Everyone
in this world wants to be safe and secure. When it comes to the safety
and security of Multinational companies, Military, Army, the situation
becomes more complicated. Even a common man puts his maximum efforts to
protect his data.
One
of the popular methods to protect the data in a more secure way is to
encrypt the data while sending and when received, decrypt the data to
retrieve the original message. Before transmitting the data, the data
will be converted into an unreadable form and will be sent. At the
receiving end, the reverse of encryption carries on to get back the
original message. Thus the data will be protected in every way by
following the encryption and decryption standard formats. Wireless makes
this project more flexible. Standard algorithms require software to be
installed into the system before actually using them and hardwired
connections. The hardware connections and cabling can be completely
eliminated in this project.
The most efficient and reliable wireless communication is Zigbee. The name ZigBee is said to come from the domestic honeybee which uses a zigzag type of dance to communicate important information to other hive members. This communication dance (the "ZigBee Principle") is what engineers are trying to emulate with this protocol, a bunch of separate and simple organisms that join together to tackle complex tasks. The goal IEEE had when they specified the IEEE 802.15.4 standard was to provide a standard for ultra-low complexity, ultra-low cost, ultra-low power consumption and low data rate wireless connectivity among inexpensive devices.
The
data can be entered from the PC keyboard or a keypad. This data is sent
to the microcontroller at the transmitter side. The microcontroller
converts the data into unreadable form i.e., encrypts the data and then
passes the encrypted data to the Zigbee transmitter module and the
transmitter transmits the data into air.
At
the receiver end, the Zigbee receiver module receives the data from
air. This microcontroller receives the encrypted data, decrypts the data
i.e., finally converts the data into a form suitable for the user to
read. This decrypted data can be seen on the LCD display. Thus, the data
is protected while it is transmitted and received between two different
places.
BLOCK DIAGRAM
Transmitter Section
Receiver Section