R.E.A.L Security Final Report

advertisement
Final Report
R.E.A.L. Security System
RFID Enabled Access Limiting Security System
ECE4884 Senior Design Project
Section L01, Security System Team
Christopher Lange, Team Leader
Clinton Plaza
Paul Brown
David Kenney
Submitted
December 10, 2007
No We Won’t Fix Your Computer (ECE4884L01)
TABLE OF CONTENTS
Executive Summary ......................................................................................................... iii
1. Introduction ..................................................................................................................1
1.1
1.2
1.3
Objective .............................................................................................................1
Motivation ...........................................................................................................1
Background .........................................................................................................2
2. Project Description and Goals ....................................................................................3
3. Technical Specifications ..............................................................................................3
4. Design Approach and Details ......................................................................................4
4.1 Design Approach ..................................................................................................4
4.2 Codes and Standards .............................................................................................7
4.3 Constraints, Alternatives, and Tradeoffs ..............................................................7
5. Schedule, Tasks, and Milestones.................................................................................8
6. Project Demonstration.................................................................................................9
7. Marketing and Cost Analysis ....................................................................................10
7.1 Marketing Analysis .............................................................................................10
7.2 Cost Analysis ......................................................................................................10
8. Summary and Conclusions .......................................................................................11
9. References ...................................................................................................................12
Appendix A: Detailed Cost Analysis
Appendix B: Sensormatic Electronics Corporation Cost Analysis
No We Won’t Fix Your Computer (ECE4884L01)
ii
EXECUTIVE SUMMARY
RFID Enabled Access Limiting Security (R.E.A.L. Security) is a combination of motiontriggered video surveillance, RFID tags and magnetic stripe card readers, all controlled through
user-friendly web interface. The cost of the standard suite, which consists of hardware to monitor
and protect two entrances, one high profile area, and access credentials for 25 employees, is
$8,000. However, the R.E.A.L. Security solution is scalable and can have individual units added
or removed. This allows consumers to purchase extra equipment to provide a unique, custom
solution tailored to their needs. Since R.E.A.L. Security is marketed to medium and large-scale
businesses, it is reasonable to expect sales of at least 100 base systems, but scalability will
increase the sales of individual components.
R.E.A.L. Security offers businesses a competitively priced alternative to currently
available security suites, while still containing the same available features. RFID readers are
used to limit access to building entrances and parking decks, thus protecting against intrusion
and theft. Should someone forcibly enter the premises, motion triggered video cameras will
record the incident for possible identification and send a copy of the recording to an off-site web
server for protection against tampering. Magnetic stripe card readers can be placed on doors
leading to high security areas, such as rooms containing server clusters, product warehouses or
financial information, for use as an extra layer of protection.
The result of our project is a fully functional proof-of-concept security system. This
includes an RFID card reader for gaining access to the main building, magnetic stripe card reader
also for granting access to the “high security” area, a camera to record movement, two servos to
act as door locks, and two eBoxes to control the entire system all controlled through a web based
user interface.
No We Won’t Fix Your Computer (ECE4884L01)
iii
RFID Enabled Access Limiting (R.E.A.L.) Security System
1.
INTRODUCTION
Modern day businesses need systems in place to limit access to their property while still
being able to customize the system. The R.E.A.L. Security System fulfills this by implementing
motion-capture video, RFID, and magnetic stripe cards to restrict access to specific areas within
a business while remaining customizable through a user-friendly interface. Due to the varying
sizes of businesses and the layouts of different buildings, the total cost of this product will vary.
However, the base system has a selling price of approximately $8,000. The result of this project
is a proof of concept prototype that demonstrates the capabilities of our fully integrated system
on a miniature businesses complex.
1.1
Objective
The R.E.A.L. Security System is used to maintain access control to specific areas of a
business or complex. Access can be given or restricted through a web interface designed to work
directly with the eBoxes. Video recordings and access attempts are logged and transferred to
another computer over a secure connection for archival and backup purposes.
1.2
Motivation
By purchasing an adaptable, secure system to protect their assets, companies can deter
theft while also documenting any incidents that may occur. Currently, most security systems are
either too complex for end users to implement and maintain, or are incapable of effectively
No We Won’t Fix Your Computer (ECE4884L01)
1
logging intrusions. The R.E.A.L. Security system is designed to combine all the features of
current, advanced security systems with an easy to use web-based user interface.
1.3
Background
Security systems are prevalent throughout the commercial industry and range from small,
residential style packages to large, complex business suites. One such vendor, X10, sells a
motion capturing video system that offers features similar to our product. Their system includes
a wireless transceiver, VCR/IR commander, motion sensor, tripod, decal, and three wireless
color cameras with remote controls. The three cameras transmit video wirelessly to the receiver
which outputs the video to the TV. The camera remote controller and wireless transceiver allow
the user to monitor and control all camera views remotely. The camera constantly transmits
video, but video is only recorded when the motion sensor is activated. When the motion sensor is
engaged it triggers the VCR/IR commander which initiates recording on a VCR until motion is
no longer detected. The system cost ranges between $170 and $300, depending upon the options
chosen. This system, however, does not provide any form of access control (RFID tags or
magnetic stripe cards) and records to tape, which is more difficult to back up and maintain than
recording to disk [1].
Sensormatic Electronics Corporation currently offers a commercial grade access control
system that can incorporate video surveillance and individual room access control. Their bundled
software, Software House C-Cure 9000, provides management tools for tracking personnel,
customized mapping, and control of over 2500 card readers. The whole suite, however, can cost
in excess of $14,000 because the card readers, hardware controllers, software, and video system
must all be purchased individually [2]. A detailed cost analysis can be found in Appendix B.
No We Won’t Fix Your Computer (ECE4884L01)
2
2.
PROJECT DESCRIPTION AND GOALS
The product is an integrated security system that offers the following:
• RFID tags
• Motion capture video
• Magnetic stripe cards
• User-friendly web-based Interface
• Scalability to meet the customer’s needs
These features act as a safeguard against intrusion and deter theft and vandalism. Since
the product is tailored more towards high-security needs, the targeted buyer is medium to large
businesses looking for an all in one security solution, or small businesses financially unable to
hire full-time security.
3.
TECHNICAL SPECIFICATIONS
Table 1. Technical Specifications Of Parts [3,4,5,6]
Item
Specification
Desired Value
Final Implementation
RFID
Effective Range
15 Feet
6 inches
Communication Protocol
EM4102
EM4102
Resonant Frequency
125 kHz to 140 kHz
125 kHz to 140 kHz
Read Update Rate
30 Updates per Second
30 Updates per Second
Field of View
15 Degrees
15 Degrees
Maximum Range
90 Feet
90 Feet
Frame Rate
30 Frames per Second
10 Frames per Second
Motion Sensor
Camera
Motor Servo
Video Capture Resolution 640 x 480 Pixels
320x240 Pixels
Operating Voltage
3 to 5 V Peak-to-Peak Square Wave
3 to 5 V Peak-to-Peak Square Wave
Rotation Range
90 degrees
90 degrees
Maximum Speed
0.877193 Revolutions per Second
0.877193 Revolutions per Second
Maximum Torque
42 Ounces per Inch
42 Ounces per Inch
No We Won’t Fix Your Computer (ECE4884L01)
3
The RFID readers have a user-tested typical effective range of approximately 6 inches,
utilizing the 125 to 140 kHz frequency band. This range is sufficient for door access control
though not what was originally proposed. The proposed range of 15 feet could not be met with
the RFID reader that is integrated into the system, though it was said possible in the reader’s
technical specifications. The motion sensor has a 15 degree field of view and a maximum sensor
range of 90 feet. The motion sensor’s field of view is rather thin and requires choosing narrow
entranceways no wider than 23 feet at maximum range. The video resolution utilized provides
the user with detailed security recordings for identification. While not meeting the proposed
frame rate, the camera is adequate for recording security level video and does not stress the
eBox's storage capacity since the motion sensor is used to trigger video recording. A lower frame
rate was used due to limits with the available camera driver, and to prevent taxing the eBox’s
200MHz processor. The motor servo’s operating voltage coincides with the low voltage nature of
security systems and the rotation range is more than sufficient to unlock a door. However, the
servo’s rotational speed and maximum torque are only sufficient for the model project and might
require replacement with a larger motor in the cost analysis of a consumer grade product.
4.
DESIGN APPROACH AND DETAILS
4.1
Design Details
The security suite utilizes two eBox 2300 embedded computers, one dedicated to reading
RFID tags and one dedicated to reading magnetic swipe cards and recording video. Both work in
conjunction with a single, convenient web-based control panel. The camera, when triggered by
the motion sensor, begins to store video onto its eBox. Once motion ceases, the video is stopped,
No We Won’t Fix Your Computer (ECE4884L01)
4
named according to time of day, and saved for later viewing. To prevent loss or tampering, all
video is automatically backed up via secured FTP to a web server. Videos are removed daily
from the eBox to conserve space, but will remain on the web server for archival purposes and for
remote viewing. RFID tags and magnetic stripe cards are linked to identification information
and, when brought in close proximity to the RFID reader or swiped in the magnetic stripe card
reader, are checked against a database located on their respective eBoxes to grant or deny access.
The web-based interface allows the user to check logs of video recordings, view RFID tag and
magnetic stripe card access attempts, and change privileges for specific users for both the RFID
and magnetic stripe card.
The most important components for use in early development were the eBox, the web
camera, and the RFID readers. These parts, combined with a personal computer used as an
“offsite” access point, allowed us to begin working on the most fundamental parts of the security
system; namely, the web interface, video capture, and the first layer of personnel identification.
Once this framework was complete, we began to add the other peripherals to further improve the
system, such as the magnetic stripe card reader, motion sensing, a second eBox, and motors to
control the doors.
The web interface, which was developed in conjunction with the hardware, is designed to
offer complete control of the system from any computer with internet access. Users can modify
access privileges, check recent access attempts, or simply check the status of the system.
Screenshots of this web interface can be seen below.
No We Won’t Fix Your Computer (ECE4884L01)
5
No We Won’t Fix Your Computer (ECE4884L01)
6
4.2
Codes and Standards
Many codes and standards apply directly to the subsystem components of this system.
RFID usage is restricted by ISO Standard 18000, which sets parameters for Air Interface
Communications at several different frequency levels [7]. The Security Industry Association has
set a standard for passive infrared motion sensing in order to help reduce incidence of false
alarms [8]. It is tied heavily to Underwriters Laboratories (UL) Standard 639, for safety
intrusion-detection units as dictated by IHS, inc. UL 639 governs units intended to be used for
intrusion-detection systems that automatically indicate presence of motion [9]. For magnetic
stripe cards, ISO Standards 7810 and 7811 define the size of the magnetic cards, the placement
of the stripe, data density, and all special characters [10]. These standards apply mostly to the
manufacturers of the subsystem components we are utilizing in the security suite and therefore
only affect us in how the parts we use work and interact with each other.
4.3
Constraints, Alternatives, and Tradeoffs
One design alternative was to use magnetic stripe card readers instead of biometric
fingerprint readers. Due to cost and time constraints on implementation, biometric fingerprint
readers were officially dropped from the design and replaced with magnetic stripe card readers
for the extra level of protection to high-security areas. Having both an RFID tag and a magnetic
stripe card is redundant, but this redundancy will add to the overall security of the system. All
users are expected to have RFID tags to gain access to general areas within a building, but the
number of users with magnetic stripe cards to high-security areas can be much more limited.
No We Won’t Fix Your Computer (ECE4884L01)
7
5.
SCHEDULE, TASKS, AND MILESTONES
The project team is set up with each member responsible for the component most related
to their specific skills. Christopher Lange is the team leader and as such, was responsible for
keeping track of the overall scheduling, the weekly progress reports, the coordination of the
required deliverables, and interfacing between hardware and software. Paul Brown was in charge
of web-based implementations and the software framework of the project. Clinton Plaza was in
charge of hardware and as such, was the lead technical expert on each piece of subsystem
equipment. David Kenney was also responsible for interfacing between hardware and software
as well as the construction of the demonstration model. As the software and hardware must work
perfectly together, there was a great amount of shared responsibility and communication between
all team members. Every member involved in this project was capable of and willing to fill in
where needed to keep the project on schedule. All group deliverables were worked on together
allowing each member to provide their input and technical expertise.
Most tasks scheduled were low risk and of moderate difficulty. The biometric system was
officially dropped from the project because of cost and compatibility issues between biometric
readers and Windows CE and magnetic stripe card readers were added as a replacement. The
most difficult component, due to team experience, was optimizing Windows CE to increase
overall performance gains and really push the software to its limits.
The project scheduling can be seen as a Gantt chart below.
No We Won’t Fix Your Computer (ECE4884L01)
8
6.
PROJECT DEMONSTRATION
The entire project was built as a proof of concept prototype on a miniaturized office
environment. A small wooden replica of a potential office building is used to help simulate how
entering a room with both layers of security works as well as how video is captured and
processed. A laptop is provided for demonstration to access the web interface.
No We Won’t Fix Your Computer (ECE4884L01)
9
7.
MARKETING AND COST ANALYSIS
7.1
Marketing Analysis
R.E.A.L. security offers a security system completely integrated and controlled through
an easy to use web interface while remaining cost competitive with the rest of the industry.
Typical security systems require the purchase and installation of an access control system and a
separate video recording system. X10, for instance, offers only a motion activated video
recording system, while Sensormatic Electronics limits its devices to access controllers [1,2].
Since these systems are made by different manufacturers, full integration between the two can be
very difficult.
Access control and management of the security suite through a secure, web-based user
interface is not offered in either of these solutions and adds a greater level of functionality for the
customer. By encapsulating motion triggered video capture, entrance logging, and an easily
modifiable identification database, the R.E.A.L. Security system acts as an effective means of
protection while providing easy scalability and maintenance to businesses.
7.2
Cost Analysis
The total design labor (4 persons at $25/hour, working 12 hours a week for 13 weeks)
comes to a total of $29,718, with benefits and overhead included. Amortized over 100 systems,
this increases the unit price by $297. Total parts cost for the standard security suite is $2,563, and
can be installed and tested for $1125. Sales and Marketing has a budget of $80,000, adding $800
per unit. Warranty and Support is estimated to be $388 per unit, and the whole system will be
sold for $7,750. At this price, the amount of profit expected on each sale is $943, or 12.2% of the
No We Won’t Fix Your Computer (ECE4884L01)
10
selling price. This analysis, however, is only for the standard suite and more parts can be
purchased on an as needed basis.
A detailed cost analysis is included in Appendix A as spreadsheets (Microsoft Excel file
available upon request).
8.
SUMMARY AND CONCLUSIONS
The current status of the project is a working proof-of-concept. All components and
aspects of the system are working as a functional security system. Initially we had hoped to
implement a biometric scanner as another layer of security. Biometric scanners are convenient
and secure due to their lack of a need for the user to possess an access card. After much research,
biometric scanners were dropped due to cost concerns and overall incompatibility with Windows
CE. As a replacement, magnetic stripe card readers were implemented and though they do not
possess the convenience and extra security that a biometric scanner would offer, they do provide
the concept of redundancy of the second layer of security we had hoped to implement. Other
than the loss of biometrics, there are no significant changes in implementation made to the
original proposal. All components work as needed to offer a complete security system, although
the video runs at a lower frame rate and resolution than we had originally hoped for. Further
improvements to our system are likely due to the constant advances in software and hardware
that occur every day.
No We Won’t Fix Your Computer (ECE4884L01)
11
9.
REFERENCES
[1]
X10, “The 3-Cam Wireless Security Camera System with Motion-Activated Recording,”
[Website], [cited 2007 September 13], Available HTTP:
http://www.x10.com/promotions/security_camera_3cam_motion_199_as.html
[2]
Software House, “Software House Products,” [Website], [cited 2007 September 13],
Available HTTP: http://www.swhouse.com/products/products.aspx
[3]
Phidgets Inc., “PhidgetRFID,” [Online Document], [cited 2007 September 13],
Available HTTP: http://www.phidgets.com/documentation/Phidgets/1023.pdf
[4]
Glolab Corp., “Infrared Parts Manual,” [Online Document], [cited 2007 September 13],
Available HTTP:
http://www.phidgets.com/documentation/DataSheets/DataSheet1111.pdf
[5]
Phidgets Inc., “PhidgetServo 1-Motor,” [Online Document], [cited 2007 September 13],
Available HTTP: http://www.phidgets.com/documentation/Phidgets/1000.pdf
[6]
Logitech , “QuickCam Pro 5000,” [Website], [cited 2007 September 13], Available
HTTP: http://www.logitech.com/index.cfm/webcam_communications/webcams/devices/
243&cl=us
[7]
ISO/IEC 18000, RFID Air Interface Standards.
[8]
Security Industry Association, “Passive Infrared Standards Subcommittee,” [Standard],
[cited 2007 September 6], Available HTTP:
http://www.siaonline.org/standards/pir_01.cfm
[9]
IHS, inc., “UHL 639 UL Standard for Safety Intrusion-Detection Units,” [Standard],
[cited 2007 September 15], Available HTTP:
http://aero-defense.ihs.com/document/abstract/EPDGABAAAAAAAAAA
[10]
ISO/IEC 7811-2, Magnetic Stripe – Identification Cards – Part 2: Recording Technique.
No We Won’t Fix Your Computer (ECE4884L01)
12
Appendix A: Detailed Cost Analysis
No We Won’t Fix Your Computer (ECE4884L01)
No We Won’t Fix Your Computer (ECE4884L01)
No We Won’t Fix Your Computer (ECE4884L01)
No We Won’t Fix Your Computer (ECE4884L01)
Appendix B: Sensormatic Electronics Corporation Cost Analysis
No We Won’t Fix Your Computer (ECE4884L01)
No We Won’t Fix Your Computer (ECE4884L01)
Download