SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Computational Engineering Research||Vol, 03||Issue, 11||

Design of A network Data Security Circuit
1

Nuha Abdelmageed Tawfig Khalil, 2 Abdelrasoul Jabar Alzubaidi,
1

2

Computer Department, Aljouf University, Sakaka – Saudi Arabia
Electronics Engineering School, Sudan University of Science and technology, Khartoum – Sudan

Abstract
To safeguard information during electronic communication and data transmission processes
across unsecured networks and provide security requirements, including authentication, confidentiality,
integrity and non-repudiation. To achieve this goal, this paper proposed to design of a network data
security circuit using two Basic Stamp2 Microcontroller, two wireless X-Bee modules, two computer and
BASCOM language (TC++ program language ) to generate non-standard algorithm ( logic algorithm ) for
encrypted and decryption. The algorithm depends on ciphering the plaintext n times with n keys.

Keywords: Basic stamp2, ciphertext, Decrypted, Encryption, Network data security, plaintext, and XBee.

I.

INTRODUCTION

Security of network communications is arguably the most important issue in the world today given the
vast amount of valuable information that is passed around in various networks. Information pertaining to banks,
credit cards, social security numbers, personal details, and government policies are transferred from place to
place with the help of networking infrastructure. The high connectivity of the World Wide Web (WWW) has
left the world ‘open’. Such openness has resulted in various networks being subjected to multifarious attacks
from vastly disparate sources, many of which are anonymous and yet to be discovered. This growth of the
WWW coupled with progress in the fields of e-commerce and the like has made the security issue even more
important.
A typical method for security that is used To safeguard information during electronic communication
and data transmission processes across unsecured networks and provide security requirements is encryption [1].
Encryption is the process of encoding messages (or information) in such a way that cannot be read by
eavesdroppers or hackers, but that authorized parties can. In an encryption scheme, the message or information
(referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext.
This is usually done with the use of an encryption key, which specifies how the message is to be encoded. An
authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a
secret decryption key [2].
Implementing a demonstration project comprise of BASIC Stamp microcontroller, two wireless X-Bee
modules, two computer and BASIC Stamp Editor v2.5 and Bascom language (TC++ program language) to
protect information during electronic communication and data transmission across unsecured networks and most
importantly to prevent data from falling into wrong hands.

II. METHODOLOGY
Design of a network data security circuit consists of two elements:
A. Hardware components:
The hardware components for this research paper consists of Parallax, Inc.’s BASIC Stamp2 modules,
X-Bee wireless modules and computer. Upon using all this materials, a transmitter and a receiver circuit will be
build.
Microcontrollers
Microcontrollers are frequently used device in embedded computing in which the application varies
from computing, calculating, smart decision-making capabilities, and processes the data. Most of the
electrical/electronic device, sensors and high-tech gadget can be easily interface and interact with
microcontrollers to automate a system structure. For this research BASIC Stamp2 is used [3].

|| Issn 2250-3005 ||

|| November || 2013 ||

Page 21
Design of A network Data Security Circuit

Figure 1: BASIC Stamp2
The BS2 microcontroller has a 24-pin Dual Inline Package (DIP) and 16 of them are used for I/O
interface. The brain for the chip is Microchip Inc.’s PIC 16C57. Each pin can source (supply) a maximum
current of 40mA and sink (draw) a maximum current of 50mA. A range of 5 to 15 direct current (VDC) power
supply is sufficient to turn on BS2, because a voltage regulator embedded inside it, provides a steady 5VDC
supply to the BS2 such that the high voltage will not damage the IC. BS2 has 2KByte (~500 PBASIC
instructions) Electronically Erasable Programmable ROM (EEPROM), and RAM size 32 Bytes (6 I/0, 26
Variable) and is programmed using PBasic language; the instruction set that is permanently stored on the BS2
ROM. The user-define program is downloaded into the EEPROM from a PC through a DB-9 serial cable
connection between the PC and the microcontroller. The excess EEPROM can be used for long term data
storage [4] [5].
X-Bee





X-Bee module is a device use to communicate via wireless network, it utilizes the IEEE 802.15.4
protocol which implements the entire features list below as to ensure data delivery and integrity:
Media Access: A special feature to make certain two network nodes do not transmit at the same time
causing data collisions and errors in communication.
Addressing: A technique to ensure only the intended node uses the receive data, allowing data to be sent
from one point to another point, or point to multi-point by sending a broadcast meant for all nodes on the
network.
Error Detection: A way to validate data received at the node correctly.
Acknowledgements & Retries: A way to notify the transmitting node that the data was delivered
successfully. Lacking this, several retries may be performed in an effort to deliver the data [3] [6].

Figure 2: X-Bee Pro modules and Pin outs
|| Issn 2250-3005 ||

|| November || 2013 ||

Page 22
Design of A network Data Security Circuit

Computer

-

To program the Basic Stamp2 with the windows interface, an IBM PC or compatible computer
system the following components is needed [7] :
IBM PC or compatible computer running windows 95, windows 98, or windows NT4.0 (S.P.3
recommended).
80468 (or greater) processor.
16 MB RAM (24 recommended).
1 MB free hard drive space.
256-color VGA video card (24 bit SVGA recommended).

D25 connection
The D25 connection used to connect Basic Stamp2 to computer parallel port for programming.
B. Software:
For this research there are two main softwares being used BASIC Stamp Editor v2.5 and Bascom
language (TC++ program language ).
- BASIC Stamp Editor v2.5, used to program the Basic Stamp2 microcontroller.
- Bascom language (TC++ program language ) , used to write non-standard algorithm ( logic algorithm ) for
encrypted and decryption.
The circuit design for this research is divided into two parts namely the transmitter and the receiver
circuit. The interconnection for the transmitter and the receiver circuit are shown in Figure 3.

Figure 3 : block diagram for the circuit
In the transmitter circuit the message will be encrypted m times depending on the length of the key.
The key will be converted to equivalent ASCII code. In this algorithm key will be inserted into the encrypted
message after any encryption stage to form the new message for the next encryption stage. This process will be
repeated m times. The number of the encryption stages will be given depending on the length of the key.
In the receive circuit the message will be decrypted by used the inverse method for encryption.
III.

RESULTS

The flowchart of the program of the design of a network data security circuit is shown in Figure 4.

|| Issn 2250-3005 ||

|| November || 2013 ||

Page 23
Design of A network Data Security Circuit

Figure 4: flowchart of the program of the design of a network data security circuit

IV. CONCLUSION
Design of a network data security circuit is the most important system to enhance security in
transmission of data in network, to prevent data from falling into wrong hands and to provide the data security
requirements, including integrity, authentication, non-repudiation and confidentiality. Design of a network data
security circuit includes the following advantages:
12-

Encrypted the message by using non-standard algorithm.
Very complicated because it encrypted and decrypted the message m times.

REFERENCES
[1.]
[2.]
[3.]

[4.]

[5.]
[6.]
[7.]

A Novel Scheme for Secured Data Transfer Over Computer Networks, Rangarajan Athi Vasudevan (University of Michigan,
Ann Arbor, USA ranga@umich.edu). http://arxiv.org/ftp/arxiv/papers/ 1002/1002.4530.pdf.
http://en.wikipedia.org/wiki/Encryption.
International Symposium on Robotics and Intelligent Sensors 2012 (IRIS 2012), Wireless Traffic Light Controller for
Emergency Vehicle through XBee and Basic Stamp Microcontroller, R.Hussin*, R.C.Ismail, E.Murrali, A.Kamarudin, School of
Microelectronic Engineering, University Malaysia Perlis (UniMAP),,http://www.sciencedirect.com/
science/article/pii/S1877705812026239? np=y
Basic Stamp 2 microcontrollers comparisons. Retrieved April 28, 2012 from
http://www.parallax.com/detail.asp?product_id=BS2-IC website of Parallax. Inc. developer and distributor of Basic Stamp 2
microcontroller.
http://www.parallax.com/BASICStampComparison/tabid/436/ efault. aspx.
Basic Stamp 2 microcontrollers. Retrieved April 13, 2012 from http://www.parallax.com/go/XBee website of Parallax. Inc.
developer and distributor of Basic Stamp 2 microcontroller.
http://books.google.com.sa/books?id=sQ9AigIlOKgC&pg=PA41&dq=connect+basic+stamp+2+with+computer+by+parallel+po
rt&hl=ar&sa=X&ei=2llpUqv0Aeno4gTZ34CICQ&ved=0CC4Q.

|| Issn 2250-3005 ||

|| November || 2013 ||

Page 24

Más contenido relacionado

La actualidad más candente

Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyIRJET Journal
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Cardsourabh4u07
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...IJECEIAES
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks csandit
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...IDES Editor
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Hamza Malik
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6Irsandi Hasan
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answersccna4discovery
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXIJNSA Journal
 

La actualidad más candente (20)

Network security
Network securityNetwork security
Network security
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6
 
Wireless security
Wireless securityWireless security
Wireless security
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
snmp
snmpsnmp
snmp
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
 
Network security
Network securityNetwork security
Network security
 

Destacado

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
програма
програмапрограма
програмаAsan Likov
 
Estructura y contenido del currículum
Estructura y contenido del currículumEstructura y contenido del currículum
Estructura y contenido del currículumAna RM
 
NBA Draft Prospects with Much to Prove
NBA Draft Prospects with Much to ProveNBA Draft Prospects with Much to Prove
NBA Draft Prospects with Much to ProveWill Selva
 
Programmating Buying — Myth or reality?
Programmating Buying — Myth or reality?Programmating Buying — Myth or reality?
Programmating Buying — Myth or reality?Cossa
 
Los deberes y derechos humanos
Los deberes y derechos humanosLos deberes y derechos humanos
Los deberes y derechos humanosYasmina Hernandez
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Destacado (19)

FILMS
FILMSFILMS
FILMS
 
Serial idm
Serial idmSerial idm
Serial idm
 
linux
linuxlinux
linux
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
програма
програмапрограма
програма
 
Estructura y contenido del currículum
Estructura y contenido del currículumEstructura y contenido del currículum
Estructura y contenido del currículum
 
NBA Draft Prospects with Much to Prove
NBA Draft Prospects with Much to ProveNBA Draft Prospects with Much to Prove
NBA Draft Prospects with Much to Prove
 
Programmating Buying — Myth or reality?
Programmating Buying — Myth or reality?Programmating Buying — Myth or reality?
Programmating Buying — Myth or reality?
 
Los deberes y derechos humanos
Los deberes y derechos humanosLos deberes y derechos humanos
Los deberes y derechos humanos
 
Scottish Humor
Scottish HumorScottish Humor
Scottish Humor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Gost r 8.000 2000 2
Gost r 8.000 2000 2Gost r 8.000 2000 2
Gost r 8.000 2000 2
 
Cono Tema 5
Cono Tema 5Cono Tema 5
Cono Tema 5
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Instructor eficaz leccion_1
Instructor eficaz leccion_1Instructor eficaz leccion_1
Instructor eficaz leccion_1
 
Food
FoodFood
Food
 

Similar a International Journal of Computational Engineering Research(IJCER)

A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
 
Training Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDTraining Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDHimanshiSingh71
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
Design and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerDesign and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerIJERA Editor
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3Soon Zoo Kwon
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
Implementation of the advanced encryption standard algorithm on an FPGA for ...
Implementation of the advanced encryption standard algorithm  on an FPGA for ...Implementation of the advanced encryption standard algorithm  on an FPGA for ...
Implementation of the advanced encryption standard algorithm on an FPGA for ...IJECEIAES
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 

Similar a International Journal of Computational Engineering Research(IJCER) (20)

A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
G05215356
G05215356G05215356
G05215356
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
Bm36382385
Bm36382385Bm36382385
Bm36382385
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
Training Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDTraining Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITED
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
Design and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerDesign and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web Server
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
Implementation of the advanced encryption standard algorithm on an FPGA for ...
Implementation of the advanced encryption standard algorithm  on an FPGA for ...Implementation of the advanced encryption standard algorithm  on an FPGA for ...
Implementation of the advanced encryption standard algorithm on an FPGA for ...
 
Cyber security
Cyber securityCyber security
Cyber security
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

International Journal of Computational Engineering Research(IJCER)

  • 1. International Journal of Computational Engineering Research||Vol, 03||Issue, 11|| Design of A network Data Security Circuit 1 Nuha Abdelmageed Tawfig Khalil, 2 Abdelrasoul Jabar Alzubaidi, 1 2 Computer Department, Aljouf University, Sakaka – Saudi Arabia Electronics Engineering School, Sudan University of Science and technology, Khartoum – Sudan Abstract To safeguard information during electronic communication and data transmission processes across unsecured networks and provide security requirements, including authentication, confidentiality, integrity and non-repudiation. To achieve this goal, this paper proposed to design of a network data security circuit using two Basic Stamp2 Microcontroller, two wireless X-Bee modules, two computer and BASCOM language (TC++ program language ) to generate non-standard algorithm ( logic algorithm ) for encrypted and decryption. The algorithm depends on ciphering the plaintext n times with n keys. Keywords: Basic stamp2, ciphertext, Decrypted, Encryption, Network data security, plaintext, and XBee. I. INTRODUCTION Security of network communications is arguably the most important issue in the world today given the vast amount of valuable information that is passed around in various networks. Information pertaining to banks, credit cards, social security numbers, personal details, and government policies are transferred from place to place with the help of networking infrastructure. The high connectivity of the World Wide Web (WWW) has left the world ‘open’. Such openness has resulted in various networks being subjected to multifarious attacks from vastly disparate sources, many of which are anonymous and yet to be discovered. This growth of the WWW coupled with progress in the fields of e-commerce and the like has made the security issue even more important. A typical method for security that is used To safeguard information during electronic communication and data transmission processes across unsecured networks and provide security requirements is encryption [1]. Encryption is the process of encoding messages (or information) in such a way that cannot be read by eavesdroppers or hackers, but that authorized parties can. In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext. This is usually done with the use of an encryption key, which specifies how the message is to be encoded. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key [2]. Implementing a demonstration project comprise of BASIC Stamp microcontroller, two wireless X-Bee modules, two computer and BASIC Stamp Editor v2.5 and Bascom language (TC++ program language) to protect information during electronic communication and data transmission across unsecured networks and most importantly to prevent data from falling into wrong hands. II. METHODOLOGY Design of a network data security circuit consists of two elements: A. Hardware components: The hardware components for this research paper consists of Parallax, Inc.’s BASIC Stamp2 modules, X-Bee wireless modules and computer. Upon using all this materials, a transmitter and a receiver circuit will be build. Microcontrollers Microcontrollers are frequently used device in embedded computing in which the application varies from computing, calculating, smart decision-making capabilities, and processes the data. Most of the electrical/electronic device, sensors and high-tech gadget can be easily interface and interact with microcontrollers to automate a system structure. For this research BASIC Stamp2 is used [3]. || Issn 2250-3005 || || November || 2013 || Page 21
  • 2. Design of A network Data Security Circuit Figure 1: BASIC Stamp2 The BS2 microcontroller has a 24-pin Dual Inline Package (DIP) and 16 of them are used for I/O interface. The brain for the chip is Microchip Inc.’s PIC 16C57. Each pin can source (supply) a maximum current of 40mA and sink (draw) a maximum current of 50mA. A range of 5 to 15 direct current (VDC) power supply is sufficient to turn on BS2, because a voltage regulator embedded inside it, provides a steady 5VDC supply to the BS2 such that the high voltage will not damage the IC. BS2 has 2KByte (~500 PBASIC instructions) Electronically Erasable Programmable ROM (EEPROM), and RAM size 32 Bytes (6 I/0, 26 Variable) and is programmed using PBasic language; the instruction set that is permanently stored on the BS2 ROM. The user-define program is downloaded into the EEPROM from a PC through a DB-9 serial cable connection between the PC and the microcontroller. The excess EEPROM can be used for long term data storage [4] [5]. X-Bee     X-Bee module is a device use to communicate via wireless network, it utilizes the IEEE 802.15.4 protocol which implements the entire features list below as to ensure data delivery and integrity: Media Access: A special feature to make certain two network nodes do not transmit at the same time causing data collisions and errors in communication. Addressing: A technique to ensure only the intended node uses the receive data, allowing data to be sent from one point to another point, or point to multi-point by sending a broadcast meant for all nodes on the network. Error Detection: A way to validate data received at the node correctly. Acknowledgements & Retries: A way to notify the transmitting node that the data was delivered successfully. Lacking this, several retries may be performed in an effort to deliver the data [3] [6]. Figure 2: X-Bee Pro modules and Pin outs || Issn 2250-3005 || || November || 2013 || Page 22
  • 3. Design of A network Data Security Circuit Computer - To program the Basic Stamp2 with the windows interface, an IBM PC or compatible computer system the following components is needed [7] : IBM PC or compatible computer running windows 95, windows 98, or windows NT4.0 (S.P.3 recommended). 80468 (or greater) processor. 16 MB RAM (24 recommended). 1 MB free hard drive space. 256-color VGA video card (24 bit SVGA recommended). D25 connection The D25 connection used to connect Basic Stamp2 to computer parallel port for programming. B. Software: For this research there are two main softwares being used BASIC Stamp Editor v2.5 and Bascom language (TC++ program language ). - BASIC Stamp Editor v2.5, used to program the Basic Stamp2 microcontroller. - Bascom language (TC++ program language ) , used to write non-standard algorithm ( logic algorithm ) for encrypted and decryption. The circuit design for this research is divided into two parts namely the transmitter and the receiver circuit. The interconnection for the transmitter and the receiver circuit are shown in Figure 3. Figure 3 : block diagram for the circuit In the transmitter circuit the message will be encrypted m times depending on the length of the key. The key will be converted to equivalent ASCII code. In this algorithm key will be inserted into the encrypted message after any encryption stage to form the new message for the next encryption stage. This process will be repeated m times. The number of the encryption stages will be given depending on the length of the key. In the receive circuit the message will be decrypted by used the inverse method for encryption. III. RESULTS The flowchart of the program of the design of a network data security circuit is shown in Figure 4. || Issn 2250-3005 || || November || 2013 || Page 23
  • 4. Design of A network Data Security Circuit Figure 4: flowchart of the program of the design of a network data security circuit IV. CONCLUSION Design of a network data security circuit is the most important system to enhance security in transmission of data in network, to prevent data from falling into wrong hands and to provide the data security requirements, including integrity, authentication, non-repudiation and confidentiality. Design of a network data security circuit includes the following advantages: 12- Encrypted the message by using non-standard algorithm. Very complicated because it encrypted and decrypted the message m times. REFERENCES [1.] [2.] [3.] [4.] [5.] [6.] [7.] A Novel Scheme for Secured Data Transfer Over Computer Networks, Rangarajan Athi Vasudevan (University of Michigan, Ann Arbor, USA ranga@umich.edu). http://arxiv.org/ftp/arxiv/papers/ 1002/1002.4530.pdf. http://en.wikipedia.org/wiki/Encryption. International Symposium on Robotics and Intelligent Sensors 2012 (IRIS 2012), Wireless Traffic Light Controller for Emergency Vehicle through XBee and Basic Stamp Microcontroller, R.Hussin*, R.C.Ismail, E.Murrali, A.Kamarudin, School of Microelectronic Engineering, University Malaysia Perlis (UniMAP),,http://www.sciencedirect.com/ science/article/pii/S1877705812026239? np=y Basic Stamp 2 microcontrollers comparisons. Retrieved April 28, 2012 from http://www.parallax.com/detail.asp?product_id=BS2-IC website of Parallax. Inc. developer and distributor of Basic Stamp 2 microcontroller. http://www.parallax.com/BASICStampComparison/tabid/436/ efault. aspx. Basic Stamp 2 microcontrollers. Retrieved April 13, 2012 from http://www.parallax.com/go/XBee website of Parallax. Inc. developer and distributor of Basic Stamp 2 microcontroller. http://books.google.com.sa/books?id=sQ9AigIlOKgC&pg=PA41&dq=connect+basic+stamp+2+with+computer+by+parallel+po rt&hl=ar&sa=X&ei=2llpUqv0Aeno4gTZ34CICQ&ved=0CC4Q. || Issn 2250-3005 || || November || 2013 || Page 24