SlideShare a Scribd company logo
1 of 2
CODE MODULATION BASED ENCRYPTION & DECRYPTION
TECHNIQUE FOR SECURE COMMUNICATION IN
WIRELESS
ABSTRACT
In Today’s Electronic communication take important role. Today’s Communication technology
the chatting system from one Place to another is easy and fast. But security is of some concern,
for that we send the data by the system named as Advanced chatting system using
Microcontroller.
In our project we have two sections, one is transmitter section and another one is Receiver
section. The two sections are designed around a microcontroller as a control unit with all the
devices interfaced to it. The main aim of the project is to transmit the data using wireless
communication by encrypting the data. At the receiver side, the encrypted data is decrypted and
is shown in the PC.
According to this project the person who wants to send the data to a remote place has to type the
data from the PC. The data is received by microcontroller and is sent to RF transmitter after
encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in
PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is
converted into plaintext.
BLOCK DIAGRAM
TRANSMITTER

POWER SUPPLY

Encoder

MICRO
CONTROLLER
(AT89S52)

MAX232

PC
RF TX

RECIEVER

POWER
SUPPLY
DECODER

MICRO
CONTROLLER

MAX232

(AT89S52)
RF RX

PC

More Related Content

What's hot

Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.sayed78
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manualprashant0001
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io tKunal Bangar
 
Home Automation Using IoT
Home Automation Using IoTHome Automation Using IoT
Home Automation Using IoTAshutosh Kumar
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoTAthira_1993
 
Home automation
Home automationHome automation
Home automationParth Sahu
 
IOT Based Data Monitoring System
IOT Based Data Monitoring SystemIOT Based Data Monitoring System
IOT Based Data Monitoring SystemAshok Fair
 
Home automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technologyHome automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technologyratthaslip ranokphanuwat
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iotKowshik Deb
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenetAboo Thahir
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of thingsAbhishek Bhadoria
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 

What's hot (17)

Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manual
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 
Home Automation Using IoT
Home Automation Using IoTHome Automation Using IoT
Home Automation Using IoT
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoT
 
Home automation
Home automationHome automation
Home automation
 
IOT Based Data Monitoring System
IOT Based Data Monitoring SystemIOT Based Data Monitoring System
IOT Based Data Monitoring System
 
Home automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technologyHome automation using IoT and AWS Cloud technology
Home automation using IoT and AWS Cloud technology
 
Home Automation System using iot
Home Automation System using iotHome Automation System using iot
Home Automation System using iot
 
Wisenet - Complete ppt about the topic wisenet
Wisenet -  Complete ppt about the topic wisenetWisenet -  Complete ppt about the topic wisenet
Wisenet - Complete ppt about the topic wisenet
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Zigbee
ZigbeeZigbee
Zigbee
 
smart automation system
smart automation systemsmart automation system
smart automation system
 

Viewers also liked

datadonderdageditie10
datadonderdageditie10datadonderdageditie10
datadonderdageditie10erikkentie
 
To the extract add a mixture of zinc dust and conc. Hydrochloric acid. It giv...
To the extract add a mixture of zinc dust and conc. Hydrochloric acid. It giv...To the extract add a mixture of zinc dust and conc. Hydrochloric acid. It giv...
To the extract add a mixture of zinc dust and conc. Hydrochloric acid. It giv...Dr. Raghavendra Kumar Gunda
 
CV by Mei Ling, Y.
CV by Mei Ling, Y.CV by Mei Ling, Y.
CV by Mei Ling, Y.Yap Mei Ling
 
KUMU Orientation PLAY2 poster SP15
KUMU Orientation PLAY2 poster SP15KUMU Orientation PLAY2 poster SP15
KUMU Orientation PLAY2 poster SP15Aman Reaka
 
Studi legali e social networks: tra Corporate e Personal Branding
Studi legali e social networks: tra Corporate e Personal BrandingStudi legali e social networks: tra Corporate e Personal Branding
Studi legali e social networks: tra Corporate e Personal BrandingClaudio Cosetti
 
Application of Residue Inversion Formula for Laplace Transform to Initial Val...
Application of Residue Inversion Formula for Laplace Transform to Initial Val...Application of Residue Inversion Formula for Laplace Transform to Initial Val...
Application of Residue Inversion Formula for Laplace Transform to Initial Val...iosrjce
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
NTOKOZO'S PORTFOLIO low res
NTOKOZO'S PORTFOLIO low resNTOKOZO'S PORTFOLIO low res
NTOKOZO'S PORTFOLIO low resOzzo Ndlovu
 
Identification of Outliersin Time Series Data via Simulation Study
Identification of Outliersin Time Series Data via Simulation StudyIdentification of Outliersin Time Series Data via Simulation Study
Identification of Outliersin Time Series Data via Simulation Studyiosrjce
 
Igor Kudevitsky Resume Short
Igor Kudevitsky Resume Short Igor Kudevitsky Resume Short
Igor Kudevitsky Resume Short Igor Kudevitsky
 
KUMU Orientation EAT1 poster SP15
KUMU Orientation EAT1 poster SP15KUMU Orientation EAT1 poster SP15
KUMU Orientation EAT1 poster SP15Aman Reaka
 

Viewers also liked (15)

datadonderdageditie10
datadonderdageditie10datadonderdageditie10
datadonderdageditie10
 
Segunda division
Segunda divisionSegunda division
Segunda division
 
Diploma
DiplomaDiploma
Diploma
 
To the extract add a mixture of zinc dust and conc. Hydrochloric acid. It giv...
To the extract add a mixture of zinc dust and conc. Hydrochloric acid. It giv...To the extract add a mixture of zinc dust and conc. Hydrochloric acid. It giv...
To the extract add a mixture of zinc dust and conc. Hydrochloric acid. It giv...
 
CV by Mei Ling, Y.
CV by Mei Ling, Y.CV by Mei Ling, Y.
CV by Mei Ling, Y.
 
KUMU Orientation PLAY2 poster SP15
KUMU Orientation PLAY2 poster SP15KUMU Orientation PLAY2 poster SP15
KUMU Orientation PLAY2 poster SP15
 
Marvel Dsouza CV
Marvel Dsouza CVMarvel Dsouza CV
Marvel Dsouza CV
 
The People's Car
The People's CarThe People's Car
The People's Car
 
Studi legali e social networks: tra Corporate e Personal Branding
Studi legali e social networks: tra Corporate e Personal BrandingStudi legali e social networks: tra Corporate e Personal Branding
Studi legali e social networks: tra Corporate e Personal Branding
 
Application of Residue Inversion Formula for Laplace Transform to Initial Val...
Application of Residue Inversion Formula for Laplace Transform to Initial Val...Application of Residue Inversion Formula for Laplace Transform to Initial Val...
Application of Residue Inversion Formula for Laplace Transform to Initial Val...
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
NTOKOZO'S PORTFOLIO low res
NTOKOZO'S PORTFOLIO low resNTOKOZO'S PORTFOLIO low res
NTOKOZO'S PORTFOLIO low res
 
Identification of Outliersin Time Series Data via Simulation Study
Identification of Outliersin Time Series Data via Simulation StudyIdentification of Outliersin Time Series Data via Simulation Study
Identification of Outliersin Time Series Data via Simulation Study
 
Igor Kudevitsky Resume Short
Igor Kudevitsky Resume Short Igor Kudevitsky Resume Short
Igor Kudevitsky Resume Short
 
KUMU Orientation EAT1 poster SP15
KUMU Orientation EAT1 poster SP15KUMU Orientation EAT1 poster SP15
KUMU Orientation EAT1 poster SP15
 

Similar to Code modulation based encryption & decryption technique for secure communication in wireless

Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Ecway Technologies
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmissionbjp4642
 
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONLATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONASHOKKUMAR RAMAR
 
IOT introduction
IOT introductionIOT introduction
IOT introductionxinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOTInxee
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systemsManpreet Chandhok
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET Journal
 
Cse318,lab report
Cse318,lab reportCse318,lab report
Cse318,lab reportFarhadHimel
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFCSandeep P M
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 

Similar to Code modulation based encryption & decryption technique for secure communication in wireless (20)

J04701080085
J04701080085J04701080085
J04701080085
 
Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...
 
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONEPROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONLATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
15-105 v6
15-105 v615-105 v6
15-105 v6
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
 
Cse318,lab report
Cse318,lab reportCse318,lab report
Cse318,lab report
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFC
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
information_communication
 information_communication information_communication
information_communication
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 

More from Ecwayt

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsEcwayt
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwayt
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwayt
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwayt
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwayt
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titlesEcwayt
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwayt
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwayt
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwayt
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwayt
 

More from Ecwayt (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Code modulation based encryption & decryption technique for secure communication in wireless

  • 1. CODE MODULATION BASED ENCRYPTION & DECRYPTION TECHNIQUE FOR SECURE COMMUNICATION IN WIRELESS ABSTRACT In Today’s Electronic communication take important role. Today’s Communication technology the chatting system from one Place to another is easy and fast. But security is of some concern, for that we send the data by the system named as Advanced chatting system using Microcontroller. In our project we have two sections, one is transmitter section and another one is Receiver section. The two sections are designed around a microcontroller as a control unit with all the devices interfaced to it. The main aim of the project is to transmit the data using wireless communication by encrypting the data. At the receiver side, the encrypted data is decrypted and is shown in the PC. According to this project the person who wants to send the data to a remote place has to type the data from the PC. The data is received by microcontroller and is sent to RF transmitter after encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is converted into plaintext.
  • 2. BLOCK DIAGRAM TRANSMITTER POWER SUPPLY Encoder MICRO CONTROLLER (AT89S52) MAX232 PC RF TX RECIEVER POWER SUPPLY DECODER MICRO CONTROLLER MAX232 (AT89S52) RF RX PC