Secured Data Transfer using ZigBee

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Four key Secured Data Transfer Using Steganography and Cryptography

Steganography and cryptography are used to send the data in a confidential way. Steganography hides the existing message and cryptography will confuse the message. The transformation of plain text to cipher text is called as encryption. The transformation of cipher text to plain text is called decryption. Encryption and decryption are controlled by keys. Hashing, symmetric and asymmetric algori...

متن کامل

Wireless Data logger Using ZigBee

This paper illustrates environmental parameters monitoring at a remote unit based on Arduino capable of transmitting the parameters to the main unit which later processes for further environmental predictions. This also explains the practical implementation of the wireless communication protocol using ZigBee, data logging, data processing using VB.net.

متن کامل

A Novel Scheme for Secured Data Transfer Over Computer Networks

This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a ‘jigsaw puzzle’ to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided to con...

متن کامل

Secured Data Transfer & Avoidance of Forgery Attacks with Digital Certificates

Today almost all organizations in the world are network-centric paradigm and to safeguard the data in a world where technology is advancing, systems are changing rapidly and information flows freely requires efficient secure channel at the endpoint. Security is the heart of IT revolution and more specifically user authentication and key establishment are the rudimentary services in secure commu...

متن کامل

Secured Wireless Data Communication

Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic sub...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Science and Technology

سال: 2016

ISSN: 0974-5645,0974-6846

DOI: 10.17485/ijst/2016/v9i17/93110