0% found this document useful (0 votes)
100 views

Term Paper of Micro Controller

This document provides a review of microcontrollers and their application in security systems. It discusses how microcontrollers can be used to implement security features like alarms, sensors, and remote monitoring through integrated components like CPUs, memory, and I/O ports. The document then describes a specific wireless home security system example that uses various Microchip microcontrollers and transceivers to encrypt sensor signals, monitor for intrusions, and control alarms. In conclusion, it is noted that microcontroller-based security systems allow users to securely protect their homes and property with automated monitoring and alerts.

Uploaded by

hunnyahuja
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views

Term Paper of Micro Controller

This document provides a review of microcontrollers and their application in security systems. It discusses how microcontrollers can be used to implement security features like alarms, sensors, and remote monitoring through integrated components like CPUs, memory, and I/O ports. The document then describes a specific wireless home security system example that uses various Microchip microcontrollers and transceivers to encrypt sensor signals, monitor for intrusions, and control alarms. In conclusion, it is noted that microcontroller-based security systems allow users to securely protect their homes and property with automated monitoring and alerts.

Uploaded by

hunnyahuja
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

REVIEW OF MICROCONTROLLER

TOPIC NAME: APPLICATION OF MICROCONTROLLER IN


SECURITY SYSTEM
SUBMITTED BY: - RAJESH AHUJA
SUBMITTED TO: - MR. GURSHARANJEET SINGH
B.TECH ECE (B)
ROLL NO: - B6701A30
REG. NO.:-1060070116
SECTION:-RB6702

ABSRTACT INTRODUCTION
Engineering is not only a theoretical study A microcontroller is a small computer on a
but it is a implementation of all we study single integrated circuit consisting
for creating something new and making internally of a relatively simple
things more easy and useful through CPU, clock timer I/O ports, and memory.
practical study. It is an art which can be Program memory in the form of NOR
gained with systematic study, observation flash or OTP ROM is also often included
and practice. In the college curriculum we on chip, as well as a typically small
usually get the theoretical knowledge of amount of RAM. Microcontrollers are
industries, and a little bit of designed for small or dedicated
implementation knowledge that how it is applications. Thus, in contrast to
works? But how can we prove our the microprocessors used in personal
practical knowledge to increase the computers and other high-performance or
productivity or efficiency of the industry? general purpose applications, simplicity is
Microcontroller has many application by emphasized. Some microcontrollers may
which we can make many securities use four-bit words and operate at clock
systems Protect our family and valuables rate frequencies as low as 4 kHz, as this is
with this microcontroller based security adequate for many typical applications,
system that will let us rest our head enabling low power consumption
knowing that should anyone trying to (milliwatts or microwatts). They will
break into our home, an alarm will go off generally have the ability to retain
and the police will be alerted immediately functionality while waiting for an event
such as a button press or other interrupt;
power consumption while sleeping (CPU the received intruder sensor signal and a
PIC16C77 PICmicro for base station panel
clock and most peripherals off) may be
monitoring and control. Other support
just nanowatts, making many of them well logic is included, such as a battery back-up
suited for long lasting battery applications. circuit, simple single stage lead acid
Other microcontrollers may serve battery charger and external siren control,
performance-critical roles, where they may but the focus of the application is the
need to act more like a digital signal implementation of Microchip KEELOQ
and PICmicro products for a complete
processor (DSP), with higher clock speeds
solution.
and power consumption.
Computer security
APPLICATIONS OF
MICROCONTROLLER IN The Mozilla Firefox web browser can use
SECURITY SYSTEM smart cards to store certificates for use in
secure web browsing
Microcontrollers are used in automatically
controlled products and devices, such as Some disk encryption systems, such
security system automobile engine control as FreeOTFE, TrueCrypt and
systems, implantable medical devices, Microsoft Windows 7 BitLocker, can use
remote controls, office machines, smart cards to securely hold encryption
appliances, power tools, and toys. By keys, and also to add another layer of
reducing the size and cost compared to a encryption to critical parts of the secured
design that uses a separate microprocessor, disk.
memory, and input/output devices, Smart cards are also used for single
microcontrollers make it economical to sign-on to log on to computers
digitally control even more devices and
Smart cards have been advertised as
processes. Mixed signal microcontrollers
suitable for personal identification tasks,
are common, integrating analog
because they are engineered to be tamper
components needed to control non-digital
resistant. The embedded chip of a smart
electronic systems.
card usually implements
somecryptographic algorithm. There are,
Wireless Home Security Implementing however, several methods of recovering
using Microcontroller some of the algorithm's internal state.
This application note describes a Differential power analysis
Microchip system solution for a low Differential power analysis involves
end/power wireless home security system.
measuring the precise time and electrical
This design implements an HCS200
encoder for the intruder sensor signal current required for certain encryption or
encryption, one PIC12C508A PICmicro decryption operations. This is most often
for sensor monitoring and RF signal used against public key algorithms such
initiation, HCS515 decoders for decrypting as RSA in order to deduce the on-chip
private key, although some obviously involve a fairly high risk of
implementations of symmetric ciphers can permanent damage to the chip, they permit
be vulnerable to timing or power attacks as much more detailed information
well. (e.g. photomicrographs of encryption
Physical disassembly hardware) to be extracted.

Smart cards can be physically CONCLUSION


disassembled by using acid, abrasives, or The use of the security system kit allows
some other technique to obtain direct, the user to understand how the kit will
work
unrestricted access to the on-board And it is the main advantage of controller
microprocessor. Although such techniques by which we can secure from thief.

You might also like