Senior Design

In their final year, Bachelor of Science majors complete either a Senior Design Project or an Enterprise project. Many of these projects are presented by students at Design Expo, an annual competition that highlights hands-on, discovery-based learning at Michigan Tech. During the event, more than a thousand students in Enterprise and on Senior Design teams showcase their work and compete for awards.

The annual Design Expo is Michigan Tech’s annual showcase for experiential, discovery-based learning. Each spring the event showcases the work of more than 1,000 students from Enterprise and Senior/Capstone Design programs. Student teams from all five Colleges: Business, Computing, Engineering, Forest Resources and Environmental Science, and Sciences and Arts were represented. The 2022 Design Expo is generously supported by industry and university event sponsorship. View all Design Expo 2022 Enterprise entries here.

2023 Senior Design Projects

Social Engineering for High School Students - 1st Place

Connor Langdon and Kayla Blunt

Team Members: Connor Langdon, Cybersecurity, Kayla Blunt, Computer Network and System Administration

Advisors: Tim Van Wagner, Applied Computing, and Victoria Walters, Applied Computing

Project Description: The goal of our project is to develop and deliver social engineering education for high school students in the local area. Through social engineering education, we aim to spread awareness on one of the most common cybersecurity threats, as well as provide resources for reporting the threat and promoting safe practices when emailing, browsing the web, engaging in social media, and answering calls and texts.


Cyber Law in the U.S.

Cyber Law Senior Design team

Team Members: Christopher Liberman, Cybersecurity; Nathan Butgereit, Computer Network and System Administration; Mason Servant, Cybersecurity

Advisor: Victoria Walter

Sponsor: College of Computing

Project Description: The goal of our project is to develop a bill specifically for the state of Michigan that addresses shortcomings that exist in current U.S. cyber laws. It follows a similar format to the California Privacy Rights Act (CPRA) and incorporates ideas from the European Union's General Data Protection Regulation (GDPR). The bill is currently in a draft stage.


Updating and Upgrading Labs for Wireless System Administration

Wireless Team CNSA students

Team Members: Wil Hobkirk, Kevin Doerr, Ryan Martell, Erik Stalsberg Barnett, Computer Network and System Administration

Advisor: Tim Van Wagner, Applied Computing

Sponsor: Michigan Tech

Project Description: The goal of our project is to analyze the lab content of SAT3820 to find outdated and depreciated content and upgrade or replace it as needed. This includes fixing and altering existing labs as well as writing a new curriculum to utilize the array of Ubiquiti radios that were recently donated to the program. The goal of the new lab material is to bring more industry relevant content into the lab space and give wireless students the chance to learn hands-on, practical skills that they can carry on into the workplace. This project is currently in its second phase. In this phase the team is deploying new and altered lab material and receiving feedback from students.




Vehicle Penetration Test

Vehicle Penetration Test Senior Project Team

Team Members: Jason Joseph, Cybersecurity; Justin M Reames, Computer Network and System Administration; Ethan Frenza, Computer Network and System Administration

Advisor: Victoria Walter, Applied Computing

Project Description: Our project goal is to investigate the possibility of vulnerabilities with modern automotives. The project focused on the use of data transmissions used by the vehicle and attempting to exploit any vulnerabilities that are identified. Such vulnerabilities involved WiFi, Radio Frequencies, and CAN Bus transmissions. We have finished our testing phase and have found and exploited vulnerabilities in the Radio Frequency transmissions from the Vehicle Car Fobs. However, there is more room to investigate different transmission types in the future.


Voice Spoofing Countermeasure for Voice-Controlled Systems Using Deep Learning

Voice Spoofing Countermeasure Senior Design image

Team Members: Jarrett Buckner, Computer Network and System Administration; Andrew Martin, Cybersecurity;  Dallas Grandy, Cybersecurity

Sponsor: College of Computing

Project Description: The goal of our project is to create a protected system that uses primarily voice for authentication, rather than a traditional text password. We developed a Graphic User Interface that takes sound as an input and predicts whether or not a user is authorized to access our system based solely on the characteristics of their voice. In order to accomplish this, we are training a machine learning model for speaker classification using recorded samples of each of our voices. We have also used online AI software to create deep-fake voice lines for each of our voices, which will be used to test how our voice recognition responds to potential cyber-attacks that use fake voices to try and gain unauthorized access to a system such as ours.


Industry 4.0 Consulting

Industry 4.0 Consulting Senior Design Team

Team Members: Nicole Andress, Cybersecurity; Matt Vongphachanh, Mechanical Engineering Technology

Advisors: David M. Labyak, Manufacturing and Mechanical Engineering Technology; Tim Van Wagner: Computer Network and System Administration

Project Description:

The purpose of team Industry 4.0 is to collect temperature data during the pouring, casting, and testing process in the Michigan Tech foundry. The driving force behind this project is to optimize the use of the foundry data collection for students, staff, and researchers. In this project, the team installed network highways for data to travel while also encrypting data for security. This network installation allowed our team to utilize IoT technology to gather real-time data with tools like an Arduino while syncing to the cloud. With the utilization of IoT devices, we were able to provide ease of access to data through the synchronization of these tools.


2022 Senior Design Projects

IoMT Device Security: 1st Place

Cybersecurity Students

Class of 2022 Cybersecurity graduates Jacson Ott, Stu Kernstock, Trevor Hornsby, and Matthew Chau won First Place in the Senior Design category at the 2022 Design Expo. Check out their winning project below.

Team Members: Jacson Ott, Stu Kernstock, Trevor Hornsby, and Matthew Chau, Cybersecurity

Advisor: Guy Hembroff, Applied Computing

Sponsor: Department of Applied Computing

Project Description: Our team researched the current security of Internet of Medical Things (IoMT) wearable devices. We have tested a wide selection of different smartwatches and accompanying smartphones for a number of different potential vulnerabilities. These include physical attacks, sniffing, man in the middle, dos, reverse application engineering, and more. The main purpose is to identify common weaknesses in security across this field, and to provide suggestions for mediation.

The goal of this project is to test the possibilities of security vulnerabilities between the connection of an Apple Watch and an iPhone. This is relevant because Apple devices are the most popular fitness tracking device on the market, and research shows that Bluetooth is vulnerable to certain attacks. This is especially true with its counterpart Bluetooth Low Energy, which has recently been tested for its security. We are currently in our second phase, where we are testing connections with a multitude of tools.


WarDriving IoT

War Driving IoT Senior Design students

Team members: Darren Hutchinson, Matthew Hoying, Lucas Runkel, Seth Hessbrook, and Devin Schultz, Computer Network and System Administration, and Eli Brockert, Cybersecurity

Advisor: Tim Van Wagner, Applied Computing

Sponsor: Michigan Tech Department of Applied Computing

Project Description: Our project is composed of two focused subgroups: Offensive Red Team and Defensive Blue Team. The goal for Red Team is to utilize IoT hardware and complimentary open-source software to perform penetration testing on a network. Phases of Red Team’s project will include detection, intrusion, and attacking devices on a network while keeping cost to a minimum. The goal for Blue Team is to utilize IoT hardware and software to defend a network. Blue Team’s focus is set up in three phases: basic network setup, advanced user setup, and network lockdown. Each phase will incorporate different levels of configuration and introduce new IoT devices and software to help monitor and defend against Red Team’s attack vectors.


High Availability Cybersecurity Kit

Cybersecurity Kit

Team members: Jerod Warren, Brad Gipson, and Brandon Lopez, Computer Network and System Administration

Advisor: Yu Cai, Applied Computing

Sponsor: Department of Applied Computing

Project Description: Our team developed the High Availability Cybersecurity Kit (H.A.C.K.), a low-cost cybersecurity training kit for middle school and high school students. H.A.C.K. will introduce the concepts of networking, Linux, Raspberry Pi, password cracking, wireless attacks, and much more. Modules with tutorials will lead students through the activities with a focus on experimentation and exploration, hopefully lighting a spark of curiosity that could lead into a career in cybersecurity.


Bluetooth Attacks on Medical Wearables

Bluetooth Attacks image

Team members: Destiny Michaels, Cam Kern, Joseph Horne, Byron Langerman, Computer Network and System Administration

Advisor: Tim Van Wagner, Applied Computing

Sponsor: Department of Applied Computing

Project Description: The goal of this project is to test the possibilities of security vulnerabilities between the connection of an Apple Watch and an iPhone. This is relevant because Apple devices are the most popular fitness tracking device on the market, and research shows that Bluetooth is vulnerable to certain attacks. This is especially true with its counterpart Bluetooth Low Energy, which has recently been tested for its security. We are currently in our second phase, where we are testing connections with a multitude of tools.


IoT Course Development for CNSA Curriculum

IoT Course Development Enterprise

Team members: Brandon Cox, CNSA, and Olivia Uzosike and Kate MacQuarrie-Klender, Cybersecurity

Sponsor: Department of Applied Computing

Project Description: The goal of this project is to implement some topic that is not covered sufficiently enough within the CNSA curriculum. We first determined that topics surrounding the Internet of Things would be a sufficient topic. We then created ten labs, ten modules, homework, and a final exam for topics surrounding IoT, including data administration, IoT security and protocols, history, modern and future use of IoT, cloud and fog computing, analytics, and implementation of IoT. Upon completion of the modules we began a lab-testing phase to finalize our project. Currently, we are using IoT-based hardware including nest cameras, raspberry pi pico, and raspberry pi, to test security and implementation based IoT techniques.


Drone-Based Crack Detection System

Drone-based Crack Detection System image

Team Members: Eric Batz and Jason Sherred, Electrical Engineering Technology

Advisor: Ashraf Saleem, Applied Computing, Department of Applied Computing

Goal: The goal of the Drone-Based Crack Detection System is to reduce the cost and risk to workers who are inspecting areas that may be unsafe. With the use of Intel RealSense, a Raspberry Pi, and Artificial Intelligence (AI), the drone will be able to detect and label cracks in infrastructure. The drone will send live video feedback to the user with a screenshot to save. This data collected will be used to train the AI continuously.


Emergency Situation Solar Generator

Emergy Situation Solar Generator image

Team members: Alexander Rogers, Josh Kiefer, and Daren Giuchin, Electrical Engineering Technology

Advisor: Ashraf Saleem, Applied Computing

Sponsor: Department of Applied Computing

Project Description: Our team was tasked with developing an affordable power source that can be resupplied via renewable solar power. The main purpose of this generator is to be deployed and used for communications and other low-voltage systems following extreme weather conditions that disable local power and disrupt the local energy supply chain.


Project Athena

Project Athena Senior Design Project image

Team members: Fiona Chow, Rylee Gorman, Macy Pawielski, Chris Arbuckle, and Brendon Cook, Management Information Systems; Jessica Brown, Computer Science

Advisor: Jeffrey Wall, College of Business and Economics

Sponsor: Needlestack

Project Description: The goal of this project is to help with the creation of a learning management system (LMS). Our team is split into two subteams–research and technical. The research subteam’s main tasks are market and user research through customer discovery methods such as conducting interviews with various end users. The technical subteam is using Adobe XD to design an automated grading pipeline. The subteams will come together to perform usability testing on the prototype design and collect user feedback to share with the client.