WIRELESS DATA ENCRYPTION &
DECRYPTION FOR SECURITY IN
ARMY APPLICATIONS
BATCH NO: EG1
MENTOR : MRS P. RAMYA KRISHNA
BY
G.R.SIRI
CHANDANA(16A31A04I5)
K.DIVYA (16A31A04J1)
K.JANANI (16A31A04J2)
N.VINEELA (16A31A04J6)
G.SUJANA (17A35A0436)
CONTENTS
• INTRODUCTION
• DESCRIPTION
• BLOCK DIAGRAM
• POWER SUPPLY
• ADVANTAGES
• APPLICATIONS
• CONCLUSION
INTRODUCTION
• One of the popular methods to protect the data in a more secure way is to
encrypt
the data while sending and when received, decrypt the data to retrieve the
original
message.
• Before transmitting the data, the data will be converted into an unreadable
form
and will be sent.
• At the receiving end, the reverse of encryption carries on to get back the
original
DESCRIPTION
The most efficient and reliable wireless
communication is Radio Frequency. The data entered from the pc
keyboard is sent to the Arduino board at the transmitter side which
encrypts the data and then passes to the RF transmitter.
At the receiver end, the RF receiver receives the
data from air. The Arduino board on the receiver side decrypts the
data.
BLOCK DIAGRAM
• RECEIVER SECTION
DRIVER
IC
MAX232
RF
ENCODER
POWER
SUPPLY
RF
TRANSMITTER
PC
• TRANSMITTER SECTION
POWER
SUPPLY
RF RECEIVER
RF
DECODER
DRIVER
IC
MAX232
PC
POWER SUPPLY
ADVANTAGES
• Data is safe and secure even when file gets stolen.
• Widely deployed, better industry support.
• Shorten processing time.
• Communication takes place even through rigid obstacles.
APPLICATIONS
• Secure Data Transmission in ARMY.
• Used in ATM’S
• INDUSTRIAL Applications.
• Fire Annunciation Systems.
CONCLUSION
The Secure Wireless Communication for Military application is
an effective security and safety system which is made by
integrating the advancements in wireless and embedded
technology. It helps for a successful secret mission.

Wireless encryption & decryption in army applications.pptx

  • 1.
    WIRELESS DATA ENCRYPTION& DECRYPTION FOR SECURITY IN ARMY APPLICATIONS BATCH NO: EG1 MENTOR : MRS P. RAMYA KRISHNA BY G.R.SIRI CHANDANA(16A31A04I5) K.DIVYA (16A31A04J1) K.JANANI (16A31A04J2) N.VINEELA (16A31A04J6) G.SUJANA (17A35A0436)
  • 2.
    CONTENTS • INTRODUCTION • DESCRIPTION •BLOCK DIAGRAM • POWER SUPPLY • ADVANTAGES • APPLICATIONS • CONCLUSION
  • 3.
    INTRODUCTION • One ofthe popular methods to protect the data in a more secure way is to encrypt the data while sending and when received, decrypt the data to retrieve the original message. • Before transmitting the data, the data will be converted into an unreadable form and will be sent. • At the receiving end, the reverse of encryption carries on to get back the original
  • 4.
    DESCRIPTION The most efficientand reliable wireless communication is Radio Frequency. The data entered from the pc keyboard is sent to the Arduino board at the transmitter side which encrypts the data and then passes to the RF transmitter. At the receiver end, the RF receiver receives the data from air. The Arduino board on the receiver side decrypts the data.
  • 5.
    BLOCK DIAGRAM • RECEIVERSECTION DRIVER IC MAX232 RF ENCODER POWER SUPPLY RF TRANSMITTER PC • TRANSMITTER SECTION POWER SUPPLY RF RECEIVER RF DECODER DRIVER IC MAX232 PC
  • 6.
  • 7.
    ADVANTAGES • Data issafe and secure even when file gets stolen. • Widely deployed, better industry support. • Shorten processing time. • Communication takes place even through rigid obstacles.
  • 8.
    APPLICATIONS • Secure DataTransmission in ARMY. • Used in ATM’S • INDUSTRIAL Applications. • Fire Annunciation Systems.
  • 9.
    CONCLUSION The Secure WirelessCommunication for Military application is an effective security and safety system which is made by integrating the advancements in wireless and embedded technology. It helps for a successful secret mission.