the WMM received and processed a status check or change command, the WMM processing unit sends a device identification code and a current status back to the server unit over the wireless channel. After data was received by the server it is sent to it s processing unit to update the user interface accordingly. An alternative to WMM disabling/enabling is the use of a unique authentication tag (FU5). The code read from the authentication tag will be sent to the WMM processor 4

unit where it will be matched to the stored code in the processing unit. The authentication tags will be read by the tag reader (FU4.4) in the WMM. If they match, the data processor unit will command the enable/disable unit to toggle the device functional or non-functional. A status change confirmation will be sent to the server unit (FU3) after a WMM status change occurred. 4. SYSTEM SPECIFICATIONS The following is a list of the specifications that this system has to comply with. 4.1 GLOBAL SPECIFICATIONS The wireless management module (WMM) should by default disable the device and it should stay in this state until a valid user authenticates it. The WMM should stay authenticated until the user commands it otherwise or it experience a power failure. A smart card and wireless network must be the only two methods of authentication. The wireless network will be the transmission medium for data sent, on the user s command, from a centralized server which will host the WMM control software. The WMM should be small enough to fit into the electronic device s enclosure. Devices equipped with a WMM should not be impaired by the WMM. The wireless communication network (FU2) must provide a reliable RF link over a diametrical distance of 20 meters. 4.2 DETAILED SPECIFICATIONS The WMM must not have an alternative power source other than the power source of the electronic device. The WMM in the electronic device should be able to cope with the noise generated by a device. The user s wireless device (FU1) should be able to communicate with the wireless server (FU3) using the and should IEEE 802.11 standard and should operate at 11Mbps 2 or 54Mbps. The server unit (FU3) should be a personnel computer capable of processing high level cryptographic algorithms. A Pentium III with 256 MB 3 RAM 4 or higher. 2 Mega bits per second 3 Megabytes 4 Random access memory 5

The server wireless unit (FU3.1) must consist of 802.11 and 802.15.4 wireless devices capable of communicating with the different standard networks. The web based user interface unit must display a encrypted login web page which requires a username and password of a valid user stored in a secured database. After a secure login, the user is routed to a secure web page displaying the wireless module command software. The server unit (FU3) must communicate with the planted module (FU4) using the IEEE 802.15.4 standard. The WMM (FU4) should consist of an 802.15.4 zigbee transceiver, microprocessor and a smart card reader. The processing unit (FU4.2) must handle all the cryptographic calculations and the data processing required for data transmissions. An affordable RF tag (FU5) should be uniquely programmed to be the only tag which can enable/disable the WMM. 5. DELIVERABLES 5.1 TECHNICAL DELIVERABLES The following need to be delivered on completion of the project. A fully functional asset management system comprised of a WMM, a wireless server and a unique authentication tag. The WMM will contain a printed circuit board with an off-the-shelf wireless zigbee transceiver, microprocessor and a smart card reader etched on it. The smart card reader will require an antenna which will be designed and developed from first principles. A smart card programmed to authenticate the WMM. A server unit which will comprise of a personal computer and wireless access devices for different standards. The wireless access devices will be off-the-shelf products. Web based user interface software developed in C# and loaded on the server for easy remote access. The low level machine code (assembly code) to be loaded on the microprocessor will be developed from first principles. 6

5.2 ADDITIONAL PROJECT REQUIREMENTS In addition to the final product described above, a user manual for the system will also be provided. 5.3 DEMONSTRATION The following will be demonstrated at the exam. A working wireless home anti-theft asset management system will be demonstrated. This system will consist of a WMM integrated into a electronic domestic device and a wireless server which will handle all communication between user and WMM. The demonstration will show that when a device, equipped with the WMM, is powered, it will by default be non-functional till the user disables the WMM. It will be demonstrated that the user will be able to enable/disable the WMM through the wireless channel in a specific device or in all the devices simultaneously, as well as to check the status of any or all of the devices. It will also show that the device will be non-functional when the WMM is enabled and functional when the WMM is disabled. The demonstration will show that the user can enable/disable the WMM with a unique authentication tag when it makes physical contact with the device. 7

6. REFERENCES Kulkarni, A.D., 1993. Artificial Neural Networks for Image Understanding. New York: Van Nostrand Reinhold. 8