FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWireless Encryption and Decryption Message transfer system for Military Applications

  • 14,337 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • PLEASE give me new projects list based on embeded.......
    Are you sure you want to
    Your message goes here
    Be the first to like this
No Downloads

Views

Total Views
14,337
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
388
Comments
1
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. RF Based Wireless Encryption and Decryption Message transfer system for Military ApplicationsABSTRACT:In simple terms, data security is the practice of keeping data protected from corruptionand unauthorized access. The focus behind data security is to ensure privacy whileprotecting personal or corporate data.Data is the raw form of information stored as columns and rows in our databases,network servers and personal computers. This may be a wide range of information frompersonal files and intellectual property to market analytics and details intended to topsecret. Data could be anything of interest that can be read or otherwise interpreted inhuman form.Data security is critical for military applications. All of the information can be hard toreplace and potentially dangerous if it falls into the wrong handsThe need for this project arises when we want the data communication to be protectedfrom others. This is highly essential in the military field and especially during war times.Because during war periods when a particular army wants to send a message to remotelylocated units, which belong to the same army, in between any person can trap the datawhen it is transmitted through wireless. 89 RANGARAJAPURAM MAIN ROAD,KODAMBAKKAM,CHENNAI-24 PL VISIT www.maastechindia.com,mobile:098402 34766
  • 2. Existing System CDMA is a military technology first used during World War II by English alliesto foil German attempts at jamming transmissions. The allies decided to transmit overseveral frequencies, instead of one, making it difficult for the Germans to pick up thecomplete signal. Because Qualcomm created communications chips for CDMAtechnology, it was privy to the classified information. Once the information becamepublic, Qualcomm claimed patents on the technology and became the first tocommercialize it. 89 RANGARAJAPURAM MAIN ROAD,KODAMBAKKAM,CHENNAI-24 PL VISIT www.maastechindia.com,mobile:098402 34766
  • 3. Proposed System CDMA Short for Code-Division Multiple Access, a digital cellular technologythat uses spread-spectrum techniques. Unlike competing systems, such as GSM, that useTDMA, CDMA does not assign a specific frequency to each user. Instead, every channeluses the full available spectrum. Individual conversations are encoded with a pseudo-random digital sequence. CDMA consistently provides better capacity for voice and datacommunications. The design is based on frequency hopping spread spectrum technologyas funded and developed by the Defense Advanced Research Products Agency (DARPA)for the United States Military to ensure secure and reliable communications under themost severe wartime battlefield conditions. Our aim of the project is to protect the data from the ensnares. To accomplishthis, we have used a PC as a sender and PIC microcontroller as a receiver station. Themessage to be sent is fed in to the computer for different units. The computer will encodethe data using generating a duplicate Character for a real one. At the receiving end the PIC microcontroller will then decode the Received data anddisplays the message on the display. The communication takes place through a WirelessRF Transmitter and Receiver operating at 433.92 MHzwe can also use CRO at the transmitting point to view the encoded data.To ensure the security level at the receiving end we have a password protection. Oncethe Message is received the unit will give an alarm message so that one can know that themessage has arrived. The he must enter the password through the keypad. If thepassword matches then he is allowed to view the data. 89 RANGARAJAPURAM MAIN ROAD,KODAMBAKKAM,CHENNAI-24 PL VISIT www.maastechindia.com,mobile:098402 34766
  • 4. Block Diagram Message Encoder RF Tx Module RF Rx Module Power Supply PIC Microcontroller +5VDC PIC 16F877A (Message Decoder) Move towards 45 Deg E Visual Alarm Alert Driver LED 4 X 3 Matrix Key Pad. Alarm89 RANGARAJAPURAM MAIN ROAD,KODAMBAKKAM,CHENNAI-24 PL VISIT www.maastechindia.com,mobile:098402 34766
  • 5. Hardware Requirements 1. PIC 16F877A Microcontroller 2. LCD display 2 X 16 Character 3. RF Transmitter Module 4. RF Receiver Module 5. Matrix Keypad 6. LED 7. Alarm 8. Personal Computer 9. Resistors 10. Capacitors 11. Transistors 12. PIC Programmer KitSoftware Requirements 1. MPLAB IDE V6.0 2. HITECH C COMPILER 3. MICROPRO – PIC Programmer Software 89 RANGARAJAPURAM MAIN ROAD,KODAMBAKKAM,CHENNAI-24 PL VISIT www.maastechindia.com,mobile:098402 34766
  • 6. Advantages 1. Limiting physical access to the radio equipment 2. Using Point-to-Point operating mode 3. Periodically changing network configuration 4. Further data encryption before presenting it to the wireless network. 5. Data Separation 6. Encryption Is On The Data 7. Encryption Equals Confidentiality 8. Password Protected 9. RF Data PacketsDisadvantages and Drawbacks 1. No separate Algorithm 2. Discovering exactly the RF hopping pattern and its adaptive criteria in order to gain access to sequential RF packets. Build an RF receiver to which the learned RF hopping lessons could be applied. 3. Analyzing the modulation type employed and build the appropriate demodulator and logic translator so received RF packets could be collected on a computer. 4. Using the collected data, ascertain its structure, encryption method, and compression algorithm. Build tools to strip out the data, decrypt it and uncompress it. 89 RANGARAJAPURAM MAIN ROAD,KODAMBAKKAM,CHENNAI-24 PL VISIT www.maastechindia.com,mobile:098402 34766
  • 7. Applications 1. Military applications 2. Banking applications 3. Private sectors 4. Satellite communications 89 RANGARAJAPURAM MAIN ROAD,KODAMBAKKAM,CHENNAI-24 PL VISIT www.maastechindia.com,mobile:098402 34766