Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

CE 2.2.1 Characteristics of the project

With the increase in the information technology and various hand held devices, security has become one of the major concerns for various technology. Along with the increase in various devices and the informational technology the data has also increased to a significant level. Therefore security issues have increased in a significant level for the information stored in the device. Along with this I have observed that securing the devices alone does not provide complete protection against the attacks. Therefore, I have found that security is the major concern for various communication networks for security and authenticating the information and data shared. Therefore, the techniques and theory of cryptography and Steganography has been developed for providing appropriate security and safety to the data transmitted through the communication channels. Therefore, in this project, I have focused on developing Zigbee based algorithm for providing security to the communicated data.

During this project I have learned that the process of cryptography required the detailed understanding and mixing of various process including the concept of logical functions and mathematics. I have studied various articles and past studies and found that security of the channel and information is dependent upon the strength and key used in the algorithm for encryption and decryption of the information and data transmitted. In this project I have aimed at providing appropriate secure communication algorithm for the Zigbee system using Cryptography and Steganography. In addition to that I have developed several objectives for this project as illustrated in the section below:

  • To develop and identify the hardware component essential for the development of the Zigbee system;
  • To evaluate the working principle for the cryptography and steganograpghic module;
  • To develop the block diagram of the proposed system;
  • To design and develop the transmitter and receiver module for the Zigbee system;
  • To prepare the appropriate algorithm for the enabling security;
  • To demonstrate the appropriate encryption process followed for the security in communication channel;

Before started working on this project I have studied various books and articles for gaining detailed information about the cryptographic process. I have used my knowledge for developing the system and generating public key at the transmitter module. In addition to that I have developed the city architecture along with the implementation of media access control layer, network layer, physical layer with the steganography protocol. I have further developed the architecture for transmitting the sensitive information from the transmitter side to the receiver side through wireless communication system.

                                              Figure 2.1: Team Member Associated with the project

I have conducted detailed research about the concept and process of steganography for hiding the data within the image file. I had the responsibility of developing the accurate algorithm for encryption and decryption of the information. Apart from that, I have developed the hardware module and wireless transmission system using Zigbee module. Furthermore, I have implemented the steganogarhic protocol within the Zigbee module for enhancing the security and integrity of the information. I had also compiled the whole research paper and also conducted different test which helped to determine the process of working of the project. Moreover, I have reviewed the work progress and developed the required documentation.

CE 2.2.2 Objectives developed for the project

CE 2.3.1 Comprehending the theory of the project

For providing security in the communication channel, the sole process of data encryption is not enough for providing appropriate security to the information transmitted. Therefore, I have included the process of both steganography and cryptography in this project for developing the appropriate security in the communication channel. I have used the cryptographic process for encrypting the data in to an image and further utilised steganography for hiding the information in the image itself. I have further used Zigbee technology for transmitting the data and information from the receiver station to the transmitter station. In the transmitter station the encrypted data are being decrypted by the system and provided the user with normal text for viewing.

                                                   Figure 2.2: Connection of the transmitter module

I have investigated the various  articles and past studies for determining the hardware elements and components required for the implementation of the Zigbee System. For this project I have selected Zigbee S2 module for establishing communication, microcontroller PIC16F877A for controlling the entire system, LCD to display the message. During the establishment of the cryptography communication, I have directed the inputted information to MAX-232 for encryption of the data. I have connected the keyboard and LCD display with the MCU for inputting the data. In addition to that, I have connected the MAX-232 with the Zigbee module for transmitting the data through the communication channel.  In addition to that, I have used the technique of LSB (Least Significant Bit) for utilizing the concept of steganography before sending the sensitive information. Through the application LSB technique I was able to hide the sensitive information within the small file. 

In this project, I have developed the architectural framework required for the development of the system. After the analysis of the various process and techniques in the field of data communication, cryptography, steganography and Zigbee module, I have proposed the required framework for the development of the wireless communication system. In addition to hat, I have proposed the algorithm required for the implementation of the message cryptography. I have used stego image for embedding the sensitive information that were required to be communicated within the secure channel.

In the proposed system, I have used an Iris pictures instead of pictures that contain faces or regular scenes, in light of the fact that the primary part or data of a man that software engineers can't hack is their biometric features. Framework is principally involved Zigbee S2 module, Alphanumeric LCD and USB to TTL module with Microchip PIC16F877A microcontroller as mind of the framework. Three fundamental circuits which any sort of microcontroller needs are reset circuit, oscillator circuit and power supply are likewise incorporated into framework. Framework is stacked with help of 16x2 alphanumeric LCD which gives arrangement of showing encoded and decoded messages on it.

CE 2.2.3 My area of work

Issue: In this project, I have observed that the significant work that is required while establishing the process of cryptography is the generation of key for both encryption and decryption process. At the transmitter section, I have utilised ACGT sequence for generating random keys that are used for encrypting the data. I have faced issue, when the key generated randomly were not of the size. Due to this the decrypted process at the receiver end failed to provide the original plain text to the user.

Solution: For resolving the issue, I have communicated with the team members and discussed the matter with the assistant professor. Upon his request and guidance, I have converted the randomly generated sequence to binary code. Further for ensuring the same length of keys, I have adjusted the plaintext length during the encryption. I have therefore created a dummy key for the encryption process at the transmission section.

                                           Figure 2.3: Process of Steganography used in the project

In order to provide creativeness and innovation within the project, I have integrated Zigbee module within the communication system for establishing wireless communication. In addition to the cryptographic process, I have utilised the technique of Steganography. I have utilized Steganography on the reserved bits field for hiding the transmitted message within the IEEE 802.14.5 layer. Apart from this, I was able to boost the security of the overall wireless communication over Zigbee. During the process of IEEE 802.14.5 I have inputted the secret message within the MAC layer’s reserved field and integrated the private key within it. I have passed the stego object within the communication channel after the encryption was done. During the receiver end, I have ensured that the encrypted data are decrypted and proper orginal text was revealed to the users.

I had collaborated with my supervisor to let myself know that the project was going on the right track and that I would be able to deliver the best quality in the research project. I had also received help from my university which had provided me with the laboratory where I had performed all the different test runs and calculation to reach the end of the project.

CE 2.4.1 Project Overview

Through this project I have proposed an advanced process for providing secure and safe channel for transmitting sensitive information through wireless communication channel. I was successful in encrypting the message with the generation of the secret key. In addition to that, the algorithm that I have proposed have provided with effective solution with complete encrypted information for transmission. Therefore, through this project I was successful in providing advanced security to the sensitive information.

I have worked along side the team members for the completion of this particular project. Throughout the entire development process, I have illustrated my knowledge and understanding of the different hardware components and Zigbee technology. In addition to that, i was successful in developing the cryptographic algorithm that has been used in the Project.
Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). Zigbee-based Algorithm For Securing Communicated Data In An Essay.. Retrieved from https://myassignmenthelp.com/free-samples/elec3500-telecommunication-networks/the-information-technology-file-O95033.html.

"Zigbee-based Algorithm For Securing Communicated Data In An Essay.." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/elec3500-telecommunication-networks/the-information-technology-file-O95033.html.

My Assignment Help (2022) Zigbee-based Algorithm For Securing Communicated Data In An Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/elec3500-telecommunication-networks/the-information-technology-file-O95033.html
[Accessed 04 December 2024].

My Assignment Help. 'Zigbee-based Algorithm For Securing Communicated Data In An Essay.' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/elec3500-telecommunication-networks/the-information-technology-file-O95033.html> accessed 04 December 2024.

My Assignment Help. Zigbee-based Algorithm For Securing Communicated Data In An Essay. [Internet]. My Assignment Help. 2022 [cited 04 December 2024]. Available from: https://myassignmenthelp.com/free-samples/elec3500-telecommunication-networks/the-information-technology-file-O95033.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close