Encrypted Wireless Communication System on UHF Frequency Based on Text Messages
Main Article Content
Abstract
Communication is a habitual thing for every human, whetherit's communicating directly orindirectly. When a natural
disaster happens, problems can occur on communication systems. These problems can lead to information being not
received properly, so the two parties communicating didn’t know the content of the message. In this situation,
a two-way radio device is the best solution that can be used to communicate. A two-way radio device enables the user
to communicate without any cellular network or internet, because the radio can be both a transceiver or a receiver
in its own frequency. A common two-way radio device uses UHF frequency range (400 MHz - 520 MHz) because
of the characteristics of this frequency range that can penetrate buildings or vegetation that usually interfere with the
radio signal. However, a two-way radio device has a broadcast and unencrypted characteristic, so that every
conversation that is happening between the radio users can be heard by other users. In an emergency situation such
as a natural disaster, important and confidential information shouldn’t be heard by an unauthorized person. So in
this project, the writers have a goal to design an encrypted text based communication system that works on the UHF
frequency band.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
References
S. Krishna Scholar, “The Role of Radio in Disaster Management: With Special Reference to
Indian Radio Introduction,” International Journal of Creative Research Thoughts (IJCRT)
www.ijcrt.org, vol. 5, pp. 2320–2882, 2017, Accessed: Jul. 10, 2022. [Online]. Available:
www.ijcrt.orgwww.ijcrt.org
R. Dwiana, A. Armando, and M. A. Birowo, “Emergency Broadcasting Radio in Indonesia:
Comparative Studies in Lombok and Palu,” Journal of Disaster Research, vol. 15, no. 5,
pp. 655– 663, Aug. 2020, doi: 10.20965/JDR. 2020.P0655.
IEEE Standard Letter Designations for Radar-Frequency Bands. 2019. Accessed: Jul. 10,
[Online]. Available: https://standards.ieee.org/ieee/521/7649/
J. D. Mathews, “Radio science issues surrounding HF/VHF/UHF radar meteor studies,”
Journal of Atmospheric and Solar-Terrestrial Physics, vol. 66, no. 3–4, pp. 285–299,
Feb. 2004, doi: 10.1016/J.JASTP.2003.11.001.
R. Sigh and N. Kumar, “A Review Paper on Cryptography of Modifed Caesar Chiper,”
Journal of Atmospheric and Solar-Terrestrial Physics, vol. 66, no. 3–4, pp. 285–299,
Feb. 2004, doi: 10.1016/J.JASTP.2003.11.001.
P. Jadhav, A. Jadhav, A. Indrale, “Data Encryption and Decryption using RF Module,”
International Research Journal of Engineering and Technology (IRJET), doi:
14419/ijet.v7i4.11.20810.
N. N. Mohamed, “Securing RF Communication Using AES-256 Symmetric Encryption: A
Performance Evaluation” International Journal of Engineering and Technology (IJET), vol.
, no. 5, May. 2019.
S. Bashir, S. Ali, S. Ahmed, and V. Kakkar, “Analog-to-digital converters: A comparative
study and performance analysis,” Proceeding - IEEE International Conference on
Computing, Communication and Automation, ICCCA 2016, pp. 999–1001, Jan. 2017, doi:
1109/CCAA.2016.7813861.
P. Sysel and P. Rajmic, “Goertzel algorithm generalized to non-integer multiples of
fundamental frequency,” Eurasip Journal on Advances in Signal Processing, vol. 2012, no.
, 2012, doi: 10.1186/1687-6180-2012-56.
Reinhard. Wobst and A. Shafir, Cryptology Unlocked. John Wiley & Sons, 2007.
E. I. Imran and F. Abdulameerabdulkareem, “Enhancement Caesar Cipher for Better
Security,” IOSR Journal of Computer Engineering, vol. 2014, no. 1, 2014, e-ISSN: 2278-