Open Access Open Access  Restricted Access Subscription Access

Secured Data Transfer using ZigBee


Affiliations
1 Department of Electronics and Computer Science Engineering, KL University, Vaddeswaram Guntur - 522502, Andhra Pradesh, India
2 Department of Electronics and Computer Science Engineering, KL University, Vaddeswaram, Guntur - 522502, Andhra Pradesh, India
 

Background/Objectives: The main objective is to provide security while transmitting any data through a wireless data communication. Here we will be having two sections transmitter section and receiver section. The data we are transmitting is encrypted and send from the transmitter and is decrypted at receiver end. Methods/Statistical Analysis: We will be converting the given data into its ASCII values. The transmitter encrypts it and sent it to the receiver; the receiver needs to decrypt the data in order to know what data actually being sent. Findings: This system has to provide the exact data and also it should see that security is maintained. Applications: It is used in places where security is given higher preference. It is good to be used in banks.

Keywords

Receiver, Security, Transmitter, Zigbee.
User

Abstract Views: 209

PDF Views: 0




  • Secured Data Transfer using ZigBee

Abstract Views: 209  |  PDF Views: 0

Authors

A. S. R. Murty
Department of Electronics and Computer Science Engineering, KL University, Vaddeswaram Guntur - 522502, Andhra Pradesh, India
K. Phani Mounika
Department of Electronics and Computer Science Engineering, KL University, Vaddeswaram, Guntur - 522502, Andhra Pradesh, India
K. Anusha Reddy
Department of Electronics and Computer Science Engineering, KL University, Vaddeswaram, Guntur - 522502, Andhra Pradesh, India
K. Bhanu Karthik
Department of Electronics and Computer Science Engineering, KL University, Vaddeswaram, Guntur - 522502, Andhra Pradesh, India

Abstract


Background/Objectives: The main objective is to provide security while transmitting any data through a wireless data communication. Here we will be having two sections transmitter section and receiver section. The data we are transmitting is encrypted and send from the transmitter and is decrypted at receiver end. Methods/Statistical Analysis: We will be converting the given data into its ASCII values. The transmitter encrypts it and sent it to the receiver; the receiver needs to decrypt the data in order to know what data actually being sent. Findings: This system has to provide the exact data and also it should see that security is maintained. Applications: It is used in places where security is given higher preference. It is good to be used in banks.

Keywords


Receiver, Security, Transmitter, Zigbee.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i17%2F132878