FPGA Based Signal Security Using FHSS
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 5
Abstract
Security of the data, information is the major topic of concern in the today’s world of technology. Only password protection security is not sufficient from the intentional interference of data. This work is based on the data protection using FHSS (Frequency Hopping Spread Spectrum) which is one of the best techniques in the field of communication where the data is hidden in the background noise by modulating it with high frequency carrier and spreading its bandwidth using pseudorandom sequence [1]. As FPGA’s makes the hardware implementation simple because of its advantages of high speed, flexibility, etc. [2]. The main objective of this work is to build the hardware implementation of FHSS transmitter using FPGA having Xilinx Simulator and verifying the result on Spectrum Analyzer. On the similar hands the receiver can also be design.Along with this, this paper will be giving idea of how the lives can be saved of people living on coastal areas and protection of country using FHSS.
Authors and Affiliations
Pralay Shende, Nilay Neve, Faizan Momin, Rutuja Deshmukh
SLUMBER DETECTION OF VISUAL ACTIVITY USING ARM 9
Slumber detection is to implement the driver attentiveness in cars. The project is to monitor the driver’s eye movement by using webcam and EOG channel respectively.Embedded project is to design and develop a low cos...
Performance Analysis of AODV and DSR Routing Protocols in MANET’S
Mobile ad-hoc networks (MANETS) are formed by a collection of mobile nodes that have the ability to form a communication network without the help of any fixed infrastructure. Because of the nature of these networks,...
An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User Participation
The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and...
Preventing Real-time Packet Classification in Wireless Networks
This paper proposes the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priori...
Equivalent Entity Mining Commencing On Relative Uncertainty
Contrast entities are an significant part of decision making progression. To assist judgment making it is useful to evaluate entities that share widespread utility but have distinguishing peripheral characteristics....