Monday, 26 May 2014

Encrypted laser friend-foe identification technology

ABSTRACT

An encrypted laser friend-foe identification technology to query potential targets as to their battle field affiliation and also to identify itself as a friend to a potential attacker. The IFF System sends a narrow laser beam to the potential target which is accompanied or closely followed by a radio frequency (RF) wave modulated with encrypted identification information. If the potential target is also equipped with IFF System and in possession of the valid code, then the received RF wave can be decrypted to reveal the potential attacker as a friend. The potential target, then, encrypts its own identification information using the same code and transmits it via RF wave to the potential attacker. This feedback signal creates a buzzer to buzz else if there is no feedback signal buzzer does not buzz.



                                                                 INTRODUCTION

      1.1 GENERAL
In military, soldier points a laser beam on to the body armor of foe soldier and trigger the gun. In such cases miscommunication may occur, during night time battle firing. So that friendly soldier may die or it may cause severe injure due to aggressive battle.
1.2 AIM OF PRESENT STUDY
To avoid miscommunication or misinterpretation during firing.
1.3 STUDY AREA
The study area is mainly to know the working of RF transmitter and RF receiver circuits. Features of PIC microcontroller and parallel TX RX is used.
      1.4 OBJECTIVE AND SCOPE OF THE PROJECT
1.    An identification-Friend-or-Foe System (IFF System) technology to query potential targets as to their battle field affiliation and also to identify itself as a friend to a potential attacker.
2.    The IFF System sends a narrow laser beam to the potential target which is accompanied or closely followed by a radio frequency (RF) wave modulated with encrypted identification information.
3.    If the potential target is also equipped with IFF System and in possession of the valid code, then the received RF wave can be decrypted to reveal the potential attacker as a friend.
4.    The potential target, then, encrypts its own identification information using the same code and transmits it via RF wave to the potential attacker.
      1.5 HISTORICAL BACKGROUND
      The inspiration for the project is derived from Identification Friend-or-Foe       (IFF) transponder systems currently used on fighter aircraft and military vehicles. Fighter aircraft fitted with an IFF system transmit a coded radio (RF) message to other aircraft detected within a pre-set range. Friendly aircraft can decrypt the RF message and provide a correctly encrypted response to prevent fratricide
       1.6 METHODOLOGY
The project is carried out in following phases
  1. Design of block diagram as per the requirement.
  2. Design of RF transmitting and receiving circuits.
  3. Simulation using the software MICRO C.
  4. Implementation and testing of circuits in general purpose PCB.
  5. Design of printed PCB and testing.
     1.7 SOURCES OF INFORMATION
The sources of information were basically from the IEEE papers, articles published in electrical papers, published thesis [1] and information about the subject from our project guide. Any further information needed for the project were taken from the internet sites like Wikipedia, journals. Elsevier and other useful information sites. http://www.automationdirect.com/static/specs/peselection.pdf
   1.8 ORGANIZATION OF THE CHAPTERS
Chapter 1 Introduces the main purpose of our project. This chapter gives a brief explanation of the aim of present study, study area, objective, methodology, sources of information and outlines the contents of the upcoming chapters.
Chapter 2 Deals with working of RF transmitter and RF receiver circuits used.
Chapter 3 Deals with details of hardware, different components used,    flowchart of the transmitter and receiver part of the PIC microcontroller and the experimental set up of the model.                .
Chapter 4 Deals with the discussion of the result.
Chapter5 Deals with advantages and limitations derived from the relevant Studies.
Chapter 6 Deals with the conclusion and future scope.





No comments:

Post a Comment