-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathindex.html
156 lines (118 loc) · 6.41 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
<!DOCTYPE HTML>
<html>
<head>
<title>pi-star</title>
<link rel="shortcut icon" href="images/favicon.ico" type="image/x-icon">
<link rel="icon" href="images/favicon.ico" type="image/x-icon">
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no" />
<link rel="stylesheet" href="assets/css/main.css" />
<noscript><link rel="stylesheet" href="assets/css/noscript.css" /></noscript>
</head>
<body class="is-preload">
<!-- Wrapper -->
<div id="wrapper">
<!-- Header -->
<header id="header" class="alt">
<span class="logo"><img src="images/Drawing.svg" alt="" /></span>
<h1>pi-star</h1>
<p style="color:white">Protected IoT Security & Threat Analysis/Response</p>
</header>
<!-- Nav -->
<nav id="nav">
<ul>
<li><a href="#intro" class="active">Overview</a></li>
<li><a href="#network">Network</a></li>
<li><a href="#threat">Threat Analysis</a></li>
<li><a href="#security">Security</a></li>
<li><a href="#data">Data Handling</a></li>
<li><a href="#git">GitHub</a></li>
</ul>
</nav>
<!-- Main -->
<div id="main">
<!-- Introduction -->
<section id="intro" class="main special">
<div class="spotlight">
<div class="content">
<header class="major">
<h1>Project Overview</h1>
</header>
<p>The Protected IoT Security and Threat Analysis/Response (PI-STAR) is an IoT-based security system designed to provide wireless security to a room with confidential information. It uses a variety of sensor modules to determine the threat level and probability of a compromising incident within a room. The system then displays real-time attack and threat level information on a web interface for continuous monitoring. Additionally, the system uses advanced security to protect against both cyber and physical attacks. Finally, the system is able to respond to critical threats by triggering an alarm and encrypting sensitive information on an external medium.</p>
<p>The system consists of sensor modules throughout the room as well as within the box node containing the sensitive information.</p>
<p>PI-STAR was created by Ibiyemi Abiodun, Simon Abrelat, Sidhesh Desai, and Grace Pfohl as part of an internship at the Georgia Tech Research Institute CIPHER-TMPO Lab.</p>
<img src="images/Diagram2.png" width="100%" align:"center"/>
</div>
</div>
</section>
<section id="network" class="main special">
<div class="spotlight">
<div class="content">
<header class="major">
<h2>Network</h2>
</header>
<p align="justify">The IoT network is based on a star structure with each of the sensor modules communicating with a mother node via MQTT. In general, the sensor data is transferred from the sensors, to the Arduino UNOs, to the Raspberry Pis, which are the basis for the IoT connections.</p>
<a href="network.html" class="button primary" >Learn More</a>
</div>
</div>
</section>
<section id="threat" class="main special">
<div class="spotlight">
<div class="content">
<header class="major">
<h2>Threat Analysis</h2>
</header>
<p align="justify">PI-STAR uses mathematical algorithms to determine the threat levels based on the sensor data.</p>
<a href="threat.html" class="button primary" >Learn More</a>
</div>
</div>
</section>
<section id="security" class="main special">
<div class="spotlight">
<div class="content">
<header class="major">
<h2>Security</h2>
</header>
<p align="justify">PI-STAR utilizes three types of security to protect the security system against a wide range of attacks. This includes cyber attacks as well as certain physical attacks. Overall, this security is designed to ensure that the security system of the room is never compromised by an attacker.</p>
<a href="security.html" class="button primary" >Learn More</a>
</div>
</div>
</section>
<section id="data" class="main special">
<div class="spotlight">
<div class="content">
<header class="major">
<h2>Data Handling</h2>
</header>
<p align="justify">The room sensor data arrives at the gateway node after multiple transfers between devices and is populated into an SQLite database and used to determine the threat level of the room algorithmically. Meanwhile, the most recent sensor readings are displayed to the user on a front end Python web application in a numerical format. The current and historic threat level is displayed graphically and the current threat level is also relayed in a summary statement.</p>
<a href="data.html" class="button primary" >Learn More</a>
</div>
</div>
</section>
<!-- Get Started -->
<section id="git" class="main special">
<header class="major">
<h2>View Our GitHub Page</h2>
</header>
<footer class="major">
<a href="https://github.com/TMPOTagEd2018" class="button primary"> View </a>
</footer>
<br>
</section>
</div>
<!-- Footer -->
<footer id="footer">
<p class="copyright" style="color:white"> An IoT Project by Ibiyemi Abiodun, Simon Abrelat, Sidhesh Desai, and Grace Pfohl</a>.</p>
<p class="copyright">© skiidk. Design based on Stellar by <a href="https://html5up.net">HTML5 UP</a>.</p>
</footer>
</div>
<!-- Scripts -->
<script src="assets/js/jquery.min.js"></script>
<script src="assets/js/jquery.scrollex.min.js"></script>
<script src="assets/js/jquery.scrolly.min.js"></script>
<script src="assets/js/browser.min.js"></script>
<script src="assets/js/breakpoints.min.js"></script>
<script src="assets/js/util.js"></script>
<script src="assets/js/main.js"></script>
</body>
</html>