3. INTRODUCTION
WHAT IS DATA?
WHAT IS DATA TRANSMISSION?
01
02
03
04
Email, Name of Students, etc.
Example of DATA
Facts And Statistics Collected Together For
Reference Or Analysis.
Definition of DATA
Data transmission refers to the process of transferring
data between two or more digital devices.
Definition of DATA TRANSMISSION
Copper wires, Optical fibers, etc.
Example of DATA TRANSMISSION
4. Risks in Data Transmission
PASSWORD RELATED THREATS
#3
DATA TAMPERING
#1
UNAUTHORISED ACCESS
#4
EAVESDROPPING
#2
LACK OF ACCOUNTABILITY
#5
6. Encryptions & Protocols
Many vendors today offer
a range of products that
can encrypt emails and
ensure secure transfer of
data.
EMAIL ENCRYPTION
This method of securing
data is for businesses that
collect sensitive customer
data from their website.
WEBSITE
ENCRYPTION
FTP is a standard network
protocol that copies a file
online from one host to
another.
FILE TRANSFER
PROTOCOL
HTTP is used typically to
transmit hypertext files
between a web server and
a browser.
HTTP
#2
#3
#4
#1
7. Other Ways for Secure Transmission
SFTP or Secure FTP is one of the safest ways to transfer data online.
Secure File Transfer Protocol (SFTP)
Clients are individually connected to a distributed peer network and carry
out the data transfer over their personal network connections.
Peer to Peer (P2P) Communication
OTR helps you encrypt messages before their transmission from your computer to any
receiving computer.
Off the Record Messaging
Just like Infrared and Bluetooth, Near Field Communication or NFC allows
safe file transmission for free.
Near Field Communication
8. CLOUD SERVICES
Content Title
Here
Cloud Services
Security
#2
#1
Centralized
Security
Reduced
Costs
Reduced
Administration
Reliability
A user can upload the file to a central
repository from where other users can read
or save the file to their device.
A cloud service is also a good method to
securely store or share your files.
9.
10. INTRODUCTION TO RF
#2
Higher frequencies result in shorter wavelengths. The
wavelength for a 900 MHz is longer than that of a
2.4 GHz.
RADIO
FREQUENCY
The wavelength of an electromagnetic signal is
inversely proportional to the frequency; the higher the
frequency, the shorter the wavelength.
#3
RF communication works by creating electromagnetic
waves at a source and being able to pick up those
electromagnetic waves at a particular destination.
#1
11. How RF Works?
RADIO
FREQUENCY
MICROCONTROLLER – PIC16F877A
MAX232N
RS232 CABLES
#2
HARDWARE COMPONENTS
REQUIRED
ANTENNAS
POWER SUPPLY
PC
#3
RF TRANSMITTER
RF RECEIVER
#1
• When electron moves
too and fro, it causes a
ripple effect.
• The effect is an
electromagnetic (EM)
wave that
travels out from the initial
location resulting in
electrons wiggling in
remote locations.
• An RF receiver can
detect this remote
electron
wiggling.
WORKING
PRINCIPLE
14. LIMITATIONS OF RF
#1
Since it is a wireless communication
sometimes the atmosphere may
disturb the Signals this results data loss
.
#3
We have to use separate radio band,
which may be expensive
#2
Interference: communication devices using
similar frequencies - wireless Phones, scanners,
wrist radios and personal locators can interfere with Transmission.
15.
16. Clustering is the task of
dividing the population
or data points into a
number of groups such
that data points in the
same groups are more
similar to other data
points in the same group
and dissimilar to the data
points in other groups.
WHAT IS
CLUSTERING?
17. INTRODUCTION AND CONCEPT
#1
Vehicular ad hoc network (VANET) is the
foundation for the intelligent transportation
systems (ITSs)
#2
It aims at achieving seamless Internet connectivity
between vehicles on the road
#3
With the developments of intelligent vehicle and
new generation wireless communication
techniques, vehicles equipped with wireless
interfaces are able to provide ITS services
#4
Therefore, the creation of a stable
network and communication
management is the most challenging
task
18. PROPOSAL
#3
Introduce a cluster-based routing protocol to
provide the efficient and reliable data
transmission in vehicular networks.
#4
To transmit data packets through stable paths, we
introduce bridge nodes at intersections to make
routing decisions.
#1
A new link reliability-based clustering algorithm
(LRCA) to provide efficient and reliable data
transmission in urban VANET.
#2
In LRCA, vehicles are grouped with stable
neighbor vehicles which are selected by the LLT-
based neighbor sampling scheme.
#5
The bridge node evaluates the network condition
over road segments and assigns weights to them.
Then the road segment with minimum weight is
selected to construct the overall routing path.
19. It is realized that it’s very
important to get online
protection these days. As
security breaches and
information hacking cases are
increasing every day, it’s
important to apply some or all
of these secure methods when
transferring data from one
place to another and ensure
your online safety.
Also we learnt about different
methods of lowering the risks
during data transmission for
efficient and secure data
transfer.
S E C U R E D A T A
T R A N S M I S S I O N
CONCLUSION
20. BIBLIOGRAPHY
FOR COMPLETING THIS PRESENTATION, I
TOOK HELP FROM SEVERAL WEBSITES. I
WOULD LIKE TO MENTION THEM BELOW -
https://www.pentasecurity.com/blog/
top-secure-data-transmission-
methods/
https://www.slideshare.net/bjp4642/
secure-transmission
https://ieeexplore.ieee.org/abstract/
document/6677258
https://www.hindawi.com/journals/m
isy/2018/9826782/
https://www.geeksforgeeks.org/clus
tering-in-machine-
learning/#:~:text=Clustering%20is%
20the%20task%20of,data%20point
s%20in%20other%20groups.