260 likes | 352 Views
Remote Access and Proximity Key. InteLock TM. Advisor: Professor Ganz. Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos. Background & Motivation. Currently there are many solutions for keyless entry systems
E N D
Remote Access and Proximity Key InteLockTM Advisor: Professor Ganz Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos
Background & Motivation • Currently there are many solutions for keyless entry systems • Combination locks, remote key locks, electronic card key locks, fingerprint identification locks • Each of these solutions provide a more convenient alternative to the standard key and lock system • Minimizes required user actions for ease of use
Background & Motivation • Another alternative to keyless entry systems • Propose a new wireless product designed for residential market that fits into existing standard doors • Convenience of having the key located on user eliminates need to manually unlock door • User key never has to be taken out of their pocket, wallet, purse, etc. • Key is detected by keyless entry system • User needs only to turn doorknob for access into the home
Background & Motivation • Allow Remote Access to Keyless Entry System • Connect system to internet so that the lock status can be queried and changed remotely. • Enables user to lock or unlock door from anywhere when necessary. • Integrate system with PC so that user events can be logged and tracked. • Allows home owner to monitor home security and user access.
Design Challenges • Form factor • Require small wireless components that are easily integrated into existing residential doors • Power consumption • Devices that require minimum power to operate • Security • Technology that provides a secure network • Efficiency • Data reliability and quick response time
Design Solution • User will be able to lock/unlock their door provided that a special key is range of the keyless system • When the special key is in range of the system, the user can simply lock/unlock their door with a turn of the doorknob • Turning the doorknob right denotes a lock command, while left denotes an unlock command • Non-valid keys will be detected by the system and access will be denied
Design Solution • System will be integrated with existing PC and internet gateway. • Software on PC will log events and allow for system monitoring and updating • Server running on PC will allow for remote monitoring and control of keyless entry system
Design Solution • Utilize new wireless technology: ZigBee • New up and coming standard for home automation • Small form factor make ZigBee easy to integrate into system design • Low power consumption enable ZigBee devices to run on same batteries for years • Support for a large number of nodes in network • Provides strong reliability and security
ZigBee Security Features • Provides freshness check to prevent replay attacks (an attacker from replaying messages) • Provides message integrity to prevent an attacker from modifying the message in transit or forging message • Up to 128 bits of integrity • Authentication and encryption protection possible at network and device levels
Review MDR Specifications • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node
Review MDR Specifications • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node
Review MDR Specifications • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node
Demonstration • Doorknob trigger will now be demonstrated • Breadboard will simulate wireless communication between the doorknob microcontroller and the control unit Doorknob trigger mechanism
Review MDR Specifications Met • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node • Establish communication between coordinator and one node using SPI… (revised spec)
Deliverables: -Phase I (1) Command unit (1) Door knob (1) Deadbolt (2) Keys Associated Source Code User Manual -Phase II Server Software for PC Source Code Interface between PC and Control unit User Manual Deliverables • Acceptance Tests: • -Phase I • Door must unlock only • if valid Key is within range • Deadbolt must disengage within a few seconds • of knob turning • -Phase II • Software must be active whenever PC is running • Interface must only allow authorized users • to operate the system
Project Milestones • Complete AVR RISC code for Phase I devices • Assemble and test Phase I system • Integrate system with PC using a ZigBee USB interface. • Write and test Software interface for system log and system control. • Write and Test server for Remote access and control
Demo Day! • Phase I will be installed in functioning door with standard hardware placement for demonstration • Phase II will be installed on PC and will be demonstrated on a laptop with wireless access.
Q & A ? ? ? ? ? ? ? ? ? ? ? ? ? ?