Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Wireless Network Security
Post: #1

Description : Communication may be considered as the art of expressing oneself coherently. In the present electronic era, communication has taken the definition: the technique or process of exchange of meaningful data among entities. With technology as the catalyst, communication has burgeoned over the last couple of decades. The notion of a physical medium for communication is fast vanishing. Technology has it that today communication is possible without actual physical connection between devices. This project explores one such technology namely, optical communication. Infrared rays are an efficient means of communication and data transfer. The merits of this technique are that it does not require physical connection between devices, it is cost effective and it is simple and easy to implement. This project involves setting an optical communication link between two computers and transmitting and receiving data. Each computer has a transmitter and receiver attached to it and is thus capable of transmitting as well as receiving data. The data to be transferred is first collected. The compression algorithm is performed on the data. Then the encryption algorithm is used to encrypt the data to provide a basic level of security. Finally the data are converted to infrared rays and then transferred
Technology Used : Java ,Swing
Algorithms : RSA ,DES AND SHA algorithms
Post: #2
there is some related pages you can read for Data security in wireless networks ,

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Security Analysis of the SASI Protocol computer science topics 2 1,934 21-06-2016 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 3,328 16-03-2015 02:52 PM
Last Post: seminar report asees
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 1,307 19-09-2014 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 5,497 11-09-2014 07:45 PM
Last Post: erhhk
  Fast Data Collection in Tree-Based Wireless Sensor Networks Projects9 9 3,058 12-03-2014 06:30 PM
Last Post: computer topic
  Folder Security System computer science topics 6 2,610 29-07-2013 11:09 AM
Last Post: computer topic
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 1,973 03-06-2013 11:13 AM
Last Post: computer topic
  Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation seminar class 2 2,486 02-02-2013 02:08 PM
Last Post: seminar details
  The Wireless Sensor Network for Home-Care System Using ZigBee smart paper boy 1 1,301 31-01-2013 11:34 AM
Last Post: seminar details
  Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Projects9 1 821 08-01-2013 02:25 PM
Last Post: Guest