Project

# Title Team Members TA Documents Sponsor
3 Bike Tag
Dushyant Singh Udawat
# Title

Team Members:
- Jamiel Abed (jabed2)
- Dip Patel (dippp2)
- Seung Lee (seungpl2)

#Problem
On UIUC's campus, there is a recurring problem of bikes being stolen on campus. However, it isn't necessarily because they don't have bike locks, it's because the bike locks alone aren't good enough. They're purely mechanical in nature and once they're broken, the robber can ride away with the bike.

#Solution overview 1

(!-- This is one possible solution to the problem --!)

I'm proposing we create a supplement to a bike lock that will prevent the gears from moving unless unlocked. The reason for this is because if a robber breaks a standard bike lock, they'll ride away with the bike. But if we add a fingerprint unlocked bike lock that attaches to the bike's gears, thus immobilizing it. Then, a robber will be significantly less likely to pick up the bike and run with it. If the lock is broken, the lock that is attached to the bikes gears will still be attached and the gears won't move.

The way I measure with a high degree of certainty that a bike is being stolen is by using a built-in accelerometer to detect movement and a gps tracker to alert the user of the bike's location. When the user locks up the bike this activates the accelerometer which will constantly monitor to see if we pass a certain threshold of movement. If this threshold is passed it will trigger the GPS device as well as a suite of anti-theft protection such as lights, and audible beeping, etc.



#Solution overview 2

(!-- This is one possible solution to the problem --!)

I'm proposing we create a supplement to a bike lock that will prevent the gears from moving unless unlocked. The reason for this is because if a robber breaks a standard bike lock, they'll ride away with the bike. But if we add a fingerprint unlocked bike lock that attaches to the bike's gears, thus immobilizing it. Then, a robber will be significantly less likely to pick up the bike and run with it. If the lock is broken, the lock that is attached to the bikes gears will still be attached and the gears won't move.

The way I measure with a high degree of certainty that the bike is stolen is by adding a perimeter module that the user can attach to the bike rack. This sets a active customizable perimeter around the bike rack which will monitor if the bike is detected outside the perimeter. If so, it then turns on GPS tracking as well as the suite of anti theft protections.




# Solution Components

## Subsystem 1

All solutions: The software involved in fingerprint locking/unlocking as well as receiving gps location signals from the LoRa module

## Subsystem 2

All solutions: the physical lock attached to the gears

## Subsystem 3

Solution 1: The IMU, the gps tracker, and the anti-theft protection suite sending signals wirelessly through the LoRa module

Solution 2: The perimeter detector, the gps tracker, and the anti-theft protection suite sending/receiving signals wirelessly through the LoRa module


# Criterion For Success

Criterion 1: The physical lock must immobilize the bike forcing the thief to carry the bike in order to move it.

Criterion 2: The fingerprint sensor needs to lock/unlock when a proper fingerprint is scanned

Criterion 3: The gps tracker must accurately (to some degree) give the location of the bike when it is stolen and must be power-efficient (to a reasonable degree)

Criterion 4:
Solution 1 : The accelerometer must correctly detect when a person picks up the bike and runs off with it.
Solution 2: The perimeter module must be able to detect when the bike leaves the range.

Schnorr Protocol Key Fob

Michael Gamota, Vasav Nair, Pedro Ocampo

Featured Project

# Schnorr Identification Protocol Key Fob

Team Members:

- Michael Gamota (mgamota2)

- Vasav Nair (vasavbn2)

- Pedro Ocampo (pocamp3)

# Problem

Current car fobs are susceptible to different types of attacks. Rolling jam attacks are one of such attacks where an attacker jams and stores a valid "unlock" signal for later. Cars with passive keys/cards can be stolen using relay attacks. Since a car can be the most expensive item someone owns, it is unreasonable to allow people to steal them so discreetly by hacking the fob/lock combo.

# Solution

By leveraging public key cryptography, specifically the Schnorr identification protocol, it is possible to create a key fob which is not susceptible to either attack (rolling jam and relay) and also gives no information about the private key of the fob if the signal were to be intercepted.

# Solution Components

# Key Fob

## Subsystem 1

Random number generation - We will use a transistor circuit to generate random numbers. This is required by the Schnorr protocol to ensure security.

## Subsystem 2

Microcontroller - The MCU will run all the computation to calculate the messages. We will likely use an ATtiny MCU so we can use the Arduino IDE for programming. However, some group members have experience with the STM32 family so that is another option.

## Subsystem 3

Power - We plan on using either a 5V battery or 3.3V battery with a boost converter to power the fob.

## Subsystem 4

Wireless Communication - We plan on using the 315 MHz frequency band which is currently used by some car fobs. We will need a transmitter and receiver, since the protocol is interactive.

# Lock

## Subsystem 1

Random number generation - We will use a transistor circuit to generate random numbers. This is required by the Schnorr protocol to ensure security.

## Subsystem 2

Microcontroller - This MCU will also run all the computation to calculate the messages. We will likely use an ATtiny MCU so we can use the Arduino IDE for programming. However, some group members have experience with the STM32 family so that is another option. This MCU will need to have PWM output to control the lock.

## Subsystem 3

Linear Actuator - We plan on using a linear actuator as a deadbolt lock for demonstration purposes.

## Subsystem 4

Wireless Communication - We plan on using the 315 MHz frequency band which is currently used by some car fobs. We will need a transmitter and receiver, since the protocol is interactive.

## Subsystem 5

Power - This subsystem will also likely require 5V, but power sourcing is not an issue since this system would be connected to the car battery. During a demo I would be acceptable to have this plugged into a power supply or a barrel jack connector from an AC-DC converter.

# Criterion For Success

Describe high-level goals that your project needs to achieve to be effective. These goals need to be clearly testable and not subjective.

Our first criteria for success is a reasonably sized fob. There is some concern about the power storage and consumption of the fob.

The next criteria for success is communication between the fob and the lock. This will be the first milestone in our design. We will need to have a message sent from one MCU that is properly received by the other, we can determine this in the debug terminal.

Once we are sure that we can communicate between the fob and the lock, we will implement the Schnorr protocol on the two systems, where the fob will act as the prover and the lock as the verifier. If the Schnorr signature implementation is correct, then we will always be able to unlock the lock using the fob whose public key is associated with full privileges.

Project Videos