Secret Code Enable Secure Communication Using RF Technology

Authors

  • Prasanna R. Ramteke  BE Scholar, Department of Electronics and Telecommunication Engineering, JD College of Engineering and Management, Nagpur, Maharashtra, India
  • Prashant K. Dandekar  BE Scholar, Department of Electronics and Telecommunication Engineering, JD College of Engineering and Management, Nagpur, Maharashtra, India
  • Sumit P. Dabhade  BE Scholar, Department of Electronics and Telecommunication Engineering, JD College of Engineering and Management, Nagpur, Maharashtra, India
  • Ankit S. Dhanare  BE Scholar, Department of Electronics and Telecommunication Engineering, JD College of Engineering and Management, Nagpur, Maharashtra, India
  • Prof. Payal Agrawal  Assistant Professor, Department of Electronics and Telecommunication Engineering, JD College of Engineering and Management, Nagpur, Maharashtra, India

Keywords:

Secure Communication, RF Transmission, Secure Transmission.

Abstract

The venture is intended to send secured messages by utilizing encryption from a PC console associated with the transmitting unit by means of RF innovation. The message is recovered at the recipient end just after entering the mystery code utilized by the transmitter. Therefore, the total mystery is kept up in this communication procedure. This framework has a mystery code appended to the transmission. The message composed in by the client is transmitted to the less than desirable end through RF transmitter. At the less than the desired end, the RF recipient is incorporated with a code and show framework. The client at getting end can possibly see the message on the off chance that he enters the correct code. For instance in military tasks, the mystery is of central significance. So when there is a requirement for sending any mystery message, one can type the message through a PC console interfaced with the framework including an 8051 family microcontroller and an RF transmitting module. This venture has a one of a kind element of labeling the message with a mystery code as chosen by the sender. The message is then transmitted through the RF transmitting module. At the recipient end, the flag is gotten by the RF collector module. The message is then recovered just if the mystery code is known to the accepting workforce. When the mystery code is entered, at that point message is shown on the getting unit on the LCD show.

References

  1. D. P. Agarwal and Q-A. Zeng, Introduction to Wireless and Mobile Systems (2nd Edition, published by Thomson, April 2005) ISBN 978-0-534-49303-5.
  2. J.K. and K. Ross, Computer Networking (2nd Ed, Addison Wesley, 2003) ISBN 978-0- 321-17644-8.
  3. Soltani, R.; Bash, B.; Goeckel, D.; Guha, S.; Towsley, D. (September 2014). "Covert single-hop communication in a wireless network with distributed artificial noise generation". 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton): 1078–1085. doi:10.1109/ALLERTON.2014.7028575.
  4. The schematics are illustrated in U.S. Patent 613,809 and describes "rotating coherers".
  5. Bash, Boulat A.; Goeckel, Dennis; Towsley, Don (September 2013). "Limits of Reliable
  6. Communication with Low Probability of Detection on AWGN Channels". IEEE
  7. Journal on Selected Areas in Communications. 31 (9): 1921–1930. ISSN 0733- 8716. doi:10.1109/JSAC.2013.130923.
  8. Thota P and Kim Y. Implementation and Comparison of M2M Protocols for Internet of Things. Proceedings of the Int. Conf. Appl. Comput. Inf. Technol., 2017, pp. 43–48.
  9. Alanazi H. O, Zaidan B. B, Zaidan A. A, Jalab H. A, and Shabbir M. New comparative study between DES, 3DES and AES within nine factors. J. Comput., 2010, 2(3), 152–157.
  10. Singh G and Supriya S. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl., 2013, 67(19), 33–38.
  11. Singhal N and Raina J. P. S. Comparative analysis of AES and RC4 algorithms for better utilization. Int. J. Comput. Trends Technol., 2011, 2(6), 177–181.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Prasanna R. Ramteke, Prashant K. Dandekar, Sumit P. Dabhade, Ankit S. Dhanare, Prof. Payal Agrawal, " Secret Code Enable Secure Communication Using RF Technology, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 2, pp.400-405, March-April-2019.