Está en la página 1de 13

Department of Electrical Engineering

(Telecommunication Engineering)

ENCRYPTION MECHANISM FOR SECURITY


ISSUES IN ADHOC NETWORK
GROUP MEMBERS NAMES

• UNSA IFTIKHAR (15B-252-EL)

• MADIHA YAHIYA SHAIKH (15B-031-EL)

• ASAD NOOR KHAN (15B-149-EL)

• MUHAMMAD MOHSIN KHAN (15B-166-EL)


CONTENTS
MOTIVATION ……….............................Slide-4

INTRODUCTION.……............................Slide-5

BLOCK DIAGRAM……………………..Slide-8

FLOW DIAGRAM………………………Slide-9

APPLICATIONS………………………...Slide-10

FUTURE WORK………………………...Slide-11

TIME FRAME/PROGRESS CHART…...Slide-12

TESTING VIDEO………………………..Slide-13

TENTATIVE OUTPUT………………….Slide-14
MOTIVATION

• Security is an essential requirement in mobile adhoc network


• Compared to wired networks,MANETS are more vulnerable
to security attacks due to the lack of a trusted centralized
authority in an open medium.
• The ad hoc environment is accessible to both authentic
network users and malicious attackers.
• Encryption helps to scrambles the information you send into
a code so that it is not accessible to others.
INTRODUCTION

• Wireless Ad hoc networks of mobile devices enable users to


communicate with each other in an infrastructure-less
environment i.e (no base stations)

• These are self-configuring,dynamic networks in which nodes


are free to move.

• Quick & Inexpensive setup regardless of geographical position

• For a reliable ad hoc network,security is added to avoid


intrusion from untrusted nodes.
ZIGBEE MODULE

• ZigBee Protocol (802.15.4) is used to create


small PAN networks over wireless links.
• ZigBee passes data through mesh network of
intermediate devices to reach more distant
nodes in a range of 10-100m
HC-12 TRANSCEIVER

• It creates a wireless link between two nodes.


• Frequency band ranges from 433.4-473.4 MHz i.e 100
channels.
• Data can be transmitted within a range of 1Km
BLOCK DIAGRAM
FLOW DIAGARM
APPLICATIONS
• Tactical Networks:
✓ Military communication
✓ Automated battlefields
• Emergency Services:
✓ Search and rescue operations
✓ Disaster recovery, Earthquake
• Education:
✓ Virtual classrooms or conference rooms.
• Home and Entertainment:
✓ Home/office wireless networking
✓ Personal Area Network
FUTURE WORK

• Encryption & decryption can be applied on larger


size of data of audio and video data transmission.

• Better data handling capacity with stronger


encryption mechanism can be worked out in future.
TIMEFRAME/ PROGRESS CHART

MILESTONE DURATION TASKS

1ST October 2018 Gather information about


till December equipment's.
Market visit and purchased
equipment's.
Testing of transmission of
text message

2ND January 2019 to Implementation of GUI


April 2019
Implementation of
Encryption and Decryption
on text message
3RD May 2019 to Solution to intrusion
July 2019 detection
TENTATIVE OUTPUT

Data security is attained over wireless communication in ad-


hoc network by using encryption and decryption techniques.

También podría gustarte