MGS655: Distributed Systems Final Project Report
Mobile distributed Systems for secure communication
Team: Saylee Joshi & Shrutee Patil
Abstract:
Wireless communication and mobility introduced a new paradigm in Distributed Systems. We examined short-range wireless data transmission using mobile agent (developed using Android OS). Presence of mobility in distributed systems introduces new challenges of reliable and secure communication. In this project, we propose a secure way of communication via wireless network (comprised of P2P nodes) – Bluetooth and secure the data transmission using asymmetric cryptograph.
Assumptions:
Communicating P2P nodes (here, mobile devices) • are not moving,
• are within stipulated range,
• have hardware capability of wireless communication, and • use latest releases of OS (For Android API > 4.0).
Introduction:
Mobile is a most commonly used distributed communication device. Our project describes the problem encountered with mobile distributed systems and how it can be solved and implemented for secure P2P communications (Peer-to-Peer communications). The system we have is distributed and based on object oriented architecture, where each node functions as both client and server. Once a network is established between these nodes, it is difficult to refuse an access to anyone who is within stipulated range and can see the network with their adapter. It is a set of distributed systems that communicate via short range wireless technologies. This
Security is always the main issue for a network, when it is a wireless system the security becomes the main concern for a user. A wireless P2P network is suffering from mainly two security attacks i) Virus Attack ii) Intruders. Intruder does not only mean it want to hack the private information over the network, it also include to use a node bandwidth and increase the Delay of Service for other host over the network. This work is basically based on such type of attack. There are some system that exists on same attack model by comparing the hop time and some other means. But in all such system the Detection system is performed on a centralized system. We are proposing and intelligent predictive system
We are watching the birth of a new revolution in computer paradigm that guarantees to profoundly affect the way we associate with the computers, gadgets, physical spaces and other individuals. This new technology helps to create a world where all embedded processors, computers, sensors and digital communication are inexpensive products which can be used anywhere in the world which helps in eliminating time and place barriers by making services available to all users everywhere. Pervasive computing will surround users with a comfortable and convenient information environment that combines physical and computational infrastructures into an integrated habitat.
Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.
Protecting information and critical infrastructure in a cohesive way that quantifies policies and procedures is imperative for implementing a proactive privacy risk management plan. In doing so, you gain the necessary framework and principals to share essential operational data for use in cybersecurity while focusing on policy cohesiveness between intra government agencies, the private sector, and securing critical infrastructures. (Claffy & Kenneally, 2010).
MUs always ask for a higher speed at a lower cost, and demand to be “Always Best Connected” [2]. However, due to the differences in wireless technologies, it is hard to achieve both high data rate and wide coverage at once. Moreover, different technologies sometimes are operated by multiple network providers. As a result, ubiquitous wireless network is not feasible with a single technology and a single wireless provider. That makes a MU always in need to connect to different types of technologies and service providers depending on his/her location and the target speed. However, there are some security concerns raised from the MU and foreign network (FN) perspectives as they cannot establish a connection without being authentic to each other. The traditional solution to such a problem is to have a roaming agreement between the home network (HN) and FN for verification process. Fig.1 illustrates the problem.
Some application developers are adopting peer to peer architecture to drive secure communications with end to end encryption, the technique adopted here is to decrypt the communication traffic directly at the recipient’s device rather than doing it on the servers.
Abstract- This paper illustrates Bluetooth enabling device for physically challenged using actuators and sensor for providing robust security and reliability. In it we have written how Bluetooth is useful for we people in present era with high security as well as performance. We have used different types of protocol which is more suitable for Bluetooth device[1] like IP Secure (IPsec) and Secure Shell (SSH).Bluetooth abbreviations out as the most averring for use in low-power sensor networks. This paper also addresses the difficulty of scatter net for singe hope Bluetooth based personal area and ad hoc networks with minimal communication overhead.Bluetooth iscriticized for various vulnerabilities and security as its designers are trying to balance wisely between performance and
Wireless communication has come a long way since weighing around 1.1 kg in 1983 to the myriad of smartphones available in the market today that are lightweight and loaded with endless features.
Network security is a problem that network administrators face because it is something that everyone should keep a careful eye on. For example, if your home network does not have any security measures in place, then you are at a high risk of data loss due to hacking. Network security is something that businesses do not take very lightly, because they want to protect their valuable information and network resources from hackers. Network security is a problem because of unauthorized use and can be resolved by increasing the security encryption levels.
File sharing, put simply, is the process of making available and distributing files via the internet. Many freely developed applications have been made available that simplify this process, providing the ability to easily search for, download, and upload any piece of digital content imaginable. These applications are commonly referred to as P2P or peer-to-peer applications as they allow individuals (peers) to directly connect with other peers to share files. By themselves, such applications are useless; a central network must be available that allows each peer to see one another. These
The other standards which are used in mobile phones are 1st generation, 2nd generation, 3rd generation, 4th generation, and LTE. The latest upcoming technology is the 5th generation. We can use the Wi-Fi in many devices like personal laptops, smartphones, computers etc. To obtain a wireless network computer or any equipment should have wireless network interface controller. These signals are transferred through a single radio frequency channel. By using multiple overlapping access points the wireless signals can the transferred to many kilometers.
Mobile phone usage is at its highest right now. I know personally if I don’t have my cell phone I feel like I am missing my closet accessory. I do everything from my phone talk, text. Check email, pay bills, check my bank account, send money, receive money etc. Since so many different things are done on cell phones, mobile security has become a big issue. The subject of mobile computing is extremely important to me because of my background in IT I have a Bachelors Degree in IT as well as I am pursing my masters in Network Engineering. The world has changed significantly in their use of technology a few years back everyone had a laptop and that was
Abstract— A VANET network is a subset of ad hoc networks where each mobile node is an intelligent vehicle equipped with communication resources (sensor). The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers. They are therefore vulnerable to many types of attacks. Many proposals have been proposed to secure communication in VANETs. In this paper; we propose an approach to adopt a new method of distributing certificates in VANET. In Our proposal the cluster-head acts as a virtual CA and issues certificates to cluster members. The main objective of our approach is to avoid making a new certificate request in case a node passes from a cluster to another. This approach has been evaluated by simulation study using the simulator network NS-2.
Over the past few years we as a race have become overly dependent on technology, which has compelled us to develop electronic devises that allow us to transfer and share data more rapidly and securely. However, this task of connecting different technologies has not been painless as most devices come with different operating systems, parts, connectors, and protocols that need to be considered and taken care of before developing any new devices. As a result, it has been a challenge to produce new technologies and protocols to allow these devices to connect easily. One such solution is Bluetooth will allows devices to connect wirelessly over a short range. However, like any other wireless networking, Bluetooth is also prone to various types
Security is a more sensitive issue in MANETs than any other networks due to lack of infrastructure and the broadcast nature of the network. While MANETs can be quickly set up as needed, so they also need secure data transfer over the network. We provide encryption and decryption algorithm using Rijndael (AES) block cipher. It helps the message to secure