Transcript
  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    1/17

    WIRELESS DATA

    ENCRYPTION &DECRYPTIONG.AJAY (09271A0418)

    M.ANIVESH (09271A0445)

    S.TRIPURA (09271A0455)

    G.SOWJANYA (102751A402)

    PROJECT GUIDE: D.MAHESH KUMAR

    ASSOCIATE PROF.DEPARTMENT OF ECE

    JMTS,KARIMNAGAR

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    2/17

    Objective

    security along with better communication.

    encrypt message and send using RF transmitter.

    On receiver side message is decrypted and is displayed.

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    3/17

    Introduction

    wireless transmission of messages was not a big deal.

    security is a big issue.

    anyone can intercept if transmitted over wireless.

    How to overcome this?

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    4/17

    Embedded System

    special purpose system

    provide service in real time.

    No waiting time dedicated to specific task, design

    reduce the size and cost of the product.

    Components include

    1) Microprocessor

    2) Memory

    3) Input Output Devices & Interfaces

    4) Software

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    5/17

    Transmitter Section Block Diagram

    KEYPAD

    MICROCONTROLLER

    LCD

    RF

    ENCODER

    RF

    TRANSMITTER

    STEP

    DOWN

    TRANSFO

    RMER

    BRIDGE

    RECTIFIER

    FILTER

    CIRCUITREGULATOR

    POWER

    SUPPLY

    TO ALL

    CONNECTIO

    NS

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    6/17

    Receiver Section Block Diagram

    RF

    RECEIVER

    MICRO

    CONTROLLER LCDRF

    ENCODER

    STEP

    DOWN

    TRANSFO

    RMER

    BRIDGE

    RECTIFIER

    FILTER

    CIRCUITREGULATOR

    POWER

    SUPPLY

    TO ALL

    CONNECTIO

    NS

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    7/17

    About AT89C52

    Pin diagram Features

    1) CMOS 8-bit microcomputer.

    2) 256 X 8-bit internal RAM.

    3) 4Kbytes of PEROM

    4) 32 programmable IO pins.

    5) Three 16-bit Timer/Counter.

    6) Eight Interrupt Sources.

    7) Programmable serial channel.

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    8/17

    RF Modules

    RF modules are normally divided into three groups,

    1) RF Transmitter

    2) RF Receiver

    3) RF Transceiver

    1) RF Transmitter STT-433MHz

    Ideal for remote control applications where low cost and

    longer range is required.

    operates from 1.5-12V supply, making it ideal for battery

    powered application.

    operates at 433.92MHz.

    2) RF Receiver STR-433MHz

    The data is received by the RF receiver from the antenna pin

    and this data is available on the data pins.

    Two data pins are provided in the receiver module.

    Thus, this data can be used for further applications.

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    9/17

    Why RF?

    Types of propagation

    LOS

    NLOS

    Free space loss

    L=C+20*log(D)+20*log(f)

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    10/17

    Encryption & Decryption

    Key-based cryptographic

    Symmetric Asymmetric

    world Xhvgl world!{[#!

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    11/17

    Keil Software

    by Gunter and Reinhard Keil in 1992.

    implemented the first C compiler designed from ground

    up specifically for the 8051 microcontroller.

    provides a broad range of development tools.

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    12/17

    Advantages

    data cannot be received unless you have receiver code

    Message encrypted is transmitted using RF transmitter.

    When encrypted message is received it is decrypted by

    the microcontroller and is displayed.

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    13/17

    Applications

    used by security agencies for communication.

    used by the police.

    send secrete messages.

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    14/17

    Conclusion

    able to send or receive messages.

    handle all handshaking problems.

    Data sent & received according to the specific algorithm.

    If we were given this project once again, we would:

    Find transmitting & receiving modules operating atdifferent frequencies.

    communication with multiple devices.

    program the targets identification number

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    15/17

    Future Advancements

    enhanced to a duplex mode of communication.

    a proper key management scheme

    implemented using long range RF modules.

    Upgrade the data encryption unit

    enhanced for working with other devices in a LAN.

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    16/17

  • 7/29/2019 WIRELESS DATA ENCRYPTION & DECRYPTION PPT'S BY G.AJAY KUMAR

    17/17

    QUERIES


Recommended