Encrypted Wireless Communication System on UHF Frequency Based on Text Messages

Main Article Content

Jerico
Wiryo
Luthfi
Suraidi
Meirista

Abstract

Communication is a habitual thing for every human, whetherit's communicating directly orindirectly. When a natural


disaster happens, problems can occur on communication systems. These problems can lead to information being not


received properly, so the two parties communicating didn’t know the content of the message. In this situation,


a two-way radio device is the best solution that can be used to communicate. A two-way radio device enables the user


to communicate without any cellular network or internet, because the radio can be both a transceiver or a receiver


in its own frequency. A common two-way radio device uses UHF frequency range (400 MHz - 520 MHz) because


of the characteristics of this frequency range that can penetrate buildings or vegetation that usually interfere with the


radio signal. However, a two-way radio device has a broadcast and unencrypted characteristic, so that every


conversation that is happening between the radio users can be heard by other users. In an emergency situation such


as a natural disaster, important and confidential information shouldn’t be heard by an unauthorized person. So in


this project, the writers have a goal to design an encrypted text based communication system that works on the UHF


frequency band.

Article Details

Section
Articles
Author Biographies

Jerico, Tarumanagara University

Electrical Engineering Department, Faculty of Engineering

Wiryo, Tarumanagara University

Electrical Engineering Department, Faculty of Engineering

Luthfi, Tarumanagara University

Electrical Engineering Department, Faculty of Engineering

Suraidi, Tarumanagara University

Electrical Engineering Department, Faculty of Engineering

Meirista, Tarumanagara University

Electrical Engineering Department, Faculty of Engineering

References

S. Krishna Scholar, “The Role of Radio in Disaster Management: With Special Reference to

Indian Radio Introduction,” International Journal of Creative Research Thoughts (IJCRT)

www.ijcrt.org, vol. 5, pp. 2320–2882, 2017, Accessed: Jul. 10, 2022. [Online]. Available:

www.ijcrt.orgwww.ijcrt.org

R. Dwiana, A. Armando, and M. A. Birowo, “Emergency Broadcasting Radio in Indonesia:

Comparative Studies in Lombok and Palu,” Journal of Disaster Research, vol. 15, no. 5,

pp. 655– 663, Aug. 2020, doi: 10.20965/JDR. 2020.P0655.

IEEE Standard Letter Designations for Radar-Frequency Bands. 2019. Accessed: Jul. 10,

[Online]. Available: https://standards.ieee.org/ieee/521/7649/

J. D. Mathews, “Radio science issues surrounding HF/VHF/UHF radar meteor studies,”

Journal of Atmospheric and Solar-Terrestrial Physics, vol. 66, no. 3–4, pp. 285–299,

Feb. 2004, doi: 10.1016/J.JASTP.2003.11.001.

R. Sigh and N. Kumar, “A Review Paper on Cryptography of Modifed Caesar Chiper,”

Journal of Atmospheric and Solar-Terrestrial Physics, vol. 66, no. 3–4, pp. 285–299,

Feb. 2004, doi: 10.1016/J.JASTP.2003.11.001.

P. Jadhav, A. Jadhav, A. Indrale, “Data Encryption and Decryption using RF Module,”

International Research Journal of Engineering and Technology (IRJET), doi:

14419/ijet.v7i4.11.20810.

N. N. Mohamed, “Securing RF Communication Using AES-256 Symmetric Encryption: A

Performance Evaluation” International Journal of Engineering and Technology (IJET), vol.

, no. 5, May. 2019.

S. Bashir, S. Ali, S. Ahmed, and V. Kakkar, “Analog-to-digital converters: A comparative

study and performance analysis,” Proceeding - IEEE International Conference on

Computing, Communication and Automation, ICCCA 2016, pp. 999–1001, Jan. 2017, doi:

1109/CCAA.2016.7813861.

P. Sysel and P. Rajmic, “Goertzel algorithm generalized to non-integer multiples of

fundamental frequency,” Eurasip Journal on Advances in Signal Processing, vol. 2012, no.

, 2012, doi: 10.1186/1687-6180-2012-56.

Reinhard. Wobst and A. Shafir, Cryptology Unlocked. John Wiley & Sons, 2007.

E. I. Imran and F. Abdulameerabdulkareem, “Enhancement Caesar Cipher for Better

Security,” IOSR Journal of Computer Engineering, vol. 2014, no. 1, 2014, e-ISSN: 2278-