Você está na página 1de 5

Secure Data Communication using Encryption

Decryption

POWER
KEY PAD
SUPPLY

IR IR
MICROCONTROLLER
ENCODER TRANSMITTER

LCD
IR
RECEVEIR

MICROCONTROLLER
IR
DECODER

POWER
LCD
SUPPLY

LCD MICROCONTROLLER

POWER
SUPPLY

Block Diagram
In this project we have shown the concept of secure wireless data
communication. By secure data communication we mean that the
problems of data theft are also solved. At the transmission end a
keypad is attached to the transmitting microcontroller which is used
to select the characters to be transmitted to the receiver end. The
characters which are chosen at the transmitter end are also made to
display on the LCD which made the user to select a particular
character to be transmitted.
At the receiver end, two microcontrollers are present. Transmitter end
will generate a code at the beginning which will decide that which
microcontroller has to work at the receiver end. At a time only one
microcontroller will work and perform the specified task. When user
selects the mode of data transmission a code will be generated by the
transmitter which will be received at the receiving end and both
microcontrollers at receiver end will start to receive and display data
on LCD screen. So when a particular character is received from the
transmitter the receiver will display it on LCD screen.
In our present system there are two types of wireless communication for
local area networks (LAN). One of which is working on Radio
Frequencies or Electromagnetic microwave links.
These both types are very much prone to the radio wave interference i.e.
any mobile phone signal or RF signal with high power can affect and
produce interference to these wireless links. Infrared rays/laser or
light rays, these wireless LANS are immune to noise or interference
but there is no security against data theft normally known as hacking.
As these types of media's are light waves so they are RF noise free but
still data theft is the main issue. In my project it is going to use the
same area and secure transmission. This is main need to develop this
project.
But with the use of IR (Infrared Rays) these problems can be eliminated
as infrared rays are not prone to electromagnetic rays and are
unidirectional.
This is main need to develop this project. As it is going to implement the
H/W, first of all system will be economically cheap and as the
software developed for this project is “embedded C” based which is a
very commonly used programming language and also the most
reliable language for H/W interfacing. So it is very easy to understand
the software protocol.
Infrared rays/laser or light rays, these wireless LANS are immune to
noise or interference but there is no security against data theft
normally known as hacking. Increased use of LAPTOP computers
within the enterprise and increase in worker mobility has fuelled the
demand for wireless networks.
In my project it is going to implement encryption technique to overcome
the problem of data theft. This is main need to develop this project.
Objective of the project design and development of system
implementation for WLAN implementation is to generate a secure
LAN for multimedia communication using single level encryption
techniques.
The main motive of the project is to generate a multi terminal secure
communication media, in simple words we have to generate a LAN
which will be first of all wireless that is not any wire or physical
connections will be used to connect the transmitter and the receiver,
and second is to develop a secure link i.e. the data transmitted from
the transmitter for first site should only be decoded by the first user
and the data sent for the second terminal should only reach to the
second terminal.
Every terminal on the N/W will be having separate encryption and
decryption key. So the data encrypted at the transmitter for a specific
receiver terminal will be received or detected by all but the receiver
with the right decryption key will only be capable to decrypt the
received data in right format.
Thus if an unwanted or unauthorized user will try to trespass in order to
get an access to the data link will be misinformed as he wouldn’t be
having the right decryption key to decode the message.
Even then as the encryption key is a secure code, formula or the process
to be performed at the data to be transmitted before transmission, so
the user with the right decryption key or the formula to decode the
encrypted data will only be able to decrypt or decode the data
received all other users will not be able to decode the data received.
In hardware unit Infrared is used as media. As the IR rays are light rays
so there will not be any effect of radio frequencies or RF signals in
the surrounding.
To show the multi terminal communication we are going to implement
for one transmitter and two receivers. User will have an option to
choose one of the two receiving terminal with different decryption
keys, and according to the receiver terminal chosen by the user the
corresponding encryption key will be selected.

POWER SUPPLY

Power supplies are designed to convert high voltage AC mains to a


suitable low voltage supply for electronics circuits and other devices. A
power supply can be broken down into a series of blocks, each of which
performs a particular function.
For example a 5V regulated supply:

Each of the block has its own function as described below


1. Transformer – steps down high voltage AC mains to low voltage
AC.
2. Rectifier – converts AC to DC, but the DC output is varying.
3. Smoothing – smooths the DC from varying greatly to a small
ripple.
Regulator – eliminates ripple by setting DC output to a fixed voltage.

Você também pode gostar