Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description...

19
Designed by: Anita Has Kristina Suen

Transcript of Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description...

Page 1: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

Designed by:Anita HasKristina Suen

Page 2: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

SYNOPSISI. Motivation & Requirements

II. Design & Description of Operation

i. Hardwareii. Software

III. Demonstration

Page 3: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

MOTIVATION & REQUIREMENTSSecurity Vulnerabilities

Lost/Stolen KeyEavesdropper

SMART – AKK RequirementsEncryption of data over communication line

Tiny Encryption AlgorithmBiometric verification module

ARA-ME-01 Biometric ModuleVehicle simulation

Wireless communication via XBEEs

Page 4: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

SMART - AKK

Page 5: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

HARDWARE

Page 6: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

DESIGN LAYOUT

Page 7: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

SMART- AKK DESIGN

Page 8: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

AKV DESIGN

Page 9: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

X-Bee 802.15.4 Wireless Modules 10 meter range

test USART

Communication8-bit data

packets38400 baud

rate

Page 10: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

ARA-ME-01 Biometric Module

On chip authentication

Scanning & matching of 120 fingerprints

Less than 3 seconds fingerprint matching

Page 11: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

ARA-ME-01 Biometric ModuleUSART Communication

19200 baud rate

Packet format (in hex)Example packet

Read image from sensor and store in image bufferPack

et head

Device address

Packet

flag

Packet

length

Command

Checksum

Request EF01 FFFFFFFF

01 0003 01 0005

Response

EF01 FFFFFFFF

07 0003 00 000A

Page 12: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

ARA-ME-01 Biometric ModuleApplication to SMART - AKK

Master fingerprint Enroll additional fingerprints Reset memory and master

Authenticate fingerprints Execute any command on AKV

Page 13: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

SOFTWARE

Page 14: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

Tiny Encryption Algorithm (TEA)Why TEA?

i. Simplicityii. Speediii. Cryptographic strength

AKV Data Packet: 64-bits

AKK/AKV VIN Key : 128-bits

Page 15: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

Tiny Encryption Algorithm (TEA)

• Serial number consists of synchronized counter that is incremented by 0x8 to prevent eavesdropping

Valid AKV Command

Atmel55 Button Sequence

32-bit Action Before TEA

32-bit ActionAfter TEA

Lock All Doors Button 1 0x11111111 0xFB5319C8Unlock All Doors

double click Button 1

0x11112222 0x4F9270C3

Engine On Button 2 0x22222222 0x015F1A82

Engine Offdouble click

Button 20x22223333 0x0BBF3EDC

Panic Button 3 0x33333333 0x52CE67EA

Page 16: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

SMART – AKK Software Flow

NO

NO

NO

Page 17: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

NO

NO8 byte buffer

overflow ?

NO

NO

AKV Software Flow

Page 18: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

DEMONSTRATION

Page 19: Designed by: Anita Has Kristina Suen. SYNOPSIS I.Motivation & Requirements II.Design & Description of Operation i. Hardware ii. Software III.Demonstration.

QUESTIONS