1 / 14

Final Project Review

Final Project Review. Team Tessier Brandon Thorpe Michael Shusta Telin Kim Lucas Root. Outline. System Overview and Demo Security Analysis Cost Analysis Project Deliverables. The Bluetag System. Tag Consumer Software Retailer Software. Store Inventory. Bluetag Database. IDB.

henrik
Télécharger la présentation

Final Project Review

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Final Project Review Team Tessier Brandon Thorpe Michael Shusta Telin Kim Lucas Root

  2. Outline • System Overview and Demo • Security Analysis • Cost Analysis • Project Deliverables

  3. The Bluetag System • Tag • Consumer Software • Retailer Software Store Inventory Bluetag Database IDB Locked Item Client

  4. Tag Overview • Housing: • 4.25” x 2” x 1.25” • Blue photopolymer, $150 • PCB: • 3” x 1.5” • Mini solenoid • Power • 78mW DC connected, 911mW transient (unlock) • Recharge jack, on-off switch

  5. User Account Creation • Bluetag website enables users to create valid accounts before entering a store • Email address, password, and credit card information • Written in HTML and PHP

  6. Retailer Software

  7. Phone Software Typical Use-case: • Enable Bluetooth on your phone, connect to BLUETAG wireless network • Login • Enter tag visual ID, connect to tag • Click “Buy” • Verify tag unlocked

  8. System Security • Protection of sensitive information • Unlock codes • User account information • Potential vulnerabilities • Database attack • Bluetooth monitoring • WiFi monitoring • Physical abuse

  9. Bluetooth Security Existing Measures • Frequency hopping (can be cracked) • Encryption (many weaknesses) Bluetag Additions • Dynamic unlock codes • Unlock code mapping

  10. Bluetooth Security

  11. WiFi Security Database RSA encrypted at 512 bits The number of possible keys : 2512 = 1.34E154 ; With a device that could check 1E18 keys per second, It will require 4.25E128 years to try all keys; Where age of universe = 1.3E10 years

  12. Cost Analysis

  13. Cost Analysis

  14. Meeting Project Goals • Full Bluetag system delivered • Highly secure • Cost effective • Lightweight, handheld tag • Readily deployable

More Related