140 likes | 250 Views
Final Project Review. Team Tessier Brandon Thorpe Michael Shusta Telin Kim Lucas Root. Outline. System Overview and Demo Security Analysis Cost Analysis Project Deliverables. The Bluetag System. Tag Consumer Software Retailer Software. Store Inventory. Bluetag Database. IDB.
E N D
Final Project Review Team Tessier Brandon Thorpe Michael Shusta Telin Kim Lucas Root
Outline • System Overview and Demo • Security Analysis • Cost Analysis • Project Deliverables
The Bluetag System • Tag • Consumer Software • Retailer Software Store Inventory Bluetag Database IDB Locked Item Client
Tag Overview • Housing: • 4.25” x 2” x 1.25” • Blue photopolymer, $150 • PCB: • 3” x 1.5” • Mini solenoid • Power • 78mW DC connected, 911mW transient (unlock) • Recharge jack, on-off switch
User Account Creation • Bluetag website enables users to create valid accounts before entering a store • Email address, password, and credit card information • Written in HTML and PHP
Phone Software Typical Use-case: • Enable Bluetooth on your phone, connect to BLUETAG wireless network • Login • Enter tag visual ID, connect to tag • Click “Buy” • Verify tag unlocked
System Security • Protection of sensitive information • Unlock codes • User account information • Potential vulnerabilities • Database attack • Bluetooth monitoring • WiFi monitoring • Physical abuse
Bluetooth Security Existing Measures • Frequency hopping (can be cracked) • Encryption (many weaknesses) Bluetag Additions • Dynamic unlock codes • Unlock code mapping
WiFi Security Database RSA encrypted at 512 bits The number of possible keys : 2512 = 1.34E154 ; With a device that could check 1E18 keys per second, It will require 4.25E128 years to try all keys; Where age of universe = 1.3E10 years
Meeting Project Goals • Full Bluetag system delivered • Highly secure • Cost effective • Lightweight, handheld tag • Readily deployable