2. Introduction
This project is a demonstration of the idea of
Safe Communication technique. This provide a
prototype for the same.
It is a console based application which
demonstrate the complete process of the
System.
3. Today modern countries like USA, UK, Russia, China etc. have made
tremendous progress in technology, for the defense and military. They
are developing weapons like Nuclear Bombs, Aircrafts etc. Our
country India is not far behind them, but it’s a bitter truth that we are
still facing many security issues in our country. And the most
convincing example is of Pulwama Attack which took place on 14th of
this February,2019. We lost our 44 soldiers in the attack. This shows
that we still need many improvements in our defense and military
services. Our country had faced many terror attacks which are not
tolerable at all. This attacks significantly show that we need
improvement in our Military Communications. The leaking of
information must need to be restricted.
Our project is based on the same. We are developing a secure and
safer Communication System which will be very useful in future
communications. This project is basically a prototype of the system, it
demonstrate how the system will work, how message will be sent, how
safer communication can be achieved, how we can avoid leaking in
sensible information and etc.
This project is aimed to be used in Indian Military, Defense, Detective
Agencies, Police. We are working on the same.
Purpose and Outcome of Project
4. About Project Implementation
The code of this project is written in C++ Programming Language. It is a
console based program. We have defined each and every part of the
communication system using Object Oriented Programming Approach. A
close idea of the implementation will be discussed.
5. System Transmitter Repeater
Receiver
with Sensor
We have build the total system by dividing it in the constituent parts. All this
components are implemented using classes in C++, and each system has its own
function, data, property and connections. All the Communicating Components are
inherited from a common class Station, and hence they share some common
behaviors, like receiving message, sending message and etc.
Station
Repeater Sensor Receiver
Transmitter
6. We have implemented a class Message which denotes a Packet of message. The
original information has been stored in encrypted form in the packet so no one can
access the information without having the decryption key. For security reasons the
key will be not shared with the Sensor until it signifies the message has not been
leaked. Key will be kept at Transmitter, and once the sensor gives green flag, then
only the key will be sent to sensor, which will decrypt the message and then
receiver will receive the message safely. If sensor found that information has been
leaked from message packet, it will just corrupt the message packet and suspend it.
It will ask transmitter to resend the message. And this process will continue till
sensor confirms that message has been safely received.
This is how the system works and ensures that no leak of data will happen.
Complete implementation details are shared further.
Message Packet
• Encrypted Message
• Safety Services
8. System class handles all the background process of communication.
• It provides user interface for the program. It accept input message from
user.
• It also have responsibility to initiate system, check for exceptions.
• Close system securely.
• Accept user message.
• Check for available transmitters and send message to transmitter for
further processing.
10. Message class represent a Message Packet which will be actually transmitted from
one component to another component of system. The text message will be only
available at Transmitter and Receiver, and in all other process, the message will be
sent packed in the message packet. This packet act as a shielding for the message.
• Give the current encryption status of Message.
• Give the current corrupting status of Message.
• Ensure avoiding leak of message.
• Signify message as corrupted if information leaked however.
12. Transmitter receives the message from System and handles all the
further processing.
• Receive plane message from System.
• Generate a random key and encrypt message and pack message in
packet.
• Store key to itself.
• Check for available Repeaters and send Message Packet.
• Monitor all the further process and wait for reply from sensor.
• Decide to send or not to send the decryption key to sensor.
• Resend the same message upon request from sensor.
14. Repeater act an intermediate process for Communication. It amplifies the
message and also check for vulnerabilities in message, if found then signify the
same in message packet.
• Receive message packet from transmitter.
• Check for the virus and other vulnerabilities.
• Mark message as corrupted if found something incorrect.
• Send Message packet to sensor for scanning.
16. Sensor stage precedes the Receiver. It ensures that message is safe
and then only sends it to receiver finally.
• Receive message from Repeater.
• Check if message is corrupted.
• If message found corrupted, request it again from transmitter
with completely as a new packet.
• If message is safe, then request and accept key from Transmitter
and decrypt message.
• Send decrypted message to Receiver.
17. Receiver
It receives the safe message from Sensor and finally handle it to the Recipient. It
also shows the original size of message, from which we can judge if message has
been safely received or not.
18. Advantages
• This communication System can be used for Military, Police,
Detective departments which needs transmitting sensible
information from places to places.
• Many terror attacks can be avoided.
• Ensures the safety of communication.
• Private data security.