Professional Documents
Culture Documents
37 www.erpublication.org
Performance Based Secure Protocol Methodology for Spontaneous Wireless Mobile Adhoc Networks
a secure self-configured environment for data distribution contextual information obtained from the apps name is very
and resources and services sharing among users. Security is limited, as the words used for app name are very short and
established based on the service required by the users, by sparse. Hence there is an immediate need to provide an
building a trust network to obtain a distributed certification effective classification of the mobile apps by using the
authority. A user is able to join the network because he/she enriched information about the apps.
knows someone that belongs to it. Thus, the certification
To achieve this goal, we will be exploiting not only the
authority is distributed between the users that trust the new
web knowledge but also the real world contextual features
user. The network management is also distributed, which
about the apps along with their word labels. This will
allows the network to have a distributed name service. We
automatically improve the contextual information of the apps,
apply asymmetric cryptography, where each device has a
resulting into improved performance of the classification.
public-private key pair for device identification and sym-
Here the web knowledge is extracted from the general search
metric cryptography to exchange session keys between
engine like Google or from the app store, while the real world
nodes. There are no anonymous users, because
features will be extracted from the mobile usage record of the
confidentiality and validity are based on user identification.
user.
Preliminary versions of this paper appeared in 2003, we
presented the basis to setup a secure spontaneous network. To
solve mentioned security issues, we used an authentication IV. EXISTING SYSTEM
phase and a trust phase. Moreover, we presented a mechanism All nodes may not be able to execute routing and/or
to allow nodes to check the authenticity of their IP addresses security protocols. Energy constraints, node variability, error
while not generating duplicated IP addresses. The mechanism rate, and bandwidth limitations mandate the design and use of
helps nodes to authenticate by using their IP addresses. We adaptive routing and security mechanisms, for any type of
have used this mechanism in the secure protocol presented in devices and scenarios. Dynamic networks with flexible
this paper, but it can be replaced by any other IP address memberships, group signatures, and distributed signatures are
assignment mechanism. difficult to manage. To achieve a reliable communication and
node authorization in mobile ad hoc networks, key exchange
mechanisms for node authorization and user authentication
II. OBJECTIVES
are needed security methods such as pre-distribution key
Advances in wireless local-area network technology algorithms, symmetric and asymmetric algorithms,
typically based on IEEE 802.11 and the growing interest in intermediate node-based methods, and hybrid methods. But
public safety communications have created new demands for these methods are not enough for spontaneous networks
reliable transmission of real-time multimedia information because they need an initial configuration or external
over distributed mobile ad hoc networks (MANET). authorities.
The objective of this project is to test and evaluate the
performance of MANET for safety communications and V. PROPOSED SYSTEM
tactical operations. In particular, by providing diversity
cooperative transmission can indeed increase throughput as We presented the basis to setup a secure spontaneous
well as transmission coverage. In this study we will network. To solve mentioned security issues, we used an
specifically concentrate on the synchronization aspects of authentication phase and a trust phase. We presented a
cooperative transmission, which is one of the major issues in mechanism to allow nodes to check the authenticity of their IP
its application to multi-hop transmission in wireless ad-hoc addresses while not generating duplicated IP addresses. The
network environments. The main focus will be to address mechanism helps nodes to authenticate by using their IP
quality of service issues and network reliability for addresses. We have used this mechanism in the secure
transmission of real-time information. Specifically, we are protocol presented in this paper, but it can be replaced by any
pursuing the following tasks: other IP address assignment mechanism.
38 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-3, Issue-1, January 2015
B. Administrator Module: node. All nodes can be both clients and servers, can request
or serve requests for information or authentication from other
1. New node Joining Module
nodes.
By using Network based Intrusion Detection System
(NIDS), the new node is created and they are joined to new
nodes by respective procedures given by owner.
The joining module is done with 3 phases
2. New network creation module
In this module, we create a new network for the trusted
users.
The first node in the network will be responsible for
setting the global settings of the spontaneous network.
The second node first configures its user data and
network security.
Our protocol relies on a sub layer protocol e.g.
Bluetooth, Wi-Fi
3. Data transfer module
A node receives a data packet that is ciphered by a public
key.
When the server process received the packet, it is in
charge of deciphering it with the private key of the user.
39 www.erpublication.org
Performance Based Secure Protocol Methodology for Spontaneous Wireless Mobile Adhoc Networks
40 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-3, Issue-1, January 2015
Forward an information request: The request will be
forwarded if it is a broadcast message.
Send data to one node: It can be sent symmetrically or
asymmetrically encrypted, or unencrypted.
Send data to all nodes: This process is doing by a
flooding system. Each node retransmits the data only the
first it receives the data. It can be sent symmetrically
encrypted or unencrypted.
Modify Data: User data can be modified and the
password changed.
Leave the network.
VIII. CONCLUSION
In This Project, we show the design of a protocol that
allows the creation and management of a spontaneous
wireless ad hoc network. It is based on a social network
imitating the behavior of human relationships. Thus, each
user will work to maintain the network, improve the services
offered, and provide information to other network users.
We have provided some procedures for self-configuration: a
unique IP address is assigned to each device, the DNS can
be managed efficiently and the services can be discovered
automatically. We have also created a user-friendly
application that has minimal interaction with the user. A
user without advanced technical knowledge can set up and
participate in a spontaneous network. The security schemes
included in the protocol allow secure communication
between end users (bearing in mind the resource,
processing, and energy limitations of ad hoc devices).We
have performed several tests to validate the protocol
operation.
ACKNOWLEDGMENT
It is my pleasure to express my knowledge to my respected
sir Prof. H. D. Sonawane, Computer Engineering Department,
BVCOE&RI, Nashik for his valuable guidance, inspiration
and continues support. This paper could not be success
without protocol study done which help to understand the
necessity for this paper.
REFERENCES
[1] R. Lacuesta, J. Lloret, M. Garcia, and L. Penalver, A Spontaneous
Ad-Hoc Network to Share WWW Access, EURASIP J. Wireless
Comm. and Networking, vol. 2010, article 18, 2010.
[2] Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, A
Survey of Key Management Schemes in Wireless Sensor Net-
works, Computer Comm., vol. 30, nos. 11/12, pp. 2314-2341, Sept.
2007.
[3] V. Kumar and M.L. Das, Securing Wireless Sensor Networks with
Public Key Techniques, Ad Hoc and Sensor Wireless Networks, vol. 5,
nos. 3/4, pp. 189-201, 2008.
[4] S. Zhu, S. Xu, S. Setia, and S. Jajodia, LHAP: A Lightweight Hop-
by-Hop Authentication Protocol for Ad-Hoc Networks, Ad Hoc
Networks J., vol. 4, no. 5, pp. 567-585, Sept. 2006.
[5] A. Noack and S. Spitz, Dynamic Threshold Cryptosystem without
Group Manager, Network Protocols and Algorithms, vol. 1, no. 1, Oct.
2009.
[6] J. Yan, J. Ma, F. Li, and S.J. Moon, Key Pre-distribution Scheme with
Node Revocation for Wireless Sensor Networks, Ad Hoc and Sensor
Wireless Networks, vol. 10, nos. 2/3, pp. 235-251, 2010.
[7] M. Mukesh and K.R. Rishi, Security Aspects in Mobile Ad Hoc
Network (MANETs): Technical Review, IJCA, vol. 12, no. 2, pp.
37-43, Dec. 2010
41 www.erpublication.org