Final Report R.E.A.L. Security System RFID Enabled Access Limiting Security System ECE4884 Senior Design Project Section L01, Security System Team Christopher Lange, Team Leader Clinton Plaza Paul Brown David Kenney Submitted December 10, 2007 No We Won’t Fix Your Computer (ECE4884L01) TABLE OF CONTENTS Executive Summary ......................................................................................................... iii 1. Introduction ..................................................................................................................1 1.1 1.2 1.3 Objective .............................................................................................................1 Motivation ...........................................................................................................1 Background .........................................................................................................2 2. Project Description and Goals ....................................................................................3 3. Technical Specifications ..............................................................................................3 4. Design Approach and Details ......................................................................................4 4.1 Design Approach ..................................................................................................4 4.2 Codes and Standards .............................................................................................7 4.3 Constraints, Alternatives, and Tradeoffs ..............................................................7 5. Schedule, Tasks, and Milestones.................................................................................8 6. Project Demonstration.................................................................................................9 7. Marketing and Cost Analysis ....................................................................................10 7.1 Marketing Analysis .............................................................................................10 7.2 Cost Analysis ......................................................................................................10 8. Summary and Conclusions .......................................................................................11 9. References ...................................................................................................................12 Appendix A: Detailed Cost Analysis Appendix B: Sensormatic Electronics Corporation Cost Analysis No We Won’t Fix Your Computer (ECE4884L01) ii EXECUTIVE SUMMARY RFID Enabled Access Limiting Security (R.E.A.L. Security) is a combination of motiontriggered video surveillance, RFID tags and magnetic stripe card readers, all controlled through user-friendly web interface. The cost of the standard suite, which consists of hardware to monitor and protect two entrances, one high profile area, and access credentials for 25 employees, is $8,000. However, the R.E.A.L. Security solution is scalable and can have individual units added or removed. This allows consumers to purchase extra equipment to provide a unique, custom solution tailored to their needs. Since R.E.A.L. Security is marketed to medium and large-scale businesses, it is reasonable to expect sales of at least 100 base systems, but scalability will increase the sales of individual components. R.E.A.L. Security offers businesses a competitively priced alternative to currently available security suites, while still containing the same available features. RFID readers are used to limit access to building entrances and parking decks, thus protecting against intrusion and theft. Should someone forcibly enter the premises, motion triggered video cameras will record the incident for possible identification and send a copy of the recording to an off-site web server for protection against tampering. Magnetic stripe card readers can be placed on doors leading to high security areas, such as rooms containing server clusters, product warehouses or financial information, for use as an extra layer of protection. The result of our project is a fully functional proof-of-concept security system. This includes an RFID card reader for gaining access to the main building, magnetic stripe card reader also for granting access to the “high security” area, a camera to record movement, two servos to act as door locks, and two eBoxes to control the entire system all controlled through a web based user interface. No We Won’t Fix Your Computer (ECE4884L01) iii RFID Enabled Access Limiting (R.E.A.L.) Security System 1. INTRODUCTION Modern day businesses need systems in place to limit access to their property while still being able to customize the system. The R.E.A.L. Security System fulfills this by implementing motion-capture video, RFID, and magnetic stripe cards to restrict access to specific areas within a business while remaining customizable through a user-friendly interface. Due to the varying sizes of businesses and the layouts of different buildings, the total cost of this product will vary. However, the base system has a selling price of approximately $8,000. The result of this project is a proof of concept prototype that demonstrates the capabilities of our fully integrated system on a miniature businesses complex. 1.1 Objective The R.E.A.L. Security System is used to maintain access control to specific areas of a business or complex. Access can be given or restricted through a web interface designed to work directly with the eBoxes. Video recordings and access attempts are logged and transferred to another computer over a secure connection for archival and backup purposes. 1.2 Motivation By purchasing an adaptable, secure system to protect their assets, companies can deter theft while also documenting any incidents that may occur. Currently, most security systems are either too complex for end users to implement and maintain, or are incapable of effectively No We Won’t Fix Your Computer (ECE4884L01) 1 logging intrusions. The R.E.A.L. Security system is designed to combine all the features of current, advanced security systems with an easy to use web-based user interface. 1.3 Background Security systems are prevalent throughout the commercial industry and range from small, residential style packages to large, complex business suites. One such vendor, X10, sells a motion capturing video system that offers features similar to our product. Their system includes a wireless transceiver, VCR/IR commander, motion sensor, tripod, decal, and three wireless color cameras with remote controls. The three cameras transmit video wirelessly to the receiver which outputs the video to the TV. The camera remote controller and wireless transceiver allow the user to monitor and control all camera views remotely. The camera constantly transmits video, but video is only recorded when the motion sensor is activated. When the motion sensor is engaged it triggers the VCR/IR commander which initiates recording on a VCR until motion is no longer detected. The system cost ranges between $170 and $300, depending upon the options chosen. This system, however, does not provide any form of access control (RFID tags or magnetic stripe cards) and records to tape, which is more difficult to back up and maintain than recording to disk [1]. Sensormatic Electronics Corporation currently offers a commercial grade access control system that can incorporate video surveillance and individual room access control. Their bundled software, Software House C-Cure 9000, provides management tools for tracking personnel, customized mapping, and control of over 2500 card readers. The whole suite, however, can cost in excess of $14,000 because the card readers, hardware controllers, software, and video system must all be purchased individually [2]. A detailed cost analysis can be found in Appendix B. No We Won’t Fix Your Computer (ECE4884L01) 2 2. PROJECT DESCRIPTION AND GOALS The product is an integrated security system that offers the following: • RFID tags • Motion capture video • Magnetic stripe cards • User-friendly web-based Interface • Scalability to meet the customer’s needs These features act as a safeguard against intrusion and deter theft and vandalism. Since the product is tailored more towards high-security needs, the targeted buyer is medium to large businesses looking for an all in one security solution, or small businesses financially unable to hire full-time security. 3. TECHNICAL SPECIFICATIONS Table 1. Technical Specifications Of Parts [3,4,5,6] Item Specification Desired Value Final Implementation RFID Effective Range 15 Feet 6 inches Communication Protocol EM4102 EM4102 Resonant Frequency 125 kHz to 140 kHz 125 kHz to 140 kHz Read Update Rate 30 Updates per Second 30 Updates per Second Field of View 15 Degrees 15 Degrees Maximum Range 90 Feet 90 Feet Frame Rate 30 Frames per Second 10 Frames per Second Motion Sensor Camera Motor Servo Video Capture Resolution 640 x 480 Pixels 320x240 Pixels Operating Voltage 3 to 5 V Peak-to-Peak Square Wave 3 to 5 V Peak-to-Peak Square Wave Rotation Range 90 degrees 90 degrees Maximum Speed 0.877193 Revolutions per Second 0.877193 Revolutions per Second Maximum Torque 42 Ounces per Inch 42 Ounces per Inch No We Won’t Fix Your Computer (ECE4884L01) 3 The RFID readers have a user-tested typical effective range of approximately 6 inches, utilizing the 125 to 140 kHz frequency band. This range is sufficient for door access control though not what was originally proposed. The proposed range of 15 feet could not be met with the RFID reader that is integrated into the system, though it was said possible in the reader’s technical specifications. The motion sensor has a 15 degree field of view and a maximum sensor range of 90 feet. The motion sensor’s field of view is rather thin and requires choosing narrow entranceways no wider than 23 feet at maximum range. The video resolution utilized provides the user with detailed security recordings for identification. While not meeting the proposed frame rate, the camera is adequate for recording security level video and does not stress the eBox's storage capacity since the motion sensor is used to trigger video recording. A lower frame rate was used due to limits with the available camera driver, and to prevent taxing the eBox’s 200MHz processor. The motor servo’s operating voltage coincides with the low voltage nature of security systems and the rotation range is more than sufficient to unlock a door. However, the servo’s rotational speed and maximum torque are only sufficient for the model project and might require replacement with a larger motor in the cost analysis of a consumer grade product. 4. DESIGN APPROACH AND DETAILS 4.1 Design Details The security suite utilizes two eBox 2300 embedded computers, one dedicated to reading RFID tags and one dedicated to reading magnetic swipe cards and recording video. Both work in conjunction with a single, convenient web-based control panel. The camera, when triggered by the motion sensor, begins to store video onto its eBox. Once motion ceases, the video is stopped, No We Won’t Fix Your Computer (ECE4884L01) 4 named according to time of day, and saved for later viewing. To prevent loss or tampering, all video is automatically backed up via secured FTP to a web server. Videos are removed daily from the eBox to conserve space, but will remain on the web server for archival purposes and for remote viewing. RFID tags and magnetic stripe cards are linked to identification information and, when brought in close proximity to the RFID reader or swiped in the magnetic stripe card reader, are checked against a database located on their respective eBoxes to grant or deny access. The web-based interface allows the user to check logs of video recordings, view RFID tag and magnetic stripe card access attempts, and change privileges for specific users for both the RFID and magnetic stripe card. The most important components for use in early development were the eBox, the web camera, and the RFID readers. These parts, combined with a personal computer used as an “offsite” access point, allowed us to begin working on the most fundamental parts of the security system; namely, the web interface, video capture, and the first layer of personnel identification. Once this framework was complete, we began to add the other peripherals to further improve the system, such as the magnetic stripe card reader, motion sensing, a second eBox, and motors to control the doors. The web interface, which was developed in conjunction with the hardware, is designed to offer complete control of the system from any computer with internet access. Users can modify access privileges, check recent access attempts, or simply check the status of the system. Screenshots of this web interface can be seen below. No We Won’t Fix Your Computer (ECE4884L01) 5 No We Won’t Fix Your Computer (ECE4884L01) 6 4.2 Codes and Standards Many codes and standards apply directly to the subsystem components of this system. RFID usage is restricted by ISO Standard 18000, which sets parameters for Air Interface Communications at several different frequency levels [7]. The Security Industry Association has set a standard for passive infrared motion sensing in order to help reduce incidence of false alarms [8]. It is tied heavily to Underwriters Laboratories (UL) Standard 639, for safety intrusion-detection units as dictated by IHS, inc. UL 639 governs units intended to be used for intrusion-detection systems that automatically indicate presence of motion [9]. For magnetic stripe cards, ISO Standards 7810 and 7811 define the size of the magnetic cards, the placement of the stripe, data density, and all special characters [10]. These standards apply mostly to the manufacturers of the subsystem components we are utilizing in the security suite and therefore only affect us in how the parts we use work and interact with each other. 4.3 Constraints, Alternatives, and Tradeoffs One design alternative was to use magnetic stripe card readers instead of biometric fingerprint readers. Due to cost and time constraints on implementation, biometric fingerprint readers were officially dropped from the design and replaced with magnetic stripe card readers for the extra level of protection to high-security areas. Having both an RFID tag and a magnetic stripe card is redundant, but this redundancy will add to the overall security of the system. All users are expected to have RFID tags to gain access to general areas within a building, but the number of users with magnetic stripe cards to high-security areas can be much more limited. No We Won’t Fix Your Computer (ECE4884L01) 7 5. SCHEDULE, TASKS, AND MILESTONES The project team is set up with each member responsible for the component most related to their specific skills. Christopher Lange is the team leader and as such, was responsible for keeping track of the overall scheduling, the weekly progress reports, the coordination of the required deliverables, and interfacing between hardware and software. Paul Brown was in charge of web-based implementations and the software framework of the project. Clinton Plaza was in charge of hardware and as such, was the lead technical expert on each piece of subsystem equipment. David Kenney was also responsible for interfacing between hardware and software as well as the construction of the demonstration model. As the software and hardware must work perfectly together, there was a great amount of shared responsibility and communication between all team members. Every member involved in this project was capable of and willing to fill in where needed to keep the project on schedule. All group deliverables were worked on together allowing each member to provide their input and technical expertise. Most tasks scheduled were low risk and of moderate difficulty. The biometric system was officially dropped from the project because of cost and compatibility issues between biometric readers and Windows CE and magnetic stripe card readers were added as a replacement. The most difficult component, due to team experience, was optimizing Windows CE to increase overall performance gains and really push the software to its limits. The project scheduling can be seen as a Gantt chart below. No We Won’t Fix Your Computer (ECE4884L01) 8 6. PROJECT DEMONSTRATION The entire project was built as a proof of concept prototype on a miniaturized office environment. A small wooden replica of a potential office building is used to help simulate how entering a room with both layers of security works as well as how video is captured and processed. A laptop is provided for demonstration to access the web interface. No We Won’t Fix Your Computer (ECE4884L01) 9 7. MARKETING AND COST ANALYSIS 7.1 Marketing Analysis R.E.A.L. security offers a security system completely integrated and controlled through an easy to use web interface while remaining cost competitive with the rest of the industry. Typical security systems require the purchase and installation of an access control system and a separate video recording system. X10, for instance, offers only a motion activated video recording system, while Sensormatic Electronics limits its devices to access controllers [1,2]. Since these systems are made by different manufacturers, full integration between the two can be very difficult. Access control and management of the security suite through a secure, web-based user interface is not offered in either of these solutions and adds a greater level of functionality for the customer. By encapsulating motion triggered video capture, entrance logging, and an easily modifiable identification database, the R.E.A.L. Security system acts as an effective means of protection while providing easy scalability and maintenance to businesses. 7.2 Cost Analysis The total design labor (4 persons at $25/hour, working 12 hours a week for 13 weeks) comes to a total of $29,718, with benefits and overhead included. Amortized over 100 systems, this increases the unit price by $297. Total parts cost for the standard security suite is $2,563, and can be installed and tested for $1125. Sales and Marketing has a budget of $80,000, adding $800 per unit. Warranty and Support is estimated to be $388 per unit, and the whole system will be sold for $7,750. At this price, the amount of profit expected on each sale is $943, or 12.2% of the No We Won’t Fix Your Computer (ECE4884L01) 10 selling price. This analysis, however, is only for the standard suite and more parts can be purchased on an as needed basis. A detailed cost analysis is included in Appendix A as spreadsheets (Microsoft Excel file available upon request). 8. SUMMARY AND CONCLUSIONS The current status of the project is a working proof-of-concept. All components and aspects of the system are working as a functional security system. Initially we had hoped to implement a biometric scanner as another layer of security. Biometric scanners are convenient and secure due to their lack of a need for the user to possess an access card. After much research, biometric scanners were dropped due to cost concerns and overall incompatibility with Windows CE. As a replacement, magnetic stripe card readers were implemented and though they do not possess the convenience and extra security that a biometric scanner would offer, they do provide the concept of redundancy of the second layer of security we had hoped to implement. Other than the loss of biometrics, there are no significant changes in implementation made to the original proposal. All components work as needed to offer a complete security system, although the video runs at a lower frame rate and resolution than we had originally hoped for. Further improvements to our system are likely due to the constant advances in software and hardware that occur every day. No We Won’t Fix Your Computer (ECE4884L01) 11 9. REFERENCES [1] X10, “The 3-Cam Wireless Security Camera System with Motion-Activated Recording,” [Website], [cited 2007 September 13], Available HTTP: http://www.x10.com/promotions/security_camera_3cam_motion_199_as.html [2] Software House, “Software House Products,” [Website], [cited 2007 September 13], Available HTTP: http://www.swhouse.com/products/products.aspx [3] Phidgets Inc., “PhidgetRFID,” [Online Document], [cited 2007 September 13], Available HTTP: http://www.phidgets.com/documentation/Phidgets/1023.pdf [4] Glolab Corp., “Infrared Parts Manual,” [Online Document], [cited 2007 September 13], Available HTTP: http://www.phidgets.com/documentation/DataSheets/DataSheet1111.pdf [5] Phidgets Inc., “PhidgetServo 1-Motor,” [Online Document], [cited 2007 September 13], Available HTTP: http://www.phidgets.com/documentation/Phidgets/1000.pdf [6] Logitech , “QuickCam Pro 5000,” [Website], [cited 2007 September 13], Available HTTP: http://www.logitech.com/index.cfm/webcam_communications/webcams/devices/ 243&cl=us [7] ISO/IEC 18000, RFID Air Interface Standards. [8] Security Industry Association, “Passive Infrared Standards Subcommittee,” [Standard], [cited 2007 September 6], Available HTTP: http://www.siaonline.org/standards/pir_01.cfm [9] IHS, inc., “UHL 639 UL Standard for Safety Intrusion-Detection Units,” [Standard], [cited 2007 September 15], Available HTTP: http://aero-defense.ihs.com/document/abstract/EPDGABAAAAAAAAAA [10] ISO/IEC 7811-2, Magnetic Stripe – Identification Cards – Part 2: Recording Technique. No We Won’t Fix Your Computer (ECE4884L01) 12 Appendix A: Detailed Cost Analysis No We Won’t Fix Your Computer (ECE4884L01) No We Won’t Fix Your Computer (ECE4884L01) No We Won’t Fix Your Computer (ECE4884L01) No We Won’t Fix Your Computer (ECE4884L01) Appendix B: Sensormatic Electronics Corporation Cost Analysis No We Won’t Fix Your Computer (ECE4884L01) No We Won’t Fix Your Computer (ECE4884L01)