SlideShare a Scribd company logo
CODE MODULATION BASED ENCRYPTION & DECRYPTION
TECHNIQUE FOR SECURE COMMUNICATION IN
WIRELESS
ABSTRACT
In Today’s Electronic communication take important role. Today’s Communication technology
the chatting system from one Place to another is easy and fast. But security is of some concern,
for that we send the data by the system named as Advanced chatting system using
Microcontroller.
In our project we have two sections, one is transmitter section and another one is Receiver
section. The two sections are designed around a microcontroller as a control unit with all the
devices interfaced to it. The main aim of the project is to transmit the data using wireless
communication by encrypting the data. At the receiver side, the encrypted data is decrypted and
is shown in the PC.
According to this project the person who wants to send the data to a remote place has to type the
data from the PC. The data is received by microcontroller and is sent to RF transmitter after
encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in
PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is
converted into plaintext.
BLOCK DIAGRAM
TRANSMITTER

POWER SUPPLY

Encoder

MICRO
CONTROLLER
(AT89S52)

MAX232

PC
RF TX

RECIEVER

POWER
SUPPLY
DECODER

MICRO
CONTROLLER

MAX232

(AT89S52)
RF RX

PC

More Related Content

PPTX
Applications of Biometrics in Technology
PDF
Results of TTA's Biometric Component Test (Korean)
PPT
Biometric Access Control Systems
PPTX
3D Password and its importance
PPTX
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
PPTX
3d password
PPTX
Rfid security access control system
PPT
3D-Password: A More Secure Authentication
Applications of Biometrics in Technology
Results of TTA's Biometric Component Test (Korean)
Biometric Access Control Systems
3D Password and its importance
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
3d password
Rfid security access control system
3D-Password: A More Secure Authentication

What's hot (20)

PPTX
3D PASSWORD SEMINAR
PPTX
3D PASSWORD
PPT
3D Password
PPT
3D-TV-PPT
PPTX
3d password 23 mar 14
PDF
SEMINAR REPORT ON 3D PASSWORD
PPT
Biometric encryption
PDF
Modern API Security with JSON Web Tokens
PPTX
SRAVYA
PPTX
3d passwords
DOCX
Smart card
PDF
What about GDPR?
PPTX
PDF
Cyber law-it-act-2000
PPTX
Eye gaze technology
PPTX
digital watermarking
PPTX
CYBERSPACE & CRIMINAL BEHAVIOR
PPTX
Intro to OAuth2 and OpenID Connect
PDF
A Project Report on RFID Based Attendance System.pdf
PPT
Biometric's final ppt
3D PASSWORD SEMINAR
3D PASSWORD
3D Password
3D-TV-PPT
3d password 23 mar 14
SEMINAR REPORT ON 3D PASSWORD
Biometric encryption
Modern API Security with JSON Web Tokens
SRAVYA
3d passwords
Smart card
What about GDPR?
Cyber law-it-act-2000
Eye gaze technology
digital watermarking
CYBERSPACE & CRIMINAL BEHAVIOR
Intro to OAuth2 and OpenID Connect
A Project Report on RFID Based Attendance System.pdf
Biometric's final ppt
Ad

Similar to Code modulation based encryption & decryption technique for secure communication in wireless (20)

DOC
Code modulation based encryption & descryption technique for secure communica...
DOC
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
PPTX
Secure Data Transmission
DOC
FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...
DOC
Development of a secure wireless data communication using zigbee
DOC
Development of a secure wireless data communication using zigbee
PDF
J04701080085
PDF
G05114043
PDF
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
DOC
Wireless appliances control report
PPT
Wpmc2004 phy protection
PPTX
wireless notice board using RF communication
PPTX
Wireless encryption & decryption in army applications.pptx
PPTX
Secured communication
PPTX
The Communication System C++ Project
PDF
Wireless RF module
PDF
Informe CLIL i video Comunicació.
PDF
Ijebea14 238
PDF
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
PDF
IRJET- Mobile Communication Security using Encryption and Decryption
Code modulation based encryption & descryption technique for secure communica...
LATEST ECE PROJECT ABSTRACT FOR COMMUNICATION-WIRELESS ENCRYPTION&DECRYPTION
Secure Data Transmission
FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...
Development of a secure wireless data communication using zigbee
Development of a secure wireless data communication using zigbee
J04701080085
G05114043
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
Wireless appliances control report
Wpmc2004 phy protection
wireless notice board using RF communication
Wireless encryption & decryption in army applications.pptx
Secured communication
The Communication System C++ Project
Wireless RF module
Informe CLIL i video Comunicació.
Ijebea14 238
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
IRJET- Mobile Communication Security using Encryption and Decryption
Ad

More from Ecwayt (20)

PDF
Covering points of interest with mobile sensors
PDF
Coloring based inter-wban scheduling for mobile wireless body area networks
PDF
Clustering sentence level text using a novel fuzzy relational clustering algo...
PDF
Clustering large probabilistic graphs
PDF
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
PDF
Cloudsim ranking on data manifold with sink points
PDF
Cloudsim quality-differentiated video multicast in multirate wireless networks
PDF
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
PDF
Cloudsim distributed web systems performance forecasting using turning bands...
PDF
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
DOCX
Civil 2013 titles
DOC
Chopper based dc motor speed control
PDF
Channel assignment for throughput optimization in multichannel multiradio wir...
PDF
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
PDF
Casual stereoscopic photo authoring
DOCX
Casual stereoscopic photo authoring
PDF
Capacity of hybrid wireless mesh networks with random a ps
DOC
Bomb detection robot with wireless camera
DOC
Bed side patients monitoring system with emergency alert
PDF
Autonomous sensing order selection strategies exploiting channel access infor...
Covering points of interest with mobile sensors
Coloring based inter-wban scheduling for mobile wireless body area networks
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering large probabilistic graphs
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim ranking on data manifold with sink points
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Civil 2013 titles
Chopper based dc motor speed control
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Casual stereoscopic photo authoring
Casual stereoscopic photo authoring
Capacity of hybrid wireless mesh networks with random a ps
Bomb detection robot with wireless camera
Bed side patients monitoring system with emergency alert
Autonomous sensing order selection strategies exploiting channel access infor...

Code modulation based encryption & decryption technique for secure communication in wireless

  • 1. CODE MODULATION BASED ENCRYPTION & DECRYPTION TECHNIQUE FOR SECURE COMMUNICATION IN WIRELESS ABSTRACT In Today’s Electronic communication take important role. Today’s Communication technology the chatting system from one Place to another is easy and fast. But security is of some concern, for that we send the data by the system named as Advanced chatting system using Microcontroller. In our project we have two sections, one is transmitter section and another one is Receiver section. The two sections are designed around a microcontroller as a control unit with all the devices interfaced to it. The main aim of the project is to transmit the data using wireless communication by encrypting the data. At the receiver side, the encrypted data is decrypted and is shown in the PC. According to this project the person who wants to send the data to a remote place has to type the data from the PC. The data is received by microcontroller and is sent to RF transmitter after encrypting it. The RF receiver receives the data decodes it and displays the encrypted data in PC. If the actual data is to be viewed then a password is to be pressed. Now the cipher text is converted into plaintext.
  • 2. BLOCK DIAGRAM TRANSMITTER POWER SUPPLY Encoder MICRO CONTROLLER (AT89S52) MAX232 PC RF TX RECIEVER POWER SUPPLY DECODER MICRO CONTROLLER MAX232 (AT89S52) RF RX PC