ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA(2010-2013) 04/07/2013.

Slides:



Advertisements
Similar presentations
--- IT Acumens. COMIT Acumens. COM SNMP Project. AIM The aim of our project is to monitor and manage the performance of a network. The aim of our project.
Advertisements

Bandwidth Estimation for IEEE Based Ad Hoc Networks.
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
ABSTRACT Due to the Internets sheer size, complexity, and various routing policies, it is difficult if not impossible to locate the causes of large volumes.
MEASUROUTING: A FRAMEWORK FOR ROUTING ASSISTED TRAFFIC MONITORING PRESENTED BY.
MAIN PROJECT REPORT ON DESIGN & PERFORMANCE ANALYSIS OF MOBILITY MANAGEMENT SCHEMES BASED ON POINTER FORWARDING FOR WMN Submitted in partial fulfilment.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
On the Node Clone Detection inWireless Sensor Networks.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Energy-Optimum Throughput and Carrier Sensing Rate in CSMA-Based Wireless Networks.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks.
Privacy-Preserving Public Auditing for Secure Cloud Storage
Incentive Based Data Sharing in Delay Tolerant Mobile Networks.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
m-Privacy for Collaborative Data Publishing
EAACK—A Secure Intrusion-Detection System for MANETs
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.
Optimal Client-Server Assignment for Internet Distributed Systems.
Protecting Sensitive Labels in Social Network Data Anonymization.
Identity-Based Secure Distributed Data Storage Schemes.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Abstract Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing.
A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Presenting By CH . MADHURI(12QU1D5806) Under the supervision of
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
VIGNAN'S NIRULA INSTITUTE OF TECHNOLOGY & SCIENCE FOR WOMEN TOOLS LINKS PRESENTED BY 1.P.NAVEENA09NN1A A.SOUJANYA09NN1A R.PRASANNA09NN1A1251.
m-Privacy for Collaborative Data Publishing
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Privacy-Preserving and Content-Protecting Location Based Queries.
Energy-Efficient Protocol for Cooperative Networks.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
Dynamic Query Forms for Database Queries. Abstract Modern scientific databases and web databases maintain large and heterogeneous data. These real-world.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Intrusion Detection-An Energy Efficient Approach In Heterogeneous WSN Department Of Computer Science and Engineering ADARSH COLLEGE OF ENGINEERING CHEBROLU.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
l-ppt. By Y11mc24047 SAT: A Security Architecture Achieving Anonimity And Traceability In Wireless Mesh Networks.
BY S.S.SUDHEER VARMA (13NT1D5816)
Security Using Armstrong Numbers and Authentication using Colors
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Towards Scalable Traffic Management in Cloud Data Centers
Under Guidance- Internal Guide- Ms. Shruti T.V
INFORMATION RETRIEVAL AND KNOWLEDGE MANAGEMENT SYSTEM
ABSTRACT   Recent work has shown that sink mobility along a constrained path can improve the energy efficiency in wireless sensor networks. Due to the.
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
STEGANOGRAPHY.
Department Of Computer Science Engineering
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
Presentation transcript:

ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013

KING COLLEGE OF TECHNOLOGY (Approved by AICTE and Affiliated to Anna University, Chennai) Nallur, N.Pudupatty (PO), Namakkal – JULY 2013

A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Under The Guidance of Mrs. P.NANDHINI MCA.,M.Phil,[Ph.D] Assistant Professor In Department of MCA Done By Student Name : M.Jerald Reg. No: Year : Final Year MCA

A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

ABSTRACT Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs).

EXISTING SYSTEM In wireless communication systems, it is easier for a global observer to mount traffic analysis attacks by following the packet forwarding path than in wired networks. Therefore, traceability is highly desirable such as in e-cash systems where it is used for detecting and tracing double-spenders.

PROPOSED SYSTEM PROPOSED SYSTEM We are motivated by resolving the above security conflicts, namely anonymity and traceability, in the emerging WMN communication systems. Furthermore, the proposed pseudonym technique renders user location information unexposed.

SYSTEM SPECIFICATION SYSTEM SPECIFICATION HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk: 40 GB. Floppy Drive: 1.44 Mb. Monitor: 15 VGA Colour. Mouse: Logitech. Ram: 256 Mb. SOFTWARE REQUIREMENTS: Operating system : Windows XP Professional Front End : JAVA, Swing(JFC),J2ME Tool : j2me wireless toolkit 2.5.2

SOFTWARE SPECIFICATION SOFTWARE SPECIFICATION Java Technology Java technology is both a programming language and a platform.  Secure High performance  Interpreted  Multithreaded  Robust  Dynamic

JDBC Goals Java Program Compilers Interpreter My Program

PROJECT DESCRIPTION PROBLEM DEFINITION A large number of studies on multi-hop wireless networks have been devoted to system stability while maximizing These metrics measure the performance of a system over a long time-scale.

OVERVIEW OF THE PROJECT we analyze a multi-hop wireless network with multiple source-destination pairs, given routing and traffic information

MODULE DESCRIPTION Blind Signature Ticket Issuance Fraud Detection Fundamental security objectives

BLIND SIGNATURE Blind signature scheme such that the message being signed must contain encoded information. user in the blind signature scheme to embed some account-related secret information into what is being signed by the bank The restrictiveness property is essentially the guarantee for traceability in the restrictive blind signature systems.

TICKET ISSUANCE In order to maintain security of the network against attacks and the fairness among clients Each client by issuing tickets based on the misbehavior history of the client Ticket issuance occurs when the client initially attempts to access the network or when all previously issued tickets are depleted.

FRAUD DETECTION Fraud is used interchangeably with misbehavior in this paper, which is essentially an insider attack. which causes the server manager to constrain his ticket requests

FUNDAMENTAL SECURITY OBJECTIVES FUNDAMENTAL SECURITY OBJECTIVES It is trivial to show that our security architecture satisfies the security requirements for authentication, data integrity, and confidentiality We are only left with the proof of non- repudiation in this category. A fraud can be repudiated only if the client can provide a different representation, he knows of message from what is derived by the server manager

SYSTEM DESIGN  Architecture.

Data Flow Diagram

Admin

User

SEQUENCE DIAGRAM

Admin

User

ACTIVITY DIAGRAM ACTIVITY DIAGRAM

Admin

User

COMPONENT DIAGRAM COMPONENT DIAGRAM

Admin

User

Output Screens:

CONCLUSION we propose SAT, a security architecture mainly consisting of the ticket-based protocols, which resolves the conflicting security requirements of unconditional anonymity for honest users and traceability of misbehaving users. By utilizing the tickets, self-generated pseudonyms, and the hierarchical identity- based cryptography, the proposed architecture is demonstrated to achieve desired security objectives and efficiency.

FUTURE ENHANCEMENT In the WMNs considered here, the uplink from the client to the mesh router may rely on multihop communications Peer clients act as relaying nodes to forward each other’s traffic to the mesh router, which forms a P2P networ The notorious problem common in P2P communication systems is the free-riding

THANK YOU

Queries ?