SlideShare a Scribd company logo
1 of 22
SECURED DATA
TRANSMISSION
THROUGH NETWORK
PRESENTED BY – ROHAN HALDER
INTRODUCTION
01
RADIO FREQUENCY
02
VANET
03
CONCLUSION
04
TODAY’S AGENDA
INTRODUCTION
 WHAT IS DATA?
 WHAT IS DATA TRANSMISSION?
01
02
03
04
Email, Name of Students, etc.
Example of DATA
Facts And Statistics Collected Together For
Reference Or Analysis.
Definition of DATA
Data transmission refers to the process of transferring
data between two or more digital devices.
Definition of DATA TRANSMISSION
Copper wires, Optical fibers, etc.
Example of DATA TRANSMISSION
Risks in Data Transmission
PASSWORD RELATED THREATS
#3
DATA TAMPERING
#1
UNAUTHORISED ACCESS
#4
EAVESDROPPING
#2
LACK OF ACCOUNTABILITY
#5
WHAT IS THE
SOLUTION?
Encryptions & Protocols
Many vendors today offer
a range of products that
can encrypt emails and
ensure secure transfer of
data.
EMAIL ENCRYPTION
This method of securing
data is for businesses that
collect sensitive customer
data from their website.
WEBSITE
ENCRYPTION
FTP is a standard network
protocol that copies a file
online from one host to
another.
FILE TRANSFER
PROTOCOL
HTTP is used typically to
transmit hypertext files
between a web server and
a browser.
HTTP
#2
#3
#4
#1
Other Ways for Secure Transmission
SFTP or Secure FTP is one of the safest ways to transfer data online.
Secure File Transfer Protocol (SFTP)
Clients are individually connected to a distributed peer network and carry
out the data transfer over their personal network connections.
Peer to Peer (P2P) Communication
OTR helps you encrypt messages before their transmission from your computer to any
receiving computer.
Off the Record Messaging
Just like Infrared and Bluetooth, Near Field Communication or NFC allows
safe file transmission for free.
Near Field Communication
CLOUD SERVICES
Content Title
Here
Cloud Services
Security
#2
#1
Centralized
Security
Reduced
Costs
Reduced
Administration
Reliability
A user can upload the file to a central
repository from where other users can read
or save the file to their device.
A cloud service is also a good method to
securely store or share your files.
INTRODUCTION TO RF
#2
Higher frequencies result in shorter wavelengths. The
wavelength for a 900 MHz is longer than that of a
2.4 GHz.
RADIO
FREQUENCY
The wavelength of an electromagnetic signal is
inversely proportional to the frequency; the higher the
frequency, the shorter the wavelength.
#3
RF communication works by creating electromagnetic
waves at a source and being able to pick up those
electromagnetic waves at a particular destination.
#1
How RF Works?
RADIO
FREQUENCY
MICROCONTROLLER – PIC16F877A
MAX232N
RS232 CABLES
#2
HARDWARE COMPONENTS
REQUIRED
ANTENNAS
POWER SUPPLY
PC
#3
RF TRANSMITTER
RF RECEIVER
#1
• When electron moves
too and fro, it causes a
ripple effect.
• The effect is an
electromagnetic (EM)
wave that
travels out from the initial
location resulting in
electrons wiggling in
remote locations.
• An RF receiver can
detect this remote
electron
wiggling.
WORKING
PRINCIPLE
ALGORITHMS FOR TRANSMISSION
ALGORITHM FOR TRANSMITTER ALGORITHM FOR RECEIVER
101001101001000010101
0011110111011011011010
101000011100101011001
010100111010100010101
0001011010110110110100
010101110001010100010
1000101110101100010011
010011010010000101010
0111101110110110110101
010000111001010110010
101001110101000101010
0010110101101101101001
PPLICATIONS
OF RF TECHNOLOGY
A
 MILITARY APPLICATION
 GOVERNMENT’S SECURE
DATA
 STORAGE DEVICES (USB)
 WIRELESS DEVICES
 ATMS
DATA
TRANSMISSION
LIMITATIONS OF RF
#1
Since it is a wireless communication
sometimes the atmosphere may
disturb the Signals this results data loss
.
#3
We have to use separate radio band,
which may be expensive
#2
Interference: communication devices using
similar frequencies - wireless Phones, scanners,
wrist radios and personal locators can interfere with Transmission.
Clustering is the task of
dividing the population
or data points into a
number of groups such
that data points in the
same groups are more
similar to other data
points in the same group
and dissimilar to the data
points in other groups.
WHAT IS
CLUSTERING?
INTRODUCTION AND CONCEPT
#1
Vehicular ad hoc network (VANET) is the
foundation for the intelligent transportation
systems (ITSs)
#2
It aims at achieving seamless Internet connectivity
between vehicles on the road
#3
With the developments of intelligent vehicle and
new generation wireless communication
techniques, vehicles equipped with wireless
interfaces are able to provide ITS services
#4
Therefore, the creation of a stable
network and communication
management is the most challenging
task
PROPOSAL
#3
Introduce a cluster-based routing protocol to
provide the efficient and reliable data
transmission in vehicular networks.
#4
To transmit data packets through stable paths, we
introduce bridge nodes at intersections to make
routing decisions.
#1
A new link reliability-based clustering algorithm
(LRCA) to provide efficient and reliable data
transmission in urban VANET.
#2
In LRCA, vehicles are grouped with stable
neighbor vehicles which are selected by the LLT-
based neighbor sampling scheme.
#5
The bridge node evaluates the network condition
over road segments and assigns weights to them.
Then the road segment with minimum weight is
selected to construct the overall routing path.
It is realized that it’s very
important to get online
protection these days. As
security breaches and
information hacking cases are
increasing every day, it’s
important to apply some or all
of these secure methods when
transferring data from one
place to another and ensure
your online safety.
Also we learnt about different
methods of lowering the risks
during data transmission for
efficient and secure data
transfer.
S E C U R E D A T A
T R A N S M I S S I O N
CONCLUSION
BIBLIOGRAPHY
FOR COMPLETING THIS PRESENTATION, I
TOOK HELP FROM SEVERAL WEBSITES. I
WOULD LIKE TO MENTION THEM BELOW -
https://www.pentasecurity.com/blog/
top-secure-data-transmission-
methods/
https://www.slideshare.net/bjp4642/
secure-transmission
https://ieeexplore.ieee.org/abstract/
document/6677258
https://www.hindawi.com/journals/m
isy/2018/9826782/
https://www.geeksforgeeks.org/clus
tering-in-machine-
learning/#:~:text=Clustering%20is%
20the%20task%20of,data%20point
s%20in%20other%20groups.
INTRODUCING MYSELF
ROHAN HALDER
rohanhalder13@gmail.com
https://www.linkedin.com/in/rohan-halder-53aa74184
STREAM– CSE
YEAR– 3RD
SECTION– A
ROLL– 47
ENROLMENT – 12018009019476
EXAMCODE– E1571
THANK YOU
ANY QUESTION?

More Related Content

What's hot

Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
dpd
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
Rashmi Joaa
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
pariluv
 

What's hot (20)

Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
 
Three types of wireless technology
Three types of wireless technologyThree types of wireless technology
Three types of wireless technology
 
6th lec infrared slides
6th lec   infrared slides6th lec   infrared slides
6th lec infrared slides
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless
WirelessWireless
Wireless
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 

Similar to Secured Data Transmission

4g security presentation
4g security presentation4g security presentation
4g security presentation
Kyle Ly
 
Iaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd Iaetsd
 
Individual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docxIndividual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docx
dirkrplav
 
461207532-Optical-Ethernet-ppt-pptx (1).pptx
461207532-Optical-Ethernet-ppt-pptx (1).pptx461207532-Optical-Ethernet-ppt-pptx (1).pptx
461207532-Optical-Ethernet-ppt-pptx (1).pptx
shindepoornima94
 
Proptotype radio network
Proptotype radio networkProptotype radio network
Proptotype radio network
fdr1975
 

Similar to Secured Data Transmission (20)

Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
Communication Network
Communication NetworkCommunication Network
Communication Network
 
my project publication
my project publicationmy project publication
my project publication
 
Document
DocumentDocument
Document
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Iaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance on
 
Individual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docxIndividual CommentsYour answers missed there below topics, sp.docx
Individual CommentsYour answers missed there below topics, sp.docx
 
461207532-Optical-Ethernet-ppt-pptx (1).pptx
461207532-Optical-Ethernet-ppt-pptx (1).pptx461207532-Optical-Ethernet-ppt-pptx (1).pptx
461207532-Optical-Ethernet-ppt-pptx (1).pptx
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it works
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
Osi
OsiOsi
Osi
 
BACKBONE NETWORKS
BACKBONE NETWORKSBACKBONE NETWORKS
BACKBONE NETWORKS
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Proptotype radio network
Proptotype radio networkProptotype radio network
Proptotype radio network
 
Computer network notes
Computer network notesComputer network notes
Computer network notes
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Building a metro ethernet network to deliver high bandwidth internet protocol...
Building a metro ethernet network to deliver high bandwidth internet protocol...Building a metro ethernet network to deliver high bandwidth internet protocol...
Building a metro ethernet network to deliver high bandwidth internet protocol...
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

Secured Data Transmission

  • 3. INTRODUCTION  WHAT IS DATA?  WHAT IS DATA TRANSMISSION? 01 02 03 04 Email, Name of Students, etc. Example of DATA Facts And Statistics Collected Together For Reference Or Analysis. Definition of DATA Data transmission refers to the process of transferring data between two or more digital devices. Definition of DATA TRANSMISSION Copper wires, Optical fibers, etc. Example of DATA TRANSMISSION
  • 4. Risks in Data Transmission PASSWORD RELATED THREATS #3 DATA TAMPERING #1 UNAUTHORISED ACCESS #4 EAVESDROPPING #2 LACK OF ACCOUNTABILITY #5
  • 6. Encryptions & Protocols Many vendors today offer a range of products that can encrypt emails and ensure secure transfer of data. EMAIL ENCRYPTION This method of securing data is for businesses that collect sensitive customer data from their website. WEBSITE ENCRYPTION FTP is a standard network protocol that copies a file online from one host to another. FILE TRANSFER PROTOCOL HTTP is used typically to transmit hypertext files between a web server and a browser. HTTP #2 #3 #4 #1
  • 7. Other Ways for Secure Transmission SFTP or Secure FTP is one of the safest ways to transfer data online. Secure File Transfer Protocol (SFTP) Clients are individually connected to a distributed peer network and carry out the data transfer over their personal network connections. Peer to Peer (P2P) Communication OTR helps you encrypt messages before their transmission from your computer to any receiving computer. Off the Record Messaging Just like Infrared and Bluetooth, Near Field Communication or NFC allows safe file transmission for free. Near Field Communication
  • 8. CLOUD SERVICES Content Title Here Cloud Services Security #2 #1 Centralized Security Reduced Costs Reduced Administration Reliability A user can upload the file to a central repository from where other users can read or save the file to their device. A cloud service is also a good method to securely store or share your files.
  • 9.
  • 10. INTRODUCTION TO RF #2 Higher frequencies result in shorter wavelengths. The wavelength for a 900 MHz is longer than that of a 2.4 GHz. RADIO FREQUENCY The wavelength of an electromagnetic signal is inversely proportional to the frequency; the higher the frequency, the shorter the wavelength. #3 RF communication works by creating electromagnetic waves at a source and being able to pick up those electromagnetic waves at a particular destination. #1
  • 11. How RF Works? RADIO FREQUENCY MICROCONTROLLER – PIC16F877A MAX232N RS232 CABLES #2 HARDWARE COMPONENTS REQUIRED ANTENNAS POWER SUPPLY PC #3 RF TRANSMITTER RF RECEIVER #1 • When electron moves too and fro, it causes a ripple effect. • The effect is an electromagnetic (EM) wave that travels out from the initial location resulting in electrons wiggling in remote locations. • An RF receiver can detect this remote electron wiggling. WORKING PRINCIPLE
  • 12. ALGORITHMS FOR TRANSMISSION ALGORITHM FOR TRANSMITTER ALGORITHM FOR RECEIVER
  • 14. LIMITATIONS OF RF #1 Since it is a wireless communication sometimes the atmosphere may disturb the Signals this results data loss . #3 We have to use separate radio band, which may be expensive #2 Interference: communication devices using similar frequencies - wireless Phones, scanners, wrist radios and personal locators can interfere with Transmission.
  • 15.
  • 16. Clustering is the task of dividing the population or data points into a number of groups such that data points in the same groups are more similar to other data points in the same group and dissimilar to the data points in other groups. WHAT IS CLUSTERING?
  • 17. INTRODUCTION AND CONCEPT #1 Vehicular ad hoc network (VANET) is the foundation for the intelligent transportation systems (ITSs) #2 It aims at achieving seamless Internet connectivity between vehicles on the road #3 With the developments of intelligent vehicle and new generation wireless communication techniques, vehicles equipped with wireless interfaces are able to provide ITS services #4 Therefore, the creation of a stable network and communication management is the most challenging task
  • 18. PROPOSAL #3 Introduce a cluster-based routing protocol to provide the efficient and reliable data transmission in vehicular networks. #4 To transmit data packets through stable paths, we introduce bridge nodes at intersections to make routing decisions. #1 A new link reliability-based clustering algorithm (LRCA) to provide efficient and reliable data transmission in urban VANET. #2 In LRCA, vehicles are grouped with stable neighbor vehicles which are selected by the LLT- based neighbor sampling scheme. #5 The bridge node evaluates the network condition over road segments and assigns weights to them. Then the road segment with minimum weight is selected to construct the overall routing path.
  • 19. It is realized that it’s very important to get online protection these days. As security breaches and information hacking cases are increasing every day, it’s important to apply some or all of these secure methods when transferring data from one place to another and ensure your online safety. Also we learnt about different methods of lowering the risks during data transmission for efficient and secure data transfer. S E C U R E D A T A T R A N S M I S S I O N CONCLUSION
  • 20. BIBLIOGRAPHY FOR COMPLETING THIS PRESENTATION, I TOOK HELP FROM SEVERAL WEBSITES. I WOULD LIKE TO MENTION THEM BELOW - https://www.pentasecurity.com/blog/ top-secure-data-transmission- methods/ https://www.slideshare.net/bjp4642/ secure-transmission https://ieeexplore.ieee.org/abstract/ document/6677258 https://www.hindawi.com/journals/m isy/2018/9826782/ https://www.geeksforgeeks.org/clus tering-in-machine- learning/#:~:text=Clustering%20is% 20the%20task%20of,data%20point s%20in%20other%20groups.
  • 21. INTRODUCING MYSELF ROHAN HALDER rohanhalder13@gmail.com https://www.linkedin.com/in/rohan-halder-53aa74184 STREAM– CSE YEAR– 3RD SECTION– A ROLL– 47 ENROLMENT – 12018009019476 EXAMCODE– E1571