Você está na página 1de 4

A

SYNOPSIS
ON

SECURED WIRELESS DATA


COMMUNICATION (AT89S52)
SUBMITTED

BY

BIKASH RANJAN RAM


CHANDAN KR. JHA
SIDDHARTH KR. SINGH

UNDER THE GUIDANCE OF

MR. MANAB KR. DAS


SR. LECTURER

DEPARTMENT OF

ELECTRONICS AND COMMUNICATION ENGINEERING

MALLABHUM INSTITUTE OF TECHNOLOGY

BISHNUPUR (BANKURA)

2009-2010

PROJECT OVERVIEW
This project is used to communicate or transmit a text message
from one place to another place through wireless. The text message is
encrypted by using the Microcontroller and the encrypted message is
transmitted through wireless. At the receiver end the signal is received by
the standard receiver and the analog signal is fed to the Microcontroller
and it is decrypted by the Microcontroller and the message is displayed
over the LCD display. We can use several receivers and the message from
the transmitter can be sent to the entire receivers at the same time. Each
receiver can be accessed separately by its address. The Microcontroller is
used to do the above work. It gets data from the Keyboard and encrypts
with the private algorithm and at the receiver end the Microcontroller
decrypts it with the same algorithm and display the data over the LCD
display.
BLOCK DIAGRAM INVOLVED

TRANSMITTER SECTION

DISPLAY (LCD

16X2)
IC
1 16Q
INPUT AT89
(KEYBOARD) S52

AM
TRANSMITT
ER

RECEIVER SECTION

IC
DISPLAY (LCD
2
16X2) AM
AT89C RECEIVER
2051
16Q
OBJECTIVE
Often there has been a need to protect information
from 'prying eyes'. In the electronic age, information that
could otherwise benefit or educate a group or individual
can also be used against such groups or individuals.
Industrial espionage among highly competitive businesses
often requires that extensive security measures be put
into place.
This project relates to a method and system for secured wireless
communications. In particular, the project relates to a method of establishing
authentication keys at both the network and mobile equipment in order to
establish a mutually authenticated communication channel.

CONCLUSION
Because of the need to ensure that only those eyes
intended to view sensitive information can ever see this
information, and to ensure that the information arrives un-
altered, security systems have often been employed in
computer systems for governments, corporations, and
even individuals. Encryption schemes can be broken, but
making them as hard as possible to break is the job of a
good cipher designer. All we can really do is to make it
very difficult for the code breaker to decipher our cipher.
Still, as long as both source and encrypted data are
available, it will always be possible to break our code. It
just won't necessarily be easy.

Você também pode gostar