The Communication System
Military Safe Communication System
Prototype
Introduction
This project is a demonstration of the idea of
Safe Communication technique. This provide a
prototype for the same.
It is a console based application which
demonstrate the complete process of the
System.
Today modern countries like USA, UK, Russia, China etc. have made
tremendous progress in technology, for the defense and military. They
are developing weapons like Nuclear Bombs, Aircrafts etc. Our
country India is not far behind them, but it’s a bitter truth that we are
still facing many security issues in our country. And the most
convincing example is of Pulwama Attack which took place on 14th of
this February,2019. We lost our 44 soldiers in the attack. This shows
that we still need many improvements in our defense and military
services. Our country had faced many terror attacks which are not
tolerable at all. This attacks significantly show that we need
improvement in our Military Communications. The leaking of
information must need to be restricted.
Our project is based on the same. We are developing a secure and
safer Communication System which will be very useful in future
communications. This project is basically a prototype of the system, it
demonstrate how the system will work, how message will be sent, how
safer communication can be achieved, how we can avoid leaking in
sensible information and etc.
This project is aimed to be used in Indian Military, Defense, Detective
Agencies, Police. We are working on the same.
Purpose and Outcome of Project
About Project Implementation
The code of this project is written in C++ Programming Language. It is a
console based program. We have defined each and every part of the
communication system using Object Oriented Programming Approach. A
close idea of the implementation will be discussed.
System Transmitter Repeater
Receiver
with Sensor
We have build the total system by dividing it in the constituent parts. All this
components are implemented using classes in C++, and each system has its own
function, data, property and connections. All the Communicating Components are
inherited from a common class Station, and hence they share some common
behaviors, like receiving message, sending message and etc.
Station
Repeater Sensor Receiver
Transmitter
We have implemented a class Message which denotes a Packet of message. The
original information has been stored in encrypted form in the packet so no one can
access the information without having the decryption key. For security reasons the
key will be not shared with the Sensor until it signifies the message has not been
leaked. Key will be kept at Transmitter, and once the sensor gives green flag, then
only the key will be sent to sensor, which will decrypt the message and then
receiver will receive the message safely. If sensor found that information has been
leaked from message packet, it will just corrupt the message packet and suspend it.
It will ask transmitter to resend the message. And this process will continue till
sensor confirms that message has been safely received.
This is how the system works and ensures that no leak of data will happen.
Complete implementation details are shared further.
Message Packet
• Encrypted Message
• Safety Services
System
System class handles all the background process of communication.
• It provides user interface for the program. It accept input message from
user.
• It also have responsibility to initiate system, check for exceptions.
• Close system securely.
• Accept user message.
• Check for available transmitters and send message to transmitter for
further processing.
Message
Message class represent a Message Packet which will be actually transmitted from
one component to another component of system. The text message will be only
available at Transmitter and Receiver, and in all other process, the message will be
sent packed in the message packet. This packet act as a shielding for the message.
• Give the current encryption status of Message.
• Give the current corrupting status of Message.
• Ensure avoiding leak of message.
• Signify message as corrupted if information leaked however.
Transmitter
Transmitter receives the message from System and handles all the
further processing.
• Receive plane message from System.
• Generate a random key and encrypt message and pack message in
packet.
• Store key to itself.
• Check for available Repeaters and send Message Packet.
• Monitor all the further process and wait for reply from sensor.
• Decide to send or not to send the decryption key to sensor.
• Resend the same message upon request from sensor.
Repeater
Repeater act an intermediate process for Communication. It amplifies the
message and also check for vulnerabilities in message, if found then signify the
same in message packet.
• Receive message packet from transmitter.
• Check for the virus and other vulnerabilities.
• Mark message as corrupted if found something incorrect.
• Send Message packet to sensor for scanning.
Sensor
Sensor stage precedes the Receiver. It ensures that message is safe
and then only sends it to receiver finally.
• Receive message from Repeater.
• Check if message is corrupted.
• If message found corrupted, request it again from transmitter
with completely as a new packet.
• If message is safe, then request and accept key from Transmitter
and decrypt message.
• Send decrypted message to Receiver.
Receiver
It receives the safe message from Sensor and finally handle it to the Recipient. It
also shows the original size of message, from which we can judge if message has
been safely received or not.
Advantages
• This communication System can be used for Military, Police,
Detective departments which needs transmitting sensible
information from places to places.
• Many terror attacks can be avoided.
• Ensures the safety of communication.
• Private data security.
THANK
YOU

The Communication System C++ Project

  • 1.
    The Communication System MilitarySafe Communication System Prototype
  • 2.
    Introduction This project isa demonstration of the idea of Safe Communication technique. This provide a prototype for the same. It is a console based application which demonstrate the complete process of the System.
  • 3.
    Today modern countrieslike USA, UK, Russia, China etc. have made tremendous progress in technology, for the defense and military. They are developing weapons like Nuclear Bombs, Aircrafts etc. Our country India is not far behind them, but it’s a bitter truth that we are still facing many security issues in our country. And the most convincing example is of Pulwama Attack which took place on 14th of this February,2019. We lost our 44 soldiers in the attack. This shows that we still need many improvements in our defense and military services. Our country had faced many terror attacks which are not tolerable at all. This attacks significantly show that we need improvement in our Military Communications. The leaking of information must need to be restricted. Our project is based on the same. We are developing a secure and safer Communication System which will be very useful in future communications. This project is basically a prototype of the system, it demonstrate how the system will work, how message will be sent, how safer communication can be achieved, how we can avoid leaking in sensible information and etc. This project is aimed to be used in Indian Military, Defense, Detective Agencies, Police. We are working on the same. Purpose and Outcome of Project
  • 4.
    About Project Implementation Thecode of this project is written in C++ Programming Language. It is a console based program. We have defined each and every part of the communication system using Object Oriented Programming Approach. A close idea of the implementation will be discussed.
  • 5.
    System Transmitter Repeater Receiver withSensor We have build the total system by dividing it in the constituent parts. All this components are implemented using classes in C++, and each system has its own function, data, property and connections. All the Communicating Components are inherited from a common class Station, and hence they share some common behaviors, like receiving message, sending message and etc. Station Repeater Sensor Receiver Transmitter
  • 6.
    We have implementeda class Message which denotes a Packet of message. The original information has been stored in encrypted form in the packet so no one can access the information without having the decryption key. For security reasons the key will be not shared with the Sensor until it signifies the message has not been leaked. Key will be kept at Transmitter, and once the sensor gives green flag, then only the key will be sent to sensor, which will decrypt the message and then receiver will receive the message safely. If sensor found that information has been leaked from message packet, it will just corrupt the message packet and suspend it. It will ask transmitter to resend the message. And this process will continue till sensor confirms that message has been safely received. This is how the system works and ensures that no leak of data will happen. Complete implementation details are shared further. Message Packet • Encrypted Message • Safety Services
  • 7.
  • 8.
    System class handlesall the background process of communication. • It provides user interface for the program. It accept input message from user. • It also have responsibility to initiate system, check for exceptions. • Close system securely. • Accept user message. • Check for available transmitters and send message to transmitter for further processing.
  • 9.
  • 10.
    Message class representa Message Packet which will be actually transmitted from one component to another component of system. The text message will be only available at Transmitter and Receiver, and in all other process, the message will be sent packed in the message packet. This packet act as a shielding for the message. • Give the current encryption status of Message. • Give the current corrupting status of Message. • Ensure avoiding leak of message. • Signify message as corrupted if information leaked however.
  • 11.
  • 12.
    Transmitter receives themessage from System and handles all the further processing. • Receive plane message from System. • Generate a random key and encrypt message and pack message in packet. • Store key to itself. • Check for available Repeaters and send Message Packet. • Monitor all the further process and wait for reply from sensor. • Decide to send or not to send the decryption key to sensor. • Resend the same message upon request from sensor.
  • 13.
  • 14.
    Repeater act anintermediate process for Communication. It amplifies the message and also check for vulnerabilities in message, if found then signify the same in message packet. • Receive message packet from transmitter. • Check for the virus and other vulnerabilities. • Mark message as corrupted if found something incorrect. • Send Message packet to sensor for scanning.
  • 15.
  • 16.
    Sensor stage precedesthe Receiver. It ensures that message is safe and then only sends it to receiver finally. • Receive message from Repeater. • Check if message is corrupted. • If message found corrupted, request it again from transmitter with completely as a new packet. • If message is safe, then request and accept key from Transmitter and decrypt message. • Send decrypted message to Receiver.
  • 17.
    Receiver It receives thesafe message from Sensor and finally handle it to the Recipient. It also shows the original size of message, from which we can judge if message has been safely received or not.
  • 18.
    Advantages • This communicationSystem can be used for Military, Police, Detective departments which needs transmitting sensible information from places to places. • Many terror attacks can be avoided. • Ensures the safety of communication. • Private data security.
  • 19.