rtos based confidential area security system

28
RTOS based Confidential Area Security System Designed and Developed By: Ajinky Gadewar Pardeep Dhiman Tejal Hagawane Shaikh Mohammed Zaid Under Guidance: Prof. Bhavik Thakker

Upload: ajinky-gadewar

Post on 26-Jan-2017

237 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: RTOS based Confidential Area Security System

RTOS based Confidential Area Security System

Designed and Developed By:Ajinky GadewarPardeep DhimanTejal HagawaneShaikh Mohammed Zaid

Under Guidance:Prof. Bhavik Thakker

Page 2: RTOS based Confidential Area Security System

Topics To Be Covered:• Introduction• Objective• Features• Block Diagram• Flowchart• Hardware:

• LPC-1768• RFID(tags)• Keyboard(P/S2)• Biometric Sensor(Fingerprint)• Humidity, PIR, Weight Sensors• DC Motor Driver(L293D)

• Software:• RTOS(µcos-II)• Keil

• Communication(SPI)• Advantages• Applications

Page 3: RTOS based Confidential Area Security System

Introduction:• Robbery has become common in our day to day life.

• Countering it, security systems with CCD cameras are commercially available.

• In most of the places, remote surveillance is needed.

• Sometimes, if the network is busy, the video is not smart security system, which can transmit video

with lesser bandwidth consumption, latency and jitter.

• For any smart security system, the element that ensure perfect security is the access granting system.

• We propose a novel which consist of various security level gadgets.

• Finger print ,RFID and password and also consist of sensors like load and humidity sensors etc.

• The proposed system uses RTOS (µcos II) programming with the two ARM boards which

communicate using SPI bus.

• First ARM board consist of three entry level security gadget viz. finger print, RFID and password

using keyboard whereas the second board consist of sensors.

• If the authorized person's all password, finger print and RFID tag no. matches the second board is

disabled by means of communication through SPI bus.

•and if not the second board is enabled and also the sensors connected to it are enabled.

Page 4: RTOS based Confidential Area Security System

Objectives:

•To provide security to confidential areas.

•To protect the area from illegal access.

•To improve security.

•To reduce the threat of data being hacked by using security modules.

Page 5: RTOS based Confidential Area Security System

Block Diagram

Page 6: RTOS based Confidential Area Security System

Flow Chart

Page 7: RTOS based Confidential Area Security System

Features: ARM Cortex M3(LPC-1768)

• Low-gate count with advanced features

• ARMv7-M: A Thumb-2 ISA subset, consisting of all base Thumb-2 instructions.

• Hardware divide instructions, SDIV and UDIV (Thumb-2 instructions)

• Handler and Thread modes

• Thumb and Debug states.

• Interruptible-continued LDM/STM, PUSH/POP for low interrupt latency.

• Automatic processor state saving and restoration for low latency Interrupt Service

Routine (ISR) entry and exit.

• ARM architecture v6 style BE8/LE support.

• ARMv6 unaligned accesses.

• Optional Memory Protection Unit (MPU).

Page 8: RTOS based Confidential Area Security System

Features: ARM Cortex M3(LPC-1768)

• Nested Vectored Interrupt Controller (NVIC) integrated with the processor for low

latency

• Configurable number, 1 to 240, of external interrupts

• Configurable number, 3 to 8 bits of priority.

• Dynamic prioritization of interrupts.

• Priority grouping. This allows selection of pre-empting interrupt levels and non

pre-empting interrupt levels

• Support for tail-chaining & late arriving, this enables back-to-back interrupt

processing without the overhead of state saving and restoration between interrupts

• Processor state automatically saved on interrupt entry, and restored on interrupt

exit, with no instruction overhead.

Page 9: RTOS based Confidential Area Security System

Features: ARM Cortex M3(LPC-1768)

• Debug System:

• The Cortex-M3 processor includes a number of fixed internal debugging components. These

components provide debugging operation supports and features such as breakpoints and watch

points.

• The Bus Interface:

• Advanced High-performance Bus-Lite (AHB-Lite) ICode, DCode and System bus interfaces.

• Code memory buses(I-Code D-Code)

• System bus used to access (SRAM)memory and peripherals

• Advanced Peripheral Bus (APB) and Private Peripheral Bus (PPB) Interface.

• Private peripheral bus provides access to a part of the system-level memory dedicated to

private peripherals such as debugging components

• Bit band support that includes atomic bit band write and read operations.

• Memory Protection Unit, or MPU(optional):

• This unit allows access rules to be set up for privileged access and user program access

• Up to Eight memory regions can be configured.

Page 10: RTOS based Confidential Area Security System

RTOS (µCOS-II )

• Portable

• Maximum portable ANSI C, minimum microprocessor-specific assembly.

• ROMable

• Designed for Embedded Applications, and with the proper tool chain, it can be

embedded to any part of the product

• Scalable

• Can be scaled to target various target applications based on the services required by

that application

• Pre-emptive

• µCOS-II is a fully pre-emptive real-time kernel.

Page 11: RTOS based Confidential Area Security System

RTOS Contd.

• Multitasking

• Tasks with the highest rate of execution are given the highest priority using rate-monotonic

scheduling

• µCOS-II can manage up to 64 or 256 tasks

• µC/OS-III allows an unlimited number of application tasks at each one of an unlimited number

of priority levels, constrained only by a processor’s access to memory

• Deterministic (time)

• Execution time of most µCOS-II functions and services are deterministic

• Deterministic (space)

• Each task requires its own different stack size

• Services

• Mailboxes, Queues, Semaphores, fixed-sized memory partitions, time-related functions

Page 12: RTOS based Confidential Area Security System

RTOS Contd.

• Interrupt Management

• Interrupts can cause higher priority tasks to be ready can contend for the CPU.

Interrupts can be nested 255 levels deep

• Robust and Reliable

• Has been developed and deployed on hundreds of commercial applications since

1992

• Task Stacks

• Each task requires its own stack. Micro C/OS-II however allows tasks to

maintain variable sized stacks. This allows applications the flexibility of making

an efficient use of the available RAM

Page 13: RTOS based Confidential Area Security System

Radio Frequency Identification (RFID)• An Automatic Data Collection that uses radio-frequency waves to transfer

data between a reader and a movable item to identify, categorize, track.

• Is fast and does not require physical sight or contact between

reader/scanner and the tagged item.

• Performs the operation using low cost components.

• .

Page 14: RTOS based Confidential Area Security System

• No line of sight requirement.

• No physical contact between data carrier and communication

device.

• Read only tag is 100% secure & can not be changed /duplicated

• Multiple tag Read/Write .

• Frequency : LF, HF,UHF

• Operation :

o Passive

o Semi-Passive

o Active

Page 15: RTOS based Confidential Area Security System

PS/2 Keyboard

• IBM PS/2 Keyboard (1987) .

• 6-pin mini connector.

• Bi-direction serial protocol.

Page 16: RTOS based Confidential Area Security System

Biometric Sensor(Fingerprint)

• optical scanner works by shining a bright light over Your finger• Integrated image collecting and algorithm chip together.

All-in-one.

• Fingerprint module command

• Interfacing

• Professional optical technology.

Page 17: RTOS based Confidential Area Security System

Humidity Sensor

• Humidity sensor works on the principle of relative humidity

and gives the output in the form of voltage.

• This analog voltage provides the information about the

percentage relative humidity present in the environment.

• A miniature sensor consisting of a RH sensitive material

deposited on a ceramic substrate.

• The resistance (impedance) of the sensor is directly

proportional to humidity .

Page 18: RTOS based Confidential Area Security System

PIR Sensor• A passive infrared sensor (PIR sensor) is an electronic sensor that

measures infrared (IR) light radiating from objects in its field of view.

• Usually this radiation is invisible to the human eye because it radiates

at infrared wavelengths.

• For detection of these wavelengths PIR sensor is used.

• The plastic window covering may have multiple facets moulded into it,

to focus the infrared energy onto the sensor.

Page 19: RTOS based Confidential Area Security System

Weight Sensor• A load cell is a sensor or a transducer that converts a load or

force acting on it into an electronic signal.

• This electronic signal can be a voltage change, current

change or frequency change depending on the type of load

cell and circuitry used.

• There are many different kinds of load cells.

• Two types of load cells resistive load cells and capacitive

load cells.

• Resistive load cells work on the principle of piezo-

resistivity.

• When a load/force/stress is applied to the sensor, it changes

its resistance. This change in resistance leads to a change in

output voltage when a input voltage is applied.

Page 20: RTOS based Confidential Area Security System

DC Motor Driver• It works on the concept of H-bridge.

• In a single l293d IC there two h-Bridge circuit inside the it which can rotate two dc

motor independently.

• For driving the motor with left H-bridge you need to enable pin 1 to high. And for

right H-Bridge you need to make the pin 9 to high.

• If anyone of the either pin1 or pin9 goes low then the motor in the corresponding

section will suspend working. It’s like a switch.

Page 21: RTOS based Confidential Area Security System
Page 22: RTOS based Confidential Area Security System

Keil

• The Keil Development Tools are designed for the professional software

developer.

• Variety of evaluation boards.

• Keil provides you with the best embedded development tools, documention, and

support.

• Several packages and configurations, dependent on the architecture.

• MDK-ARM: Microcontroller Development Kit.

• PK166: Keil Professional Developer’s Kit.

• DK251: Keil 251 Development Tools.

• PK51: Keil 8051 Development Tools.

Page 23: RTOS based Confidential Area Security System

Communication (SPI)

• The Serial Peripheral Interface (SPI) bus is a synchronous serial

communication interface specification used for short distance communication,

primarily in embedded systems.

• SPI devices communicate in full duplex mode using a master-slave architecture with

a single master.

• The master device originates the frame for reading and writing.

• Multiple slave devices are supported through selection with individual slave

select (SS) lines.

MOSI-Master output Slave inputMISO-Master input Slave outputClock-Clock PulsesChip select- Selects Master/Slave

Page 24: RTOS based Confidential Area Security System

• Data is shifted out of the master's MOSI pin and in it's MISO pin

• Data transfer is initiated by simply writing data to the SPI data register.

• All data movement is coordinated by SCK.

• Slave select may or may not be used depending on interfacing device.

Page 25: RTOS based Confidential Area Security System

• There is no specified flow control! No acknowledgement mechanism to

confirm receipt of data.

• Hardware realization is usually done with a simple shift register.

• SPI is faster, but gets complicated when there is more than one slave

involved.

• Simple hardware interfacing.

• Transceivers are not needed.

• At most one "unique" bus signal per device (CS); all others are shared.

Page 26: RTOS based Confidential Area Security System

Advantages

• Increase security - Provide a convenient and low-cost additional tier of

security. 

• Make it possible, automatically, to know WHO did WHAT, WHERE and

WHEN??

• Unequivocally link an individual to a transaction or event.

• Module wise access - without verifying all security modules u can’t unlock

the door.

• Alarm System – Any unauthorized access will cause an alarm which alert the

observers.

• Better than CCTV.

Page 27: RTOS based Confidential Area Security System

Applications

• In industrial areas to protect confidential files and server rooms.

• Electronic Voting Machine

• Bank Locker Rooms

Page 28: RTOS based Confidential Area Security System

THANK YOU