1 / 26

InteLock TM

Remote Access and Proximity Key. InteLock TM. Advisor: Professor Ganz. Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos. Background & Motivation. Currently there are many solutions for keyless entry systems

Download Presentation

InteLock TM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Remote Access and Proximity Key InteLockTM Advisor: Professor Ganz Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos

  2. Background & Motivation • Currently there are many solutions for keyless entry systems • Combination locks, remote key locks, electronic card key locks, fingerprint identification locks • Each of these solutions provide a more convenient alternative to the standard key and lock system • Minimizes required user actions for ease of use

  3. Background & Motivation • Another alternative to keyless entry systems • Propose a new wireless product designed for residential market that fits into existing standard doors • Convenience of having the key located on user eliminates need to manually unlock door • User key never has to be taken out of their pocket, wallet, purse, etc. • Key is detected by keyless entry system • User needs only to turn doorknob for access into the home

  4. Background & Motivation • Allow Remote Access to Keyless Entry System • Connect system to internet so that the lock status can be queried and changed remotely. • Enables user to lock or unlock door from anywhere when necessary. • Integrate system with PC so that user events can be logged and tracked. • Allows home owner to monitor home security and user access.

  5. Design Challenges • Form factor • Require small wireless components that are easily integrated into existing residential doors • Power consumption • Devices that require minimum power to operate • Security • Technology that provides a secure network • Efficiency • Data reliability and quick response time

  6. Design Solution • User will be able to lock/unlock their door provided that a special key is range of the keyless system • When the special key is in range of the system, the user can simply lock/unlock their door with a turn of the doorknob • Turning the doorknob right denotes a lock command, while left denotes an unlock command • Non-valid keys will be detected by the system and access will be denied

  7. Design Solution • System will be integrated with existing PC and internet gateway. • Software on PC will log events and allow for system monitoring and updating • Server running on PC will allow for remote monitoring and control of keyless entry system

  8. Design Solution • Utilize new wireless technology: ZigBee • New up and coming standard for home automation • Small form factor make ZigBee easy to integrate into system design • Low power consumption enable ZigBee devices to run on same batteries for years • Support for a large number of nodes in network • Provides strong reliability and security

  9. ZigBee Security Features • Provides freshness check to prevent replay attacks (an attacker from replaying messages) • Provides message integrity to prevent an attacker from modifying the message in transit or forging message • Up to 128 bits of integrity • Authentication and encryption protection possible at network and device levels

  10. Review MDR Specifications • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node

  11. Review MDR Specifications • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node

  12. Review MDR Specifications • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node

  13. Demonstration • Doorknob trigger will now be demonstrated • Breadboard will simulate wireless communication between the doorknob microcontroller and the control unit Doorknob trigger mechanism

  14. Review MDR Specifications Met • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node • Establish communication between coordinator and one node using SPI… (revised spec)

  15. Deliverables: -Phase I (1) Command unit (1) Door knob (1) Deadbolt (2) Keys Associated Source Code User Manual -Phase II Server Software for PC Source Code Interface between PC and Control unit User Manual Deliverables • Acceptance Tests: • -Phase I • Door must unlock only • if valid Key is within range • Deadbolt must disengage within a few seconds • of knob turning • -Phase II • Software must be active whenever PC is running • Interface must only allow authorized users • to operate the system

  16. Project Milestones • Complete AVR RISC code for Phase I devices • Assemble and test Phase I system • Integrate system with PC using a ZigBee USB interface. • Write and test Software interface for system log and system control. • Write and Test server for Remote access and control

  17. Demo Day! • Phase I will be installed in functioning door with standard hardware placement for demonstration • Phase II will be installed on PC and will be demonstrated on a laptop with wireless access.

  18. Budget Overview

  19. Q & A ? ? ? ? ? ? ? ? ? ? ? ? ? ?

More Related