Académique Documents
Professionnel Documents
Culture Documents
THESIS REPORT (PHASE I) SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF
MASTER OF ENGINEERING
(COMPUTER SCIENCE AND ENGINEERING)
Submitted by
R. BINDHUNAATH
(Reg. No. 111212405003)
DEC-2013
CERTIFICATE
S.SOUNDHARYA
Lecturer Dept. of Computer Science & Engg. Project Guide
N. THARMINIE
Head of Department Dept. of Computer Science & Engg.
Internal Examiner
External Examiner
Place: Date:
ACKNOWLEGEMENT
ACKNOWLEGEMENT
I wish to express my sincere thanks and deep sense of gratitude to N. Tharminie, M.E., Ph.D., Head, Department of Computer Science and Engineering, and Project Coordinator, Department of Computer Science and Engineering, Magna College of Engineering, for having given me the opportunity to undertake this project. I am grateful and thankful to my guide S. Soundharya, M.E., Lecturer, Department of Computer Science and Engineering, for her invaluable guidance and inspiring suggestions at every stage of this project. Her technical expertise and immense help have largely contributed to the success of this project. Also I extend gratitude to the staff of the Department of Computer Science and Engineering for their encouragement which kept my spirits high throughout the course of the project. I also thank all my friends for their timely encouragement and kind cooperation.
TABLE OF CONTENTS
TABLE OF CONTENTS CHAPTER NO TITLE ABSTRACT (ENGLISH) ABSTARCT (TAMIL) LIST OF FIGURES APPENDIX 1 INTRODUCTION 1.1 INTRODUCTION TO WIRELESS NETWORKS 1.2 MOBILE AD-HOC NETWORKS 1.3 PROBLEM DEFINITION 1.3.1 ISSUES IN MANET 1.3.2 VARIOUS COLLABORATION 1.3.3 UNTRUSTED ENVIRONMENT 1.3.4 ON-LINE SECURITY INFRASTRUCTURE 1.3.5 HOSTILE ENVIRONMENT 1.4 PROJECT SCOPE 1.5 PROJECT PURPOSE LITERATURE REVIEW EXTERNAL INTERFACES REQUIREMENTS 3.1 USER INTERFACES 3.2 HARDWARE INTERFACES 3.3 SOFTWARE INTERFACES 3.4 COMMUNICATION INTERFACES OVERALL DESCRIPTION 4.1 PRODUCT PERSCEPTIVE 4.2 PRODUCT FEATURES 4.3 OPERATING ENVIRONMENT 4.4 DESIGN AND IMPLEMENTATION SYSTEM FEATURES DEVELOPMENT OF SOFTWARE 6.1 NETWORK FORMATION 6.2 CLUSTER BASED ROUTING PROTOCOL RESULTS AND CONCLUSION REFERENCES PAGE NO I II III IV 2 2 3 4 4 4 4 4 4 5 6 8 11 11 11 11 11 13 13 13 14 14 17 19 19 20 24 34
2 3
5 6
ABSTRACT
A mobile ad hoc network is vulnerable to many kinds of malicious attacks, and it is thus difficult to ensure secure communications. Protecting legitimate nodes from malicious attacks must be considered in MANETs. This is achievable through the use of a key management scheme which serves as a means of conveying trust in a public key infrastructure. These certificates are signed by the Certificate Authority (CA) of the network, which is a trusted third party that is responsible for issuing and revoking certificates. In such networks, a certificate revocation scheme which invalidates attackers certificates is essential in keeping the network secured. An attackers certificate can be successfully revoked by the CA if there are enough accusations showing that it is an attacker. A malicious node will try to remove legitimate nodes from the network by falsely accusing them as attackers. Therefore, the issue of false accusation must be taken into account in designing certificate revocation mechanisms.
, . . . , . , . . .
II
LIST OF FIGURES
SERIAL NO. 1 2 3 TITLE NODE FORMATION CLUSTER BASED ROUTING PROTOCOL GATEWAY NODE PAGE NO 19 20 22
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
CLUSTER BASED CERTIFICATE REVOCATION AUTHORITY SHOWING REGION CREATION-DISTANCE REGION CREATION-RANGE REGION RANGE ERROR REGION CREATED NODE CREATION-DISTANCE NODE CREATION-RANGE NODE RANGE ERROR NODE CREATED NODE CREATED WITH NEIGHBOURS NODES IN REGIONS GATEWAY CREATION-DISTANCE GATEWAY CREATION-RANGE GATEWAY CREATED-REGION 1 GATEWAY CREATED-REGION 2 PATH FINDING AUTHORITY WITH CLUSTER HEAD FALSE ACCUSATION CREATION WARNING AND ACCUSED NODES
24 24 25 25 26 26 27 27 28 28 29 29 30 30 31 31 32 32 33 33
III
APPENDIX
IEEE LAN TCP CBRP - Institute of Electrical and Electronic Engineers. - Local Area Network. - Transmission Control Protocol. - Cluster Based Routing Protocol
CA ISDN GUI
COCA Cornell Online Certificate Authority URSA Ubiquitous and Robust Access
IV