Secure Wireless Communication System
VerifiedAdded on  2020/02/24
|10
|1773
|37
AI Summary
This engineering project focuses on developing a secure wireless communication system utilizing the Zigbee protocol and cryptographic techniques. The project involves implementing encryption algorithms to protect transmitted messages and incorporating steganography to hide the message within reserved bits of the IEEE 802.14.5 layer. The student details their contributions to the project, including the development of the cryptographic algorithm and collaboration with team members and supervisors.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Career Episode 2
Competency
Demonstration Report
Competency
Demonstration Report
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CE 2.1 Project Information
Name of the project : Secured Wireless Communication through Zigbee using
Cryptography and Steganography
Location of the project : [PLEASE FILL]
Project Duration : [PLEASE FILL]
Organization : [PLEASE FILL]
Role and Designation : [PLEASE FILL]
CE 2.2 Project Background
CE 2.2.1 Characteristics of the project
With the increase in the information technology and various hand held devices, security
has become one of the major concerns for various technology. Along with the increase in various
devices and the informational technology the data has also increased to a significant level.
Therefore security issues have increased in a significant level for the information stored in the
device. Along with this I have observed that securing the devices alone does not provide
complete protection against the attacks. Therefore, I have found that security is the major
concern for various communication networks for security and authenticating the information and
data shared. Therefore, the techniques and theory of cryptography and Steganography has been
developed for providing appropriate security and safety to the data transmitted through the
Page 1 of 10
Name of the project : Secured Wireless Communication through Zigbee using
Cryptography and Steganography
Location of the project : [PLEASE FILL]
Project Duration : [PLEASE FILL]
Organization : [PLEASE FILL]
Role and Designation : [PLEASE FILL]
CE 2.2 Project Background
CE 2.2.1 Characteristics of the project
With the increase in the information technology and various hand held devices, security
has become one of the major concerns for various technology. Along with the increase in various
devices and the informational technology the data has also increased to a significant level.
Therefore security issues have increased in a significant level for the information stored in the
device. Along with this I have observed that securing the devices alone does not provide
complete protection against the attacks. Therefore, I have found that security is the major
concern for various communication networks for security and authenticating the information and
data shared. Therefore, the techniques and theory of cryptography and Steganography has been
developed for providing appropriate security and safety to the data transmitted through the
Page 1 of 10
communication channels. Therefore, in this project, I have focused on developing Zigbee based
algorithm for providing security to the communicated data.
CE 2.2.2 Objectives developed for the project
During this project I have learned that the process of cryptography required the detailed
understanding and mixing of various process including the concept of logical functions and
mathematics. I have studied various articles and past studies and found that security of the
channel and information is dependent upon the strength and key used in the algorithm for
encryption and decryption of the information and data transmitted. In this project I have aimed at
providing appropriate secure communication algorithm for the Zigbee system using
Cryptography and Steganography. In addition to that I have developed several objectives for this
project as illustrated in the section below:
ï‚· To develop and identify the hardware component essential for the development of the
Zigbee system;
ï‚· To evaluate the working principle for the cryptography and steganograpghic module;
ï‚· To develop the block diagram of the proposed system;
ï‚· To design and develop the transmitter and receiver module for the Zigbee system;
ï‚· To prepare the appropriate algorithm for the enabling security;
ï‚· To demonstrate the appropriate encryption process followed for the security in
communication channel;
Page 2 of 10
algorithm for providing security to the communicated data.
CE 2.2.2 Objectives developed for the project
During this project I have learned that the process of cryptography required the detailed
understanding and mixing of various process including the concept of logical functions and
mathematics. I have studied various articles and past studies and found that security of the
channel and information is dependent upon the strength and key used in the algorithm for
encryption and decryption of the information and data transmitted. In this project I have aimed at
providing appropriate secure communication algorithm for the Zigbee system using
Cryptography and Steganography. In addition to that I have developed several objectives for this
project as illustrated in the section below:
ï‚· To develop and identify the hardware component essential for the development of the
Zigbee system;
ï‚· To evaluate the working principle for the cryptography and steganograpghic module;
ï‚· To develop the block diagram of the proposed system;
ï‚· To design and develop the transmitter and receiver module for the Zigbee system;
ï‚· To prepare the appropriate algorithm for the enabling security;
ï‚· To demonstrate the appropriate encryption process followed for the security in
communication channel;
Page 2 of 10
CE 2.2.3 My area of work
Before started working on this project I have studied various books and articles for
gaining detailed information about the cryptographic process. I have used my knowledge for
developing the system and generating public key at the transmitter module. In addition to that I
have developed the city architecture along with the implementation of media access control
layer, network layer, physical layer with the steganography protocol. I have further developed
the architecture for transmitting the sensitive information from the transmitter side to the receiver
side through wireless communication system.
CE 2.2.4 Project Group
Figure 2.1: Team Member Associated with the project
Page 3 of 10
Before started working on this project I have studied various books and articles for
gaining detailed information about the cryptographic process. I have used my knowledge for
developing the system and generating public key at the transmitter module. In addition to that I
have developed the city architecture along with the implementation of media access control
layer, network layer, physical layer with the steganography protocol. I have further developed
the architecture for transmitting the sensitive information from the transmitter side to the receiver
side through wireless communication system.
CE 2.2.4 Project Group
Figure 2.1: Team Member Associated with the project
Page 3 of 10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CE 2.2.5 My responsibilities throughout the project
I have conducted detailed research about the concept and process of steganography for
hiding the data within the image file. I had the responsibility of developing the accurate
algorithm for encryption and decryption of the information. Apart from that, I have developed
the hardware module and wireless transmission system using Zigbee module. Furthermore, I
have implemented the steganogarhic protocol within the Zigbee module for enhancing the
security and integrity of the information. I had also compiled the whole research paper and also
conducted different test which helped to determine the process of working of the project.
Moreover, I have reviewed the work progress and developed the required documentation.
CE 2.3 Distinctive Activity
CE 2.3.1 Comprehending the theory of the project
For providing security in the communication channel, the sole process of data encryption
is not enough for providing appropriate security to the information transmitted. Therefore, I have
included the process of both steganography and cryptography in this project for developing the
appropriate security in the communication channel. I have used the cryptographic process for
encrypting the data in to an image and further utilised steganography for hiding the information
in the image itself. I have further used Zigbee technology for transmitting the data and
information from the receiver station to the transmitter station. In the transmitter station the
encrypted data are being decrypted by the system and provided the user with normal text for
viewing.
Page 4 of 10
I have conducted detailed research about the concept and process of steganography for
hiding the data within the image file. I had the responsibility of developing the accurate
algorithm for encryption and decryption of the information. Apart from that, I have developed
the hardware module and wireless transmission system using Zigbee module. Furthermore, I
have implemented the steganogarhic protocol within the Zigbee module for enhancing the
security and integrity of the information. I had also compiled the whole research paper and also
conducted different test which helped to determine the process of working of the project.
Moreover, I have reviewed the work progress and developed the required documentation.
CE 2.3 Distinctive Activity
CE 2.3.1 Comprehending the theory of the project
For providing security in the communication channel, the sole process of data encryption
is not enough for providing appropriate security to the information transmitted. Therefore, I have
included the process of both steganography and cryptography in this project for developing the
appropriate security in the communication channel. I have used the cryptographic process for
encrypting the data in to an image and further utilised steganography for hiding the information
in the image itself. I have further used Zigbee technology for transmitting the data and
information from the receiver station to the transmitter station. In the transmitter station the
encrypted data are being decrypted by the system and provided the user with normal text for
viewing.
Page 4 of 10
CE 2.3.2 Engineering knowledge and skills applied in the project
Figure 2.2: Connection of the transmitter module
I have investigated the various articles and past studies for determining the hardware
elements and components required for the implementation of the Zigbee System. For this project
I have selected Zigbee S2 module for establishing communication, microcontroller PIC16F877A
for controlling the entire system, LCD to display the message. During the establishment of the
cryptography communication, I have directed the inputted information to MAX-232 for
encryption of the data. I have connected the keyboard and LCD display with the MCU for
inputting the data. In addition to that, I have connected the MAX-232 with the Zigbee module for
transmitting the data through the communication channel. In addition to that, I have used the
Page 5 of 10
Figure 2.2: Connection of the transmitter module
I have investigated the various articles and past studies for determining the hardware
elements and components required for the implementation of the Zigbee System. For this project
I have selected Zigbee S2 module for establishing communication, microcontroller PIC16F877A
for controlling the entire system, LCD to display the message. During the establishment of the
cryptography communication, I have directed the inputted information to MAX-232 for
encryption of the data. I have connected the keyboard and LCD display with the MCU for
inputting the data. In addition to that, I have connected the MAX-232 with the Zigbee module for
transmitting the data through the communication channel. In addition to that, I have used the
Page 5 of 10
technique of LSB (Least Significant Bit) for utilizing the concept of steganography before
sending the sensitive information. Through the application LSB technique I was able to hide the
sensitive information within the small file.
CE 2.3.3 Accomplishment and task performed
In this project, I have developed the architectural framework required for the
development of the system. After the analysis of the various process and techniques in the field
of data communication, cryptography, steganography and Zigbee module, I have proposed the
required framework for the development of the wireless communication system. In addition to
hat, I have proposed the algorithm required for the implementation of the message cryptography.
I have used stego image for embedding the sensitive information that were required to be
communicated within the secure channel.
In the proposed system, I have used an Iris pictures instead of pictures that contain faces
or regular scenes, in light of the fact that the primary part or data of a man that software
engineers can't hack is their biometric features. Framework is principally involved Zigbee S2
module, Alphanumeric LCD and USB to TTL module with Microchip PIC16F877A
microcontroller as mind of the framework. Three fundamental circuits which any sort of
microcontroller needs are reset circuit, oscillator circuit and power supply are likewise
incorporated into framework. Framework is stacked with help of 16x2 alphanumeric LCD which
gives arrangement of showing encoded and decoded messages on it.
Page 6 of 10
sending the sensitive information. Through the application LSB technique I was able to hide the
sensitive information within the small file.
CE 2.3.3 Accomplishment and task performed
In this project, I have developed the architectural framework required for the
development of the system. After the analysis of the various process and techniques in the field
of data communication, cryptography, steganography and Zigbee module, I have proposed the
required framework for the development of the wireless communication system. In addition to
hat, I have proposed the algorithm required for the implementation of the message cryptography.
I have used stego image for embedding the sensitive information that were required to be
communicated within the secure channel.
In the proposed system, I have used an Iris pictures instead of pictures that contain faces
or regular scenes, in light of the fact that the primary part or data of a man that software
engineers can't hack is their biometric features. Framework is principally involved Zigbee S2
module, Alphanumeric LCD and USB to TTL module with Microchip PIC16F877A
microcontroller as mind of the framework. Three fundamental circuits which any sort of
microcontroller needs are reset circuit, oscillator circuit and power supply are likewise
incorporated into framework. Framework is stacked with help of 16x2 alphanumeric LCD which
gives arrangement of showing encoded and decoded messages on it.
Page 6 of 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
CE 2.3.4 Identified issues and their solutions
Issue: In this project, I have observed that the significant work that is required while
establishing the process of cryptography is the generation of key for both encryption and
decryption process. At the transmitter section, I have utilised ACGT sequence for generating
random keys that are used for encrypting the data. I have faced issue, when the key generated
randomly were not of the size. Due to this the decrypted process at the receiver end failed to
provide the original plain text to the user.
Solution: For resolving the issue, I have communicated with the team members and
discussed the matter with the assistant professor. Upon his request and guidance, I have
converted the randomly generated sequence to binary code. Further for ensuring the same length
of keys, I have adjusted the plaintext length during the encryption. I have therefore created a
dummy key for the encryption process at the transmission section.
Page 7 of 10
Issue: In this project, I have observed that the significant work that is required while
establishing the process of cryptography is the generation of key for both encryption and
decryption process. At the transmitter section, I have utilised ACGT sequence for generating
random keys that are used for encrypting the data. I have faced issue, when the key generated
randomly were not of the size. Due to this the decrypted process at the receiver end failed to
provide the original plain text to the user.
Solution: For resolving the issue, I have communicated with the team members and
discussed the matter with the assistant professor. Upon his request and guidance, I have
converted the randomly generated sequence to binary code. Further for ensuring the same length
of keys, I have adjusted the plaintext length during the encryption. I have therefore created a
dummy key for the encryption process at the transmission section.
Page 7 of 10
CE 2.3.5 Plan to produce creative and innovative work
Figure 2.3: Process of Steganography used in the project
In order to provide creativeness and innovation within the project, I have integrated
Zigbee module within the communication system for establishing wireless communication. In
addition to the cryptographic process, I have utilised the technique of Steganography. I have
utilized Steganography on the reserved bits field for hiding the transmitted message within the
IEEE 802.14.5 layer. Apart from this, I was able to boost the security of the overall wireless
communication over Zigbee. During the process of IEEE 802.14.5 I have inputted the secret
message within the MAC layer’s reserved field and integrated the private key within it. I have
passed the stego object within the communication channel after the encryption was done. During
the receiver end, I have ensured that the encrypted data are decrypted and proper orginal text was
revealed to the users.
Page 8 of 10
Figure 2.3: Process of Steganography used in the project
In order to provide creativeness and innovation within the project, I have integrated
Zigbee module within the communication system for establishing wireless communication. In
addition to the cryptographic process, I have utilised the technique of Steganography. I have
utilized Steganography on the reserved bits field for hiding the transmitted message within the
IEEE 802.14.5 layer. Apart from this, I was able to boost the security of the overall wireless
communication over Zigbee. During the process of IEEE 802.14.5 I have inputted the secret
message within the MAC layer’s reserved field and integrated the private key within it. I have
passed the stego object within the communication channel after the encryption was done. During
the receiver end, I have ensured that the encrypted data are decrypted and proper orginal text was
revealed to the users.
Page 8 of 10
CE 2.3.6 Collaborative work
I had collaborated with my supervisor to let myself know that the project was going on
the right track and that I would be able to deliver the best quality in the research project. I had
also received help from my university which had provided me with the laboratory where I had
performed all the different test runs and calculation to reach the end of the project.
CE 2.4 Project Review
CE 2.4.1 Project Overview
Through this project I have proposed an advanced process for providing secure and safe
channel for transmitting sensitive information through wireless communication channel. I was
successful in encrypting the message with the generation of the secret key. In addition to that, the
algorithm that I have proposed have provided with effective solution with complete encrypted
information for transmission. Therefore, through this project I was successful in providing
advanced security to the sensitive information.
CE 2.4.2 My contribution to work
I have worked along side the team members for the completion of this particular project.
Throughout the entire development process, I have illustrated my knowledge and understanding
of the different hardware components and Zigbee technology. In addition to that, i was
successful in developing the cryptographic algorithm that has been used in this project.
Page 9 of 10
I had collaborated with my supervisor to let myself know that the project was going on
the right track and that I would be able to deliver the best quality in the research project. I had
also received help from my university which had provided me with the laboratory where I had
performed all the different test runs and calculation to reach the end of the project.
CE 2.4 Project Review
CE 2.4.1 Project Overview
Through this project I have proposed an advanced process for providing secure and safe
channel for transmitting sensitive information through wireless communication channel. I was
successful in encrypting the message with the generation of the secret key. In addition to that, the
algorithm that I have proposed have provided with effective solution with complete encrypted
information for transmission. Therefore, through this project I was successful in providing
advanced security to the sensitive information.
CE 2.4.2 My contribution to work
I have worked along side the team members for the completion of this particular project.
Throughout the entire development process, I have illustrated my knowledge and understanding
of the different hardware components and Zigbee technology. In addition to that, i was
successful in developing the cryptographic algorithm that has been used in this project.
Page 9 of 10
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.