SlideShare a Scribd company logo
1 of 2
CODE MODULATION BASED ENCRYPTION & DECRYPTION
TECHNIQUE FOR SECURE COMMUNICATION IN
WIRELESS
ABSTRACT
In Today’s Electronic communication take important role. Today’s Communication technology
the chatting system from one Place to another is easy and fast. But security is of some concern,
for that we send the data by the system named as Advanced chatting system using
Microcontroller.
In our project we have two sections, one is transmitter section and another one is Receiver
section. The two sections are designed around a microcontroller as a control unit with all the
devices interfaced to it. The main aim of the project is to transmit the data using wireless
communication by encrypting the data. At the receiver side, the encrypted data is decrypted and
is shown in the PC.
According to this project the person who wants to send the data to a remote place has to type the
data from the PC. The data is received by microcontroller and is sent to RF transmitter after
encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in
PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is
converted into plaintext.
BLOCK DIAGRAM
TRANSMITTER

POWER SUPPLY

Encoder

MICRO
CONTROLLER
(AT89S52)

MAX232

PC
RF TX

RECIEVER

POWER
SUPPLY
DECODER

MICRO
CONTROLLER

MAX232

(AT89S52)
RF RX

PC

More Related Content

What's hot

Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.sayed78
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manualprashant0001
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automationgeetha chandrathi
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io tKunal Bangar
 
Home Automation Using IoT
Home Automation Using IoTHome Automation Using IoT
Home Automation Using IoTAshutosh Kumar
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoTAthira_1993
 
Home automation
Home automationHome automation
Home automationParth Sahu
 
IOT Based Data Monitoring System
IOT Based Data Monitoring SystemIOT Based Data Monitoring System
IOT Based Data Monitoring SystemAshok Fair
 
Home automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technologyHome automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technologyratthaslip ranokphanuwat
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iotKowshik Deb
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenetAboo Thahir
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of thingsAbhishek Bhadoria
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
smart automation system
smart automation systemsmart automation system
smart automation systemAbhishek Bhadoria
 

What's hot (17)

Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manual
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 
Home Automation Using IoT
Home Automation Using IoTHome Automation Using IoT
Home Automation Using IoT
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoT
 
Home automation
Home automationHome automation
Home automation
 
IOT Based Data Monitoring System
IOT Based Data Monitoring SystemIOT Based Data Monitoring System
IOT Based Data Monitoring System
 
Home automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technologyHome automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technology
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iot
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenet
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Zigbee
ZigbeeZigbee
Zigbee
 
smart automation system
smart automation systemsmart automation system
smart automation system
 

Viewers also liked

Trademark registration attorneys in brazil
Trademark registration attorneys in brazilTrademark registration attorneys in brazil
Trademark registration attorneys in brazilparitypatent
 
Trademark registration office in bolivia
Trademark registration office in boliviaTrademark registration office in bolivia
Trademark registration office in boliviaparitypatent
 
Automatic station name display in train
Automatic station name display in trainAutomatic station name display in train
Automatic station name display in trainEcwaytechnoz
 
Trademark registration office in colombia
Trademark registration office in colombiaTrademark registration office in colombia
Trademark registration office in colombiaparitypatent
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecway2004
 
Trademark registration office in chile
Trademark registration office in chileTrademark registration office in chile
Trademark registration office in chileparitypatent
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcway2004
 
2014.01.13 faster nod for ncr projects in haryana toi
2014.01.13 faster nod for ncr projects in haryana toi2014.01.13 faster nod for ncr projects in haryana toi
2014.01.13 faster nod for ncr projects in haryana toiNational Citizens Movement
 
Expert lawyers in argentina
Expert lawyers in argentinaExpert lawyers in argentina
Expert lawyers in argentinaparitypatent
 
WASIM CV FM--A
WASIM CV FM--AWASIM CV FM--A
WASIM CV FM--AWaseem Shafi
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titlesEcwaytechnoz
 
Onwednesdayswewearpinkfinal
OnwednesdayswewearpinkfinalOnwednesdayswewearpinkfinal
Onwednesdayswewearpinkfinaltiffanymelo
 
Kraljevi generacija hrvatskog ÅĄaha - 2003. - mala, ali vaÅūna ispravka
Kraljevi generacija hrvatskog ÅĄaha -  2003. - mala, ali vaÅūna ispravkaKraljevi generacija hrvatskog ÅĄaha -  2003. - mala, ali vaÅūna ispravka
Kraljevi generacija hrvatskog ÅĄaha - 2003. - mala, ali vaÅūna ispravkaÅ k Ivan DvorÅūak
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titlesEcwaytechnoz
 
Pascual Prayerletter March 2015....
Pascual Prayerletter March 2015....Pascual Prayerletter March 2015....
Pascual Prayerletter March 2015....Jonathan Pascual
 
Media pembelajaran
Media pembelajaranMedia pembelajaran
Media pembelajaranMilza Milza
 
Millennials haiku deck
Millennials haiku deckMillennials haiku deck
Millennials haiku deck11aeh4
 

Viewers also liked (20)

Trademark registration attorneys in brazil
Trademark registration attorneys in brazilTrademark registration attorneys in brazil
Trademark registration attorneys in brazil
 
Trademark registration office in bolivia
Trademark registration office in boliviaTrademark registration office in bolivia
Trademark registration office in bolivia
 
Automatic station name display in train
Automatic station name display in trainAutomatic station name display in train
Automatic station name display in train
 
Trademark registration office in colombia
Trademark registration office in colombiaTrademark registration office in colombia
Trademark registration office in colombia
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Trademark registration office in chile
Trademark registration office in chileTrademark registration office in chile
Trademark registration office in chile
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Ruta 36
Ruta 36Ruta 36
Ruta 36
 
2014.01.13 faster nod for ncr projects in haryana toi
2014.01.13 faster nod for ncr projects in haryana toi2014.01.13 faster nod for ncr projects in haryana toi
2014.01.13 faster nod for ncr projects in haryana toi
 
Expert lawyers in argentina
Expert lawyers in argentinaExpert lawyers in argentina
Expert lawyers in argentina
 
Sino si Duterte
Sino si DuterteSino si Duterte
Sino si Duterte
 
WASIM CV FM--A
WASIM CV FM--AWASIM CV FM--A
WASIM CV FM--A
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
 
Onwednesdayswewearpinkfinal
OnwednesdayswewearpinkfinalOnwednesdayswewearpinkfinal
Onwednesdayswewearpinkfinal
 
Kraljevi generacija hrvatskog ÅĄaha - 2003. - mala, ali vaÅūna ispravka
Kraljevi generacija hrvatskog ÅĄaha -  2003. - mala, ali vaÅūna ispravkaKraljevi generacija hrvatskog ÅĄaha -  2003. - mala, ali vaÅūna ispravka
Kraljevi generacija hrvatskog ÅĄaha - 2003. - mala, ali vaÅūna ispravka
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
Pascual Prayerletter March 2015....
Pascual Prayerletter March 2015....Pascual Prayerletter March 2015....
Pascual Prayerletter March 2015....
 
Media pembelajaran
Media pembelajaranMedia pembelajaran
Media pembelajaran
 
Millennials haiku deck
Millennials haiku deckMillennials haiku deck
Millennials haiku deck
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 

Similar to Code modulation based encryption & decryption technique for secure communication in wireless

J04701080085
J04701080085J04701080085
J04701080085ijceronline
 
Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Ecway Technologies
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmissionbjp4642
 
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONLATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONASHOKKUMAR RAMAR
 
IOT introduction
IOT introductionIOT introduction
IOT introductionxinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOTInxee
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systemsManpreet Chandhok
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrinNowrinJahanSiam
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET Journal
 
Cse318,lab report
Cse318,lab reportCse318,lab report
Cse318,lab reportFarhadHimel
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFCSandeep P M
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 

Similar to Code modulation based encryption & decryption technique for secure communication in wireless (20)

J04701080085
J04701080085J04701080085
J04701080085
 
Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...
 
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONEPROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONLATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
15-105 v6
15-105 v615-105 v6
15-105 v6
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
 
Cse318,lab report
Cse318,lab reportCse318,lab report
Cse318,lab report
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFC
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
information_communication
 information_communication information_communication
information_communication
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 

More from Ecway2004

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsEcway2004
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcway2004
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcway2004
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcway2004
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcway2004
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecway2004
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecway2004
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecway2004
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titlesEcway2004
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcway2004
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecway2004
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecway2004
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcway2004
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcway2004
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcway2004
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcway2004
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcway2004
 
Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Ecway2004
 
Automobile security system using digital password
Automobile security system using digital passwordAutomobile security system using digital password
Automobile security system using digital passwordEcway2004
 
Automatic temperature based exhaust fan controller
Automatic temperature based exhaust fan controllerAutomatic temperature based exhaust fan controller
Automatic temperature based exhaust fan controllerEcway2004
 

More from Ecway2004 (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 
Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...
 
Automobile security system using digital password
Automobile security system using digital passwordAutomobile security system using digital password
Automobile security system using digital password
 
Automatic temperature based exhaust fan controller
Automatic temperature based exhaust fan controllerAutomatic temperature based exhaust fan controller
Automatic temperature based exhaust fan controller
 

Code modulation based encryption & decryption technique for secure communication in wireless

  • 1. CODE MODULATION BASED ENCRYPTION & DECRYPTION TECHNIQUE FOR SECURE COMMUNICATION IN WIRELESS ABSTRACT In Today’s Electronic communication take important role. Today’s Communication technology the chatting system from one Place to another is easy and fast. But security is of some concern, for that we send the data by the system named as Advanced chatting system using Microcontroller. In our project we have two sections, one is transmitter section and another one is Receiver section. The two sections are designed around a microcontroller as a control unit with all the devices interfaced to it. The main aim of the project is to transmit the data using wireless communication by encrypting the data. At the receiver side, the encrypted data is decrypted and is shown in the PC. According to this project the person who wants to send the data to a remote place has to type the data from the PC. The data is received by microcontroller and is sent to RF transmitter after encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is converted into plaintext.
  • 2. BLOCK DIAGRAM TRANSMITTER POWER SUPPLY Encoder MICRO CONTROLLER (AT89S52) MAX232 PC RF TX RECIEVER POWER SUPPLY DECODER MICRO CONTROLLER MAX232 (AT89S52) RF RX PC