You are on page 1of 10

VIGNAN’S LARA INSTITUTE OF TECHNOLOGY

AND SCIENCES

PRESENTED BY: GUIDED BY:


K.RADHA RANI-16FE1A0471 M.KISHORE
N.HIMA BINDU-16FE1A04A3
N.PRATHIBHA-16FE1AO4B5
K.PRUDHVI-16FE1A0464
 The Wi-Fi based secured wireless communication using RSA
encryption allows us to communicate wirelessly with security
feature. The data transfer during communication between two
system is encrypted using RSA encryption which is highly
secure.
 Security of data in army stations is an important issue. In early
systems, at the time of information transmission between two
army stations, it can be hacked by terrorists, spies and
enemies.
 Cryptography is a very important system employed for this
purpose.
 Mobile nodes in military environments such as a battlefield or
a hostile region are likely to suffer from intermittent network
connectivity and frequent partitions. Disruption-tolerant
Network (DTN) technologies are becoming successful
solutions that allow wireless devices carried by soldiers to
communicate with each other and access the confidential
information
 Atmega 328 Microcontrollers
 2 Wi-Fi modules
 LCD Displays
 USB Keyboards
 12V Transformers
 Resistors
 Capacitors
 Diodes
 Arduino Compiler
 MC Programming Language: C
 The data can be decrypted with correct key only, otherwise it
returns some garbage value. This is two way communication
system where we can transmit as well as receive at both ends.
We have used Atmega microcontroller interfaced with xbee
along with LCD display to send message and key, also have
USB keyboards connected to each system and powered by
12V supply.
 After starting system, we will able to enter message on system.
The maximum limit of message is 32 character. After that
system asks for key, the key limit is 16character it can be
number or alphabet.
 Entering key will send the encrypted message to other system.
Then the other system ask key to view the message. If the
users enter correct key the message gets decrypted otherwise it
will show garbage value thus securing the wireless
communication.
 Cryptography is the best method for security of data. The
proposed RSA shows a better result when compared with the
previous works. It will take less time and it is impossible to
break the encryption algorithm without knowing the exact key
value. This algorithm can be applied for data encryption and
decryption in any type of public applications for sending
confidential data

You might also like