SECURE WIRELESS DATA COMMUNICATION
#1

[attachment=12503]
INTRODUCTION-:
Wireless phones are very popular, and the number of people who use them is steadily growing. As of December 2009, there were over 285 million wireless subscribers in the U.S. But even though wireless devices have many advantages, privacy is not one of them.
Depending on the kind of phone you use, others can listen to calls you make. Pagers can also be intercepted. And if your computer is connected to a wireless network ('Wi-Fi'), the data you transmit to other computers and printers might not be secure.
It pays to be aware of the privacy and fraud implications of using wireless devices. A few simple precautions will enable you to detect and prevent fraud as well as to safeguard the privacy of your communications.
A word about terminology: This guide uses the terms "analog" and "digital" when describing wireless communications. Analog cellular services have been available for 25 years and are now accessible across 95% of the U.S. They send a voice through the air using a continuous radio wave. Digital services, available since 1995, convert the signal into the ones and zeros of computer code. In contrast to analog signals which are continuous, digital transmissions are sent as discrete pulses of electricity. In cell phone networks, digital coverage is rapidly catching up to analog coverage and now accounts for more than 85% of the calls made. Digital calls are generally clearer and more secure than analog.
BASIC CONCEPT-:
There are various ways to help protect your privacy when using Wi-Fi. Begin with basic common sense. Look around to see if anyone is surreptitiously trying to look at your computer. Do not leave your computer unattended. Never conduct unsecured transactions over unsecured Wi-Fi. When entering sensitive information (such as your Social Security number, password, or credit card number), ensure that either the webpage encrypts the information or that your Wi-Fi connection is encrypted. Disable your wireless adapter if you are not using the Internet. Otherwise, you leave your computer open to vulnerabilities if it accidentally connects to the first available network.
VPN (Virtual Private Network)-:
This is the first line of defense against vulnerabilities created by Wi-Fi. A VPN provides encryption over an unencrypted Wi-Fi connection. This will help ensure that all web pages visited, log-on details, and contents of email messages remain encrypted. This renders intercepted traffic useless to the hacker. You can obtain software to set up a VPN through your office or home computer, or you can use a commercial provider’s hosted VPN service.
A BRIEF INTRODUCTION TO 8051 MICROCONTROLLER-:
When we have to learn about a new computer we have to familiarize about the machine capability we are using, and we can do it by studying the internal hardware design (devices architecture), and also to know about the size, number and the size of the registers.
A microcontroller is a single chip that contains the processor (the CPU), non-volatile memory for the program (ROM or flash), volatile memory for input and output (RAM), a clock and an I/O control unit. Also called a "computer on a chip," billions of microcontroller units (MCUs) are embedded each year in a myriad of products from toys to appliances to automobiles. For example, a single vehicle can use 70 or more microcontrollers. The following picture describes a general block diagram of microcontroller.
AT89S52: The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry-standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory pro-grammer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller, which provides a highly flexible and cost-effective solution to many, embedded control applications. The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM con-tents but freezes the oscillator, disabling all other chip functions until the next interrupt
Reply
#2

to get information about the topic Data Security In Wireless Networks full report,ppt and related topic refer the page link bellow

http://studentbank.in/report-data-securi...anr-report

http://studentbank.in/report-wireless-network-security

http://studentbank.in/report-wireless-la...ars-report

http://studentbank.in/report-wireless-in...ull-report

http://studentbank.in/report-secure-wire...munication

http://studentbank.in/report-network-security-projects

http://studentbank.in/report-border-secu...nsors-wins

http://studentbank.in/report-security-in...ull-report
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: secure wireless data communication project, detail on test platform for secure wireless communication using xtea, wireless data communication report, wireless data communication, secure wireless data communication at89s52, wireless data communication ppt, wireless data communication diagram,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ROBUST DWT-SVD DOMAIN IMAGE WATERMARKING: EMBEDDING DATA IN ALL FREQUENCIES computer science crazy 2 5,187 19-06-2018, 06:10 PM
Last Post: KavyaIyengar
  Military combat robot wireless controlled. Camera helps keeping an eye on border. seminar class 6 11,165 09-06-2017, 10:27 AM
Last Post: jaseela123d
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 18,688 17-08-2016, 09:23 AM
Last Post: jaseela123d
  Wireless Communication – ZigBee / Bluetooth / RF / IR based major projects for ECE project topics 9 19,075 16-07-2016, 03:45 PM
Last Post: jaseela123d
  Wireless based Automatic dam water level control shutter open /closed with emergency smart paper boy 4 11,244 11-09-2015, 02:00 PM
Last Post: seminar report asees
  Multiuser SMS Based Wireless Electronic Notice Board seminar class 4 5,770 20-05-2015, 01:33 PM
Last Post: seminar report asees
  wireless charging of mobile phones using microwaves ramki86 33 21,331 05-08-2014, 09:29 PM
Last Post: seminar report asees
  SMS Based Wireless Electronic Notice Board using GSM/CDMA/3G Mobile Phone seminar class 20 18,151 30-04-2014, 10:43 PM
Last Post: ShawnHasson
  SECURE ATM BY IMAGE PROCESSING seminar class 6 9,817 06-04-2014, 05:49 PM
Last Post: Guest
  PROJECT REPORT ON WIRELESS CONTROL OF MOTOR USING ZIGBEE computer topic 0 1,545 25-03-2014, 10:26 PM
Last Post: computer topic

Forum Jump: