CFP last date
20 May 2024
Reseach Article

Design and Implementation of SOC in NIOS-II Soft Core Processor for Secured Wireless Communication

by R. Ramachandran, J. Thomas Joseph Prakash
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 14
Year of Publication: 2012
Authors: R. Ramachandran, J. Thomas Joseph Prakash
10.5120/8486-2429

R. Ramachandran, J. Thomas Joseph Prakash . Design and Implementation of SOC in NIOS-II Soft Core Processor for Secured Wireless Communication. International Journal of Computer Applications. 53, 14 ( September 2012), 1-5. DOI=10.5120/8486-2429

@article{ 10.5120/8486-2429,
author = { R. Ramachandran, J. Thomas Joseph Prakash },
title = { Design and Implementation of SOC in NIOS-II Soft Core Processor for Secured Wireless Communication },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 14 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number14/8486-2429/ },
doi = { 10.5120/8486-2429 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:54:03.434954+05:30
%A R. Ramachandran
%A J. Thomas Joseph Prakash
%T Design and Implementation of SOC in NIOS-II Soft Core Processor for Secured Wireless Communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 14
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the modern world, the information that could benefit the individual / a group also can be used against such individual or group. Encryption is the technique of converting a plaintext (original data packet) into cipher text (encrypted message) which can be decoded back into the original message. There are several types of data encryptions schemes available which form the basis of network security. Our proposed work deals with the security based wireless communication system, with the NIOS-II soft core processor. Security in wireless communication is most essential, especially where hacking and tampering are threats of the data packet. Hence introduction of suitable security bits (Key) with the actual data packet is most important aspect in wireless communication to avoid such threats. It is really a significant and interesting area for the researcher. In this work, the data encryption standard technique is used for the safety transmission and reception, and implemented it successfully with the NIOS-II soft core processor.

References
  1. David Tse, Pramod Viswanath, Fundamentals of Wireless Communication 2005
  2. Andrea Goldsmith, Wireless communication
  3. Cyrus Peikari, Seth Fogie, Wireless Maximum Security, Chapter 6, Sams publishing, 2003.
  4. H. Chen, A. Perrig. " Security and privacy in Sensor Networks" Computer, Vol. 36, Issue 10, Oct. 2003, pp 103-105.
  5. Nios II processor Reference handbook, http://www. altera. com/
  6. http://users. ece. gatech. edu/~hamblen/DE1/DE1_CDROM/DE1_tutorials/tut_sopc_introduction_verilogDE2. pdf.
  7. Federal Information Processing Standards Publication 46-3, 1999 October 25.
  8. Data sheet of National Semiconductor, www. national. com
  9. Altera NIOS II Software Developer's Handbook, http://www. altera. com/
  10. Altera Quartus II Handbook, http://www. altera. com/
  11. DE2 Development and Education Board, http://www. altera. com/
  12. RS 232 Serial interface, http://www. fpga4fun. com/SerialInterface1. html
  13. http://en. wikipedia. org/wiki/Subscriber_Identity_Module.
  14. Alfred Menezes, Paul van Oorschot , Scott Vanstone, Handbook of Applied Cryptography.
  15. Jonathan Katz , Yehuda Lindell, Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series).
Index Terms

Computer Science
Information Sciences

Keywords

Wireless communication NIOS-II soft core processor FPGA SOC Data Encryption