ece 415 senior design project fall 2010 justin ayvazian eric putney ben johnson michael ruth...
Post on 21-Dec-2015
218 views
TRANSCRIPT
ECE 415 Senior Design Project Fall 2010
Justin AyvazianEric PutneyBen JohnsonMichael Ruth
Advisor: Professor Sandip Kundu
Friend-Foe Identification System
2ECE 415 Senior Design Project Fall 2010
Outline
Project Overview• Motivation• Problem Statement• System Design
System Diagrams and Operation• User and Data Flow Diagrams• Hardware Block Diagrams• Communication Scheme
Message Security• Password entry and transformation• RC5
Project Progress• Graphical Interface and Vehicle Tracking• Prototype Implementation• Future Consideration
3ECE 415 Senior Design Project Fall 2010
Motivation
•Deaths per day due to Vehicle Bombings in Iraq
•7,000 heavily armored Mine Resistant Ambush Protected (MRAP) vehicles transported into Iraq from 07’ to 08’
•Accounts for drop in deaths since 2007
•Vehicle hijackings and digital attacks more frequent as a result
•Prominent in Afghanistan and Pakistan
•18 attacks on Pakistani soil, up to 13 vehicles hijacked per attack (From August to November of 07’)
• Extrapolated, that’s over 2100 vehicles hijacked since August 07’
4ECE 415 Senior Design Project Fall 2010
Problem Statement
Identify ground vehicles• Hijackings and bombings
Transmissions• Eavesdropping
Security• Digital Terrorism• Data Encryption and Decryption
5ECE 415 Senior Design Project Fall 2010
System Overview
6ECE 415 Senior Design Project Fall 2010
Requirements Specification
Vehicle mounted system• Power efficient, compact, and stand-alone
Identification and threat assessment of approaching vehicles• 2 mile range on base for adequate reaction time
Security• Secure transmissions
• Prevent digital terrorism and impersonation of friendly vehicles
• Password interface• Prevent unknown hijackings of military vehicles
7ECE 415 Senior Design Project Fall 2010
Final Design Concept
Prototype system with limited range• Design hardware and communication modules, leave physical
method of transmission up to end user
WiFi as wireless transmission method for prototype• Well defined standards, inexpensive implementation
Nios II FPGA Core• Run C control code on top of hardware modules
• Ex: RC5 and WiFi Transmission
8ECE 415 Senior Design Project Fall 2010
Time to react: 110 seconds for 2 mile range at 105 km/h
Range: 2 miles -> 100 m
Speed: 105 km/h -> 6.56 km/h• GUI Applet: Vehicle’s speed is 1.83 m/s
Scaling for Prototype
9ECE 415 Senior Design Project Fall 2010
Outline
Project Overview• Motivation• Problem Statement• System Design
System Diagrams and Operation• User and Data Flow Diagrams• Hardware Block Diagrams• Communication Scheme
Message Security• Password entry and transformation• RC5
Project Progress• Graphical Interface and Vehicle Tracking• Prototype Implementation• Future Consideration
10ECE 415 Senior Design Project Fall 2010
User-Level Diagram
11ECE 415 Senior Design Project Fall 2010
Data Flow Diagram
12ECE 415 Senior Design Project Fall 2010
Interrogator Unit
13ECE 415 Senior Design Project Fall 2010
Transponder Unit
14ECE 415 Senior Design Project Fall 2010
Identification Process
15ECE 415 Senior Design Project Fall 2010
Packet Structures
4 message types:• Base Module:
• Request Identification
• Acknowledge ID/Update Randomization Value
• Vehicle Module:• Transmit Identification
• Acknowledge Randomization Value Update
16ECE 415 Senior Design Project Fall 2010
Outline
Project Overview• Motivation• Problem Statement• System Design
System Diagrams and Operation• User and Data Flow Diagrams• Hardware Block Diagrams• Communication Scheme
Message Security• Password entry and transformation• RC5
Project Progress• Graphical Interface and Vehicle Tracking• Prototype Implementation• Future Consideration
17ECE 415 Senior Design Project Fall 2010
Password Transformation
Why do passwords need to be transformed?• Avoid physical keys, use shared password • Future messages with same vehicle will be unique
Implementation• Shared 16 bit password for all vehicles• Multiply by randomly generated 16-bit number• 232 possible values• “Three strikes rule” - ~ 5x10-3 % chance of correctly
guessing password even if all other parts of the system have been compromised
18ECE 415 Senior Design Project Fall 2010
Randomization Value Updating
Updated through rolling encryption scheme• Similar to system used for remote entry devices for cars
Last message from base to vehicle sends new randomization value• Generated by base, stored by both vehicle and base
Base stores current value and previous value of randomization values• Final message is vehicle to base• Base must store both in case final transmission not
received by base but is sent by vehicle
19ECE 415 Senior Design Project Fall 2010
Message Encryption
Encryption Requirements• Real-time ciphering• Robust algorithm to prevent cryptanalysis
RC5• Parameter-Based Symmetric Block Cipher
• Adaptable for speed and encryption strength• Lightweight encryption algorithm FAST• Performs word-oriented operations FAST
20ECE 415 Senior Design Project Fall 2010
RC5 Encryption Module
Initial C-based implementation—Completed• Timing trials from 32-bit XP OS, running on a 1.83 GHz
processor.
Future Verilog implementation• Timing Expectations
Algorithm requirements:• Strong Security
• Data Dependant rotations• Fast Encryption, Decryption, and Key Expansion
21ECE 415 Senior Design Project Fall 2010
RC5—Security Strength
Several strategies for breaking block cipher:• Exhaustive search• Statistical tests • Linear Cryptanalysis• Differential Cryptanalysis
Best public attack a variant of differential cryptanalysis Still requires unreasonable amounts of plaintext/ciphertext pairs
22ECE 415 Senior Design Project Fall 2010
RC5—Security Strength (cont.)
Data Dependent Rotations• Helps protect against differential cryptanalysis• Coupled with the use of the password transformation,
identical messages will have different ciphertexts• Prevents Timing analysis
Strength against other known cryptanalysis methods• Linear• Exhaustive
• 2Bits_in_key attempts• Statistical
• Data-dependent rotations/password randomization
23ECE 415 Senior Design Project Fall 2010
RC5—Operation Speed
Real-time requirement for transmissions Speed Results for RC5 – 32/12/16
What if we increase the number of rounds?• Achieves ≈220μs Key Expansion with 2000 rounds
Hypothesis: Verilog implementation will be more efficient than C
Processor Speed Compiler Key Expansion Encryption/Decryption bytes/second
90 MHz 16-bit Borland 220μs 22μs 36,000Bps
1.83GHz 32-bit GCC >1μs >1μs >64MBps
24ECE 415 Senior Design Project Fall 2010
Outline
Project Overview• Motivation• Problem Statement• System Design
System Diagrams and Operation• User and Data Flow Diagrams• Hardware Block Diagrams• Communication Scheme
Message Security• Password entry and transformation• RC5
Project Progress• Graphical Interface and Vehicle Tracking• Prototype Implementation• Future Consideration
25ECE 415 Senior Design Project Fall 2010
Interrogator User Interface
Output on the base module will be a GUI using a Google Maps overlay
Present• Used the longitude and latitude for UMass in demo• 100 meters at UMass longitude is .001270
• 100 meters at UMass latitude is .0010
• Range of base station is 100 meters
Future• Will be putting the GUI in an applet – need to acquire
license from Google• Simulated path based on normal UMass walkways will be
used for demos– need GPS module before data can be taken
26ECE 415 Senior Design Project Fall 2010
Interrogator User Interface
27ECE 415 Senior Design Project Fall 2010
Prototype Progress
Transponder Unit (Vehicle):• RC5
• Message encryption and decryption• Key table generation
• Control Module• Data parsing & concatenation
Interrogator Unit (Base Station):• RC5
• Message encryption and decryption• Key table generation
• Control Module• Data parsing & concatenation
• GUI implementation
28ECE 415 Senior Design Project Fall 2010
Future Deliverables
Working Model• C and Verilog code• GUI• Implemented RC5 encryption scheme• Full Communication Between:
• GPS and Vehicle via USB• Vehicle and Base Station via 802.11 protocols• Base Station and GUI via USB
Equipment• GPS via USB port• WiFi Transceivers via USB ports• Altera DE2 Boards
29ECE 415 Senior Design Project Fall 2010
Future Considerations
Ad Hoc networking• Allow vehicles to identify one another away from base
Enhanced driver identification system• Increased protection against hijackings• Example: fingerprint scan
• More specific to military personnel
Anti-jamming• Switch between 802.11 b and 802.11 g to prevent narrow
band jamming
30ECE 415 Senior Design Project Fall 2010
Questions?
31ECE 415 Senior Design Project Fall 2010
Sources
[1] B. Kaliski, Y. Yin. On the Security of the RC5 Encryption Algorithm. v1.0, September 1998. Available at
ftp://ftp.rsasecurity.com/pub/rsalabs/rc5/rc5-report.pdf.
[2] R. Rivest. The RC5 Encryption Algorithm. March 20, 1997. Available at http://people.csail.mit.edu/rivest/Rivest-
TheRC5EncryptionAlgorithm.
[3] R. Rivest. The RC5 Algorithm. Dr. Dobbs Journal number 226, pages 146-148. January 1995. Available at
http://people.csail.mit.edu/rivest/Rivest-rc5rev.pdf