Project

# Title Team Members TA Documents Sponsor
36 Bike Alert: Bike Lock with Real-Time Security Monitoring
David Youmaran
Diego Herrera
Kenny Kim
Aishee Mondal design_document1.pdf
final_paper1.pdf
grading_sheet1.pdf
photo1.jpeg
photo2.jpeg
presentation1.pdf
proposal1.pdf
video
# Bike Alert: Bike Lock with Real-Time Security Monitoring

## Team Members
- Diego Herrera (dherr4)
- Kenneth Kim (kk67)
- David Youmaran (dcy2)

# Problem
Bicycle theft remains a major issue, especially on campus. While traditional locks provide physical security, they fail to notify owners when tampering occurs, leaving bikes vulnerable. A security solution is needed—one that not only prevents unauthorized access but also alerts the owner in real time when theft attempts occur.

# Solution
The Bike Alert system is an advanced security attachment for standard bike locks, integrating multiple tamper-detection mechanisms with real-time notifications. The device will:
- Detect lock disengagement and unauthorized tampering using various sensors.
- Utilize an ESP32 microcontroller to process sensor data.
- Communicate alerts via Wi-Fi to a mobile app, notifying the user in real time.
- Feature a secondary locking mechanism (deadbolt) controlled by RFID for enhanced security.
- Be battery-powered and rechargeable to ensure long-lasting operation.

We acknowledge that previous attempts have been made to develop bike locking systems. However, most existing designs focus primarily on physical security without incorporating real-time alerts or secondary security measures. To our knowledge, no prior project has successfully implemented both mobile app notifications and an RFID-controlled deadbolt lock. Our design aims to bridge this gap by providing a comprehensive security solution that enhances both theft prevention and user awareness.

# Solution Components

## Data Collection Subsystem (Tampering & Lock Disengagement Detection)
This subsystem monitors the lock and detects unauthorized access. It consists of:

- Hall-Effect Sensors for Lock and Case Monitoring
- Lock Disengagement Detection: A Hall-effect sensor and magnet will detect when the lock is disengaged. If the magnet moves past a predefined threshold, an alert is triggered.
- Case Tamper Detection: Inspired by [TI's application](https://www.ti.com/lit/ab/sboa514a/sboa514a.pdf), we will use a Hall-effect sensor positioned inside a 3D-printed enclosure to detect when the outer case is tampered with. A magnet embedded in the case ensures that when closed, the sensor detects a high flux density. If the case is opened/moved far enough, the decreasing flux density will trigger an alert.

- Spring-Based Adjustable Vibration Sensor
- Detects physical tampering such as cutting or shaking the lock.
- The adjustability allows fine-tuning of sensitivity to differentiate between minor disturbances and actual theft attempts.

- ESP32 Microcontroller
- Collects data from all sensors and sends it to the Wi-Fi-connected mobile app.

## Communication & Mobile App Subsystem
This subsystem enables real-time notifications and user interaction.

- ESP32-to-App Communication
- The ESP32 will transmit sensor data via Wi-Fi, using the campus network for connectivity.
- If an alert is triggered (lock disengagement, tampering detected), the app will receive a real-time notification.

- Mobile App Features
- Display current lock status.
- Send push notifications for tampering or disengagement events.
- Event log to track past security incidents.
- Allow the user to enable/disable monitoring modes manually (e.g., "In Use" vs. "Not In Use" mode).

## Secondary Security Subsystem (RFID Deadbolt Lock)
To add an additional layer of security, the system will include an RFID-controlled deadbolt locking mechanism.

- Purpose: Even if the main lock is broken, the deadbolt will prevent full disengagement of the bike lock.
- How it Works:
- The deadbolt is controlled via RFID authentication for convenient unlocking.
- A small, high-torque motor will drive the deadbolt mechanism.
- Requires a motor driver circuit and relay to switch power efficiently.

## Power Supply Subsystem
The system must support continuous operation, including sensor monitoring, Wi-Fi communication, and motor operation.

- Power Source: Rechargeable Lithium-Ion Battery.
- Battery Capacity Considerations:
- Must sustain ESP32 operation and Wi-Fi connectivity.
- Should provide enough power for motor-driven deadbolt activation.
- Efficient power management circuit to maximize battery life.

# Criterion For Success
- Reliable Detection – Sensors must accurately distinguish between normal activity and actual tampering.
- Alerts – Wi-Fi-enabled notifications must reach the user in real time.
- Secure Secondary Lock – The RFID-controlled deadbolt should prevent theft even if the primary lock is compromised.
- Battery Life – The system must operate for at least 48 hours per charge under normal conditions.

# Conclusion
The Bike Alert system offers an approach to bicycle security by combining tamper detection, real-time notifications, and an RFID-based secondary lock. This project integrates multiple subsystems into a compact, user-friendly solution that enhances traditional bike locks without compromising convenience or being overly expensive.

Cloud-controlled quadcopter

Anuraag Vankayala, Amrutha Vasili

Cloud-controlled quadcopter

Featured Project

Idea:

To build a GPS-assisted, cloud-controlled quadcopter, for consumer-friendly aerial photography.

Design/Build:

We will be building a quad from the frame up. The four motors will each have electronic speed controllers,to balance and handle control inputs received from an 8-bit microcontroller(AP),required for its flight. The firmware will be tweaked slightly to allow flight modes that our project specifically requires. A companion computer such as the Erle Brain will be connected to the AP and to the cloud(EC2). We will build a codebase for the flight controller to navigate the quad. This would involve sending messages as per the MAVLink spec for sUAS between the companion computer and the AP to poll sensor data , voltage information , etc. The companion computer will also talk to the cloud via a UDP port to receive requests and process them via our code. Users make requests for media capture via a phone app that talks to the cloud via an internet connection.

Why is it worth doing:

There is currently no consumer-friendly solution that provides or lets anyone capture aerial photographs of them/their family/a nearby event via a simple tap on a phone. In fact, present day off-the-shelf alternatives offer relatively expensive solutions that require owning and carrying bulky equipment such as the quads/remotes. Our idea allows for safe and responsible use of drones as our proposed solution is autonomous, has several safety features, is context aware(terrain information , no fly zones , NOTAMs , etc.) and integrates with the federal airspace seamlessly.

End Product:

Quads that are ready for the connected world and are capable to fly autonomously, from the user standpoint, and can perform maneuvers safely with a very simplistic UI for the common user. Specifically, quads which are deployed on user's demand, without the hassle of ownership.

Similar products and comparison:

Current solutions include RTF (ready to fly) quads such as the DJI Phantom and the Kickstarter project, Lily,that are heavily user-dependent or user-centric.The Phantom requires you to carry a bulky remote with multiple antennas. Moreover,the flight radius could be reduced by interference from nearby conditions.Lily requires the user to carry a tracking device on them. You can not have Lily shoot a subject that is not you. Lily can have a maximum altitude of 15 m above you and that is below the tree line,prone to crashes.

Our solution differs in several ways.Our solution intends to be location and/or event-centric. We propose that the users need not own quads and user can capture a moment with a phone.As long as any of the users are in the service area and the weather conditions are permissible, safety and knowledge of controlling the quad are all abstracted. The only question left to the user is what should be in the picture at a given time.

Project Videos