You are on page 1of 17

WIRELESS DATA ENCRYPTION & DECRYPTION

G.AJAY M.ANIVESH S.TRIPURA G.SOWJANYA (09271A0418) PROJECT GUIDE: D.MAHESH KUMAR ASSOCIATE PROF. (09271A0445) DEPARTMENT OF ECE (09271A0455) JMTS,KARIMNAGAR (102751A402)

Objective

security along with better communication.


encrypt message and send using RF transmitter. On receiver side message is decrypted and is displayed.

Introduction

wireless transmission of messages was not a big deal.


security is a big issue.

anyone can intercept if transmitted over wireless.


How to overcome this?

Embedded System

special purpose system provide service in real time. No waiting time dedicated to specific task, design reduce the size and cost of the product. Components include
1) Microprocessor 2) Memory 3) Input Output Devices & Interfaces 4) Software

Transmitter Section Block Diagram


LCD MICRO CONTROLLER RF ENCODER RF TRANSMITTER

KEYPAD

STEP DOWN TRANSFO RMER

BRIDGE RECTIFIER

FILTER CIRCUIT

REGULATOR

POWER SUPPLY TO ALL CONNECTIO NS

Receiver Section Block Diagram

RF RECEIVER

RF ENCODER

MICRO CONTROLLER

LCD

STEP DOWN TRANSFO RMER

BRIDGE RECTIFIER

FILTER CIRCUIT

REGULATOR

POWER SUPPLY TO ALL CONNECTIO NS

About AT89C52

Pin diagram

Features

1) CMOS 8-bit microcomputer. 2) 256 X 8-bit internal RAM.

3) 4Kbytes of PEROM
4) 32 programmable IO pins. 5) Three 16-bit Timer/Counter. 6) Eight Interrupt Sources. 7) Programmable serial channel.

RF Modules

RF modules are normally divided into three groups,

2) RF RFTransmitter Receiver STR-433MHz 1) STT-433MHz 1) RF Transmitter


2) received RF Receiver The data is by the RF receiver from the antenna Ideal for remote control applications where low cost and pin RFis Transceiver and this 3) data available on the data pins. longer range is required.

operates Two data from pins 1.5-12V are provided in the receiver module. supply, making it ideal for battery Thus, application. this data can be used for further applications. powered operates at 433.92MHz.

Why RF?

Types of propagation
LOS NLOS

Free space loss


L=C+20*log(D)+20*log(f)

Encryption & Decryption


Key-based cryptographic

Symmetric

Asymmetric

world

Xhvgl !{[#!

world

Keil Software

by Gunter and Reinhard Keil in 1992.


implemented the first C compiler designed from ground

up specifically for the 8051 microcontroller.

provides a broad range of development tools.

Advantages

data cannot be received unless you have receiver code


Message encrypted is transmitted using RF transmitter. When encrypted message is received it is decrypted by the microcontroller and is displayed.

Applications

used by security agencies for communication.


used by the police. send secrete messages.

Conclusion

able to send or receive messages.


handle all handshaking problems. Data sent & received according to the specific algorithm. If we were given this project once again, we would: Find transmitting & receiving modules operating at different frequencies. communication with multiple devices. program the targets identification number

Future Advancements
enhanced to a duplex mode of communication. a proper key management scheme implemented using long range RF modules. Upgrade the data encryption unit enhanced for working with other devices in a LAN.

QUERIES

You might also like