Secured Data Transfer using ZigBee
نویسندگان
چکیده
منابع مشابه
Four key Secured Data Transfer Using Steganography and Cryptography
Steganography and cryptography are used to send the data in a confidential way. Steganography hides the existing message and cryptography will confuse the message. The transformation of plain text to cipher text is called as encryption. The transformation of cipher text to plain text is called decryption. Encryption and decryption are controlled by keys. Hashing, symmetric and asymmetric algori...
متن کاملWireless Data logger Using ZigBee
This paper illustrates environmental parameters monitoring at a remote unit based on Arduino capable of transmitting the parameters to the main unit which later processes for further environmental predictions. This also explains the practical implementation of the wireless communication protocol using ZigBee, data logging, data processing using VB.net.
متن کاملA Novel Scheme for Secured Data Transfer Over Computer Networks
This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a ‘jigsaw puzzle’ to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided to con...
متن کاملSecured Data Transfer & Avoidance of Forgery Attacks with Digital Certificates
Today almost all organizations in the world are network-centric paradigm and to safeguard the data in a world where technology is advancing, systems are changing rapidly and information flows freely requires efficient secure channel at the endpoint. Security is the heart of IT revolution and more specifically user authentication and key establishment are the rudimentary services in secure commu...
متن کاملSecured Wireless Data Communication
Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic sub...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2016
ISSN: 0974-5645,0974-6846
DOI: 10.17485/ijst/2016/v9i17/93110