SlideShare a Scribd company logo
1 of 2
CODE MODULATION BASED ENCRYPTION & DECRYPTION
TECHNIQUE FOR SECURE COMMUNICATION IN
WIRELESS
ABSTRACT
In Today’s Electronic communication take important role. Today’s Communication technology
the chatting system from one Place to another is easy and fast. But security is of some concern,
for that we send the data by the system named as Advanced chatting system using
Microcontroller.
In our project we have two sections, one is transmitter section and another one is Receiver
section. The two sections are designed around a microcontroller as a control unit with all the
devices interfaced to it. The main aim of the project is to transmit the data using wireless
communication by encrypting the data. At the receiver side, the encrypted data is decrypted and
is shown in the PC.
According to this project the person who wants to send the data to a remote place has to type the
data from the PC. The data is received by microcontroller and is sent to RF transmitter after
encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in
PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is
converted into plaintext.
BLOCK DIAGRAM
TRANSMITTER

POWER SUPPLY

Encoder

MICRO
CONTROLLER
(AT89S52)

MAX232

PC
RF TX

RECIEVER

POWER
SUPPLY
DECODER

MICRO
CONTROLLER

MAX232

(AT89S52)
RF RX

PC

More Related Content

What's hot

Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.sayed78
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manualprashant0001
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io tKunal Bangar
 
Home Automation Using IoT
Home Automation Using IoTHome Automation Using IoT
Home Automation Using IoTAshutosh Kumar
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoTAthira_1993
 
Home automation
Home automationHome automation
Home automationParth Sahu
 
IOT Based Data Monitoring System
IOT Based Data Monitoring SystemIOT Based Data Monitoring System
IOT Based Data Monitoring SystemAshok Fair
 
Home automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technologyHome automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technologyratthaslip ranokphanuwat
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iotKowshik Deb
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenetAboo Thahir
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of thingsAbhishek Bhadoria
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 

What's hot (17)

Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manual
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 
Home Automation Using IoT
Home Automation Using IoTHome Automation Using IoT
Home Automation Using IoT
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoT
 
Home automation
Home automationHome automation
Home automation
 
IOT Based Data Monitoring System
IOT Based Data Monitoring SystemIOT Based Data Monitoring System
IOT Based Data Monitoring System
 
Home automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technologyHome automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technology
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iot
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenet
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Zigbee
ZigbeeZigbee
Zigbee
 
smart automation system
smart automation systemsmart automation system
smart automation system
 

Similar to Code modulation based encryption & decryption technique for secure communication in wireless

Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Ecway Technologies
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmissionbjp4642
 
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONLATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONASHOKKUMAR RAMAR
 
IOT introduction
IOT introductionIOT introduction
IOT introductionxinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOTInxee
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systemsManpreet Chandhok
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET Journal
 
Cse318,lab report
Cse318,lab reportCse318,lab report
Cse318,lab reportFarhadHimel
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFCSandeep P M
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 

Similar to Code modulation based encryption & decryption technique for secure communication in wireless (20)

J04701080085
J04701080085J04701080085
J04701080085
 
Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...
 
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONEPROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONLATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
15-105 v6
15-105 v615-105 v6
15-105 v6
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
 
Cse318,lab report
Cse318,lab reportCse318,lab report
Cse318,lab report
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFC
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
information_communication
 information_communication information_communication
information_communication
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 

More from Ecwaytechnoz

Wheelztracker.pptx
Wheelztracker.pptxWheelztracker.pptx
Wheelztracker.pptxEcwaytechnoz
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwaytechnoz
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwaytechnoz
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwaytechnoz
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwaytechnoz
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwaytechnoz
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwaytechnoz
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwaytechnoz
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwaytechnoz
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwaytechnoz
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwaytechnoz
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwaytechnoz
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwaytechnoz
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwaytechnoz
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwaytechnoz
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwaytechnoz
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwaytechnoz
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwaytechnoz
 
Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Ecwaytechnoz
 

More from Ecwaytechnoz (20)

Wheelztracker.pptx
Wheelztracker.pptxWheelztracker.pptx
Wheelztracker.pptx
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 
Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...
 

Code modulation based encryption & decryption technique for secure communication in wireless

  • 1. CODE MODULATION BASED ENCRYPTION & DECRYPTION TECHNIQUE FOR SECURE COMMUNICATION IN WIRELESS ABSTRACT In Today’s Electronic communication take important role. Today’s Communication technology the chatting system from one Place to another is easy and fast. But security is of some concern, for that we send the data by the system named as Advanced chatting system using Microcontroller. In our project we have two sections, one is transmitter section and another one is Receiver section. The two sections are designed around a microcontroller as a control unit with all the devices interfaced to it. The main aim of the project is to transmit the data using wireless communication by encrypting the data. At the receiver side, the encrypted data is decrypted and is shown in the PC. According to this project the person who wants to send the data to a remote place has to type the data from the PC. The data is received by microcontroller and is sent to RF transmitter after encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is converted into plaintext.
  • 2. BLOCK DIAGRAM TRANSMITTER POWER SUPPLY Encoder MICRO CONTROLLER (AT89S52) MAX232 PC RF TX RECIEVER POWER SUPPLY DECODER MICRO CONTROLLER MAX232 (AT89S52) RF RX PC