Open Access Open Access  Restricted Access Subscription or Fee Access

Secured Data Transmission by Blowfish Algorithm using OFDM

T.S. Murugesh, B. Balraj

Abstract


The data communication is highly essential in the military field and especially critical during Battles. This research is aimed to protect any confidential data from any unauthorized persons and also aims at delivering a cost effective solution for the much needed data security. The PC encrypts the given text data into pseudo-random noise sequence using OFDM and Blowfish Algorithm. The communication takes place through a wireless RF transmitter and receiver module operating at a frequency 433.92 MHz. At the receiving end PIC Microcontroller is used to decrypt the received data into original text data. Once the information is received the alarm sounds indicating reception of message. Only upon proper authentication, one is allowed to view the data in an available LCD display. This work is tested to operate at a maximum range of 40 km and it also penetrates through any obstructions such as trees, walls, etc., this system is also equipped for a secured data transmission. In order to protect the data from unauthorized persons, if the four digit password is entered wrongly thrice, on the next entry of the password even though if it is correct, the particular data received will be erased. Data communication will have to continue afresh for any further data reception.

Keywords


OFDM,Blowfish,A Pseudo-random Noise (PN).

Full Text:

PDF

References


L. Xiao and L. Cuthbert “Improving Fairness in Relay-Based Access Networks” International Symposium on Modeling, Analysis Simulation wireless Mobile System, October 2008.

L. Huang, M. Rong, L. Wang, Y. Xue and E. Schulz “ Recourse Scheduling for OFDMA/TDD based relay enhanced Cellular Networks” IEEE Journal on Wireless Communication Networks, Vol. 27, PP 1544 – 1548, June 2009.

Balraj B and Thamaraiselvi D “OFDM Based Reduction in High – Speed Wireless Communication” International Journal on Technology Today, Vol.02, PP 119 - 122, July 2010.

Z. Han and K.J. Liu “Resource Allocation for Wireless Networks: Basics, Techniques and Applications, Published by Cambridge University Press, September 2008.

Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms,” in IJCSNS International Journal of Computer Science and Network Security, vol.8 No.12, December 2008, pp. 280- 286.

K. Maharatna, E. Grass and U. Jagdhold “ A 64-point Fourier Transform Chip for High speed Wireless LAN Application using OFDM” IEEE Journal of Solid-State Circuit. Vol. 39, No.3, March 2004.

T. Cui and C. Tellambura, "OFDM Channel Estimation and Data Detection with Superimposed Pilots," European Transactions on Telecommunications, vol. 22, no. 3, pp. 125-136, April 2011.

G. Wang, F. Gao, Y. Wu, and C. Tellambura, "Joint CFO and Channel Estimation for OFDM Based Two-Way Relay Networks," IEEE Transactions on Wireless Communications, vol. 10, no. 2, pp. 456-465, February 2011.

Z. Zhang, C. Tellambura, and R. Schober, "Improved OFDMA Uplink Transmission Via Cooperative Relaying in the Presence of Frequency Offsets - Part I: Ergodic Information Rate Analysis," European Transactions on Telecommunications, vol. 21, no, 3, pp. 224-240, April 2010.

Z. Zhang, H. Kayama and C. Tellambura, "Transmission Systems New joint frame synchronisation and carrier frequency offset estimation method for OFDM systems," European Transactions on Telecommunications, published online November 2008, DOI: 10.1002/ett.1339

Bruce Schneier. The Blowfish Encryption Algorithm Retrieved October 25, 2008, http://www.schneier.com/blowfish.html

Meyers, R.K.; Desoky, A.H. "An Implementation of the Blowfish Cryptosystem" Signal Processing and Information Technology, 2008. ISSPIT 2008. IEEE International Symposium.pp 346 – 351.

Alka Sawlikar, Manisha Sharma, "I Analysis of Different Pseudo Noise Sequences" International Journal of Computer Technology and Electronics Engineering, vol. 1, no, 2, pp. 156-161,

Microchip Technology Inc., PIC16F87X 28/40- Pin 8-Bit CMOS Flash Microcontrollers Datasheet, (2001).

Muhammad Ali Mazidi, PIC Microcontroller and Embedded systems using Assembly and C for PIC16, Pearson Education, 2008

Ajay V. Deshmukh, “Microcontrollers: Theory and applications”, Tata McGraw-Hill

7805 and 7812 Voltage Regulator ICs-Data sheets.

“PIC16F877A” Data sheet from Microchip Corporation


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.