0% found this document useful (0 votes)
56 views3 pages

BL06 Wireless Secured Data Transmission

This document discusses implementing secured wireless data transmission using Bluetooth technology. Bluetooth modules allow for reliable and secure data exchange over short distances without line of sight. The project uses two systems, each with a microcontroller, PC, and Bluetooth module. Data is encrypted before transmission and decrypted upon receipt to securely transfer information between the two wireless devices.

Uploaded by

MechWindNani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views3 pages

BL06 Wireless Secured Data Transmission

This document discusses implementing secured wireless data transmission using Bluetooth technology. Bluetooth modules allow for reliable and secure data exchange over short distances without line of sight. The project uses two systems, each with a microcontroller, PC, and Bluetooth module. Data is encrypted before transmission and decrypted upon receipt to securely transfer information between the two wireless devices.

Uploaded by

MechWindNani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Wireless secured data transmission using Bluetooth

Abstract:

Now a day’s security is major concern in everywhere. Sending data between two systems
wireless and with secured is a difficult job but this can be made easy using advancement in
present technologies. In this project we are implementing secured data communication using
Bluetooth technology.

These Bluetooth modules are more reliable, secure and low power modules and these modules
do not require line of sight also..

Bluetooth is a wireless technology standard for exchanging data over short distances (using
short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and
mobile devices, creating personal area networks (PANs) with high levels of security. Created by
telecom vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-
232 data cables. It can connect several devices, overcoming problems of synchronization.

Bluetooth uses a radio technology called frequency-hopping spread spectrum, which chops up


the data being sent and transmits chunks of it on up to 79 bands (1 MHz each; centered from
2402 to 2480 MHz) in the range 2,400–2,483.5 MHz (allowing for guard bands). This range is
in the globally unlicensed Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio
frequency band. It usually performs 800 hops per second, with Adaptive Frequency-
Hopping (AFH) enabled.

In this project we have two systems, each system contains micro controller, PC, Bluetooth
module. One of the popular methods to protect the data in a more secure way is to encrypt the
data while sending and when received, decrypt the data to retrieve the original message. Before
transmitting the data, the data will encoded using some encoding technique and will be sent. At
the receiving end, the reverse of encryption carries on to get back the original message
BLOCK DIAGRAM:

M
RESET I
C PC
PC
R
O

CRYSTAL C
OSCILLATOR O
N
MAX232
T
R
O
L
L
E
R

Same systems we need 2 for this project.


Software Tools:

 KEIL IDE for developing micro controller code


 ORCAD for designing schematics
 FLASH MAGIC for dumping the hex file into controller
 HTML coding for develop web application

Hardware Tools:

 AT89S52 Micro controller.


 Blue tooth module.
 MAX232

 PC
.

Advantages:

 Easy to use, easy to install as it is simple stand alone system.


 Low cost, small size and low power.
 Portable.

Applications:

 Useful for offices


 Army applications.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy