Vous êtes sur la page 1sur 11

CERTIFICATE REVOCATION TO COPE WITH FALSE ACCUSATIONS IN AD-HOC NETWORKS

THESIS REPORT (PHASE I) SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF

MASTER OF ENGINEERING
(COMPUTER SCIENCE AND ENGINEERING)

Submitted by

R. BINDHUNAATH
(Reg. No. 111212405003)

Under the Guidance of

Mrs. S. SOUNDHARYA, M.E.,


Lecturer Department of Computer Science and Engineering

MAGNA COLLEGE OF ENGINEERING MAGARAL 600 055

DEC-2013

CERTIFICATE

MAGNA COLLEGE OF ENGINEERING


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
This is to certify that this thesis report (Phase-I) titled CERTIFICATE REVOCATION TO COPE WITH FALSE ACCUSATIONS IN ADHOC NETWORKS is the bonafide work of the work done by R.BINDHUNAATH, (Register No. 111212405003) in partial fulfillment of the requirements for the degree of Master of Engineering in Computer Science and Engineering during the year 2013. Certified further, that to the best of my knowledge the work reported herein does not form or any other candidate. part of any other project report or dissertation on the basis of which a degree or award was conferred on an earlier occasion on this

S.SOUNDHARYA
Lecturer Dept. of Computer Science & Engg. Project Guide

N. THARMINIE
Head of Department Dept. of Computer Science & Engg.

Internal Examiner

External Examiner

Place: Date:

ACKNOWLEGEMENT

ACKNOWLEGEMENT
I wish to express my sincere thanks and deep sense of gratitude to N. Tharminie, M.E., Ph.D., Head, Department of Computer Science and Engineering, and Project Coordinator, Department of Computer Science and Engineering, Magna College of Engineering, for having given me the opportunity to undertake this project. I am grateful and thankful to my guide S. Soundharya, M.E., Lecturer, Department of Computer Science and Engineering, for her invaluable guidance and inspiring suggestions at every stage of this project. Her technical expertise and immense help have largely contributed to the success of this project. Also I extend gratitude to the staff of the Department of Computer Science and Engineering for their encouragement which kept my spirits high throughout the course of the project. I also thank all my friends for their timely encouragement and kind cooperation.

TABLE OF CONTENTS

TABLE OF CONTENTS CHAPTER NO TITLE ABSTRACT (ENGLISH) ABSTARCT (TAMIL) LIST OF FIGURES APPENDIX 1 INTRODUCTION 1.1 INTRODUCTION TO WIRELESS NETWORKS 1.2 MOBILE AD-HOC NETWORKS 1.3 PROBLEM DEFINITION 1.3.1 ISSUES IN MANET 1.3.2 VARIOUS COLLABORATION 1.3.3 UNTRUSTED ENVIRONMENT 1.3.4 ON-LINE SECURITY INFRASTRUCTURE 1.3.5 HOSTILE ENVIRONMENT 1.4 PROJECT SCOPE 1.5 PROJECT PURPOSE LITERATURE REVIEW EXTERNAL INTERFACES REQUIREMENTS 3.1 USER INTERFACES 3.2 HARDWARE INTERFACES 3.3 SOFTWARE INTERFACES 3.4 COMMUNICATION INTERFACES OVERALL DESCRIPTION 4.1 PRODUCT PERSCEPTIVE 4.2 PRODUCT FEATURES 4.3 OPERATING ENVIRONMENT 4.4 DESIGN AND IMPLEMENTATION SYSTEM FEATURES DEVELOPMENT OF SOFTWARE 6.1 NETWORK FORMATION 6.2 CLUSTER BASED ROUTING PROTOCOL RESULTS AND CONCLUSION REFERENCES PAGE NO I II III IV 2 2 3 4 4 4 4 4 4 5 6 8 11 11 11 11 11 13 13 13 14 14 17 19 19 20 24 34

2 3

5 6

ABSTRACT
A mobile ad hoc network is vulnerable to many kinds of malicious attacks, and it is thus difficult to ensure secure communications. Protecting legitimate nodes from malicious attacks must be considered in MANETs. This is achievable through the use of a key management scheme which serves as a means of conveying trust in a public key infrastructure. These certificates are signed by the Certificate Authority (CA) of the network, which is a trusted third party that is responsible for issuing and revoking certificates. In such networks, a certificate revocation scheme which invalidates attackers certificates is essential in keeping the network secured. An attackers certificate can be successfully revoked by the CA if there are enough accusations showing that it is an attacker. A malicious node will try to remove legitimate nodes from the network by falsely accusing them as attackers. Therefore, the issue of false accusation must be taken into account in designing certificate revocation mechanisms.

, . . . , . , . . .

II

LIST OF FIGURES
SERIAL NO. 1 2 3 TITLE NODE FORMATION CLUSTER BASED ROUTING PROTOCOL GATEWAY NODE PAGE NO 19 20 22

4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

CLUSTER BASED CERTIFICATE REVOCATION AUTHORITY SHOWING REGION CREATION-DISTANCE REGION CREATION-RANGE REGION RANGE ERROR REGION CREATED NODE CREATION-DISTANCE NODE CREATION-RANGE NODE RANGE ERROR NODE CREATED NODE CREATED WITH NEIGHBOURS NODES IN REGIONS GATEWAY CREATION-DISTANCE GATEWAY CREATION-RANGE GATEWAY CREATED-REGION 1 GATEWAY CREATED-REGION 2 PATH FINDING AUTHORITY WITH CLUSTER HEAD FALSE ACCUSATION CREATION WARNING AND ACCUSED NODES

24 24 25 25 26 26 27 27 28 28 29 29 30 30 31 31 32 32 33 33

III

APPENDIX
IEEE LAN TCP CBRP - Institute of Electrical and Electronic Engineers. - Local Area Network. - Transmission Control Protocol. - Cluster Based Routing Protocol

CA ISDN GUI

- Certificate Authority - Integrated Services Digital Network - Graphical User Interface

MANET Mobile Adhoc NETworks

COCA Cornell Online Certificate Authority URSA Ubiquitous and Robust Access

IV

Vous aimerez peut-être aussi