Faculty of Computing, Engineering and Science DESIGNING SECURE PROTOCOL FOR WIRELESS AD-HOC NETWORKS STUDENT NAME : ARVINDH KUMAR S T REFERENCE NO : 14024765 AWARD : COMPUTER NETWORKS AND SECURITY MODULE CODE : C0CS70686-2014-SPG1-2014-SPG1 MODULE TITLE : RESEARCH METHODS FOR NETWORKING LECTURER : RACHEL CORNES SUBMISSION DATE: 05-DEC-2014 TABLE OF CONTENTS: 1 BACKGROUND 2 PROPOSED WORK 3 AIMS AND OBJECTIVES 4 INTELLECTUAL CHALLENGE 5 RESEARCH SCHEDULE 6 DELIVERABLES 7 ETHICAL CONSIDERATIONS 8 RESOURCES 9 REFERENCES Figure 1 Wireless ad-hoc networks (Source: http://www.thelifenetwork.org/about.html) BACKGROUND: Now-a-days, communication had become a major role within the people. Communication is done by a medium with sender and receiver. In internet the way of communication takes place by medium of wired and wireless. There is a rapid growth in both wired and wireless infrastructures. It makes use of the customers for the internet connection in many possible ways .In most of the places wireless internet has been used. Most of the wireless spontaneous network is not secure because it is not a planned network and network boundaries are defined poor, due to the lack of centralized server in the network. Usually wireless networks perform both communication and measurement in a given network. Wireless network architecture usually
The popularity of Internet has become ubiquitous and pervasive all over the world. The Internet plays a pivotal role in all walks of human life and has improved the quality of people life and has invaded all sectors like Governmental Organizations, Science and Technology, Business World, Industry and Education. In 1969, the Internet was originated by US Department of Defense (DoD) and Advanced Research Project (ARPANET) using Network Control Program (NCP). Research on packet switching communication methodology resulted in inter-networking of networks in 1981, when the researchers in Great Britain and Norway tried to collaborate with the researchers in US using Internet Protocol (IP). Realizing the importance and advantages of IP, the Internet
Security is always the main issue for a network, when it is a wireless system the security becomes the main concern for a user. A wireless P2P network is suffering from mainly two security attacks i) Virus Attack ii) Intruders. Intruder does not only mean it want to hack the private information over the network, it also include to use a node bandwidth and increase the Delay of Service for other host over the network. This work is basically based on such type of attack. There are some system that exists on same attack model by comparing the hop time and some other means. But in all such system the Detection system is performed on a centralized system. We are proposing and intelligent predictive system
The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people's homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie in a collection of computers that were linked together in the 1970s to form the US Department of Defense's communications systems. Fearing the consequences of nuclear attack, there was no central computer holding vast amounts of data, rather the information was dispersed across thousands of machines. A set of rules, of protocols, known as TCP/IP was
• Interception: is considered to be a passive attack in which the intruder listens and records the sent encrypted messages to be decrypted later on.
The Internet is the global way of interconnected computer interfaces that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is an interface of networks that consists of individual, civic, academic, marketing, and government tracks of local to global scope, joined by a broad collection of electronic, wireless, and optical networking technologies. The Internet has changed continuation upside down. It was no longer a state-controlled outline, although the extensive computer network in the world including across 50,000 sub-networks, 4 million systems, and 70 million users. The Internet supports numerous network services, most prominently mobile apps such as social media apps,Internet telephony, the World Wide Web, multiplayer online games,electronic mail, and file sharing services. The internet is essentially a web
Wireless connectivity is critical to most homes and corporations as the world advances in technology. The technology has grown to a capacity that allows for extreme growth in wireless infrastructure as well as a trend of bringing your own technology device. Many corporations experience a high volume of critically important information being transferred over it wireless network so security is essential. There are many differences between a home and corporate wireless installation and each has its differences in securing.
The internet is a worldwide system of computer networks which is sometimes called as “The Net”. It consists of several interconnected networks which provides various information and communication facilities using standardized communication protocols. Internet is also called as a network of networks, which means that it connects millions of computers together worldwide. As long as computers are connected to internet they can easily communicate with each other.
Although the internet with algrothmic is smart enough and makes the information getting process easier, internet safety problem is still unsolved. The internet can know everything about us: it knows where we are, what type of our computer is,etc. Even if we log out our account, based on what Eli says, the internet still looks for 57 signals. To solve security problem, maybe becomes the goal of next generation of technology that people get information from
Abstract— Wireless Sensor Networks (WSN) introduce a new way to interact with the physical environment. The security in WSNs became an attractive area of research. WSNs are susceptible to a wide range of malicious attacks. At present ECC is considered for secure communications, which is having good potential for WSN security due to its smaller key size and its high strength of security. Unfortunately, the execution time of ECC is more which is not suitable for more number of applications. A number of other security mechanisms have been proposed for sensor networks to provide data confidentiality, namely Advanced Encryption Standard (AES) and Data Encryption Standard (DES). In this paper, we propose an algorithm, which is compared and analyzed with the existing ECC and AES to provide better security with authenticated sensor nodes. The authentication is done with a secret code. The proposed algorithm will ensure the secure communication with authenticated devices. The analysis results shows that the scheme works better than the common existent schemes with better utilization of available memory.
In today’s world Internet has become one of the most important mediums of communication. It has become the lifeline of our survival. It has removed the entire social, economic and physical barrier and has immense effect on our day to day activity.
In the development of internet technology, many issues have emerged regarding the method of internet control. This nature of internet development and the various technologies to control over the internet will be explained in this section.
Wireless network is indicated to a telecommunication network whose interconnections between nodes are implemented without the use of wires, such a computer network. Nowadays, wireless network has become the important thing in telecommunication. This sort of technology has been used for over a century and remains synonymous with radio. In 19th century, Guglielmo Marconi invented a radio and made his made his mark in the world of wireless technology.
To date, the dominant part of Internet connections worldwide are gadgets utilized straightforwardly by people, for example, PCs and mobile phones. The principle correspondence form is human-human. In a near future, each object can be associated. Things can trade data by themselves and the quantity of "things" associated with the internet will be much bigger than the quantity of "individuals" and people may turn into the minority of generators and recipients of traffic. But, as of
A wireless protocol that is intended to deliver the privacy comparable to that of a wired network.
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail.