SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Computational Engineering Research||Vol, 03||Issue, 11||

Design of A network Data Security Circuit
1

Nuha Abdelmageed Tawfig Khalil, 2 Abdelrasoul Jabar Alzubaidi,
1

2

Computer Department, Aljouf University, Sakaka – Saudi Arabia
Electronics Engineering School, Sudan University of Science and technology, Khartoum – Sudan

Abstract
To safeguard information during electronic communication and data transmission processes
across unsecured networks and provide security requirements, including authentication, confidentiality,
integrity and non-repudiation. To achieve this goal, this paper proposed to design of a network data
security circuit using two Basic Stamp2 Microcontroller, two wireless X-Bee modules, two computer and
BASCOM language (TC++ program language ) to generate non-standard algorithm ( logic algorithm ) for
encrypted and decryption. The algorithm depends on ciphering the plaintext n times with n keys.

Keywords: Basic stamp2, ciphertext, Decrypted, Encryption, Network data security, plaintext, and XBee.

I.

INTRODUCTION

Security of network communications is arguably the most important issue in the world today given the
vast amount of valuable information that is passed around in various networks. Information pertaining to banks,
credit cards, social security numbers, personal details, and government policies are transferred from place to
place with the help of networking infrastructure. The high connectivity of the World Wide Web (WWW) has
left the world ‘open’. Such openness has resulted in various networks being subjected to multifarious attacks
from vastly disparate sources, many of which are anonymous and yet to be discovered. This growth of the
WWW coupled with progress in the fields of e-commerce and the like has made the security issue even more
important.
A typical method for security that is used To safeguard information during electronic communication
and data transmission processes across unsecured networks and provide security requirements is encryption [1].
Encryption is the process of encoding messages (or information) in such a way that cannot be read by
eavesdroppers or hackers, but that authorized parties can. In an encryption scheme, the message or information
(referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext.
This is usually done with the use of an encryption key, which specifies how the message is to be encoded. An
authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a
secret decryption key [2].
Implementing a demonstration project comprise of BASIC Stamp microcontroller, two wireless X-Bee
modules, two computer and BASIC Stamp Editor v2.5 and Bascom language (TC++ program language) to
protect information during electronic communication and data transmission across unsecured networks and most
importantly to prevent data from falling into wrong hands.

II. METHODOLOGY
Design of a network data security circuit consists of two elements:
A. Hardware components:
The hardware components for this research paper consists of Parallax, Inc.’s BASIC Stamp2 modules,
X-Bee wireless modules and computer. Upon using all this materials, a transmitter and a receiver circuit will be
build.
Microcontrollers
Microcontrollers are frequently used device in embedded computing in which the application varies
from computing, calculating, smart decision-making capabilities, and processes the data. Most of the
electrical/electronic device, sensors and high-tech gadget can be easily interface and interact with
microcontrollers to automate a system structure. For this research BASIC Stamp2 is used [3].

|| Issn 2250-3005 ||

|| November || 2013 ||

Page 21
Design of A network Data Security Circuit

Figure 1: BASIC Stamp2
The BS2 microcontroller has a 24-pin Dual Inline Package (DIP) and 16 of them are used for I/O
interface. The brain for the chip is Microchip Inc.’s PIC 16C57. Each pin can source (supply) a maximum
current of 40mA and sink (draw) a maximum current of 50mA. A range of 5 to 15 direct current (VDC) power
supply is sufficient to turn on BS2, because a voltage regulator embedded inside it, provides a steady 5VDC
supply to the BS2 such that the high voltage will not damage the IC. BS2 has 2KByte (~500 PBASIC
instructions) Electronically Erasable Programmable ROM (EEPROM), and RAM size 32 Bytes (6 I/0, 26
Variable) and is programmed using PBasic language; the instruction set that is permanently stored on the BS2
ROM. The user-define program is downloaded into the EEPROM from a PC through a DB-9 serial cable
connection between the PC and the microcontroller. The excess EEPROM can be used for long term data
storage [4] [5].
X-Bee





X-Bee module is a device use to communicate via wireless network, it utilizes the IEEE 802.15.4
protocol which implements the entire features list below as to ensure data delivery and integrity:
Media Access: A special feature to make certain two network nodes do not transmit at the same time
causing data collisions and errors in communication.
Addressing: A technique to ensure only the intended node uses the receive data, allowing data to be sent
from one point to another point, or point to multi-point by sending a broadcast meant for all nodes on the
network.
Error Detection: A way to validate data received at the node correctly.
Acknowledgements & Retries: A way to notify the transmitting node that the data was delivered
successfully. Lacking this, several retries may be performed in an effort to deliver the data [3] [6].

Figure 2: X-Bee Pro modules and Pin outs
|| Issn 2250-3005 ||

|| November || 2013 ||

Page 22
Design of A network Data Security Circuit

Computer

-

To program the Basic Stamp2 with the windows interface, an IBM PC or compatible computer
system the following components is needed [7] :
IBM PC or compatible computer running windows 95, windows 98, or windows NT4.0 (S.P.3
recommended).
80468 (or greater) processor.
16 MB RAM (24 recommended).
1 MB free hard drive space.
256-color VGA video card (24 bit SVGA recommended).

D25 connection
The D25 connection used to connect Basic Stamp2 to computer parallel port for programming.
B. Software:
For this research there are two main softwares being used BASIC Stamp Editor v2.5 and Bascom
language (TC++ program language ).
- BASIC Stamp Editor v2.5, used to program the Basic Stamp2 microcontroller.
- Bascom language (TC++ program language ) , used to write non-standard algorithm ( logic algorithm ) for
encrypted and decryption.
The circuit design for this research is divided into two parts namely the transmitter and the receiver
circuit. The interconnection for the transmitter and the receiver circuit are shown in Figure 3.

Figure 3 : block diagram for the circuit
In the transmitter circuit the message will be encrypted m times depending on the length of the key.
The key will be converted to equivalent ASCII code. In this algorithm key will be inserted into the encrypted
message after any encryption stage to form the new message for the next encryption stage. This process will be
repeated m times. The number of the encryption stages will be given depending on the length of the key.
In the receive circuit the message will be decrypted by used the inverse method for encryption.
III.

RESULTS

The flowchart of the program of the design of a network data security circuit is shown in Figure 4.

|| Issn 2250-3005 ||

|| November || 2013 ||

Page 23
Design of A network Data Security Circuit

Figure 4: flowchart of the program of the design of a network data security circuit

IV. CONCLUSION
Design of a network data security circuit is the most important system to enhance security in
transmission of data in network, to prevent data from falling into wrong hands and to provide the data security
requirements, including integrity, authentication, non-repudiation and confidentiality. Design of a network data
security circuit includes the following advantages:
12-

Encrypted the message by using non-standard algorithm.
Very complicated because it encrypted and decrypted the message m times.

REFERENCES
[1.]
[2.]
[3.]

[4.]

[5.]
[6.]
[7.]

A Novel Scheme for Secured Data Transfer Over Computer Networks, Rangarajan Athi Vasudevan (University of Michigan,
Ann Arbor, USA ranga@umich.edu). http://arxiv.org/ftp/arxiv/papers/ 1002/1002.4530.pdf.
http://en.wikipedia.org/wiki/Encryption.
International Symposium on Robotics and Intelligent Sensors 2012 (IRIS 2012), Wireless Traffic Light Controller for
Emergency Vehicle through XBee and Basic Stamp Microcontroller, R.Hussin*, R.C.Ismail, E.Murrali, A.Kamarudin, School of
Microelectronic Engineering, University Malaysia Perlis (UniMAP),,http://www.sciencedirect.com/
science/article/pii/S1877705812026239? np=y
Basic Stamp 2 microcontrollers comparisons. Retrieved April 28, 2012 from
http://www.parallax.com/detail.asp?product_id=BS2-IC website of Parallax. Inc. developer and distributor of Basic Stamp 2
microcontroller.
http://www.parallax.com/BASICStampComparison/tabid/436/ efault. aspx.
Basic Stamp 2 microcontrollers. Retrieved April 13, 2012 from http://www.parallax.com/go/XBee website of Parallax. Inc.
developer and distributor of Basic Stamp 2 microcontroller.
http://books.google.com.sa/books?id=sQ9AigIlOKgC&pg=PA41&dq=connect+basic+stamp+2+with+computer+by+parallel+po
rt&hl=ar&sa=X&ei=2llpUqv0Aeno4gTZ34CICQ&ved=0CC4Q.

|| Issn 2250-3005 ||

|| November || 2013 ||

Page 24

Weitere ähnliche Inhalte

Was ist angesagt?

Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyIRJET Journal
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Cardsourabh4u07
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...IJECEIAES
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks csandit
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...IDES Editor
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Hamza Malik
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6Irsandi Hasan
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answersccna4discovery
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXIJNSA Journal
 

Was ist angesagt? (20)

Network security
Network securityNetwork security
Network security
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks Authentication and Key Agreement in 3GPP Networks
Authentication and Key Agreement in 3GPP Networks
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6
 
Wireless security
Wireless securityWireless security
Wireless security
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
snmp
snmpsnmp
snmp
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
 
Network security
Network securityNetwork security
Network security
 

Andere mochten auch

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
програма
програмапрограма
програмаAsan Likov
 
Estructura y contenido del currículum
Estructura y contenido del currículumEstructura y contenido del currículum
Estructura y contenido del currículumAna RM
 
NBA Draft Prospects with Much to Prove
NBA Draft Prospects with Much to ProveNBA Draft Prospects with Much to Prove
NBA Draft Prospects with Much to ProveWill Selva
 
Programmating Buying — Myth or reality?
Programmating Buying — Myth or reality?Programmating Buying — Myth or reality?
Programmating Buying — Myth or reality?Cossa
 
Los deberes y derechos humanos
Los deberes y derechos humanosLos deberes y derechos humanos
Los deberes y derechos humanosYasmina Hernandez
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Andere mochten auch (19)

FILMS
FILMSFILMS
FILMS
 
Serial idm
Serial idmSerial idm
Serial idm
 
linux
linuxlinux
linux
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
програма
програмапрограма
програма
 
Estructura y contenido del currículum
Estructura y contenido del currículumEstructura y contenido del currículum
Estructura y contenido del currículum
 
NBA Draft Prospects with Much to Prove
NBA Draft Prospects with Much to ProveNBA Draft Prospects with Much to Prove
NBA Draft Prospects with Much to Prove
 
Programmating Buying — Myth or reality?
Programmating Buying — Myth or reality?Programmating Buying — Myth or reality?
Programmating Buying — Myth or reality?
 
Los deberes y derechos humanos
Los deberes y derechos humanosLos deberes y derechos humanos
Los deberes y derechos humanos
 
Scottish Humor
Scottish HumorScottish Humor
Scottish Humor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Gost r 8.000 2000 2
Gost r 8.000 2000 2Gost r 8.000 2000 2
Gost r 8.000 2000 2
 
Cono Tema 5
Cono Tema 5Cono Tema 5
Cono Tema 5
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Instructor eficaz leccion_1
Instructor eficaz leccion_1Instructor eficaz leccion_1
Instructor eficaz leccion_1
 
Food
FoodFood
Food
 

Ähnlich wie International Journal of Computational Engineering Research(IJCER)

A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
 
Training Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDTraining Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDHimanshiSingh71
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
Design and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerDesign and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerIJERA Editor
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3Soon Zoo Kwon
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
Implementation of the advanced encryption standard algorithm on an FPGA for ...
Implementation of the advanced encryption standard algorithm  on an FPGA for ...Implementation of the advanced encryption standard algorithm  on an FPGA for ...
Implementation of the advanced encryption standard algorithm on an FPGA for ...IJECEIAES
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 

Ähnlich wie International Journal of Computational Engineering Research(IJCER) (20)

A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
G05215356
G05215356G05215356
G05215356
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
Bm36382385
Bm36382385Bm36382385
Bm36382385
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
Training Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITEDTraining Report BHARAT ELECTRONICS LIMITED
Training Report BHARAT ELECTRONICS LIMITED
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
Design and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web ServerDesign and Development of ARM9 Based Embedded Web Server
Design and Development of ARM9 Based Embedded Web Server
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3COMP8045 - Project Report v.1.3
COMP8045 - Project Report v.1.3
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
Implementation of the advanced encryption standard algorithm on an FPGA for ...
Implementation of the advanced encryption standard algorithm  on an FPGA for ...Implementation of the advanced encryption standard algorithm  on an FPGA for ...
Implementation of the advanced encryption standard algorithm on an FPGA for ...
 
Cyber security
Cyber securityCyber security
Cyber security
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 

Kürzlich hochgeladen

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

International Journal of Computational Engineering Research(IJCER)

  • 1. International Journal of Computational Engineering Research||Vol, 03||Issue, 11|| Design of A network Data Security Circuit 1 Nuha Abdelmageed Tawfig Khalil, 2 Abdelrasoul Jabar Alzubaidi, 1 2 Computer Department, Aljouf University, Sakaka – Saudi Arabia Electronics Engineering School, Sudan University of Science and technology, Khartoum – Sudan Abstract To safeguard information during electronic communication and data transmission processes across unsecured networks and provide security requirements, including authentication, confidentiality, integrity and non-repudiation. To achieve this goal, this paper proposed to design of a network data security circuit using two Basic Stamp2 Microcontroller, two wireless X-Bee modules, two computer and BASCOM language (TC++ program language ) to generate non-standard algorithm ( logic algorithm ) for encrypted and decryption. The algorithm depends on ciphering the plaintext n times with n keys. Keywords: Basic stamp2, ciphertext, Decrypted, Encryption, Network data security, plaintext, and XBee. I. INTRODUCTION Security of network communications is arguably the most important issue in the world today given the vast amount of valuable information that is passed around in various networks. Information pertaining to banks, credit cards, social security numbers, personal details, and government policies are transferred from place to place with the help of networking infrastructure. The high connectivity of the World Wide Web (WWW) has left the world ‘open’. Such openness has resulted in various networks being subjected to multifarious attacks from vastly disparate sources, many of which are anonymous and yet to be discovered. This growth of the WWW coupled with progress in the fields of e-commerce and the like has made the security issue even more important. A typical method for security that is used To safeguard information during electronic communication and data transmission processes across unsecured networks and provide security requirements is encryption [1]. Encryption is the process of encoding messages (or information) in such a way that cannot be read by eavesdroppers or hackers, but that authorized parties can. In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext. This is usually done with the use of an encryption key, which specifies how the message is to be encoded. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key [2]. Implementing a demonstration project comprise of BASIC Stamp microcontroller, two wireless X-Bee modules, two computer and BASIC Stamp Editor v2.5 and Bascom language (TC++ program language) to protect information during electronic communication and data transmission across unsecured networks and most importantly to prevent data from falling into wrong hands. II. METHODOLOGY Design of a network data security circuit consists of two elements: A. Hardware components: The hardware components for this research paper consists of Parallax, Inc.’s BASIC Stamp2 modules, X-Bee wireless modules and computer. Upon using all this materials, a transmitter and a receiver circuit will be build. Microcontrollers Microcontrollers are frequently used device in embedded computing in which the application varies from computing, calculating, smart decision-making capabilities, and processes the data. Most of the electrical/electronic device, sensors and high-tech gadget can be easily interface and interact with microcontrollers to automate a system structure. For this research BASIC Stamp2 is used [3]. || Issn 2250-3005 || || November || 2013 || Page 21
  • 2. Design of A network Data Security Circuit Figure 1: BASIC Stamp2 The BS2 microcontroller has a 24-pin Dual Inline Package (DIP) and 16 of them are used for I/O interface. The brain for the chip is Microchip Inc.’s PIC 16C57. Each pin can source (supply) a maximum current of 40mA and sink (draw) a maximum current of 50mA. A range of 5 to 15 direct current (VDC) power supply is sufficient to turn on BS2, because a voltage regulator embedded inside it, provides a steady 5VDC supply to the BS2 such that the high voltage will not damage the IC. BS2 has 2KByte (~500 PBASIC instructions) Electronically Erasable Programmable ROM (EEPROM), and RAM size 32 Bytes (6 I/0, 26 Variable) and is programmed using PBasic language; the instruction set that is permanently stored on the BS2 ROM. The user-define program is downloaded into the EEPROM from a PC through a DB-9 serial cable connection between the PC and the microcontroller. The excess EEPROM can be used for long term data storage [4] [5]. X-Bee     X-Bee module is a device use to communicate via wireless network, it utilizes the IEEE 802.15.4 protocol which implements the entire features list below as to ensure data delivery and integrity: Media Access: A special feature to make certain two network nodes do not transmit at the same time causing data collisions and errors in communication. Addressing: A technique to ensure only the intended node uses the receive data, allowing data to be sent from one point to another point, or point to multi-point by sending a broadcast meant for all nodes on the network. Error Detection: A way to validate data received at the node correctly. Acknowledgements & Retries: A way to notify the transmitting node that the data was delivered successfully. Lacking this, several retries may be performed in an effort to deliver the data [3] [6]. Figure 2: X-Bee Pro modules and Pin outs || Issn 2250-3005 || || November || 2013 || Page 22
  • 3. Design of A network Data Security Circuit Computer - To program the Basic Stamp2 with the windows interface, an IBM PC or compatible computer system the following components is needed [7] : IBM PC or compatible computer running windows 95, windows 98, or windows NT4.0 (S.P.3 recommended). 80468 (or greater) processor. 16 MB RAM (24 recommended). 1 MB free hard drive space. 256-color VGA video card (24 bit SVGA recommended). D25 connection The D25 connection used to connect Basic Stamp2 to computer parallel port for programming. B. Software: For this research there are two main softwares being used BASIC Stamp Editor v2.5 and Bascom language (TC++ program language ). - BASIC Stamp Editor v2.5, used to program the Basic Stamp2 microcontroller. - Bascom language (TC++ program language ) , used to write non-standard algorithm ( logic algorithm ) for encrypted and decryption. The circuit design for this research is divided into two parts namely the transmitter and the receiver circuit. The interconnection for the transmitter and the receiver circuit are shown in Figure 3. Figure 3 : block diagram for the circuit In the transmitter circuit the message will be encrypted m times depending on the length of the key. The key will be converted to equivalent ASCII code. In this algorithm key will be inserted into the encrypted message after any encryption stage to form the new message for the next encryption stage. This process will be repeated m times. The number of the encryption stages will be given depending on the length of the key. In the receive circuit the message will be decrypted by used the inverse method for encryption. III. RESULTS The flowchart of the program of the design of a network data security circuit is shown in Figure 4. || Issn 2250-3005 || || November || 2013 || Page 23
  • 4. Design of A network Data Security Circuit Figure 4: flowchart of the program of the design of a network data security circuit IV. CONCLUSION Design of a network data security circuit is the most important system to enhance security in transmission of data in network, to prevent data from falling into wrong hands and to provide the data security requirements, including integrity, authentication, non-repudiation and confidentiality. Design of a network data security circuit includes the following advantages: 12- Encrypted the message by using non-standard algorithm. Very complicated because it encrypted and decrypted the message m times. REFERENCES [1.] [2.] [3.] [4.] [5.] [6.] [7.] A Novel Scheme for Secured Data Transfer Over Computer Networks, Rangarajan Athi Vasudevan (University of Michigan, Ann Arbor, USA ranga@umich.edu). http://arxiv.org/ftp/arxiv/papers/ 1002/1002.4530.pdf. http://en.wikipedia.org/wiki/Encryption. International Symposium on Robotics and Intelligent Sensors 2012 (IRIS 2012), Wireless Traffic Light Controller for Emergency Vehicle through XBee and Basic Stamp Microcontroller, R.Hussin*, R.C.Ismail, E.Murrali, A.Kamarudin, School of Microelectronic Engineering, University Malaysia Perlis (UniMAP),,http://www.sciencedirect.com/ science/article/pii/S1877705812026239? np=y Basic Stamp 2 microcontrollers comparisons. Retrieved April 28, 2012 from http://www.parallax.com/detail.asp?product_id=BS2-IC website of Parallax. Inc. developer and distributor of Basic Stamp 2 microcontroller. http://www.parallax.com/BASICStampComparison/tabid/436/ efault. aspx. Basic Stamp 2 microcontrollers. Retrieved April 13, 2012 from http://www.parallax.com/go/XBee website of Parallax. Inc. developer and distributor of Basic Stamp 2 microcontroller. http://books.google.com.sa/books?id=sQ9AigIlOKgC&pg=PA41&dq=connect+basic+stamp+2+with+computer+by+parallel+po rt&hl=ar&sa=X&ei=2llpUqv0Aeno4gTZ34CICQ&ved=0CC4Q. || Issn 2250-3005 || || November || 2013 || Page 24