CONCLUSION
The
structure of the code and wireless systems itself mainly depends on the design
requirements. This project has utilized the process design and simulation over
simulation. A vast research on security methods had been done for ideas on
design. This gave a lot of useful information not only on the study, but also
on information gathering.
The
project had been carried out from software to hardware which depicts the real
circuit easily. Although there are some disadvantages using the board, due to
unfamiliarity with the board, it had somehow an effective way to apply
theoretical knowledge into reality, using the simplest method.
A complete version
of the auto keyless entry system has been designed. It is
proven that it
meets the earlier determined requirements, in terms of entry method,security
level, and ease of use for end users. The hardware simulation runs
properly,which depicts the real circuit is going to be ready for further expand
or upgrades.
REFERENCES
Systems Security Management
NERC Reliability Standards CIP-002 through CIP-009
NERC
Implementation Plan for Cyber Security Standards