wireless data encryption & decryption ppt's by g.ajay kumar
TRANSCRIPT
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
1/17
WIRELESS DATA
ENCRYPTION &DECRYPTIONG.AJAY (09271A0418)
M.ANIVESH (09271A0445)
S.TRIPURA (09271A0455)
G.SOWJANYA (102751A402)
PROJECT GUIDE: D.MAHESH KUMAR
ASSOCIATE PROF.DEPARTMENT OF ECE
JMTS,KARIMNAGAR
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
2/17
Objective
security along with better communication.
encrypt message and send using RF transmitter.
On receiver side message is decrypted and is displayed.
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
3/17
Introduction
wireless transmission of messages was not a big deal.
security is a big issue.
anyone can intercept if transmitted over wireless.
How to overcome this?
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
4/17
Embedded System
special purpose system
provide service in real time.
No waiting time dedicated to specific task, design
reduce the size and cost of the product.
Components include
1) Microprocessor
2) Memory
3) Input Output Devices & Interfaces
4) Software
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
5/17
Transmitter Section Block Diagram
KEYPAD
MICROCONTROLLER
LCD
RF
ENCODER
RF
TRANSMITTER
STEP
DOWN
TRANSFO
RMER
BRIDGE
RECTIFIER
FILTER
CIRCUITREGULATOR
POWER
SUPPLY
TO ALL
CONNECTIO
NS
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
6/17
Receiver Section Block Diagram
RF
RECEIVER
MICRO
CONTROLLER LCDRF
ENCODER
STEP
DOWN
TRANSFO
RMER
BRIDGE
RECTIFIER
FILTER
CIRCUITREGULATOR
POWER
SUPPLY
TO ALL
CONNECTIO
NS
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
7/17
About AT89C52
Pin diagram Features
1) CMOS 8-bit microcomputer.
2) 256 X 8-bit internal RAM.
3) 4Kbytes of PEROM
4) 32 programmable IO pins.
5) Three 16-bit Timer/Counter.
6) Eight Interrupt Sources.
7) Programmable serial channel.
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
8/17
RF Modules
RF modules are normally divided into three groups,
1) RF Transmitter
2) RF Receiver
3) RF Transceiver
1) RF Transmitter STT-433MHz
Ideal for remote control applications where low cost and
longer range is required.
operates from 1.5-12V supply, making it ideal for battery
powered application.
operates at 433.92MHz.
2) RF Receiver STR-433MHz
The data is received by the RF receiver from the antenna pin
and this data is available on the data pins.
Two data pins are provided in the receiver module.
Thus, this data can be used for further applications.
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
9/17
Why RF?
Types of propagation
LOS
NLOS
Free space loss
L=C+20*log(D)+20*log(f)
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
10/17
Encryption & Decryption
Key-based cryptographic
Symmetric Asymmetric
world Xhvgl world!{[#!
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
11/17
Keil Software
by Gunter and Reinhard Keil in 1992.
implemented the first C compiler designed from ground
up specifically for the 8051 microcontroller.
provides a broad range of development tools.
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
12/17
Advantages
data cannot be received unless you have receiver code
Message encrypted is transmitted using RF transmitter.
When encrypted message is received it is decrypted by
the microcontroller and is displayed.
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
13/17
Applications
used by security agencies for communication.
used by the police.
send secrete messages.
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
14/17
Conclusion
able to send or receive messages.
handle all handshaking problems.
Data sent & received according to the specific algorithm.
If we were given this project once again, we would:
Find transmitting & receiving modules operating atdifferent frequencies.
communication with multiple devices.
program the targets identification number
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
15/17
Future Advancements
enhanced to a duplex mode of communication.
a proper key management scheme
implemented using long range RF modules.
Upgrade the data encryption unit
enhanced for working with other devices in a LAN.
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
16/17
-
7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR
17/17
QUERIES