1 / 17

Remote Security Solutions

Remote Security Solutions. Tommy Long Eastern Kentucky University Dept. of Applied Engineering &Technology. OUTLINE. Motivation Introduction Problem Statement Assumptions Proposed Solution Results Conclusions Future Work References Acknowledgements. MOTIVATION.

lonna
Download Presentation

Remote Security Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Remote Security Solutions TommyLong EasternKentuckyUniversity Dept. of Applied Engineering &Technology

  2. OUTLINE • Motivation • Introduction • Problem Statement • Assumptions • Proposed Solution • Results • Conclusions • Future Work • References • Acknowledgements

  3. MOTIVATION • RFID based door systems are used world-wide in a variety of industries. • Problem is they aren’t as secure as people think. • Someone can steal a valid RFID card and gain access. • Or someone could clone someone’s valid RFID card. • I wanted to find a way to make RFID based door systems more secure.

  4. INTRODUCTION • I’ve always been interested in RFID technology. • After a little research I found a problem in one area of RFID technology implementation. • RFID card reader based door systems aren’t very secure. • Anyone with a little common sense could find a way in through a door using traditional RFID based systems. • All they RFID reader based door systems on the market are basically the same.

  5. INTRODUCTION • I set out to design a system to fix this security issue. • I wanted to develop a custom RFID card reader door system with an Arduino.

  6. PROBLEM STATEMENT • RFID card reader based door entry systems are insecure. • This gives people using these systems a false sense of security. • It provides a possible entry-point for criminals…

  7. ASSUMPTIONS • People assume that RFID based entry systems are expensive. • That these systems are hard to install, implement or manage. • The system I designed can be installed at a residence, business or warehouse. • My system cost about ten times less than commercially available systems. • This system does require someone to have knowledge about electronics and how they operate. • You also need to have some understanding or experience programming with C++, C, Java and HTML.

  8. PROPOSED SOLUTION • List steps taken to solve the problem such as but not limited to: • Research RFID systems and how they work. • Research Arduino microcontrollers. • Design an RFID based system with an Arduino microcontroller. • Finding reasonable resources to obtain hardware needed for this project. • Writing custom code for Arduino. • Configuring hardware and software. • Troubleshooting issues with hardware/software. • Testing in a real-world environment. • Verifying results

  9. PROPOSED SOLUTION • My system uses an IP cam to let the other person see who’s on the other side of the door. • Then they can make a decision to either unlock the door, lock the door or to sound an alarm. • This system is available over the internet and can be seen from any where in the world with an internet connection. • This allows for being able to control the door remotely.

  10. PROPOSED SOLUTION

  11. PROPOSED SOLUTION

  12. RESULTS • To build my system it costs a total of $315.89 • Most RFID based entry systems can costs thousands of dollars. • My system adds another layer of authentication that involves interaction from a human to identify the person trying to access the door. • This two-factor form of security makes my system superior to other similar systems.

  13. CONCLUSIONS • This project proposes a viable and practical solution to the security flaws with most available RFID based door systems. • Before starting this project I couldn’t tell you what an Arduino even was. • My understanding of electronics, microcontrollers and my programming skills in C++, C, Java and HTML have improved tremendously.

  14. FUTURE WORK • This project could be customized in many ways. • Due to the limitations of the Arduino because of it’s small amount of memory and limited processing power, I would look for a better microcontroller. • I would recommend moving away from the Arduino microcontroller and implementing the Raspberry Pi. • This project can be scaled up to incorporate multiple doors and cameras. • Thank you for watching this presentation. • If you have questions, comments or suggestions, you can send them to me at tommy_long22@mymail.eku.edu

  15. QUESTIONS???

  16. REFERENCES • Long, T.( 2013,May 05) Remote Security Solutions. Retrieved from: http://www.eku-aet.org/net/Capstone/2013/TommyLong_EKU-NET_Capstone2013_presentation.pptx • Long, T.(2013,May 05) Remote Security Solutions Tutorial. Retrieved from: http://www.eku-aet.org/net/Capstone/2013/TommyLong_EKU_NET_Capstone2013_video.wmv

  17. ACKNOWLEDGEMENTS • Margolis, M. (2011). Arduino cookbook. Beijing: O'Reilly. Provide a thumbnail of image/video along with online/author information • RFID card swipe image. Retrieved May 05,2013 from www.kaba.co.nz • Arduino Uno image. Retrieved May 05, 2013 from www.store.Arduino.cc • Burglar image. Retrieved May 05, 2013 from www.lawyersweekly.com.au. • Security Guard image. Retrieved May 05, 2013 from www.gccaz.edu • Special thanks to Andrew Six for his help.

More Related