1 / 1

Friend-Foe Identification System

Department of Electrical and Computer Engineering ECE 415/ECE 416 SENIOR DESIGN PROJECT 2010 College of Engineering - University of Massachusetts Amherst. Friend-Foe Identification System. Justin Ayvazian, Ben Johnson, Eric Putney, Mike Ruth Faculty Advisor: Prof. Sandip Kundu.

washi
Download Presentation

Friend-Foe Identification System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Department of Electrical and Computer Engineering ECE 415/ECE 416 SENIOR DESIGN PROJECT 2010 College of Engineering - University of Massachusetts Amherst Friend-Foe Identification System Justin Ayvazian, Ben Johnson, Eric Putney, Mike Ruth Faculty Advisor: Prof. Sandip Kundu Background When combating an enemy who uses guerilla tactics and deception as their primary offensive strategy, reliably identifying friendly forces from enemy units or imposters can often be the deciding factor between facing a devastating surprise attack or the containment of a serious threat. While current friend and foe identification systems are effective for identifying friendly units, these systems rely on hardware keys that can be stolen from friendly soldiers. The Friend and Foe Identification System (FFID) however, will use keypad-input passwords to identify friendly vehicles, preventing the theft of identification keys. This automated system allows for the fast and reliable identification of multiple vehicles simultaneously in a secure way that will prevent both hijackings and hostile imposters. Hardware Block Diagrams Orange: Hardware Peripherals Red: Software Control Modules Blue: Security and Encryption Modules Gray: Password Input Interface System Operations Overview Our proposed system will consist of two different units, a transponder (vehicle) unit and an interrogation (base) unit. The base unit will continuously request identification from any vehicle entering the communication range. The vehicle will respond to this request and be labeled as friendly, hostile, hijacked, or unknown based upon the password input by vehicle personnel. Additionally, the base unit will track the GPS coordinates of each vehicle it encounters and output their location on a graphical interface. In order to protect the communication scheme from interception, wireless transmissions will be encrypted. • Design Challenges • Vehicle to Base Wireless Communication • Development of Compact and Reliable Communication Scheme • Transmission Security • Ease of Use for Friendly Soldiers • GPS Vehicle Tracking • Graphical Display Integration Prototype Features • RC5 Packet Encryption/Decryption • 802.11 Wireless Communication • C Software Implementation • FPGA Hardware • GPS Tracking • Graphical User Interface Fig 1: System Overview The base will identify and track all transponder outfitted vehicles within the communication range based on password transmissions from each vehicle. Fig 2: Communication Scheme This figure shows one full security identification conversation between a base and vehicle. Each arrow represents one packet, with the data contained in each packet listed above. System Security Overview Team Photo • Wireless Security • Purpose: Prevent eavesdroppers from decoding transmissions • Transmitted data encrypted by RC5 algorithm • Block cipher with data dependant rotations • Password Interface • Purpose: Prevent hijacked vehicles from being identified as friendly • Common password mentally stored by military personnel • Each vehicle transmits unique password by transforming common password with a unique random seed • Pictures Here: DE-II pic and team kundu pic From Left to Right: Ben Johnson, Mike Ruth, Prof. Sandip Kundu, Eric Putney, and Justin Ayvazian Acknowledgements We would like to thank Professor Kundu, Professor Tessier, General Dynamics, Fran Caron and Keith Shimeld. This project was fully funded by the ECE department.

More Related