SlideShare a Scribd company logo
1 of 35
SECURE DATA TRANSMISSION
THROUGH RF TECHNOLOGY
SRI SARATHI INSTITUTE OF ENGINEERIING
AND TECHNOLOGY
PRESENTED BY
B.JOHN PHILIP
05541A0464
UNDER THE GUIDANCE OF
Ms.M.KALPANA (M.Tech)
ABSTRACT
 Communication take an important role. But security is of some
concern.
 Encoding and decoding the data completely defines the
effectiveness of the system to secure the transmitted data.
 The parallax 433.92 MHZ RF transmitter allows users to easily
send serial data wirelessly .
 The RF transmitter paired with the matched RF receiver, reliable
wireless communication is as effortless.
OVERVIEW
 In cryptography, encryption is the process of transforming the information
using an algorithm . The result of this process is encrypted information.
 Nowadays when more and more sensitive information is stored on
computers and transmitted over the Internet or other communication
means, we need to ensure information security and safety.
 Sending sensitive messages, documents and files over the internet. Your
message is totally open to interception by anyone along the way – so
anybody - your ISP, your boss, etc. can read your message.
 Once your data has been encrypted, a person can not make
sense of your data without knowing the password (or figuring
it out).
 Sophisticated software can make intelligent guesses of the
password to decrypt data. One easy way is with a database of
common passwords. A more difficult way is by analyzing the
encrypted data.
 A longer password makes it more difficult for the entruders to
decrypt the data.
 RF communication works by creating electromagnetic
waves at a source and being able to pick up those
electromagnetic waves at a particular destination.
 Higher frequencies result in shorter wavelengths. The
wavelength for a 900 MHz is longer than that of a
2.4 GHz.
Introduction to RF
 The wavelength of an electromagnetic signal is
inversely proportional to the frequency; the higher the
frequency, the shorter the wavelength.
 When electron moves too and fro, it causes a
ripple effect, somewhat akin to dropping a pebble
in a pond.
The effect is an electromagnetic (EM) wave that
travels out from the initial location resulting in
electrons wiggling in remote locations.
An RF receiver can detect this remote electron
wiggling.
RF Communication System Works
In order to accurately compute range
– It is essential to understand a few
terms like
dB – Decibels
Range determination
Decibels are logarithmic units that are often
used to represent RF power. To convert from
watts to dB: Power in dB = 10* (log x) where
x is the power in watts.
REQUIREMENTS
 Hardware Requirements
 RF Transmitter
 RF Receiver
 Microcontroller – PIC16F877A
 MAX232N
 RS232 cables
 Antennas
 Power Supply
 PC
BLOCK DIAGRAM - TRANSMITTER SECTION
POWER SUPPLY EMBEDDED
CONTROLLER
RF TRANSMITTER
PC
ANTENNA
TRANSMITTER
In this transmitter part we use the MAX232N
for shifting the levels of the serial data to the
microcontroller .
RF Transmitter output is connected to the
antenna.
 The data which is in the air is in analog form.
 The RF modules used here are TWS-434 MHz
Transmitter, RWS-434 MHz Receiver .
BLOCK DIAGRAM – RECEIVER SECTION
RF RECEIVER
POWER SUPPLY
EMBEDDED
CONTROLLER
PC
ANTENNA
RECEIVER
 At the receiving end, the receiver receives
this analog form on a single data line and
passes this data to the microcontroller.
 This project uses regulated 5V, 500mA
power supply.
 In this receiver part we use the MAX232N for
shifting the levels of the serial data from
microcontroller .
 The name PIC initially referred to "Peripheral Interface Controller".
derived from the PIC1640,PIC is a family of Harvard architecture
microcontrollers.
 The package type of this integrated circuits is DIP package. DIP stand
for Dual Inline Package for semiconductor IC
 This IC works on just a 5V power supply adapter, 20MHz crystal
oscillator and 2 units of 33pF capacitors.
 PICs are popular with developers ,alike due to their low cost, wide
availability ,free development tools and serial programming
INTRODUCTION TO PIC16F877A
MICROCONTROLLER
CONTROLLER CIRCUIT DIAGRAM
 There are 40 pins in PIC16F877A.
 Most of the pins are for input and output, and arranged as 5 ports: A(5),
B(8),C(8), D(8) and E(3), giving a total of 32 I/O pins.
 These all can operate as simple digital I/O pins, but most have more than one
function, and the mode of operation of each is selected by initializing various
control registers within the chip.
 Ports A and E become ANALOG INPUTS by default (on power up or reset), so
they have to set up for digital I/O if required.
 Port B is used for downloading the program to the chip flash ROM (RB6 and
RB7), and RB0 and RB4–RB7 can generate an interrupt.
 Port C gives access to timers and serial ports.
 Port D can be used as a slave port.
 Port E providing the control pins for this function.
PIN DESCRIPTION
Embedded Control Solution company is the
manufacture of this PIC microcontrollers.
Microchips manufacture base-line, mid-range
and High-end controllers (12,14,16bit word
respectively)
PIC16F877A is a 16 bit controller
Microchip’s PIC 16F877A
 One of the easiest and most frequently used solutions to
the voltage differences for TTL/CMOS and RS-232 is
theMAX-232 chip from MAXIM semiconductors.
 This chip converts 5-volts TTL/CMOS signal to a minimum of
+8 to-8volts.
 Each level converter handles the conversion of two
TTL/CMOS lines .We will use the first for data transmit & receive
and the second for CTS/RTS handshaking.
 The MAX-232 is a 16-pin chip that has two complete RS-
232transreceivers. These chips work by using the capacitors to boost
the signal voltage levels to operate with in the RS-232 signal
definitions.
Introduction to MAX232N
MAX 232N
Features of MAX232N
Operates From a Single 5-V Power Supply
With 1.0-F Charge-Pump Capacitors
 Operates Up To 120 Kbit/s
 Two trans receivers
+/- 30v input levels
SOFTWARE REQUIREMENTS
 MPLAB IDE
 Orcad
 Orcad Capture (Circuit Designing)
 Orcad Layout (PCB Designing)
 Serial communication interfaces is the RS-232
(Recommended Standard). RS-232 was first defined by the
Electronic Industries Association (EIA) in 1962 .
 RS-232 provide interface between a pc and the external
equipment.
 One of the major features that RS-232 provides is the
use of asynchronous communication method.
SERIAL COMMUNICATION INTERFACE RS-232
RS-232 Connector Configurations:
25 pin connector
9 pin connector
1. Carrier Detect (CD)
2. Receive Data (RXD)
3. Transmit Data (TxD)
4. Data Terminal Read (DTR).
5. Signal ground (GND).
6. Data Set Ready (DSR)
7. Request to Send (RTS)
8. Clear to Send (CTS).
9. Ring indicator (RI)
ALGORITHM OF TRANSMITTER:
STEP 1: Start.
STEP 2: Enter the data from the keyboard which you want to transfer.
STEP 3: Enter the password which you like security Concern.
STEP 4: Depend upon the software installed the data will encrypted and it
will Show on the Computer.
STEP 5: The encrypted data transmitted to the micro controller through
RS232 Cable and will stored in controller SBUF register.
STEP 6: Data in micro controller transmitted to receiver through RF
Communication.
STEP 7: Stop.
TRANSMITTER FLOWCHART:
ALGORITHM OF RECEIVER:
STEP 1: Start.
STEP 2: The encrypted data goes to the micro controller and stored there in
SBUF.
STEP 3 : This stored data transmitted to the PC via RS232 and MAX232.
STEP 4: The encrypted data show on the computer.
STEP 5 : Give the password which will be matched to the transmitted section.
STEP 6 : Then the data will decrypted and will get the original data which
you send.
STEP 7 : Stop.
RECEIVER FLOWCHART:
ADVANTAGES
 Security.
 No line of sight is required.
 Speed of transmission.
 Not as sensitive to weather/environmental conditions .
 Easy to implement.
 Unlimited data transfer.
APPLICATIONS
 Military application
 Government’s secure data
transmission
 Storage devices ( USB )
 Wireless devices
 ATMs
LIMITATIONS:
• Since it is a wireless communication sometimes the
atmosphere may disturb the Signals this results data loss.
• Interference: communication devices using similar
frequencies - wireless Phones, scanners, wrist radios and
personal locators can interfere with Transmission.
•We have to use separate radio band, which may be
expensive
CONCLUSION
Hence by this we can say that it is provided with a effective security for
data communication by designing standard algorithm for encryption and
decryption and this transmission will also includes the password which
provides additional security for the data.
This transmission includes the password so the users must and should
remember this and keep it as secret and the password will be any of
length we can use.
The work presented in this thesis provides a model for data “Secure
data transmission through RF communication” is used to provide the
security to the data.
The encrypted data looks like the garbage until it is decrypted. So, it is
not possible for any one to look over the data during the transmission.
FUTURE SCOPE
 Through this technique we can send any type of data with high
level of security, by making the modifications in i/p and o/p
devices.
 This is embedded based so we can make our own algorithm in
micro controller for more security concern.
 We can use these high level security transfer systems for banking ,
military and online shopping .
 We can use the powerful antennas for longer communication.
Secure Data Transmission
Secure Data Transmission

More Related Content

What's hot

Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
hinalala
 
Floppy disk & drive
Floppy disk & driveFloppy disk & drive
Floppy disk & drive
Deviki Mk
 
Memory module
Memory moduleMemory module
Memory module
lemar12
 
Comuputer processor
Comuputer processorComuputer processor
Comuputer processor
Sanjeev Jain
 

What's hot (20)

Bios and cmos
Bios and cmosBios and cmos
Bios and cmos
 
Computer Components
Computer ComponentsComputer Components
Computer Components
 
Introduction for microprocessor
Introduction for microprocessorIntroduction for microprocessor
Introduction for microprocessor
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
ARM Processors
ARM ProcessorsARM Processors
ARM Processors
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Ssd(solid state drive )
Ssd(solid state drive )Ssd(solid state drive )
Ssd(solid state drive )
 
Introduction in microcontroller
Introduction in microcontrollerIntroduction in microcontroller
Introduction in microcontroller
 
Magnetic media
Magnetic mediaMagnetic media
Magnetic media
 
Pic microcontroller architecture
Pic microcontroller architecturePic microcontroller architecture
Pic microcontroller architecture
 
Computer hardware ppt1
Computer hardware ppt1Computer hardware ppt1
Computer hardware ppt1
 
Floppy disk & drive
Floppy disk & driveFloppy disk & drive
Floppy disk & drive
 
Memory module
Memory moduleMemory module
Memory module
 
Secondary memory
Secondary memorySecondary memory
Secondary memory
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
 
High Bandwidth Memory : Notes
High Bandwidth Memory : NotesHigh Bandwidth Memory : Notes
High Bandwidth Memory : Notes
 
Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)  Computer fundamentals (kamleshwar pandey)
Computer fundamentals (kamleshwar pandey)
 
Computer network
Computer networkComputer network
Computer network
 
Comuputer processor
Comuputer processorComuputer processor
Comuputer processor
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 

Viewers also liked (20)

Chap5 analog transmission
Chap5 analog transmissionChap5 analog transmission
Chap5 analog transmission
 
Ch25
Ch25Ch25
Ch25
 
Ch31
Ch31Ch31
Ch31
 
Ch15
Ch15Ch15
Ch15
 
Ch08
Ch08Ch08
Ch08
 
Ch21
Ch21Ch21
Ch21
 
Ch09
Ch09Ch09
Ch09
 
2[1].1 data transmission
2[1].1 data transmission2[1].1 data transmission
2[1].1 data transmission
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
 
Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmission
 
Digital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shapingDigital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shaping
 
Data communications
Data communicationsData communications
Data communications
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
Analog transmission
Analog transmissionAnalog transmission
Analog transmission
 
Data transmission
Data transmissionData transmission
Data transmission
 
Serial transmission
Serial transmissionSerial transmission
Serial transmission
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
Ch06
Ch06Ch06
Ch06
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
Ch18
Ch18Ch18
Ch18
 

Similar to Secure Data Transmission

Wireless Remote using RF Module
Wireless Remote using RF ModuleWireless Remote using RF Module
Wireless Remote using RF Module
ijtsrd
 
NFCRFID Ripe for Application Expansion_ElectronicDesign
NFCRFID Ripe for Application Expansion_ElectronicDesignNFCRFID Ripe for Application Expansion_ElectronicDesign
NFCRFID Ripe for Application Expansion_ElectronicDesign
Hamed M. Sanogo
 
FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...
FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...
FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...
ASHOKKUMAR RAMAR
 
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
Pradeep Singh
 

Similar to Secure Data Transmission (20)

wireless notice board using RF communication
wireless notice board using RF communicationwireless notice board using RF communication
wireless notice board using RF communication
 
Global System for Mobile Communication Based Smart Home Security System
Global System for Mobile Communication Based Smart Home Security SystemGlobal System for Mobile Communication Based Smart Home Security System
Global System for Mobile Communication Based Smart Home Security System
 
Rfid interfacing & controlling with 8051
Rfid interfacing & controlling with 8051Rfid interfacing & controlling with 8051
Rfid interfacing & controlling with 8051
 
J04701080085
J04701080085J04701080085
J04701080085
 
Wireless Remote using RF Module
Wireless Remote using RF ModuleWireless Remote using RF Module
Wireless Remote using RF Module
 
What is 433MHz Frequency?
What is 433MHz Frequency?What is 433MHz Frequency?
What is 433MHz Frequency?
 
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can Bus
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can BusIntegrated Mine Safety Monitoring and Alerting System Using Zigbee & Can Bus
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can Bus
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
NFCRFID Ripe for Application Expansion_ElectronicDesign
NFCRFID Ripe for Application Expansion_ElectronicDesignNFCRFID Ripe for Application Expansion_ElectronicDesign
NFCRFID Ripe for Application Expansion_ElectronicDesign
 
FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...
FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...
FINAL YEAR PROJECTS ABSTRACT ECE-Wireless encryption and decryption newWirele...
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
 
Hs3513431348
Hs3513431348Hs3513431348
Hs3513431348
 
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULEWIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULE
 
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)
 
IRJET- Power Line Carrier Communication
IRJET- Power Line Carrier CommunicationIRJET- Power Line Carrier Communication
IRJET- Power Line Carrier Communication
 
Hand gesture controlled robot
Hand gesture controlled robotHand gesture controlled robot
Hand gesture controlled robot
 
IoT Connectivity with LoRa
IoT Connectivity with LoRaIoT Connectivity with LoRa
IoT Connectivity with LoRa
 
Rf module interfacing without microcontrollers
Rf module interfacing without microcontrollersRf module interfacing without microcontrollers
Rf module interfacing without microcontrollers
 
Physical layer interface & standards
Physical layer interface & standardsPhysical layer interface & standards
Physical layer interface & standards
 
J010234960
J010234960J010234960
J010234960
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

Secure Data Transmission

  • 1. SECURE DATA TRANSMISSION THROUGH RF TECHNOLOGY SRI SARATHI INSTITUTE OF ENGINEERIING AND TECHNOLOGY PRESENTED BY B.JOHN PHILIP 05541A0464 UNDER THE GUIDANCE OF Ms.M.KALPANA (M.Tech)
  • 2. ABSTRACT  Communication take an important role. But security is of some concern.  Encoding and decoding the data completely defines the effectiveness of the system to secure the transmitted data.  The parallax 433.92 MHZ RF transmitter allows users to easily send serial data wirelessly .  The RF transmitter paired with the matched RF receiver, reliable wireless communication is as effortless.
  • 3. OVERVIEW  In cryptography, encryption is the process of transforming the information using an algorithm . The result of this process is encrypted information.  Nowadays when more and more sensitive information is stored on computers and transmitted over the Internet or other communication means, we need to ensure information security and safety.  Sending sensitive messages, documents and files over the internet. Your message is totally open to interception by anyone along the way – so anybody - your ISP, your boss, etc. can read your message.
  • 4.  Once your data has been encrypted, a person can not make sense of your data without knowing the password (or figuring it out).  Sophisticated software can make intelligent guesses of the password to decrypt data. One easy way is with a database of common passwords. A more difficult way is by analyzing the encrypted data.  A longer password makes it more difficult for the entruders to decrypt the data.
  • 5.  RF communication works by creating electromagnetic waves at a source and being able to pick up those electromagnetic waves at a particular destination.  Higher frequencies result in shorter wavelengths. The wavelength for a 900 MHz is longer than that of a 2.4 GHz. Introduction to RF  The wavelength of an electromagnetic signal is inversely proportional to the frequency; the higher the frequency, the shorter the wavelength.
  • 6.  When electron moves too and fro, it causes a ripple effect, somewhat akin to dropping a pebble in a pond. The effect is an electromagnetic (EM) wave that travels out from the initial location resulting in electrons wiggling in remote locations. An RF receiver can detect this remote electron wiggling. RF Communication System Works
  • 7. In order to accurately compute range – It is essential to understand a few terms like dB – Decibels Range determination Decibels are logarithmic units that are often used to represent RF power. To convert from watts to dB: Power in dB = 10* (log x) where x is the power in watts.
  • 8. REQUIREMENTS  Hardware Requirements  RF Transmitter  RF Receiver  Microcontroller – PIC16F877A  MAX232N  RS232 cables  Antennas  Power Supply  PC
  • 9. BLOCK DIAGRAM - TRANSMITTER SECTION POWER SUPPLY EMBEDDED CONTROLLER RF TRANSMITTER PC ANTENNA
  • 11. In this transmitter part we use the MAX232N for shifting the levels of the serial data to the microcontroller . RF Transmitter output is connected to the antenna.  The data which is in the air is in analog form.  The RF modules used here are TWS-434 MHz Transmitter, RWS-434 MHz Receiver .
  • 12. BLOCK DIAGRAM – RECEIVER SECTION RF RECEIVER POWER SUPPLY EMBEDDED CONTROLLER PC ANTENNA
  • 14.  At the receiving end, the receiver receives this analog form on a single data line and passes this data to the microcontroller.  This project uses regulated 5V, 500mA power supply.  In this receiver part we use the MAX232N for shifting the levels of the serial data from microcontroller .
  • 15.  The name PIC initially referred to "Peripheral Interface Controller". derived from the PIC1640,PIC is a family of Harvard architecture microcontrollers.  The package type of this integrated circuits is DIP package. DIP stand for Dual Inline Package for semiconductor IC  This IC works on just a 5V power supply adapter, 20MHz crystal oscillator and 2 units of 33pF capacitors.  PICs are popular with developers ,alike due to their low cost, wide availability ,free development tools and serial programming INTRODUCTION TO PIC16F877A MICROCONTROLLER
  • 17.  There are 40 pins in PIC16F877A.  Most of the pins are for input and output, and arranged as 5 ports: A(5), B(8),C(8), D(8) and E(3), giving a total of 32 I/O pins.  These all can operate as simple digital I/O pins, but most have more than one function, and the mode of operation of each is selected by initializing various control registers within the chip.  Ports A and E become ANALOG INPUTS by default (on power up or reset), so they have to set up for digital I/O if required.  Port B is used for downloading the program to the chip flash ROM (RB6 and RB7), and RB0 and RB4–RB7 can generate an interrupt.  Port C gives access to timers and serial ports.  Port D can be used as a slave port.  Port E providing the control pins for this function. PIN DESCRIPTION
  • 18. Embedded Control Solution company is the manufacture of this PIC microcontrollers. Microchips manufacture base-line, mid-range and High-end controllers (12,14,16bit word respectively) PIC16F877A is a 16 bit controller Microchip’s PIC 16F877A
  • 19.  One of the easiest and most frequently used solutions to the voltage differences for TTL/CMOS and RS-232 is theMAX-232 chip from MAXIM semiconductors.  This chip converts 5-volts TTL/CMOS signal to a minimum of +8 to-8volts.  Each level converter handles the conversion of two TTL/CMOS lines .We will use the first for data transmit & receive and the second for CTS/RTS handshaking.  The MAX-232 is a 16-pin chip that has two complete RS- 232transreceivers. These chips work by using the capacitors to boost the signal voltage levels to operate with in the RS-232 signal definitions. Introduction to MAX232N
  • 21. Features of MAX232N Operates From a Single 5-V Power Supply With 1.0-F Charge-Pump Capacitors  Operates Up To 120 Kbit/s  Two trans receivers +/- 30v input levels
  • 22. SOFTWARE REQUIREMENTS  MPLAB IDE  Orcad  Orcad Capture (Circuit Designing)  Orcad Layout (PCB Designing)
  • 23.  Serial communication interfaces is the RS-232 (Recommended Standard). RS-232 was first defined by the Electronic Industries Association (EIA) in 1962 .  RS-232 provide interface between a pc and the external equipment.  One of the major features that RS-232 provides is the use of asynchronous communication method. SERIAL COMMUNICATION INTERFACE RS-232
  • 24. RS-232 Connector Configurations: 25 pin connector 9 pin connector 1. Carrier Detect (CD) 2. Receive Data (RXD) 3. Transmit Data (TxD) 4. Data Terminal Read (DTR). 5. Signal ground (GND). 6. Data Set Ready (DSR) 7. Request to Send (RTS) 8. Clear to Send (CTS). 9. Ring indicator (RI)
  • 25. ALGORITHM OF TRANSMITTER: STEP 1: Start. STEP 2: Enter the data from the keyboard which you want to transfer. STEP 3: Enter the password which you like security Concern. STEP 4: Depend upon the software installed the data will encrypted and it will Show on the Computer. STEP 5: The encrypted data transmitted to the micro controller through RS232 Cable and will stored in controller SBUF register. STEP 6: Data in micro controller transmitted to receiver through RF Communication. STEP 7: Stop.
  • 27. ALGORITHM OF RECEIVER: STEP 1: Start. STEP 2: The encrypted data goes to the micro controller and stored there in SBUF. STEP 3 : This stored data transmitted to the PC via RS232 and MAX232. STEP 4: The encrypted data show on the computer. STEP 5 : Give the password which will be matched to the transmitted section. STEP 6 : Then the data will decrypted and will get the original data which you send. STEP 7 : Stop.
  • 29. ADVANTAGES  Security.  No line of sight is required.  Speed of transmission.  Not as sensitive to weather/environmental conditions .  Easy to implement.  Unlimited data transfer.
  • 30. APPLICATIONS  Military application  Government’s secure data transmission  Storage devices ( USB )  Wireless devices  ATMs
  • 31. LIMITATIONS: • Since it is a wireless communication sometimes the atmosphere may disturb the Signals this results data loss. • Interference: communication devices using similar frequencies - wireless Phones, scanners, wrist radios and personal locators can interfere with Transmission. •We have to use separate radio band, which may be expensive
  • 32. CONCLUSION Hence by this we can say that it is provided with a effective security for data communication by designing standard algorithm for encryption and decryption and this transmission will also includes the password which provides additional security for the data. This transmission includes the password so the users must and should remember this and keep it as secret and the password will be any of length we can use. The work presented in this thesis provides a model for data “Secure data transmission through RF communication” is used to provide the security to the data. The encrypted data looks like the garbage until it is decrypted. So, it is not possible for any one to look over the data during the transmission.
  • 33. FUTURE SCOPE  Through this technique we can send any type of data with high level of security, by making the modifications in i/p and o/p devices.  This is embedded based so we can make our own algorithm in micro controller for more security concern.  We can use these high level security transfer systems for banking , military and online shopping .  We can use the powerful antennas for longer communication.