Submit Search
Upload
IRJET- Mobile Communication Security using Encryption and Decryption
•
0 likes
•
29 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i3/IRJET-V6I3110.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Bluetooth
Bluetooth
aimenriyadh
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
Saravana Kumar
Bluetooth presentation
Bluetooth presentation
Amit Dovtya
What is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical Version
Veacon
IRJET- Electronic Notice Board Remotely Operated using Android Phone
IRJET- Electronic Notice Board Remotely Operated using Android Phone
IRJET Journal
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
IRJET-V Wi-Fi E Switch using Internet of Things
IRJET-V Wi-Fi E Switch using Internet of Things
IRJET Journal
A Review on Wireless Technologies
A Review on Wireless Technologies
IRJET Journal
Recommended
Bluetooth
Bluetooth
aimenriyadh
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
Saravana Kumar
Bluetooth presentation
Bluetooth presentation
Amit Dovtya
What is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical Version
Veacon
IRJET- Electronic Notice Board Remotely Operated using Android Phone
IRJET- Electronic Notice Board Remotely Operated using Android Phone
IRJET Journal
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
IRJET-V Wi-Fi E Switch using Internet of Things
IRJET-V Wi-Fi E Switch using Internet of Things
IRJET Journal
A Review on Wireless Technologies
A Review on Wireless Technologies
IRJET Journal
Comparison of 5 Wireless Communication Technologies
Comparison of 5 Wireless Communication Technologies
Antenna Manufacturer Coco
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET Journal
Narrowband internet of things technology
Narrowband internet of things technology
Antenna Manufacturer Coco
Apresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no Brasil
TI Safe
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
Mehraj U Din
Bluetooth PPT Report
Bluetooth PPT Report
Bilal Maqbool ツ
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET Journal
The characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fi
zaidinvisible
6 NB-IoT Applications
6 NB-IoT Applications
Antenna Manufacturer Coco
Wi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
Arun ACE
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
IOSR Journals
Bluetooth Presentation
Bluetooth Presentation
wayn
Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
IJCERT
4g security presentation
4g security presentation
Kyle Ly
Bluetooth Slides
Bluetooth Slides
Aniruddha Gupta
Characteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocols
Antenna Manufacturer Coco
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
Siva Pradeep Bolisetti
Bluetooth
Bluetooth
Rajan Kumar
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET Journal
Bluetooth technology
Bluetooth technology
Karun Kumar
IRJET- Mobile Detector
IRJET- Mobile Detector
IRJET Journal
IRJET- Signal Jammer in Military Operations
IRJET- Signal Jammer in Military Operations
IRJET Journal
More Related Content
What's hot
Comparison of 5 Wireless Communication Technologies
Comparison of 5 Wireless Communication Technologies
Antenna Manufacturer Coco
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET Journal
Narrowband internet of things technology
Narrowband internet of things technology
Antenna Manufacturer Coco
Apresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no Brasil
TI Safe
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
Mehraj U Din
Bluetooth PPT Report
Bluetooth PPT Report
Bilal Maqbool ツ
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET Journal
The characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fi
zaidinvisible
6 NB-IoT Applications
6 NB-IoT Applications
Antenna Manufacturer Coco
Wi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
Arun ACE
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
IOSR Journals
Bluetooth Presentation
Bluetooth Presentation
wayn
Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
IJCERT
4g security presentation
4g security presentation
Kyle Ly
Bluetooth Slides
Bluetooth Slides
Aniruddha Gupta
Characteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocols
Antenna Manufacturer Coco
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
Siva Pradeep Bolisetti
Bluetooth
Bluetooth
Rajan Kumar
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET Journal
Bluetooth technology
Bluetooth technology
Karun Kumar
What's hot
(20)
Comparison of 5 Wireless Communication Technologies
Comparison of 5 Wireless Communication Technologies
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic System
Narrowband internet of things technology
Narrowband internet of things technology
Apresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no Brasil
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
Bluetooth PPT Report
Bluetooth PPT Report
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
The characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fi
6 NB-IoT Applications
6 NB-IoT Applications
Wi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
Bluetooth Presentation
Bluetooth Presentation
Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
4g security presentation
4g security presentation
Bluetooth Slides
Bluetooth Slides
Characteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocols
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
Bluetooth
Bluetooth
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
Bluetooth technology
Bluetooth technology
Similar to IRJET- Mobile Communication Security using Encryption and Decryption
IRJET- Mobile Detector
IRJET- Mobile Detector
IRJET Journal
IRJET- Signal Jammer in Military Operations
IRJET- Signal Jammer in Military Operations
IRJET Journal
IRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPS
IRJET Journal
Study on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOT
IRJET Journal
B010331019
B010331019
IOSR Journals
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET Journal
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET Journal
A novel password based authentication technique for 4 g mobile communications
A novel password based authentication technique for 4 g mobile communications
eSAT Journals
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
eSAT Publishing House
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
Dustin Pytko
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
IRJET Journal
Comprehensive survey of possible
Comprehensive survey of possible
IJNSA Journal
Securing voip communications in an open network
Securing voip communications in an open network
eSAT Publishing House
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET Journal
7215nsa05
7215nsa05
Shivanand Manjaragi
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
IJNSA Journal
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
Dr. Edwin Hernandez
Security management systemofcellular_communication
Security management systemofcellular_communication
ardhita banu adji
The Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMaster
WoMaster
Similar to IRJET- Mobile Communication Security using Encryption and Decryption
(20)
IRJET- Mobile Detector
IRJET- Mobile Detector
IRJET- Signal Jammer in Military Operations
IRJET- Signal Jammer in Military Operations
IRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPS
Study on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOT
B010331019
B010331019
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
A novel password based authentication technique for 4 g mobile communications
A novel password based authentication technique for 4 g mobile communications
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
Comprehensive survey of possible
Comprehensive survey of possible
Securing voip communications in an open network
Securing voip communications in an open network
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
7215nsa05
7215nsa05
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
Security management systemofcellular_communication
Security management systemofcellular_communication
The Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMaster
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
tanu pandey
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
University management System project report..pdf
University management System project report..pdf
Kamal Acharya
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
RishantSharmaFr
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
NANDHAKUMARA10
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
Recently uploaded
(20)
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
University management System project report..pdf
University management System project report..pdf
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
IRJET- Mobile Communication Security using Encryption and Decryption
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 583 Mobile Communication Security using Encryption and Decryption Uzmasaman Aejaz Chanderki Trainee Engineer, Prasar Bharti, All India Radio, Mumbai. ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract - We live in a world where there are many secret agencies, one of them are secret organization which taps our telephonic calls. Over a million mobile phones of different service provider are under the surveillance of a central organization in India. Our private and important conversation over phones is recorded. This privacy can be secured by a security system. The proposed system is a security solution which will retain and if necessary the conversation can be made accessible to the Government using Authentication protocol and Cryptography. Keywords- Mobile Communication, Base Station, RF signal, Transmitter, Receiver, Antenna, Cryptography, Encryption, decryption, AES, CHAP, Authentication protocols. 1. INTRODUCTION Privacy of our data is a major concern nowadays. But private conversations are no private anymore. Over more than 6000 mobile phones are tapped in New Delhi. The information obtained through this can be misused against anyone. We never know what are the intention of the hackers are. According to a law under the general provision of section 5 of the India Telegraph Act. Due to this provision it mobile tampering is held at large extends. Fig: 1.1 Ordinary Mobile Communications. An ordinary mobile communication working starts with Mobile A calling Mobile B. the both can be anywhere in this world. When A starts calling it scans for the best cell. The base station further informs MTSO. MTSO verifies the SIM card number, balance available, checks available channel. If channel capacity is full then call drops or the call is initiated. MTSO also checks the same factors of B as it checked for A. If everything is clear it troughs the voice channel between these two mobiles and rings the Mobile B. Here the voice transmitted is not encrypted and secured. It can be tampered, misused or manipulated by the hacker. Fig: 1.2 Required Mobile Communications. The required system should be designed in such a way that the original voice data should only be with the people who are communicating. Rest of the data transmission should in encrypted form so that even if a hacker breaks in he won’t be able to understand or decode the data. Such strong encryption is done by Advance Encryption Standard. Even though the data is encrypted the voice data will still can be accessed by Government only through strong authentication protocol known as CHAP.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 584 2. EXISTING MOBILE COMMUNICATION PROCESS This block diagram is a general transmitter. The speech signal is given to microphone. The audio signal which is the output of microphone is given to the Preamplifier which boosts the level of the modulating signal. The local oscillator generates carrier signal which is modulated with the modulating signal in a Modulator. The power amplifier increases the power of signal makes it powerful enough to be transmitted. Fig 2.1 General block diagram of a transmitter. The RF signal is then given to the antenna. This system has no security. The data flow is as it is easy for hackers to break in. Fig: 2.2 General block diagram of a receiver RF signal received will be amplified in an RF amplifier. Mixer is a nonlinear circuit which will mix the amplified RF signal and local frequency to produce intermediate frequencies. The signal is then limited and demodulated send to the speaker after power boosting. Hence in the entire process we didn’t see any cryptography and the data is out there without any security. 3. PROPOSED SYSTEM. The working of the new transmitter and receiver will be same but 2 new blocks will be added to increase the security. Fig: 2.3 Secured transmitter using Encryption Voice recorder block is kept for legal purposes. Only Government official will have the correct authentication to access the voice recorder as and when it is needed. So that the data’s originality is preserved even though it is encrypted. Authentication protocol which will be used is CHAP. Challenge Handshake Authentication Protocol is a more secure procedure for connecting to a system. The output of the voice recorder will be given to encryption which will use AES.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 585 Fig: 2.4 AES Design 256-bit encryption is a data or file encryption technique that makes use of a 256-bit key to encrypt and decrypt data or files. It is one of the most secure and strongest encryption methods after 128- and 192-bit encryption, and is used in most modern encryption algorithms, protocols and technologies including AES and SSL. It can encrypt folder, file, mp3, audio even a single sentence. After encryption the operation will be same as previous process. An encrypted RF waves will be sent on air which will be protected from hackers. Fig: 2.4 Secured Receivers. In receiver when encrypted signal is process in reversed way of transmitter we get the same result signal we had at the starting point of transmitter after encryption. This same signal is decrypted again recorded. It is then given to speaker of the receiver handset. 4. RESULT CHAP Authentication protocol which will protect the authenticity of voice recorded and its access. Fig: 4.1 CHAP Authentication. (prototype) AES encryption and decryption which are used in transmitter and receiver. Fig: 4.2 AES Encryption & Decryption (prototype) 5. CONCLUSION This proposal is simple, practical yet cost effective. Hardware changes are minimal and affordable by every service provider, mobile handset manufacturer. This system can be made even more secured by adding stronger protocol. Such systems are needed when highly confidential conversation will take place like VVIP person, military and so on. This can be implemented in telephone, data call, voice calls. REFERENCES [1] P. Carroll, B. Fortz, M. Labbe, and S. McGarraghy, “Improved Formulations for the Ring Spur Assignment ´ Problem,” in INOC 2011, Hamburg, Germany, pp. 24– 36, 2011. [2] A. Merwaday and I. Guvenc, “UAV assisted heterogeneous networks for public safety communications,” in IEEE Wireless Communications
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 586 and Networking Conference Workshops, pp. 329–334, 2015. [3] Understanding GPS: Principles and Applications (Artech House Telecommunications Library), Elliott D. Kaplan (Editor) / Hardcover / (1996) [4] Alex Fares,”GSM systems engineering and network management,” 2003. [5] O. Fagbohun, "Comparative studies on 3G, 4G and 5G wireless technology," IOSR Journal of Electronics and Communication Engineering, vol. 9, pp. 88-94, 2014 [6] J. M. Keenan, A. J. Motley, Personal communication radio coverage in buildings at 900 MHz and 1700 MHz, ElectronicsLetters, 24(12), 1988, 763 – 764. [7] D. C. Cox, 910 MHz urban mobile radio propagation: Multipath characteristics in New York City, IEEE Transactions on VehicularTechnology, 22(4), 1973, 104-110. [8] T. S. Rappaport, S. Y. Seidel, Path loss prediction in multi floored buildings at 914MHz. ElectronicsLetters, 27(15), 1991, 1384-1387. [9] V. Duan, Electrocardiographicartifactdueto a mobile phone mimicking ventricular tachycardia. Journal of Electrocardiology, 47 (3), 2014, 33–34. [10] M. Periyasamy, andR. Dhanasekaran, Evaluation of electromagnetic interference between critical medical devices and new generation cellular phones. Journal of MicrowavePowerEnergy, 49 (3), 2015, 160–70.
Download now