With the increase in the information technology and various hand held devices, security has become one of the major concerns for various technology. Along with the increase in various devices and the informational technology the data has also increased to a significant level. Therefore security issues have increased in a significant level for the information stored in the device. Along with this I have observed that securing the devices alone does not provide complete protection against the attacks. Therefore, I have found that security is the major concern for various communication networks for security and authenticating the information and data shared. Therefore, the techniques and theory of cryptography and Steganography has been developed for providing appropriate security and safety to the data transmitted through the communication channels. Therefore, in this project, I have focused on developing Zigbee based algorithm for providing security to the communicated data.
During this project I have learned that the process of cryptography required the detailed understanding and mixing of various process including the concept of logical functions and mathematics. I have studied various articles and past studies and found that security of the channel and information is dependent upon the strength and key used in the algorithm for encryption and decryption of the information and data transmitted. In this project I have aimed at providing appropriate secure communication algorithm for the Zigbee system using Cryptography and Steganography. In addition to that I have developed several objectives for this project as illustrated in the section below:
Before started working on this project I have studied various books and articles for gaining detailed information about the cryptographic process. I have used my knowledge for developing the system and generating public key at the transmitter module. In addition to that I have developed the city architecture along with the implementation of media access control layer, network layer, physical layer with the steganography protocol. I have further developed the architecture for transmitting the sensitive information from the transmitter side to the receiver side through wireless communication system.
Figure 2.1: Team Member Associated with the project
I have conducted detailed research about the concept and process of steganography for hiding the data within the image file. I had the responsibility of developing the accurate algorithm for encryption and decryption of the information. Apart from that, I have developed the hardware module and wireless transmission system using Zigbee module. Furthermore, I have implemented the steganogarhic protocol within the Zigbee module for enhancing the security and integrity of the information. I had also compiled the whole research paper and also conducted different test which helped to determine the process of working of the project. Moreover, I have reviewed the work progress and developed the required documentation.
CE 2.3.1 Comprehending the theory of the project
For providing security in the communication channel, the sole process of data encryption is not enough for providing appropriate security to the information transmitted. Therefore, I have included the process of both steganography and cryptography in this project for developing the appropriate security in the communication channel. I have used the cryptographic process for encrypting the data in to an image and further utilised steganography for hiding the information in the image itself. I have further used Zigbee technology for transmitting the data and information from the receiver station to the transmitter station. In the transmitter station the encrypted data are being decrypted by the system and provided the user with normal text for viewing.
Figure 2.2: Connection of the transmitter module
I have investigated the various articles and past studies for determining the hardware elements and components required for the implementation of the Zigbee System. For this project I have selected Zigbee S2 module for establishing communication, microcontroller PIC16F877A for controlling the entire system, LCD to display the message. During the establishment of the cryptography communication, I have directed the inputted information to MAX-232 for encryption of the data. I have connected the keyboard and LCD display with the MCU for inputting the data. In addition to that, I have connected the MAX-232 with the Zigbee module for transmitting the data through the communication channel. In addition to that, I have used the technique of LSB (Least Significant Bit) for utilizing the concept of steganography before sending the sensitive information. Through the application LSB technique I was able to hide the sensitive information within the small file.
In this project, I have developed the architectural framework required for the development of the system. After the analysis of the various process and techniques in the field of data communication, cryptography, steganography and Zigbee module, I have proposed the required framework for the development of the wireless communication system. In addition to hat, I have proposed the algorithm required for the implementation of the message cryptography. I have used stego image for embedding the sensitive information that were required to be communicated within the secure channel.
In the proposed system, I have used an Iris pictures instead of pictures that contain faces or regular scenes, in light of the fact that the primary part or data of a man that software engineers can’t hack is their biometric features. Framework is principally involved Zigbee S2 module, Alphanumeric LCD and USB to TTL module with Microchip PIC16F877A microcontroller as mind of the framework. Three fundamental circuits which any sort of microcontroller needs are reset circuit, oscillator circuit and power supply are likewise incorporated into framework. Framework is stacked with help of 16×2 alphanumeric LCD which gives arrangement of showing encoded and decoded messages on it.
Issue: In this project, I have observed that the significant work that is required while establishing the process of cryptography is the generation of key for both encryption and decryption process. At the transmitter section, I have utilised ACGT sequence for generating random keys that are used for encrypting the data. I have faced issue, when the key generated randomly were not of the size. Due to this the decrypted process at the receiver end failed to provide the original plain text to the user.
Solution: For resolving the issue, I have communicated with the team members and discussed the matter with the assistant professor. Upon his request and guidance, I have converted the randomly generated sequence to binary code. Further for ensuring the same length of keys, I have adjusted the plaintext length during the encryption. I have therefore created a dummy key for the encryption process at the transmission section.
Figure 2.3: Process of Steganography used in the project
In order to provide creativeness and innovation within the project, I have integrated Zigbee module within the communication system for establishing wireless communication. In addition to the cryptographic process, I have utilised the technique of Steganography. I have utilized Steganography on the reserved bits field for hiding the transmitted message within the IEEE 802.14.5 layer. Apart from this, I was able to boost the security of the overall wireless communication over Zigbee. During the process of IEEE 802.14.5 I have inputted the secret message within the MAC layer’s reserved field and integrated the private key within it. I have passed the stego object within the communication channel after the encryption was done. During the receiver end, I have ensured that the encrypted data are decrypted and proper orginal text was revealed to the users.
I had collaborated with my supervisor to let myself know that the project was going on the right track and that I would be able to deliver the best quality in the research project. I had also received help from my university which had provided me with the laboratory where I had performed all the different test runs and calculation to reach the end of the project.
CE 2.4.1 Project Overview
Through this project I have proposed an advanced process for providing secure and safe channel for transmitting sensitive information through wireless communication channel. I was successful in encrypting the message with the generation of the secret key. In addition to that, the algorithm that I have proposed have provided with effective solution with complete encrypted information for transmission. Therefore, through this project I was successful in providing advanced security to the sensitive information.
I have worked along side the team members for the completion of this particular project. Throughout the entire development process, I have illustrated my knowledge and understanding of the different hardware components and Zigbee technology. In addition to that, i was successful in developing the cryptographic algorithm that has been used in the Project.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download