Difference between revisions of "Home Automation"
From Makers Local 256
(→Entry Automation: comments) |
m (→Cons) |
||
Line 31: | Line 31: | ||
* 1 wire interface may be fakable with any interface that has the same signal levels (very cheap and easy buttonforging) | * 1 wire interface may be fakable with any interface that has the same signal levels (very cheap and easy buttonforging) | ||
** ''prove it'' --[[User:Strages|strages]] 20:18, 8 May 2008 (CDT) | ** ''prove it'' --[[User:Strages|strages]] 20:18, 8 May 2008 (CDT) | ||
+ | *** [[iButton Spoofing]]. I'm not promising to get around to this anytime soon, but I'll layout how to spoof the static key iButton here. [[User:Omegix|Omegix]] 23:02, 8 May 2008 (CDT) | ||
** ''It doesn't matter. Old keys are still eliminated from the system. And the threat of theft through kicking the door in is much higher than copying a valid key.'' --[[User:Korc|Korc]] 20:51, 8 May 2008 (CDT) | ** ''It doesn't matter. Old keys are still eliminated from the system. And the threat of theft through kicking the door in is much higher than copying a valid key.'' --[[User:Korc|Korc]] 20:51, 8 May 2008 (CDT) | ||
* User may forget to log their entry to the area. | * User may forget to log their entry to the area. |
Revision as of 23:02, 8 May 2008
Contents
[hide]Entry Automation
General Implementation Notes
- The system needs to be powered, and preferably include a UPS
- Overriding key access is nice for graceful failure
- Of course, this just underlines the fact that this is an access registry system more than anything
- Probably need a normal handle in the door with an electric door strike for the cheapest implementation.
- If the implementation simply replaces the metal key with a token, it will have the same problems. Unless two- or three-factor authentication is used and/or the physical security of the lock and door are improved, it's about as secure as it was.
RFID
Pros
- Hands-off access
- Hands-off tracking of access
- As long as user has their RFID tag on them, their presence within a certain proximity around the reader will be recorded.
Cons
- Keys easily stolen with anonymity
Implementation
Materials
- Need a reader with good range. Can be found for under $100
- To build a system that can perform coming/going detection, would need two readers. or 1 + N readers, where N is the number of approachable directions
- Need a writer. Under $100
- Some writers are substantially more expensive. Q: Why the price difference?
- Need a server
iButton
Pros
- Rotating keys are available
- Someone must have physical access to the fob to capture the non-rotating key
Cons
- Hands-on access
- 1 wire interface may be fakable with any interface that has the same signal levels (very cheap and easy buttonforging)
- prove it --strages 20:18, 8 May 2008 (CDT)
- iButton Spoofing. I'm not promising to get around to this anytime soon, but I'll layout how to spoof the static key iButton here. Omegix 23:02, 8 May 2008 (CDT)
- It doesn't matter. Old keys are still eliminated from the system. And the threat of theft through kicking the door in is much higher than copying a valid key. --Korc 20:51, 8 May 2008 (CDT)
- prove it --strages 20:18, 8 May 2008 (CDT)
- User may forget to log their entry to the area.
- If door is open, no incentive to use key
- Group of people walk in at once
- Someone knocks and has the door opened for them
- All these Cons are valid for any system --Korc 19:26, 8 May 2008 (CDT)