Atmel and Arduino Announce Wi-Fi Shield 101 at World Maker Faire

Atmel and Arduino teamed up at World Maker Faire to introduce the Wi-Fi shield 101. [Gary] from Atmel gave us the lowdown on this new shield and its components. The shield is a rather spartan affair, carrying only devices of note: an Atmel WINC1500 WiFi module, and an ATECC108 crypto chip.

The WINC1500 is a nifty little WiFi module in its own right. WINC handles IEEE 802.11 b/g/n at up to 72 Mbps. 72Mbps may not sound like much by today’s standards, but it’s plenty fast for most embedded applications. WINC handles all the heavy lifting of the wireless connection. Connectivity is through SPI, UART or I2C, though on the Arduino shield it will be running in SPI mode.

The ATECC108 is a member of Atmel’s “CryptoAuthentication” family. It comes packaged in an 8-pin SOIC, and is compatible with serial I2C EEPROM specifications. Internally the similarities to serial EEPROMs end. The ‘108 has a 256-bit SHA engine in hardware, as well as a Federal Information Processing Standards (FIPS) level random number generator. Atmel sees this chip as being at the core of secure embedded systems. We think it’s pretty darn good, so long as we don’t hear about it at the next DEFCON.

The Wi-Fi shield 101 and associated libraries should be out in January 2015. We can’t wait to see all the new projects (and new ways to blink an LED) the shield will enable.

A 1920’s Doorbell is Upgraded with 2010’s Technology

When you move into an old house, you are bound to have some home repairs in your future. [Ben] discovered this after moving into his home, built in 1929. The house had a mail slot that was in pretty bad shape. The slot was rusted and stuck open, it was covered in old nasty caulk, and it had a built-in doorbell that was no longer functional. [Ben] took it upon himself to fix it up.

The first thing on the agenda was to fix the doorbell. After removing the old one, [Ben] was able to expose the original cloth-insulated wiring. He managed to trace the wires back to his basement and, to his surprise, they seemed to be functional. He replaced the old doorbell button with a new momentary button and then hooked up a DIY doorbell using an XBee radio. [Ben] already had an XBee base station for his Raspberry Pi, so he was wrote a script that could send a notification to his phone whenever the doorbell was pushed.

Unfortunately, the old wiring just didn’t hold up. The push button only worked sporadically. [Ben] ended up purchasing an off the shelf wireless doorbell. He didn’t want to have to stick the included ugly plastic button onto the front of his house though, so [Ben] had to figure out how to trigger the new doorbell using the nice metallic button. He used the macro lens on his iPhone to follow the traces on the PCB until he was able to locate the correct points to trigger the doorbell. Then it was just a matter of a quick soldering job and he had a functional doorbell.

Once the electronics upgrades were complete, he moved on to fixing up the look of the mail slot. He had to remove the rust using a wire brush and sandpaper. Then he gave it a few coats of paint. He replaced the original natural insulation with some spray foam, and removed all the old nasty caulk. The final product looks as good as new and now includes a functional wireless doorbell.

We’re big fans of salvaging old-school home hardware. Another example that comes to mind is this set of door chimes with modernized driver.

ESP8266 Distance Testing

With progress slowly being made on turning the ESP8266 UART to WiFi module into something great, there is still the question of what the range is for the radio in this tiny IoT wonder. [CNLohr] has some test results for you, and the results are surprisingly good.

Connecting to the WiFi module through a TPLink WR841N router, [CN] as able to ping the module at 479 meters with a huge rubber duck antenna soldered on, or 366 meters with the PCB antenna. Wanting to test out the maximum range, [CN] and his friends dug out a Ubiquiti M2 dish and were able to drive 4.28 kilometers away from the module and still ping it.

Using a dish and a rubber duck antenna is an exercise in excess, though: no one is going to use a dish for an Internet of Things thing, but if you want to carry this experiment to its logical conclusion, there’s no reason to think an ESP8266 won’t connect, so long as you have line of sight and a huge antenna.

There’s still a lot of work to be done on this module. It’s capable of running custom code, and since you can pick this module up for less than $5 USD, it’s an interesting platform for whatever WiFi project you have in mind.

Inductive Charger Mod Allows for Non-Stop Wireless Rocking

When you want to jam out to the tunes stored on your mobile devices, Bluetooth speakers are a good option. Battery power means you can take them on the go and the Bluetooth connection means you don’t have to worry about cables or wires dangling around. Unfortunately the batteries never seem to last as long as we want them too. You can always plug the speaker back in to charge up the battery… but when you unhook those cords they always seem to end up falling back behind the furniture.

[Pierre] found himself with this problem, but being a hacker at heart meant that he was able to do something about it. He modified his JAM Classic Bluetooth Wireless Speaker to include an inductive charger. It used to be a lot of work to fabricate your own inductive charging system, or to rip it out of another device. But these days you can purchase kits outright.

The JAM speaker was simply put together with screws, so no cracking of the plastic was necessary. Once the case was removed, [Pierre] used a volt meter to locate the 5V input line. It looks like he just tapped into the USB port’s power and ground connections. The coil’s circuit is soldered in place with just the two wires.

All [Pierre] had left to do was to put the speaker back together, taking care to find space for the coil and the new circuit board. The coil was taped to the round base of the speaker. This meant that [Pierre] could simply tape the charging coil to the underside of a glass table top. Now whenever his Bluetooth speaker gets low on battery, he can simply place it on the corner of the table and it will charge itself. No need to mess with cables.



Energia on the CC3200

If you’re looking to connect things to the internet, with the goal of building some sort of “Internet of Things,” the new CC3200 chip from TI is an interesting option. Now you can get started quickly with the Energia development environment for the CC3200.

We discussed the CC3200 previously on Hackaday. The chip gives you an ARM Cortex M4 processor with a built-in WiFi stack and radio. It supports things like web servers and SSL out of the box.

Energia is an Arduino-like development environment for TI chips. It makes writing firmware for these devices easier, since a lot of the work is already done. The collection of libraries aids in getting prototypes running quickly. You can even debug Energia sketches using TI’s fully featured IDE.

With this new release of Energia, the existing Energia WiFi library supports the built-in WiFi radio on the CC3200. This should make prototyping of WiFi devices easier, and cheaper since the CC3200 Launchpad retails for $30.

A Remote Controlled, Fully Functional, Steam Powered Tank

Steam Powered Tank for the 21st Century

Steam power anything these days is pretty cool, but rarely have we ever seen such a complex build as this steam powered, remote controlled 1/16th scale tank.

[Ian] is an electronics design engineer whose hobbies include messing around with steam power. The Steam Turret Tank is based on a 1/16th scale Tamiya King Tiger die-cast model tank. It features a 3.5″ diameter marine boiler from MaccSteam, which is a fully equipped miniature version of a real boiler, complete with pressure gauges, safety valves, and a ceramic burner. It can produce pressures of up to 70PSI (max 120PSI), but for this project, [Ian] is limiting it to around 30PSI.

A small 2″ diameter fuel tank contains a propane mixture to fuel the boiler. Two Regner 40451 Piccolo steam engines make up the drive train, with mechanical linkages controlled by servos to engage the various features. The tank can go forward, backward, spin in place, and the turret can both rotate and adjust trajectory. It also has controllable headlights, and can even “fire” the turret.

Continue reading “A Remote Controlled, Fully Functional, Steam Powered Tank”

Green Light Your Commute with America’s Unsecured Traffic Lights

Remember that episode of Leverage (season 5, episode 3), where Alec uses Marvin to wirelessly change all the street lights green so they can catch up to an SUV? And you scoffed and said “that’s so not real!”… well actually they got it right. A new study out of the University of Michigan (PDF warning), shows just how easy it is to make your morning commute green lights all the way.

The study points out that a large portion of traffic lights in the United States communicate with each other wirelessly over the 900Mhz and 5.8Ghz ISM band with absolutely no encryption. In order to connect to the 5.8Ghz traffic signals, you simply need the SSID (which is set to broadcast) and the proper protocol. In the study the researchers used a wireless card that is not available to the public, but they do point out that with a bit of social engineering you could probably get one. Another route is the HackRF SDR, which could be used to both sniff and transmit the required protocol. Once connected to the network you will need the default username and password, which can be found on the traffic light manufacturer’s website. To gain access to the 900Mhz networks you need all of the above and a 16-bit slave ID. This can be brute forced, and as the study shows, no ID was greater than 100. Now you have full access, not to just one traffic signal, but EVERY signal connected to the network.

Once on the network you have two options. The completely open debug port in the VxWorks OS which allows you to read-modify-write any memory register. Or by sending a(n) UDP packet where the last byte encodes the button pressed on the controller’s keypad. Using the remote keypad you can freeze the current intersection state, modify the signal timing, or change the state of any light. However the hardware Malfunction Management Unit (MMU) will still detect any illegal states (conflicting green or yellow lights), and take over with the familiar 4-way red flashing. Since a technician will have to come out and manually reset the traffic signal to recover from an illegal state, you could turn every intersection on the network into a 4-way stop.

So the next time you stop at a red light, and it seems to take forever to change, keep an eye out for the hacker who just green lit their commute.

Thanks for the tip [Matt]