Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Embedded system(Pos Module) & Security(A Configurable approach)
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Embedded system(Pos Module) & Security(A Configurable approach)
[attachment=27901]
EMBEDDED SYSTEM
“An embedded system is a computer system designed to perform one or a few dedicated often with real time computing constraints”.
“It is embedded as part of a complete device often including hardware and software parts”.
Applications of embedded system
MP3 Players.
Mobile phone.
GPS Receivers.
Programmable data terminals.
PROGRAMMABLE DATA TERMINAL.
The Programmable Data Terminal (PDT) is a Hand Held Computer”.
It consists of components like Program flash memory, Data flash memory, customized Keypad, Display unit with Backlight, Impact or Thermal printer, Rechargeable battery, High speed RS232 / IR port for programming and data transfer etc.
FLASH MEMORY:
Flash memory is a non-volatile computer storage chip that can be electrically erased and reprogrammed. It was developed from EEPROM (electrically erasable programmable read-only memory) and must be erased in fairly large blocks before these can be rewritten with new data.
CUSTOMERIZED KEYPAD:
Customerized keypads are made in a high grade silicone, it is environmental safe, non toxic, it is available in various forms according to our specific use. Silicon keypads are best in use.
DISPLAY UNIT WITH BLACK LIGHT IMPACT:
A monitor or display sometimes called a (visual display unit) is an electronic visual display for computers. The monitor comprises the display device, circuitry, and an enclosure. The display device in modern monitors is typically a thin film transistor liquid crystal display (TFT-LCD) thin panel, while older monitors use a cathode ray tube about as deep as the screen size.The first computer monitors used Cathode ray tubes (CRTs), which was the dominant technology until they were replaced by LCD monitors in the 21st Century.
RECHARGEABLE BATTERY:
A rechargeable battery or storage battery is a group of one or more electrochemical cells. They are known as secondary cells because their electrochemical reactions are electrically reversible. Rechargeable batteries come in many different shapes and sizes, ranging anything from a button cell to megawatt systems connected to stabilize an electrical distribution network. Several different combinations of chemicals are commonly used, including: lead-acid, nickel cadmium (NiCd), nickel metal hydride (NiMH), lithium ion (Li-ion), and lithium ion polymer (Li-ion polymer).
Application of pdt.
Electronic ticketing machine.
Spot billing machine.
Electronic parking machine.
Micro banking.
House tax terminal.
Traffic offence recording system.
Point of sale terminal etc.
Point of sale (pos)
Point of sale or Point of service is used in the location where a sale transaction takes place.
Most specifically point of sale often refers to the equivalent of an electronic cash register.
SPECIFICATION
The POS terminals consists of high range of optional hardware components like.
Customerised keypad (30 keys elestomeric)
Display (5 lines x 20 characters unit) black light.
256 kb program flash memory.
4 mb data flash memory.
Built in 2.2 Ahr NiMH battery.
Intelligent battery charger.
High speed serial port.
Programming port.
High speed thermal printer.
Data modem.
Smart card reader.
Technical requirement of pos.
Hardware device
PC with serial interface.
Keil Compiler.
devices
“Handheld device is a pocket size computing device, typically comparing a small visual display screen for user output with a a thermal printer and a miniature keyboard or touch screen for user input”.
Pc with serial interface
The interfacing between computer and hand held device is done by a data cable- :
Keil software.
A different type of compiler is used for compiling in programmable terminal
This software follows the steps below:
Create a project to select the 8051 device and the tool settings.
Create source file in C or assembly.
Build your application with project manager.
Correct errors in source file.
Test linked applications.
Advantages of embedded system.
Designed to do a specific task.
Simplified system hardware.
Less costly.
In the form of small computerized parts in larger devices.
Required limited computer hardware resources.
Little memory and small keyboard on screen.
Viruses, Worms, and Trojan Horses.
As computer devices have become more pervasive, so has Malware.Cell phones, email, instant messaging, internet browsing, everyone is threatened.
Definition of Worm:
A program that makes copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some sort.
Definition of Virus:
A program or code that replicates; that is, infects another program, boot sector, partition sector, or document that supports macros, by inserting itself or attaching itself to that medium. Most viruses only replicate, though, many do a large amount of damage as well.
Definition of Trojan Horse:
A program that neither replicates nor copies itself, but causes damage or compromises the security of the computer. Typically, an individual emails a Trojan Horse to you-it does not email itself-and it may arrive in the form of a joke program or software of some sort.
We use configurable computing to refer to 3 related areas:
1.Configurable security modules are used to implement efficient security primitives such as AES private key, SH5 authentication, ECC public-key.
2. Secure configurable systems refers to the overall agility of the system, not just primitives. Examples include a system that modifies its security algorithms when an attack is detected or predicted.
3. Configurable design security addresses the problem that configurability does not itself introduce new vulnerabilities.The design should be secure against theft, hijacking, denial of service and other malicious or unintended uses.
Embedded System with Continuous Monitoring and Verification System
One approach we are exploring to detect attacks involves a continuous monitoring and verification of on-chip behavior.
This involves off-line profiling the characteristics of “normal behavior”, and then using on-chip monitors to detect deviations from this behavior. As with more conventional Intrusion Detection Systems, this approach involves minimizing both false positive and false negative detections. We rely on the simplicity, regularity and predictability of embedded system workloads to simplify this problem.
However we also have constraints in terms of the amount of additional computation and storage that can be allocated.
On-Chip Surveillance with Configurable Monitors
This slide shows architectural support for on-chip surveillance to detect potential attacks.
Various Configurable Monitors are used to detect physical values such as voltage, current, temperature and signal timing, as well as digital monitors to look for particular data patterns or statistics.
Configurable monitors communicate with each other and a security executive processor (SEP) using an On-Chip Intelligence Network.This network is secure & low-latency to allow rapid response to Attacks.
CMs receive new configuration information through a secure channel from the SEP.
CONCLUSION:
In this report we studied about the Embedded system and the Point of Sale Module. We also came to know that Security is an increasing concern in embedded system design using a model-based approach, security can be considered as an integral part through design process ,experiment platforms are critical to validate security designs.