SlideShare a Scribd company logo
CODE MODULATION BASED ENCRYPTION & DECRYPTION
TECHNIQUE FOR SECURE COMMUNICATION IN
WIRELESS
ABSTRACT
In Today’s Electronic communication take important role. Today’s Communication technology
the chatting system from one Place to another is easy and fast. But security is of some concern,
for that we send the data by the system named as Advanced chatting system using
Microcontroller.
In our project we have two sections, one is transmitter section and another one is Receiver
section. The two sections are designed around a microcontroller as a control unit with all the
devices interfaced to it. The main aim of the project is to transmit the data using wireless
communication by encrypting the data. At the receiver side, the encrypted data is decrypted and
is shown in the PC.
According to this project the person who wants to send the data to a remote place has to type the
data from the PC. The data is received by microcontroller and is sent to RF transmitter after
encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in
PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is
converted into plaintext.
BLOCK DIAGRAM
TRANSMITTER

POWER SUPPLY

Encoder

MICRO
CONTROLLER
(AT89S52)

MAX232

PC
RF TX

RECIEVER

POWER
SUPPLY
DECODER

MICRO
CONTROLLER

MAX232

(AT89S52)
RF RX

PC

More Related Content

What's hot

BiCMOS Technology
BiCMOS TechnologyBiCMOS Technology
BiCMOS Technology
Mithileysh Sathiyanarayanan
 
Audio Amplifier
Audio AmplifierAudio Amplifier
Audio Amplifier
Jyoti Rawat
 
Optical communication
Optical communicationOptical communication
Optical communication
asalmoezi
 
Formats for coherent optical communications -OPTICAL COMMUNICATIONS
Formats for coherent optical communications -OPTICAL COMMUNICATIONSFormats for coherent optical communications -OPTICAL COMMUNICATIONS
Formats for coherent optical communications -OPTICAL COMMUNICATIONS
NITHIN KALLE PALLY
 
wireless electronics notice board using GSM
wireless electronics notice board using GSMwireless electronics notice board using GSM
wireless electronics notice board using GSM
Rahul Kumar
 
Embedded System Case Study
Embedded System Case StudyEmbedded System Case Study
Embedded System Case Study
JCT COLLEGE OF ENGINEERING AND TECHNOLOGY
 
Visible light communication
Visible light communicationVisible light communication
Visible light communication
Parth Saxena
 
The MPEG-21 Multimedia Framework
The MPEG-21 Multimedia FrameworkThe MPEG-21 Multimedia Framework
The MPEG-21 Multimedia Framework
Alpen-Adria-Universität
 
embedded system and iot.pptx
embedded system and iot.pptxembedded system and iot.pptx
embedded system and iot.pptx
SanjanaN25
 
Analog modulation
Analog modulationAnalog modulation
Analog modulation
vish0110
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending Network
Swarna Gautam
 
Introduction To Microelectronics
Introduction To MicroelectronicsIntroduction To Microelectronics
Introduction To MicroelectronicsAnkita Jaiswal
 
Visible Light Communication
Visible Light CommunicationVisible Light Communication
Visible Light CommunicationAshwin Shenoy M
 
Eecb351 exp 8 ask fsk
Eecb351 exp 8 ask fskEecb351 exp 8 ask fsk
Eecb351 exp 8 ask fsk
Zufayri Chan
 
Raman optical amplifier. simple presentation
Raman optical amplifier. simple presentationRaman optical amplifier. simple presentation
Raman optical amplifier. simple presentation
Donaire Carapichoso
 
Java management extensions (jmx)
Java management extensions (jmx)Java management extensions (jmx)
Java management extensions (jmx)
Tarun Telang
 
Gi-Fi ppt
Gi-Fi pptGi-Fi ppt
Gi-Fi ppt
Tushar Choudhary
 
APPLICATION OF DSP IN BIOMEDICAL ENGINEERING
APPLICATION OF DSP IN BIOMEDICAL ENGINEERINGAPPLICATION OF DSP IN BIOMEDICAL ENGINEERING
APPLICATION OF DSP IN BIOMEDICAL ENGINEERING
pirh khan
 
Zigbee
ZigbeeZigbee

What's hot (20)

BiCMOS Technology
BiCMOS TechnologyBiCMOS Technology
BiCMOS Technology
 
Audio Amplifier
Audio AmplifierAudio Amplifier
Audio Amplifier
 
Optical communication
Optical communicationOptical communication
Optical communication
 
Cmos
CmosCmos
Cmos
 
Formats for coherent optical communications -OPTICAL COMMUNICATIONS
Formats for coherent optical communications -OPTICAL COMMUNICATIONSFormats for coherent optical communications -OPTICAL COMMUNICATIONS
Formats for coherent optical communications -OPTICAL COMMUNICATIONS
 
wireless electronics notice board using GSM
wireless electronics notice board using GSMwireless electronics notice board using GSM
wireless electronics notice board using GSM
 
Embedded System Case Study
Embedded System Case StudyEmbedded System Case Study
Embedded System Case Study
 
Visible light communication
Visible light communicationVisible light communication
Visible light communication
 
The MPEG-21 Multimedia Framework
The MPEG-21 Multimedia FrameworkThe MPEG-21 Multimedia Framework
The MPEG-21 Multimedia Framework
 
embedded system and iot.pptx
embedded system and iot.pptxembedded system and iot.pptx
embedded system and iot.pptx
 
Analog modulation
Analog modulationAnalog modulation
Analog modulation
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending Network
 
Introduction To Microelectronics
Introduction To MicroelectronicsIntroduction To Microelectronics
Introduction To Microelectronics
 
Visible Light Communication
Visible Light CommunicationVisible Light Communication
Visible Light Communication
 
Eecb351 exp 8 ask fsk
Eecb351 exp 8 ask fskEecb351 exp 8 ask fsk
Eecb351 exp 8 ask fsk
 
Raman optical amplifier. simple presentation
Raman optical amplifier. simple presentationRaman optical amplifier. simple presentation
Raman optical amplifier. simple presentation
 
Java management extensions (jmx)
Java management extensions (jmx)Java management extensions (jmx)
Java management extensions (jmx)
 
Gi-Fi ppt
Gi-Fi pptGi-Fi ppt
Gi-Fi ppt
 
APPLICATION OF DSP IN BIOMEDICAL ENGINEERING
APPLICATION OF DSP IN BIOMEDICAL ENGINEERINGAPPLICATION OF DSP IN BIOMEDICAL ENGINEERING
APPLICATION OF DSP IN BIOMEDICAL ENGINEERING
 
Zigbee
ZigbeeZigbee
Zigbee
 

Similar to Code modulation based encryption & decryption technique for secure communication in wireless

J04701080085
J04701080085J04701080085
J04701080085
ijceronline
 
Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Ecway Technologies
 
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONEPROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
International Educational Applied Scientific Research Journal (IEASRJ)
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
bjp4642
 
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONLATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONASHOKKUMAR RAMAR
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
xinoe
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
Inxee
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
Manpreet Chandhok
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
NowrinJahanSiam
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET Journal
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET Journal
 
Cse318,lab report
Cse318,lab reportCse318,lab report
Cse318,lab report
FarhadHimel
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
Ahmed Mohamed Mahmoud
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFC
Sandeep P M
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 
information_communication
 information_communication information_communication
information_communication
Aakash software cell Gujrat.
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
Priyasloka Arya
 

Similar to Code modulation based encryption & decryption technique for secure communication in wireless (20)

J04701080085
J04701080085J04701080085
J04701080085
 
Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...Code modulation based encryption & descryption technique for secure communica...
Code modulation based encryption & descryption technique for secure communica...
 
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONEPROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTIONLATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
 
IOT introduction
IOT introductionIOT introduction
IOT introduction
 
Introduction-All 'bout IOT
Introduction-All 'bout IOTIntroduction-All 'bout IOT
Introduction-All 'bout IOT
 
15-105 v6
15-105 v615-105 v6
15-105 v6
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
 
Project report,nowrin
Project report,nowrinProject report,nowrin
Project report,nowrin
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
 
Cse318,lab report
Cse318,lab reportCse318,lab report
Cse318,lab report
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFC
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
information_communication
 information_communication information_communication
information_communication
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 

More from Ecwayt

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsEcwayt
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwayt
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwayt
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwayt
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwayt
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwayt
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titlesEcwayt
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwayt
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwayt
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwayt
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwayt
 
Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Ecwayt
 

More from Ecwayt (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 
Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...Autonomous sensing order selection strategies exploiting channel access infor...
Autonomous sensing order selection strategies exploiting channel access infor...
 

Code modulation based encryption & decryption technique for secure communication in wireless

  • 1. CODE MODULATION BASED ENCRYPTION & DECRYPTION TECHNIQUE FOR SECURE COMMUNICATION IN WIRELESS ABSTRACT In Today’s Electronic communication take important role. Today’s Communication technology the chatting system from one Place to another is easy and fast. But security is of some concern, for that we send the data by the system named as Advanced chatting system using Microcontroller. In our project we have two sections, one is transmitter section and another one is Receiver section. The two sections are designed around a microcontroller as a control unit with all the devices interfaced to it. The main aim of the project is to transmit the data using wireless communication by encrypting the data. At the receiver side, the encrypted data is decrypted and is shown in the PC. According to this project the person who wants to send the data to a remote place has to type the data from the PC. The data is received by microcontroller and is sent to RF transmitter after encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is converted into plaintext.
  • 2. BLOCK DIAGRAM TRANSMITTER POWER SUPPLY Encoder MICRO CONTROLLER (AT89S52) MAX232 PC RF TX RECIEVER POWER SUPPLY DECODER MICRO CONTROLLER MAX232 (AT89S52) RF RX PC